Future Vision BIE Future Vision BIE


ONE STOP FOR ALL STUDY MATERIALS & LAB PROGRAMS


E MENU Whatsapp Share Join Telegram, to get Instant Updates
×

NOTE!

Click on MENU to Browse between Subjects...

Advertisement

17CS61 - CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

6TH SEMESTER ISE & CSE

Answer Script for Module 1

Solved Previous Year Question Paper

CBCS SCHEME


CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

[As per Choice Based Credit System (CBCS) scheme]

(Effective from the academic year 2017 - 2018)

SEMESTER - VI

Subject Code 17CS61

IA Marks 40

Number of Lecture Hours/Week 3

Exam Marks 60



Advertisement


These Questions are being framed for helping the students in the "FINAL Exams" Only (Remember for Internals the Question Paper is set by your respective teachers). Questions may be repeated, just to show students how VTU can frame Questions.

- ADMIN


17CS61 - CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

6TH SEMESTER ISE & CSE

Answer Script for Module 1



× CLICK ON THE QUESTIONS TO VIEW ANSWER

1.1 Cyber Attack:

cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. An attacker is a person or process that attempts to access data, functions or other restricted areas of the system without authorization, potentially with malicious intent. Depending on context, cyberattacks can be part of cyberwarfare or cyberterrorism . A cyberattack can be employed by sovereign states , individuals, groups, society or organizations, and it may originate from an anonymous source.

A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seeking to limit the use of the term to incidents causing physical damage, distinguishing it from the more routine data breaches and broader hacking activities.

1.2 Motives of Cyber Attacks:

The sheer thrill of mounting a successful cyber-attack has been motivation enough for hackers (Table 1.1)

Year

Event

1988

Robert Morrisa 23-year-old Cornell graduate student, released a worm that over an Arpanet, incapacitating almost 6000 computers, congesting government and university systems. He was fined $10,000 and sentenced to 3 years' probation.

1991

31-year-old David L. Smith created the worm "Melissa," which infected thousands of computers causing damage of approximately $1.5 billion. This virus sent copies of itself to the first 50 names of the recipient's address book. He received a 20-month jail term.

2001

"Anna Kournikova" virus. Promising photos of the tennis star mailed itself to the every person in the victim's address book. Investigators were apprehensive that the virus was created with a toolkit enabling the rookies to create a virus.

2008

The headquarters of the Obama and McCain presidential campaigns were hacked.

Table 1.1 Notable cyber attacks

Most hackers were (and still are) young adults, often teens, who had dropped out of school but were otherwise intelligent and focused. Many of the "traditional" hackers seem to be obsessive programmers. They seem to be adept at circumventing limitations to achieve a challenging but often forbidden objective.

In addition, there is a tribe of script kiddies - juveniles who use scripts and attack kits designed by others (these can be freely downloaded from the Internet). Their activities do not require any special programming skills or advanced knowledge of computer systems.

Other perpetrators of cyber-attacks include company insiders, often disgruntled employees who. wish to even scores with their employers. There is also a serious threat from cyber terrorists who espouse extreme religious or political causes. Cyber terrorism is one weapon in their impressive arsenal which may include biological, chemical, and nuclear weapons. Their goals are to cripple the information/communication systems of the financial and business institutions of their "enemies."

Some of the main motives of launching cyber-attacks are:

1. Theft of sensitive information.

2. Disruption of service.

3. Illegal access to or use of resources

1.2.1 Theft of sensitive information.

i. Many organizations store and communicate sensitive information.

ii. Information on new products being designed or revenue sources can be hugely advantageous to a company's competitors.

iii. Likewise, details of military installations or precise military plans can be of immense value to a nation's adversaries.

iv. Political spying targeted at government ministries and national intelligence can HAVE many sensitive operations planned for the future.

v. Besides corporations, banks, the military, intelligence, etc., the individual too has increasingly been a target.

vi. Leakage of personal information such as credit card numbers, passwords, and even personal spending habits are common and are collectively referred to as identity theft. Such information is advertised on certain websites and may be purchased for a small fee.

1.2.2 Disruption of service.

i. Interruption or disruption of service is launched against an organization's servers so they are made unavailable or inaccessible.

ii. In recent times, there have been unconfirmed reports of such attacks being launched by business rivals of e-commerce websites.

iii. The goal here appears to be "my competitor's loss is my gain." In 2001, there were a series of such attacks that targeted the websites of Yahoo, Microsoft, etc. in a short span of time.

iv. They were meant to alert corporates and others of the dangers of this class of attacks.

1.2.3 Illegal access to or use of resources

i. The goal here is to obtain free access or service to paid services.

ii. Examples of this include free access to online digital products such as magazine or journal articles, free talk time on someone else's account, free use of computing power on a supercomputer, etc.

iii. In each case, the attacker is able to circumvent controls that permit access to only paid subscribers of such services.



Advertisement

2.1 Extended Euclidean Algorithm:

The formal procedure to obtain the inverse of c modulo b is called the Extended Euclidean Algorithm and ts presented next. It assumes that b and c are relatively prime.

Extended Euclidean Algorithm

Fig 2.1: Extended Euclidean Algorithm

2.2 We use the Extended Euclidean Algorithm (Fig. 2.1) to compute the inverse of 12 modulo 79 (b = 79 and c = 12)

Table 2.2 tracks the values of b’, c’, q, r, old1, new1, old2, and new2 at the end of each iteration. The invariant, new1 x b + new2 x c = r is maintained across all iterations. At the end of the last iteration r = 1 and the invariant is

(-5) x 79 + 33 x 12 =1,

or

12 * 33 = 1+5 * 79 = 1 (mod 79)

Thus, the inverse of 12 modulo 79 is 33.

Illustrating the Extended Euclidean Algorithm - Finding inverse
    of 12 modulo 79

Table 2.2: Illustrating the Extended Euclidean Algorithm - Finding inverse of 12 modulo 79


The

Vigenere cipher

is a

polyalphabetic

that uses a multi-digit cipher key,

k1, k2, …, km,

Here, k1, k2, …, km, are each integer. The

plaintext

is split into non-overlapping blocks, each containing

m consecutive characters

. Then the

first letter

of each block is replaced by the letter

k1,

positions to its right, the second letter of each block is replaced by the letter

k2

, positions to its right, and so on.

Vigenere cipher

The first letter in the above text is W. The corresponding key is 04. This means that the cipher text is the letter 4 positions ahead (in the modulo 26 sense).

The key length = 8, i.e., the key string repeats after every 8 characters.

There are four occurrences of the letter "s" in the above text (for simplicity we do not distinguish between upper and lower case letters). However, each occurrence of "s" is encrypted as a different character in the cipher text - "V", "X", "O" and "Z".



Advertisement

Loading Image


There are at least tour important vulnerability classes in the domain of security:

5.1 Human Vulnerabilities:

These are vulnerabilities caused by human behaviour or action.

For example, the user clicks on a link in an e-mail message received from a questionable source. By so doing, the user can be directed to a site controlled by the attacker as in a

phishing attack or a cross-site scripting attack

.

Similarly clicking on an e-mail attachment may open up a document causing a

macro

to be executed.

The

macro may be designed to infect other files

on the system and/or spread the infected e-mail to other e-mail addresses harvested from the victim's inbox.

In both these cases, the

human vulnerability consists of clicking on a link or

attachment in an e-mail from a possibly unknown source.

The

link or attachment

may have provoked the victim by a flashy message suggesting quick money, etc., blinding him/her to the fact that the message came from an unknown source.

It is actions like this that make a phishing attack or an e-mail virus so very successful.

5.2 Protocol Vulnerabilities:

A number of networking protocols including

TCP, IP, ARP, ICMP, UDP, DNS

, and various protocols used in local area networks (LANs) have features that have been used in unanticipated ways to craft assorted attacks.

Pharming attacks and various

hijacking attacks

are some examples.

There are tools available

on-line to facilitate some of these attacks.

One such tool subverts the normal functioning of the ARP protocol to sniff passwords from a LAN.

There are a number of vulnerabilities in the

design of security protocols

that lead to

replay or man-in-the-middle attacks.

These attacks, in turn, lead to identity theft, compromise of secret keys, etc.

Vulnerabilities in network protocols are often related to aspects of their design though they may also be the result of poor implementation or improper deployment.

5.3 Software Vulnerabilities:

This family of vulnerabilities is caused by written system or application software.

In many cases, the causes of the problem seem to be the code that is all too trusting of user input.

Ex A web server accepts input from a user's browser. the web server must accept the request after typing the complete username and password. the server software should perform sufficient validation.

5.4

Configuration Vulnerabilities:

These relate to configuration settings on newly installed applications, files, etc.

Read-write-execute

permissions on files may be too generous and susceptible to

abuse.

The privilege level assigned to a process may be higher than what it should be to carry out a task. This privilege may be misused during some point in its execution leading to what are commonly called "privilege escalation" attacks.

Besides misconfiguration of software and services, security appliances such as firewalls may be incorrectly or incompletely configured with possibly devastating effect.

Loading Image

Fig 5.1: Common attacks and vulnerabilities


× NOTE: Each Page Provides only 5 Questions & Answer
Below Page NAVIGATION Links are Provided...
All the Questions on Question Bank Is SOLVED

Advertisement



× SUGGESTION: SHARE WITH ALL THE STUDENTS AND FRIENDS -ADMIN