Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

CSE ASSIGNMENT

1. Discuss information assurance fundamental.


2. Analyse public key encryption.
3. Domain Name system is naming database. Justify.
4. Is firewall same as IDF, if not justify your answer.
5. Describe how DNS work.
--------------------------------------------------------------
1.
-------------------------------------------------------------------------
2.Components of Public Key Encryption:

Plain Text:
This is the message which is readable or understandable. This message is given to
the Encryption algorithm as an input.
Cipher Text:
The cipher text is produced as an output of Encryption algorithm. We cannot simply
understand this message.
Encryption Algorithm:
The encryption algorithm is used to convert plain text into cipher text.
Decryption Algorithm:
It accepts the cipher text as input and the matching key (Private Key or Public
key) and produces the original plain text
Public and Private Key:
One key either Private key (Secret key) or Public Key (known to everyone) is used
for encryption and other is used for decryption
Applications of the Public Key Encryption:

Encryption/Decryption:
Confidentiality can be achieved using Public Key Encryption.
Digital signature:
Digital signature is for senders authentication purpose.
In this sender encrypt the plain text using his own private key.
Key exchange:
This algorithm can use in both Key-management and securely transmission of data.
-------------------------------------------------------------------------
3.The domain name system (DNS) is a naming database in which internet domain names
are located and translated into Internet Protocol (IP)
addresses. The domain name system maps the name people use to locate a website to
the IP address that a computer uses to locate that
website.
For example, if someone types "example.com" into a web browser, a server behind the
scenes maps that name to the
corresponding IP address. An IP address is similar in structure to 203.0.113.72.
Web browsing and most other internet activities rely on DNS to quickly provide the
information necessary to
connect users to remote hosts. DNS mapping is distributed throughout the internet
in a hierarchy of authority.
Access providers and enterprises, as well as governments, universities and other
organizations, typically have their own
assigned ranges of IP addresses and an assigned domain name. They also typically
run DNS servers to manage the mapping of those
names to those addresses. Most Uniform Resource Locators (URLs) are built around
the domain name of the web server that takes client
requests.
-------------------------------------------------------------------------
4.
Intrusion Detection Systems and firewalls are both cybersecurity solutions that
can be deployed to protect an endpoint or network.
However, they differ significantly in their purposes.
An IDS is a passive monitoring device that detects potential threats and generates
alerts,
enabling security operations center (SOC) analysts or incident responders to
investigate and respond to the potential incident.
An IDS provides no actual protection to the endpoint or network. A firewall, on the
other hand, is designed to act as a protective
system. It performs analysis of the metadata of network packets and allows or
blocks traffic based upon predefined rules.
This creates a boundary over which certain types of traffic or protocols cannot
pass.Since a firewall is an active protective device,
it is more like an Intrusion Prevention System (IPS) than an IDS.
-------------------------------------------------------------------------
5.
a)A user types ‘example.com’ into a web browser and the query travels into the
Internet and is received by a DNS recursive resolver.
b)The resolver then queries a DNS root nameserver (.).
c)The root server then responds to the resolver with the address of a Top Level
Domain (TLD) DNS server (such as .com or .net), which stores the information for
its domains. When searching for example.com, our request is pointed toward the .com
TLD.
d)The resolver then makes a request to the .com TLD.
e)The TLD server then responds with the IP address of the domain’s nameserver,
example.com.
f)Lastly, the recursive resolver sends a query to the domain’s nameserver.
g)The IP address for example.com is then returned to the resolver from the
nameserver.
h)The DNS resolver then responds to the web browser with the IP address of the
domain requested initially.
Once the 8 steps of the DNS lookup have returned the IP address for example.com,
the browser is able to make the request for the web page:
i)The browser makes a HTTP request to the IP address.
j)The server at that IP returns the webpage to be rendered in the browser

You might also like