Você está na página 1de 19

ASKB Charitable Foundation Trust

Atria Institute of Technology, Bangalore 24


DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Subject / Course Lesson Plan


Semester: VIII

Year: 2016

Subject Name:Network Security

Subject Code: 10EC832

Total Teaching Hours: 52 hrs

Duration of Exam: 3hours

Exam Marks: 100

IA Marks: 25

Lesson Plan Author: Umama Kousar

Date: 01 Feb 2016

Checked By:

Date: 01 Feb 2016

Prerequisites: The student should have undergone the course on the following topics
Basic knowledge of networking concepts.
Basics of cryptography.
OSI Model and its specifications.
Virus attacks information.

Subject/Course Learning Objectives:


At the end of the course the student should be able to:

Illustrate the basic fundamental networking concepts and OSI model for security.
Understand the different types of cryptographies.
Introduce authentication techniques.
Discuss various types of virus and construction of firewalls.

Subject/Course Outcomes:
After completing this course the student must demonstrate the knowledge and ability to:
1. Build a fundamental understanding of the objectives of cryptography and network security.
2. Become familiar with the cryptographic techniques that provides information and network security.
3. Impart knowledge on Encryption techniques, Design Principles and Modes of operation.
4. Analyze a given system with respect to security of the system.
5. Understand the Key Management techniques and Number Theory.
6. Create an understanding of Authentication functions the manner in which Message Authentication
Codes and Hash Functions works.
7. Examine the issues and structure of Authentication Service and Electronic Mail Security
8. Provide familiarity in Intrusion detection and Firewall Design Principles.

Page 1 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Subject/Course Articulation Matrix: Mapping of Subject Learning Objectives (SLO/CLO)


with NBA-2015 tier 1 &2 (Course outcomes)
Subject Name:Network Security
Semester: VIII

Course code:10EC832
Year: 2015 - 2016 (Even Sem)
Life-long learning

3. Impart knowledge on
Encryption techniques,
Design Principles and
Modes of operation.

4. Analyze a given system


with respect to security of
the system.

5. Understand the Key


Management techniques
and Number Theory.

H
H

6. Create an understanding
of Authentication functions
the manner in which
Message Authentication
Codes and Hash Functions
works.

12

Project management and finance:

11

Communication

10
Individual and team work

9
Ethics

8
Environment and sustainability

7
The engineer and society:

6
Modern tool usage:

5
Conduct investigations of complex problems

cryptographic techniques
that provides information
and network security.

4
Design/development of solutions

1. Build a fundamental
understanding of the
objectives of cryptography
and network security.
2. Become familiar with the

3
Problem analysis

Subject/Course Learning
Objectives-SLO/CLO

2
Engineering knowledge

L
L

7. Examine the issues and


structure of Authentication
Service and Electronic Mail
Security.

8.Provide familiarity in
M
L
L
Intrusion detection and
Firewall Design Principles.
Degree of compliance L: Low M: Medium

H: High

Page 2 of 19

H
L

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Syllabus Content
Subject Code: 10EC832
Subject Name:Network Security
Teaching Hours: 52

IA: 25
Exam Marks: 100
Part A

UNIT 1
Services,mechanisms and attacks,The OSI security achitecture,A model for network
security
UNIT 2

SYMMETRIC

CIPHERS:

Symmetric

Cipher

Model,

6 hours

Substitution Techniques,

Transposition Techniques, Simplified DES, Data encryption standard (DES), The


strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles

7 hours

and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The
AES Cipher.
UNIT 3
Principles of Public-Key Cryptasystems, The RSA algorithm, Key Management, Diffie
Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash
Functions.
UNIT 4
Digital signatures, Authentication Protocols, Digital Signature Standard.

6 hours

7 hours

PartB
UNIT 5
Web Security Consideration, Security socket layer (SSL) and Transport layer security,
Secure Electronic Transaction.

6 hours

UNIT 6
6 hours

Intruders, Intrusion Detection, Password Management .


UNIT 7
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures.

7 hours

UNIT 8
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures.

6 hours

TEXT BOOKS:

1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.


REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.

Page 3 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Evaluation Scheme
IA Scheme
Assessment

Weightage in Marks

Internal Assessment Exam 1

25

Internal Assessment Exam 2

25

Improvement- Internal Assessment Exam 3

25

Assignments

00
Total

25

Subject Unitization for IA Exams and Semester Examination


Unit

Part- A

Part- B

Chapter

Teaching
Hours

Overview

06

Symmetric Ciphers

07

Public Key Cryptography

06

Digital Signatures and


Authentication protocols

07

Web Security

06

Inruders

06

Malicious Software

07

Firewalls

06

No. of Questions in
IA Exam I

VTU Exam
Pattern
(Answer
any
two questions)

No. of Questions
in ImprovementIA Exam III

IA Exam II

VTU Exam
Pattern
(Answer
any
two questions)

VTU Exam
Pattern
(Answer any 2
questions from
part A, Part B
and 1 from either
Part A or Part B)

Note:

Each Question carries 20 marks and may consist of sub-questions.

Answer 5 full questions of 20 marks each (two full questions from Part A, Part BI, and 1 full question
from Either Part A of Part B) out of 8 in Semester Exam.

Date:

Head of Department

Page 4 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Unit Wise Plan


Unit - I
Subject Code and Name: 10EC832 Network Security
1.Overview,Cryptographic Concepts

Planned Hours: 06

Learning Objectives
At the end of this chapter student should be able to:
1. Provide an introduction to the fundamental principles of cryptography and its applications on the
network security domain.
2. Illustrate the concepts of cryptography.
Learning Outcomes
1. Explain the model of network security.
2. Distinguish between various kinds of attacks.
Lesson Schedule
1. Introduction to Cryptography
2. Security Services
3. Security mechanisms and attacks
4. The OSI security architecture
5. A model for network security

Review Questions:
1.What is the OSI security architecture?
2 What is the difference between passive and active security threats?
3 List and briefly define categories of passive and active security attacks.
4 List and briefly define categories of security services.

Quiz, Multiple Choices:


1.Which of the following commands typed in the RUN menu in Windows will NOT help you find out and configure
which programs are allowed to be auto-started on a system?
A
services.
.
msc
B.
IPconf
g/all
C.
re
ged
it
D.
msc
onfg
2. You need to update your antivirus definition files regularly.
A
T
.
r
u
e
B.
F
a
l
s
e
You
can get a virus just by opening and reading your email.
3.

Page 5 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

4. DoS is a
A
.
B.
C.

Disk operating
system
Denial of service
attack
Detected on-going
service

Critical Questions:
1.Explain the working of the playfair cipher with an example.
2 List and briefly define categories of security mechanisms.

Challenging Questions:
1. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a
card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the
system and, in each case, indicate the degree of importance of the requirement.

Case Studies/Real Time Applications/Mini Projects:


1. Consider a desktop publishing system used to produce documents for various organizations.
a. Give an example of a type of publication for which confidentiality of the stored data is the most important
requirement.
b. Give an example of a type of publication in which data integrity is the most important requirement..
c. Give an example in which system availability is the most important requirement.

Unit - 2
Subject Code and Name: 10EC832 Network Security
2.Symmetric Ciphers

Planned Hours: 07

Learning Objectives
At the end of this chapter student should be able to:
1. Study various approaches to Encryption techniques, strengths of Traffic Confidentiality
2. Analyze security and structure of Data Encryption Standard.
Learning Outcomes
1.Perform encryption on different data
2.Distinguish betweeen block cipher and stream cipher.
3.Describe about steganography.
Lesson Schedule
1. Symmetric Ciphers:Symmetric Cipher Model
2. Substitution Techniques
3. Transposition Techniques
4. Simplified DES, Data encryption standard (DES)
5. The strength of DES
6. Differential and Linear Cryptanalysis
7. Block Cipher Design Principles and Modes of Operation
8. Evaluation Criteria for Advanced Encryption Standard
9. The AES Cipher

Page 6 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
Review Questions:
1. What are the essential ingredients of a symmetric cipher?
2 What are the two basic functions used in encryption algorithms?
3 How many keys are required for two people to communicate via a cipher?
4 What is the difference between a block cipher and a stream cipher?
5 What are the two general approaches to attacking a cipher?
6 List and briefly define types of cryptanalytic attacks based on what is known to the
attacker.

Quiz, Multiple Choices:

1. Which of the following network operating system logon restrictions is most likely to stop a hacker who is
attempting to discover someone's password through a brute force or dictionary attack?
Total time
logged on
Time
of day
C.
Period of time after which a password
expires
D.
Number of unsuccessful logon
attempts
2. You need to use multiple antivirus applications on the same computer.
A
T
.
r
u
e
B.
F
a
l
s
e
3. What is the main problem of a modern
antivirus?
A
High price and the absence of free telephone
.
support
B.
False
positives
C.
Dependence on antivirus
signatures
D.
High memory
and cpu
4. What is a hash?
A
An encrypted
.
value
B.
A
decryption
key
C.
Code used to compress
data
5. Which of the following is most likely to steal your
identity?
A
T
.
r
oj
a
n
B.
W
o
r
A
.
B.

Page 7 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
m
V
i
r
u
s
Spy
war
e
Ad
wa
re

C.

D.

E.

Critical Questions:
1.
2.
3.

Explain the single round of DES encryption model.


Explain the operation of caeser cipher with an algorithm.
Explain Feistel encryption and decryption algorithm.

Challenging Questions:

1. A ciphertext has been generated with an affine cipher.The most frequent letter of the ciphertext is
B, and the second most frequent letter of the ciphertext is U. Break this code.
2.The following ciphertext was generated using a simple substitution algorithm.
53305))6*;4826)4.)4);806*;48860))85;;]8*;:*883
(88)5*;46(;88*96*?;8)*(;485);5*2:*(;4956*2(5*4)88*;
4069285);)68)4;1(9;48081;8:81;4885;4)485528806*81(9;48;(88;4(?
34;48)4;161;:188;?;
Decrypt this message.

Case Studies/Real Time Applications/Mini Projects:


1. This problem uses a real-world example, from an old U.S. Special Forces manual (public domain). A copy is
available at this books Web site.
a. Using the two keys (memory words) cryptographic and network security, encrypt the following message:
Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distrustful bring two friends.
Make reasonable assumptions about how to treat redundant letters and excess letters in the memory words and
how to treat spaces and punctuation. Indicate what your assumptions are. Note: The message is from the Sherlock
Holmes novel, The Sign of Four.
b. Decrypt the ciphertext. Show your work.
c. Comment on when it would be appropriate to use this technique and what its
advantages are.

Unit - 3
Subject Code and Name: 10EC832 Network Security
3.Asymmetric Ciphers

Planned Hours: 06

Learning Objectives
At the end of this chapter student should be able to:
1. To be familiar with cryptographic techniques for secure (confidential) communication of two parties over an
insecure (public) channel.

Learning Outcomes
1. Illustrate Deffie Hellman key exchange algorithm.
2. Distinguish between conventional and public key encryption methods.

Lesson Schedule
1. Principles of Public-Key Cryptasystems
2. The RSA algorithm

Page 8 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
3. Key Management, Diffie Hellman Key Exchange
4. Elliptic Curve Arithmetic
5. Authentication functions
6. Hash Functions

Review Questions:
1. What are the principal elements of a public-key cryptosystem?
2 What are the roles of the public and private key?
3 What are three broad categories of applications of public-key cryptosystems?

Quiz, Multiple Choices:

1. Deliberate software attacks are referred to


A
.

as:

B.
C.
D.

Mal
war
e
Malicious
code
Malicious
software
All of the above

2.Auditing is used to secure the network and systems on your

network.
T
r
u
e
B.
False
3.
Which of the following is true regarding access lists applied to an interface?
A
.

A.

You can place as many access lists as you want on any interface until you run out of
memory.

B.

You can apply only one access list on any interface.

C.

One access list may be configured, per direction, for each layer 3 protocol configured on an
interface.

D.

You can apply two access lists to any interface.

Critical Questions:
1.

What requirements must a public key cryptosystems fulfill to be a secure algorithm?

2.

What is a one-way function?

3.

What is a trap-door one-way function?

4.

Describe in general terms an efficient procedure for picking a prime number.

Challenging Questions:
1. In using the RSA algorithm, if a small number of repeated encodings give back the plaintext, what is the likely
cause?

Page 9 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
2.Suppose we have a set of blocks encoded with the RSA algorithm and we dont have the private key.Assume n =
pq, e is the public key. Suppose also someone tells us they know one of the plaintext blocks has a common factor
with n. Does this help us in any way?

Case Studies/Real Time Applications/Mini Projects:


1.Using a spreadsheet (such as Excel) or a calculator, perform the operations described below. Document results of
all intermediate modular multiplications. Determine a number of modular multiplications per each major
transformation (such as encryption, decryption, primality testing, etc.).
a. Test all odd numbers in the range from 233 to 241 for primality using the Miller- Rabin test with base 2.
b. Encrypt the message block M= 2 using RSA with the following parameters: e = 23 and n = 233 241.
c. Compute a private key (d, p, q) corresponding to the given above public key (e, n).
d. Perform the decryption of the obtained ciphertext
1. without using the Chinese Remainder Theorem, and
2. using the Chinese Remainder Theorem.

Unit 4
Subject Code and Name: 10EC832 Network Security
4.Digital Sigantures

Planned Hours: 07

Learning Objectives
At the end of this chapter student should be able to:
1. Be familiar with verification of the authenticity of the source of a message.
Learning Outcomes
1. Discuss RSA and DSS approaches of digital siganture standards.
2. Define the classes of message authentication functions.
Lesson Schedule
1. Digital signatures
2. Direct Digital Signature,Arbitrated Digital Signature
3. Authentication Protocols
4. Mutual Authentication
5. One-Way Authentication
6. Digital Signature Standard
7. Digital Signature Algorithm

Review Questions:
1. List two disputes that can arise in the context of message authentication.
2 What are the properties a digital signature should have?

Page 10 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
3 What requirements should a digital signature scheme satisfy?

Critical Questions:
1. What is the difference between direct and arbitrated digital signature?
2.In what order should the signature function and the confidentiality function be applied to a message, and why?
3. What are some threats associated with a direct digital signature scheme?

Challenging Questions:
1.DSA specifies that if the signature generation process results in a value of s=0 , a new value of k should be
generated and the signature should be recalculated.Why?
2 What happens if a value used in creating a DSA signature is compromised?

Case Studies/Real Time Applications/Mini Projects:


1. It is tempting to try to develop a variation on Diffie-Hellman that could be used as a digital signature. Here is one
that is simpler than DSA and that does not require a secret random number in addition to the private key.
Public elements:
a a 6 q and a is a primitive root of q
q prime number
Private key: X X 6 q
Public key: Y = aX mod q
To sign a message , compute , which is the hash code of the message.We require that . If not, append the hash to
the message and calculate a new hash. Continue this process until a hash code is produced that is relatively prime
to .Then calculate to satisfy .The signature of the message is . To verify the signature, a user verifies that
a. Show that this scheme works.That is, show that the verification process produces an equality if the signature is
valid.
b. Show that the scheme is unacceptable by describing a simple technique for forging a users signature on an
arbitrary message.

Unit 5
Subject Code and Name: 10EC832 Network security
Unit Number and Title: 5.Web Security Consideration

Planned Hours: 06

Learning Objectives
At the end of this chapter student should be able to:
1. Discuss SSL record protocol.
2. Discuss Secure Electronic Transaction protocol.
Learning Outcomes
1. Explain the SET requirements.
2. Exlain various phases of SSL handshake protocol.
Lesson Schedule
1. Web Security Consideration
2. Security socket layer (SSL)
3. SSL Record Protocol
4. Handshake Protocol

Page 11 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

5. Transport layer security


6. Secure Electronic Transaction

Review Questions:
1.What are the advantages of each of the three approaches?
2 What protocols comprise SSL?
3 What is the difference between an SSL connection and an SSL session?
4 What steps are involved in the SSL Record Protocol transmission?

Quiz, Multiple Choices:


1. A hardware firewall is just a (n) ________ running on a dedicated piece of hardware or specialized device.
Software
Firewall
Intrusion Detection
System
C.
R
o
ut
er
D.
S
wi
tc
h
2. Encryption should be considered for internal network traffic as well as external network traffic.
A
T
.
r
u
e
B.
F
a
l
s
e
3. This is a series of messages sent by someone attempting to break into a computer to learn which network
services the computer provides.
A
Service profle
.
identifer
B.
Bit
robbin
g
C.
Ja
b
b
er
D.
Port
scan
4. Windows updates are not necessary.
A
T
.
r
u
e
B.
F
a
A
.
B.

Page 12 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

5.
A
.
B.
C.
D.

6.
A
.
B.
C.
D.

l
s
e
What IDS identifies intrusions based on a preset database that identifies known attack
signatures?
Host
Based IDS
Behavior
Based IDS
Knowledge
Based IDS
Network
Based IDS
__________ is a method used by firewalls to filter and block unauthorized traffic.
Heuristic
Scanning
Stateful/Packet
Inspection
Intrusion
Detection
Active
Scripting

Critical Questions:
1. List and briefly define the parameters that define an SSL session state.
2. List and briefly define the parameters that define an SSL session connection.
3. What services are provided by the SSL Record Protocol?

Challenging Questions:
1. What is the purpose of HTTPS?
2.For what applications is SSH useful?
3.List and briefly define the SSH protocols.

Case Studies/Real Time Applications/Mini Projects:


1. Based on what you have learned in this chapter, is it possible in SSL for the receiver to reorder SSL record
blocks that arrive out of order? If so, explain how it can be done. If not, why not?
2. For SSH packets, what is the advantage, if any, of not including the MAC in the scope of the packet encryption?

Unit 6
Subject Code and Name: 10EC832 Network Security
Unit Number and Title: 6.Intruders

Planned Hours: 06

Learning Objectives
At the end of this chapter student should be able to:
1. Describe Intrusion detection mechanisms.
2. Explain the architecture of distributed intrusion detection system.

Page 13 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
Learning Outcomes
1. List three classes of intruders.
2. Illlustrate password selection techniques.
Lesson Schedule
1. Intruders-Intrusion Techniques
2. Intrusion Detection
3. Audit records,Statistical Anomaly Detection
4. Rule Based Intrusion Detection,The Base-Rate Fallacy
5. Distributed Intrusion Detection,Intrusion Detection Exchange Fprmat
6. Password Management- Protection and Selection Strategies

Review Questions:
1. List and briefly define three classes of intruders.
2 What are two common techniques used to protect a password file?
3 What are three benefits that can be provided by an intrusion detection system?
4 What is the difference between statistical anomaly detection and rule-based intrusion
detection?

Quiz, Multiple Choices:


17. DoS attacks cannot be launched against
A
.

B.

18.
A
.
B.
C.

D.

19.
A
.
B.
C.
D.

20.

routers.
T
r
u
e
F
a
l
s
e
Zone Alarm is an example of a ________ firewall.
Per
son
al
Corp
orate
I
D
S
None of the
above
How should you protect your wireless
network?
Don't broadcast your
SSID
Use
encryption
Only let known computers connect to your access
point.
All of the
above
Encrypting sensitive data on a hard drive
means

Page 14 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
A
.
B.
C.
D.

Only I can see and


use it.
Only someone who knows the decryption password can see and
use it.
No one can see it, but everyone can
use it.
No one can use it, but other administrators may see it with my
permission.

Critical Questions:
1. What metrics are useful for profile-based intrusion detection?
2.What is the difference between rule-based anomaly detection and rule-based penetration
identification?
3. What is a honeypot?
4. What is a salt in the context of UNIX password management?
5.List and briefly define four techniques used to avoid guessable passwords.

Challenging Questions:
1.An example of a host-based intrusion detection tool is the tripwire program.This is a file integrity
checking tool that scans files and directories on the system on a regular basis and notifies the
administrator of any changes. It uses a protected database of cryptographic checksums for each file
checked and compares this value with that recomputed on each file as it is scanned. It must be
configured with a list of files and directories to check, and what changes, if any, are permissible to
each. It can allow, for example, log files to have new entries appended, but not for existing entries to
be changed.What are the advantages and disadvantages of using such a tool? Consider
the problem of determining which files should only change rarely, which files may change more often
and how, and which change frequently and hence cannot be checked. Hence consider the amount of
work in both the configuration of the program and on the system administrator monitoring the
responses generated.

Case Studies/Real Time Applications/Mini Projects:


1.A taxicab was involved in a fatal hit-and-run accident at night. Two cab companies, the Green and
the Blue, operate in the city.You are told that:
85% of the cabs in the city are Green and 15% are Blue.
A witness identified the cab as Blue.
The court tested the reliability of the witness under the same circumstances that existed on the night
of the accident and concluded that the witness was correct in identifying the color of the cab 80% of
the time.What is the probability that the cab involved in the incident was Blue rather than Green?

Unit 7
Subject Code and Name: 10EC832 Network Security
7.Malicious Software

Planned Hours: 07

Learning Objectives
At the end of this chapter student should be able to:
1. Describe malicious program.
Learning Outcomes
1. Explain digital immune system.
2. List out different types of viruses and explain them.
Lesson Schedule
1. Malicious Software-Viruses and Related Threats,
2. Malicious Programs,The Nature of Viruses
3. Types of Viruses
4. Macro Viruses,Email Viruses,Worms
5. Virus Countermeasures-Antivirus Approaches
6. Advanced Antivirus Approaches

Page 15 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

7. Behaviour-Blocking Software

Review Questions:
1. What is the role of compression in the operation of a virus?
2 What is the role of encryption in the operation of a virus?
3 What are typical phases of operation of a virus or worm?
4 What is a digital immune system?

Quiz, Multiple Choices:


12. A (n) ________ is a computer system on the Internet that is expressly set up to attract and "trap" people who
A
.
B.

C.

D.

13.
A
.
B.
C.

D.

14.
A
.
B.
C.

15.
A
.

B.

16.
A
.

attempt to penetrate other people's computer systems.


I
D
S
Fir
ew
all
Hon
eypo
t
CT
deco
y
If you want to see unbiased tests of antivirus applications, where do you
go?
Telev
ision
Antivirusware
.com
Avcomparatives.or
g
Unbiasedavtest
s.org
What does SSL stand for?
Secret Service
Logarithm
Systematic Security
Level
Secure Sockets
Layer
I use a Mac therefore Im not exposed to security
threats.
T
r
u
e
F
a
l
s
e
Which of the following is most likely to send spam emails from your
computer?
T
r

Page 16 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

B.

C.

D.

E.

oj
a
n
W
o
r
m
V
i
r
u
s
Spy
war
e
Ad
wa
re

Critical Questions:
1.
2.
3.
4.

How does behavior-blocking software work?


In general terms, how does a worm propagate?
Describe some worm countermeasures.
What is a DDoS?

Challenging Questions:
1.The list of passwords used by the Morris worm is provided at this books Web site.
a. The assumption has been expressed by many people that this list represents words commonly
used as passwords. Does this seem likely? Justify your answer.
b. If the list does not reflect commonly used passwords, suggest some approaches that Morris may
have used to construct the list.

Case Studies/Real Time Applications/Mini Projects:


1.Suggest some methods of attacking the PWC worm defense that could be used by worm creators
and suggest countermeasures to these methods.

Unit 8
Subject Code and Name: 10EC832 Network Security
8.Firewalls

Planned Hours: 06

Learning Objectives
At the end of this chapter student should be able to:
1. Expalin Firewall
2. Describe Multilevel security requirements and reference monitor functionality.
Learning Outcomes
1. Explain three types of firewall configurations.
2. List security rulesof reference monitor.

Lesson Schedule
1. Firewalls Design Principles
2. Firewall characteristics
3. Types of Firewalls
4. Firewall Configuration

Page 17 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

5. Trusted Systems
6. Data Access Control
7. The Concept of Trusted Systems
8. Trojan Horse Defense

Review Questions:
1.List three design goals for a firewall.
2 List four techniques used by firewalls to control access and enforce a security policy.
3 What information is used by a typical packet filtering firewall?
4 What are some weaknesses of a packet filtering firewall?

Critical Questions:
1.What is the difference between a packet filtering firewall and a stateful inspection firewall?
2.What is an application-level gateway?
3.What is a circuit-level gateway?

Challenging Questions:
1.What are the common characteristics of a bastion host?
2.Why is it useful to have host-based firewalls?
3. What is a DMZ network and what types of systems would you expect to find on such

Quiz, Multiple Choices:


1. Security updates are needed
A
.
B.
C.
D.

2.
A
.

B.

C.

D.

3.
A
.

B.

to:

Improve flaws in installed programs and operating systems to resolve


vulnerabilities
Improve program design and
functionality
Make programs easier
to use
To boost vendors
profts
Which of the following is less likely to be detected with standard antivirus
software?
T
r
oj
a
n
V
i
r
u
s
Spy
war
e
Ad
wa
re
What port does secure HTTP use?
1
7
0
1
1

Page 18 of 19

ASKB Charitable Foundation Trust


Atria Institute of Technology, Bangalore 24
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
5
1
2
C.
4
4
3
D.
8
0
4. Passwords stop an intruder who gains physical access to a computer.
A
T
.
r
u
e
B.
F
a
l
s
e
A
system
that monitors traffic into and out of a network and automatically alerts you when suspicious traffic
5.
patterns occur, indicating a possible unauthorized intrusion attempt is called a(n)
A
I
.
D
S
B.
Fir
ew
all
C.
R
o
ut
er
D.
Anti
viru
s
E.
None of the
above

Case Studies/Real Time Applications/Mini Projects:


1. A common management requirement is that all external Web traffic must flow via the
organizations Web proxy. However, that requirement is easier stated than implemented. Discuss the
various problems and issues, possible solutions, and limitations with supporting this requirement. In
particular consider issues such as identifying
exactly what constitutes Web traffic and how it may be monitored, given the large range of ports
and various protocols used by Web browsers and servers.

Page 19 of 19

Você também pode gostar