Question 1
Q1. List and briefly define categories of security mechanisms?
Here are categories of security mechanisms:
1. Preventive Mechanisms
- Firewalls: block unauthorized access
- Intrusion Detection/Prevention Systems (IDPS): detect and prevent intrusions
- Access Control Lists (ACLs): regulate network traffic
- Encryption: protect data confidentiality
2. Detective Mechanisms
- Auditing and Logging: monitor system activity
- Intrusion Detection Systems (IDS): detect intrusions
- Anomaly Detection Systems: identify unusual behavior
- Security Information and Event Management (SIEM) systems: analyze logs
3. Reactive Mechanisms
- Incident Response Plans: respond to security incidents
- Backup and Recovery: restore systems after breaches
- Patch Management: update software vulnerabilities
- Disaster Recovery Plans: recover from disasters
4. Deterrent Mechanisms
- Authentication mechanisms (e.g., passwords, biometrics)
- Authorization mechanisms (e.g., access control)
- Penalties for unauthorized access
- Security awareness training
5. Corrective Mechanisms
- Configuration Management: ensure secure configurations
- Vulnerability Management: identify and remediate vulnerabilities
- Patch Management: update software vulnerabilities
- Security updates and upgrades
6. Physical Security Mechanisms
- Biometric access control
- Smart cards
- Physical locks and barriers
- Surveillance systems
7. Cryptographic Mechanisms
- Encryption (symmetric, asymmetric)
- Digital signatures
- Hash functions
- Key management
6. Physical Security Mechanisms
- Biometric access control
- Smart cards
- Physical locks and barriers
- Surveillance systems
7. Cryptographic Mechanisms
- Encryption (symmetric, asymmetric)
- Digital signatures
- Hash functions
- Key management
8. Network Security Mechanisms
- Virtual Private Networks (VPNs)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Secure Shell (SSH)
- Network segmentation
These categories overlap, and effective security requires a combination of mechanisms.
- Virtual Private Networks (VPNs)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Secure Shell (SSH)
- Network segmentation
These categories overlap, and effective security requires a combination of mechanisms.
Q2. Briefly define the difference between hashing and digital signatures?
Hashing
- A one-way mathematical function
- Transforms data into a fixed-size string (hash value or digest)
- Ensures data integrity and detects tampering
- Examples: SHA-256, MD5, CRC
Digital Signatures
- A cryptographic mechanism combining hashing, encryption, and authentication
- Verifies authenticity, integrity, and non-repudiation
- Uses public-key cryptography (asymmetric encryption)
- Examples: RSA, DSA, ECDSA
Key differences:
1. Purpose: Hashing (integrity) vs. Digital Signatures (authenticity, integrity, non-repudiation)
2. Direction: Hashing (one-way) vs. Digital Signatures (encryption and decryption)
3. Keys: Hashing (no keys) vs. Digital Signatures (public-private key pairs)
Q3. What do you mean by cryptography? Explain symmetric key cryptography.
Cryptography
Cryptography is the practice and study of techniques for secure communication by transforming plaintext (readable data) into ciphertext (unreadable data) to protect it from unauthorized access. It involves algorithms and protocols to ensure confidentiality, integrity, and authenticity.
Symmetric Key Cryptography
Symmetric key cryptography, also known as secret key cryptography, uses the same secret key for both encryption and decryption.
Key Characteristics:
1. Same key for encryption and decryption
2. Fast and efficient
3. Secure key exchange is challenging
How Symmetric Key Cryptography Works:
1. Key generation: Generate a shared secret key.
2. Encryption: Use the secret key to encrypt plaintext.
3. Transmission: Send ciphertext over an insecure channel.
4. Decryption: Use the same secret key to decrypt ciphertext.
Types of Symmetric Key Algorithms:
1. Block ciphers (AES, DES): Divide data into fixed-size blocks.
2. Stream ciphers (RC4): Encrypt continuous data streams.
Advantages:
1. Fast encryption/decryption
2. Low computational overhead
3. Efficient key management
Disadvantages:
1. Key exchange challenges
2. Limited security (compared to asymmetric cryptography)
Examples of Symmetric Key Algorithms:
1. AES (Advanced Encryption Standard)
2. DES (Data Encryption Standard)
3. 3DES (Triple Data Encryption Algorithm)
4. Blowfish
5. Twofish
Real-World Applications:
1. Secure online transactions (HTTPS)
2. Data encryption (files, databases)
3. Secure communication protocols (SSL/TLS)
4. Cryptographic protocols (IPsec, PGP)
0 Comments