Professional Documents
Culture Documents
Lab - 1 - Network Security and Cryptography
Lab - 1 - Network Security and Cryptography
LAB ASSIGNMENT 1
Submitted By:
Sol.The OSI model (Open Systems Interconnect) is a design concept that breaks dow
n the functioning of communication or communications into seven layers of abstracti
on. The OSI model is often used to understand and design network structures. Althou
gh the OSI model itself does not directly specify security measures, security consider
ations can be implemented at various layers. When security is discussed in the conte
xt of the OSI model, it is often referred to as OSI security architecture, or OSI security
for short.
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
Resolve security issues at different layers of the network and use the OSI model and
various security protocols and processes to protect communications and data integrit
y. Below is a brief description of the security of each layer generally discussed:
PhysicalLayer: The security measures of this system include protecting physical syste
ms (such as cabling and network equipment) from unauthorized use or tampering.
Data link layer: Security mechanisms such as MAC (Media Access Control) address filt
ering are used to control data link access to the network.
Network layer: this layer includes routing and addressing. Network layer security incl
udes measures such as firewalls and routers with access control lists (ACLs) to control
traffic.
TransportLayer: The security of this system includes ensuring the integrity and confid
entiality of information during transmission. Protocols such as SSL/TLS operate at the
transport layer to provide secure communications.
Session layer: The session layer is not particularly secure but can use encryption met
hods provided by higher layers to establish a secure session.
Although the OSI standard provides meaning, it should be noted that the process and
technology will not exactly follow the process of the standard. Additionally, today's n
etwork security discussion often includes other standards, such as the TCP/IP standar
d, and focuses on specific security issues such as authentication, access, and access a
ccess.
Q2. Define the type of security attack and explain in each of following cases:
A. John gives a cheque of $14 to the shopkeeper to buy a book. Later he finds that
the cheque was cashed for $140.
B. A person sends hundreds of e-mails every day to another person using a phony
return e-mail address.
Sol:
Description:
In the incident, John gave the store owner a check for $14 to purchase a book. What
occurs here is the detection of fraud through security attack, intervention or
modification. After John issues the check, someone (who may be the store owner or
a third party) maliciously changes the amount on the check. The check was
fraudulently changed to $140 instead of the original $14. These attacks involve illegal
transfers into financial instruments for the purpose of committing fraud and
obtaining additional funds.
Description:
In this scenario, a person uses a fake email address to send messages to other
people every day. People send hundreds of emails. . The security attack described
here is email spoofing and specifically falls into the general category of phishing.
Email spoofing involves spoofing the sender's address in an email so that it appears
to come from a trusted source. Phishing is a type of social networking attack where
attackers typically attempt to trick recipients into revealing sensitive information,
such as access to credentials or financial details. By using the false email address,
attackers aim to trick the recipient into thinking the email is legitimate; This can lead
to various crimes such as spreading malware, hacking papers, or initiating financial
fraud.
Q3. Draw a matrix that shows the relationship between security services and
security mechanisms.
Sol. The relationship between security services and security systems can be
represented by a matrix. Security services represent the higher goals or objectives of
security, and security systems are the specific tools, processes or technologies used
to implement this service. Here is a simple matrix:
Explanation:
Sol. Fundamental security design principles provide guidance for creating secure
systems and networks. These principles help create a safe and effective environment.
Some important aspects of security design are:
Least Privilege:
Users and systems should be allowed the minimum access or authorization necessary
to perform their tasks. This principle limits damages in the event of a security breach
by minimizing unauthorized access.
Defense in depth:
Failsafe default:
The system must be failsafe by default. If security controls are not working or
misconfigured, the system needs to be reset to the most secure state rather than
exposing vulnerabilities.
Economy of mechanism:
Make the security mechanism as simple as possible. Systems with fewer components
are easier to understand, analyze and manage. Complexity often creates
vulnerabilities, so simplicity increases security.
Completing the Discussion:
Permissions should be checked for all access to resources. This ensures that
unauthorized access attempts are always denied and ignored.
Open Design:
The security of the system should not depend on the confidentiality of its design. The
design should be open to review by the security community. This principle promotes
transparency and helps identify and resolve potential problems through public
scrutiny.
Separation of Responsibilities:
Minimal mechanisms:
Least surprising:
Divide the system into parts or sections and restrict the flow of data between them.
This principle helps to overcome the security situation by isolating different parts of
the body.
Using these principles helps develop robust and secure systems, communications
and applications. Remember that security is a constantly evolving process and the
application of these principles must be adapted to the environment and technology.
Sol. The text provided appears to have been encrypted using a password that is easy
to change. In password changing, ciphertext is created by replacing each letter in the
plaintext with another letter. To determine this, we need to determine the
orientation of the original text and the replaced text.
computers have made our lives easier by automating many mundane tasks; making
them much more efficient and less time-consuming. a computer system consists of
various components, making it complex and capable of performing a wide range of
tasks. a system typically includes input devices such as keyboards and mice, output
devices like monitors and printers, and a central processing unit (cpu) that performs
calculations and manages data. a network connects computers and allows them to
communicate with each other, enabling the sharing of resources and information.
decrypt this message.