QUESTION BANK 10CS835-INFORMATION AND NETWORK SECURITY

Similar documents
NETWORK ADMINISTRATION AND SECURITY

Chapter 10. Network Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 8. Network Security

Chapter 32 Internet Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Protocol Security Where?

Cryptography and network security CNET4523

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Lecture 9 - Network Security TDTS (ht1)

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

CSE/EE 461 Lecture 23

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Wireless Mobile Internet Security. 2nd Edition

Network Security Part II: Standards

Network Security Fundamentals

NETWORK SECURITY (W/LAB) Course Syllabus

IT Networks & Security CERT Luncheon Series: Cryptography

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Computer Networks. Secure Systems

EXAM questions for the course TTM Information Security May Part 1

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Security and Firewall 1

How To Understand And Understand The Security Of A Key Infrastructure

Secure Sockets Layer

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security Engineering Part III Network Security. Security Protocols (II): IPsec

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Virtual Private Networks

Cornerstones of Security

Network Security Protocols

Chapter 7 Transport-Level Security

Savitribai Phule Pune University

CS 494/594 Computer and Network Security

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Chapter 4 Virtual Private Networking

Network Security Technology Network Management

Virtual Private Networks: IPSec vs. SSL

ICTTEN8195B Evaluate and apply network security

Securing IP Networks with Implementation of IPv6

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

CS 4803 Computer and Network Security

Internet Security. Contents. ITS335: IT Security. Internet Security. Secure . Summary

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

CSCI 454/554 Computer and Network Security. Final Exam Review

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 9. IP Secure

Three attacks in SSL protocol and their solutions

VALLIAMMAI ENGINEERING COLLEGE

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Introduction to Cyber Security / Information Security

IPSec Pass through via Gateway to Gateway VPN Connection

Cisco QuickVPN Installation Tips for Windows Operating Systems

ETSF10 Part 3 Lect 2

Security vulnerabilities in the Internet and possible solutions

Implementing Cisco IOS Network Security v2.0 (IINS)

IPsec VPN Application Guide REV:

How To Pass A Credit Course At Florida State College At Jacksonville

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Network Access Security. Lesson 10

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Network Security. Lecture 3

Network Security. Outline of the Tutorial

T Cryptography and Data Security

UNIT I. 5. Define cryptanalysis? It is a process of attempting to discover the key or plaintext or both.

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Netzwerksicherheit: Anwendungen

Security Policy Revision Date: 23 April 2009

Tim Bovles WILEY. Wiley Publishing, Inc.

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

CRYPTOG NETWORK SECURITY

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

PA160: Net-Centric Computing II. Network Security

Network Security Administrator

Security Protocols/Standards

Internetwork Security

Description: Objective: Attending students will learn:

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Cryptography and Network Security IPSEC

Transcription:

QUESTION BANK 10CS835-INFORMATION AND NETWORK SECURITY Objectives: - It is the purpose of this subject to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards, especially Internet standards that have been widely deployed. QUESTION BANK UNIT1: Planning for security 1. Define Policy and explain issue specific security policy. 10 2. Explain the importance of incident response planning strategy. 10 3. Explain the Pipkin s three categories of incident indicators 12 4. Explain the ISO/IEC 27001:2005 plan-do-check-act-cycle. 08 5. Discuss the system specific policy. How managerial guidance 10 and technical specifications can be used in SYSSP? 6. Who is responsible for a policy management? How a policy is 10 managed? Explain. 7. Define the terms : Policy,standards and practices in the context 06 of information security. Draw a schematic diagram depicting the inter-relationship between the above. 8. What are the policies that must be defined by the managements 07 (of organizations) as per NIST SP 800-14? Describe briefly the specific areas covered by any of these policies. 9. What are the components of contingency planning? Describe 07 briefly the important steps involved in the recovery process after

the extent of damage causes by an incident has been assessed? 10. Explain the major steps specified in BS7799:2 documents. How 10 these steps help in security planning? 11. Explain issue specific security policy. 10 12. Draw Schematic diagram showing major steps in contingency 10 planning. Explain in detail business impact analysis 13. Explain NSTISSC security model. 05 UNIT 2: SECURITY TECHNOLOGY-1 1. Explain the firewall rules. 10** 2. Explain the screened subnet firewall. 10 3. What is a firewall? Show the working of a screened host and 10 dual homed firewalls. 4. How a firewall can be configured and managed? Give examples. 10 5. What is firewall? Explain categories of firewalls based on 10 processing mode. 6. What is VPN? Explain two modes of a VPN. 10 7. What are VPN? Explain different techniques to implement a 10** VPN? 8. What is a firewall? List the type of firewalls categorized by 10 processing mode. Draw a schematic diagram of a packet filtering router used as a firewall and explain its function using a sample firewall rule. UNIT 3: SECURITY TECHNOLOGY-2 1. How a signature based IDPS differ from a behavior does based 10 IDPs? 2. Explain the venerability scanners. 10 3. What is an intrusion? Briefly write about any eight IDPS 10 terminologies. 4. Explain network based intrusion detection and prevention 10

. 5. Describe the need of operating system detecting tools. 10 6. Define the following terms related to IDS: 05 i) Alert ii) False attack stimulus iii) False negative iv) False positive v) True attack stimulus. 7. Discuss the reasons for acquisition and use of IDSs by 06 organization. 8. Discuss the differences between host IDS and network IDS, with 06 the help of a schematic diagram. 9. Define the terms : honey pots,honey net and padded cells. 03 10. Differentiate between network-based IDS and Host based IDS 08 emphasizing on their advantages and disadvantages. 11 With the help of schematic diagram, explain centralized control 06 strategy implementation of IDS. 12 Enumerate the advantages and disadvantages of using honey 06 honey pots UNIT 4: CRYPTOGRAPHY 1. What are the differences between digital signature and digital 10 certificate? 2. Explain the two methods of encrypting plain text? 10 3. What is an encryption? Discuss the symmetric and asymmetric 10 encryption methods? 4. List out the elements of cryptosystems and explain transposition 10 cipher technique. 5. Who can attack cryptosystems? Discuss different categories of 10** attacks on cryptosystems. 6. Define the following terms related to cryptography: 10** 1) Algorithm 2) Cipher 3)Key 4) Link encryption 5) Work factor 6) Plain Text 7) Stenography 8) Work Factor 9) 7. Summarize RSA algorithm. 06**

In a RSA system, it is given that p = 11, q = 13, r = 7 and M = 5, Find ciphertext C and also M from decryption 8. Explain the Diffie hellman key exchange algorithm. 06** 9. With a neat block diagram explain the single round of DES algorithm. 06** 10. Explain the various modes in which DES can be used for different applications. 06** UNIT 5: INTRODUCTION TO NETWORK SECURITY, AUTHENTICATION APPLICATIONS 1. Describe the terms: authentication, integrity, privacy, 05 authorization and non repudiation. 2. Discuss the man-in-the-middle attack. 04 3. What are the differences between active and passive security 05 attacks? 4. Explain the different authentication procedures in X.509 09** certificate. 5. Write the summary of Kerberos version five message exchange. 06 6. What is meant by information security? Discuss the three 10 aspects of information security. 7. Briefly explain the four types of security attacks that are 10 normally encountered.also distinguish between active and passive attacks. 8. With a schematic figure, explain Kerberos Ver-4 Authentication 10* dialogue. Clearly mention various steps. 9. Compare active and passive attacks. 05 10. With a neat diagram, explain network security model. 07 11. List out the differences between Kerberos version 4 and version 08 5 12. Describe briefly the various security attacks and specific 14 security mechanisms covered by X.800. 13. Describe briefly the authentication procedures covered by 06 X.809.

14. Describe the steps involved in Kerberos Login and Kerberos 10 Request for services, with suitable illustrations. 15. Discuss active security attacks 04 16. Explain the Kerberos ver-4 message exchanges 10 UNIT 6: ELECTRONIC MAIL SECURITY 1. With a neat diagram, explain the digital signature service 10 provided by PGP. 2. Explain the different MIME content types. 10** 3. With flow charts, explain the process of transmission and 10 reception of PGP messages. 4. Explain PGP Message generation and PGP message reception 10** techniques. 5. Describe S/MIME functionality. 05 6. Explain S/MIME certificate processing method. 05 7. Describe the steps involved in providing authentication and 10 confidentiality by PGP, with suitable illustrations. 8. Discuss the limitations of SMTP/RFC 822 and how MIME 10 overcomes these limitations. UNIT 7: IP SECURITY 1. Explain the format of an ESP packet in IP Security. 07 2. Why does ESP include a padding field? 03 3. Give an example of an aggressive 0akley key. 10 4. Give the general structure of IPSEC authentication header. 10 Describe how anti reply service is supported. 5. With neat diagrams, discuss the basic combinations of security 10 associations. 6. Describe SA parameters and SA selectors in detail. 10

7. Describe Oakley key determination protocol. 10 8. Describe the benefits of IPSec. 05 9. What is security association? Discuss briefly the parameters that 05 are used to define a security association. 10. Describe the transport and tunnel modes used for IPSec AH 10 authentication bringing out their scope relevant to IPV4. 11 Mention Applications of IP Sec 04 12 Explain security association selectors that determine an security 06 policy database entry 13 Draw neat diagram of IP Sec ESP format and explain 05 14 Mention the important features of Oakley Algorithm 05 UNIT 8: WEB SECURITY 1. Explain the dual signature in SET protocol. What is its purpose? 10 2. Explain the different alert codes of TLS protocols. 10 3. What is SET? Discuss the requirements and key features of 10 SET. 4. Write short notes on: 1) SSL handshake protocol 2) SSL alert 10 protocol. 5. Explain SSL handshake protocol with a neat diagram. 10 6. List out the key features of secure electronic transaction and 10 explain in detail. 7. Discuss the SSL protocol stack. 04 8. What are the services provided by SSL record protocol? 08 Describe the operation of this protocol, with suitable illustration. 9. What is SET? Discuss its specifications. 08 10. Explain the parameters that define session state and connection 10 state in SSL 11 Describe SET participants 05

12 Explain the construction of dual signature n SET with a 05 diagram. Also show its verification by the merchant and the Bank.