Solution, Information Security and Cyber Laws PUT

advertisement
JRE SCHOOL OF Engineering
PUT April 2015
Subject Name
Information Security and
Cyber Laws
Roll No. of Student
Date
28th April 2015
For CSE branch VI Semester only
SET-A
Subject Code
EIT - 505
Max Marks
Max Duration
Time
50
10:00 AM to 1:00 PM
3 hrs
NOTE: ATTEMPT ALL QUESTIONS
1. Attempt any two parts:
(2 x 6 = 12)
a. What do you mean by Information System attack ? What are the various types of
“Information” attacks
Ans. When an individual or group designs software to attack systems, they create
malicious code/software called malware Designed to damage, destroy, or deny service
to the target systems
DoS- Denial of Service
Trojan Horse - Comes with other software.
Virus - Reproduces itself by attaching to other executable files.
Worm - Self-reproducing program. Creates copies of itself. Worms that spread using e-mail address books
are often called viruses.
Logic Bomb - Dormant until an event triggers it (Date, user action, random trigger, etc.).
Hacker Attacks
I use the term "hacker attacks" to indicate hacker attacks that are not automated by programs such as
viruses, worms, or trojan horse programs. There are various forms that exploit weakneses in security.
Many of these may cause loss of service or system crashes.
IP spoofing - An attacker may fake their IP address so the receiver thinks it is sent from a location that it is
not actually from. There are various forms and results to this attack.
The attack may be directed to a specific computer addressed as though it is from that same computer.
This may make the computer think that it is talking to itself. This may cause some operating systems such
as Windows to crash or lock up.
Gaining access through source routing. Hackers may be able to break through other friendly but less
secure networks and get access to your network using this method.
Man in the middle attack Session hijacking - An attacker may watch a session open on a network. Once authentication is complete,
they may attack the client computer to disable it, and use IP spoofing to claim to be the client who was
just authenticated and steal the session. This attack can be prevented if the two legitimate systems share
a secret which is checked periodically during the session.
Server spoofing - A C2MYAZZ utility can be run on Windows 95 stations to request LANMAN (in the clear)
authentication from the client. The attacker will run this utility while acting like the server while the user
attempts to login. If the client is tricked into sending LANMAN authentication, the attacker can read their
username and password from the network packets sent.
DNS poisoning - This is an attack where DNS information is falsified. This attack can succeed under the
right conditions, but may not be real practical as an attack form. The attacker will send incorrect DNS
information which can cause traffic to be diverted. The DNS information can be falsified since name
servers do not verify the source of a DNS reply. When a DNS request is sent, an attacker can send a false
DNS reply with additional bogus information which the requesting DNS server may cache. This attack can
be used to divert users from a correct webserver such as a bank and capture information from customers
when they attempt to logon.
Password cracking - Used to get the password of a user or administrator on a network and gain
unauthorized access.
Some DoS Attacks
Ping broadcast - A ping request packet is sent to a broadcast network address where there are many
hosts. The source address is shown in the packet to be the IP address of the computer to be attacked. If
the router to the network passes the ping broadcast, all computers on the network will respond with a
ping reply to the sttacked system. The attacked system will be flooded with ping responses which will
cause it to be unable to operate on the network for some time, and may even cause it to lock up. The
attacked computer may be on someone else's network. One countermeasure to this attack is to block
incoming traffic that is sent to a broadcast address.
Ping of death - An oversized ICMP datagram can crash IP devices that were made before 1996.
Smurf - An attack where a ping request is sent to a broadcast network address with the sending address
spoofed so many ping replies will come back to the victim and overload the ability of the victim to process
the replies.
Q. What is Intrusion ? What is an Intrusion Detection System (IDS) ? Explain its components and
working in detail.
Ans. • IDSs work like burglar alarms
• IDSs require complex configurations to provide the level of detection and response
desired
• An IDS operates as either network-based, when the technology is focused on
protecting network information assets, or host-based, when the technology is focused
on protecting server or host information assets
• IDSs use one of two detection methods, signature-based or statistical anomaly-based
The different types of IDSs:
 Network-based IDS
 Host-based IDS
 Application-based IDS
 Signature-based IDS
 Statistical Anomaly-Based IDS
NIDS
A network-based IDS (NIDS) resides on a computer or an appliance connected to a
segment of an organization’s network and monitors traffic on that network segment,
looking for indications of ongoing or successful attacks.
HIDS
A Host-based IDS (HIDS) works differently from a network-based version of IDS. A hostbased IDS resides on a particular computer or server, known as the host and monitors
activity only on that system. HIDs are also known as System Integrity Verifiers as they
benchmark and monitor the status of key system files and detect when an intruder
creates , modifies or deletes monitored files.
use of HIDS
A HIDs is also capable of monitoring system configuration databases,such as windows
registries,in addition to stored configuration files like .ini,.cfg,and .dat files.
Application-based IDS
A refinement of Host-based IDs is the application-based IDS(AppIDS). The application
based IDs examines an application for abnormal incidents. It looks for anomalous
occurrences such as users exceeding their authorization,invalid file executions etc.
Signature-based IDS
A signature-based IDS(also called Knowledge-based IDs) examines data traffic in search
of patterns that match known signatures – that is,preconfigured ,predetermined attack
patterns.
b. Using examples, elaborate the following terms:
(i)
B2B e-commerce
(ii) C2C e-commerce
(ii) B2C e-commerce
Ans. Business-to-Business (B2B) is one of the major forms of e commerce. Here the seller
and the buyer participate as business entities. Here the business is carried out the same
way a manufacturer supplies goods to a wholesaler.
Business-to-Consumer (B2C) : In this case transactions take place between consumers
and business houses. Here individuals are also involved in the online business
transactions
Consumer-to-Consumer (C2C) model is applicable when the business transaction is
carried between two individuals. But for this type of e commerce, the individuals require
a platform or an intermediary for business transactions.
Consumer-to-Business (C2B)
Peer-to-Peer (P2P) is another model of e-commerce. This model is technologically more
sound than the other e commerce models. During this type of transactions, people can
share computer resources. Here it is not required to use a common server; instead a
common platform can be used for the transactions.
2. Attempt any two parts:
(2 x 7 = 14)
a. Information Act was formulated in India in year 2000. Explain in detail its salient
features ? What are some of the grey areas in it ?
Ans. Cyber crime encompasses any criminal act dealing with computers and networks (called
hacking). Additionally, cyber crime also includes traditional crimes conducted through the
Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit
card account thefts are considered to be cyber crimes when the illegal activities are committed
through the use of a computer and the Internet.
Information Act formulated in year 2000 in India.
Salient features:
1. Prior to the enactment of the IT Act, 2000 even an e-mail was not accepted under the
prevailing
statutes of India as an accepted legal form of communication and as evidence in a court of law.
But the IT Act, 2000 changed this scenario by legal recognition of the electronic format. Indeed,
the IT Act, 2000 is a step forward.
2. From the perspective of the corporate sector, companies shall be able to carry out electronic
commerce using the legal infrastructure provided by the IT Act, 2000. Till the coming into effect
of the Indian Cyber law, the growth of electronic commerce was impeded in our country
basically because there was no legal infrastructure to regulate commercial transactions online.
3. Corporate will now be able to use digital signatures to carry out their transactions online.
These digital signatures have been given legal validity and sanction under the IT Act, 2000.
4. In today’s scenario, information is stored by the companies on their respective computer
system, apart from maintaining a back up. Under the IT Act, 2000, it shall now be possible for
corporate to have a statutory remedy if any one breaks into their computer systems or networks
and causes damages or copies data. The remedy provided by the IT Act, 2000 is in the form of
monetary damages, by the way of compensation, not exceeding Rs. 1, 00, 00,000.
5. IT Act, 2000 has defined various cyber crimes which includes hacking and damage to the
computer
code. Prior to the coming into effect of the Indian Cyber law, the corporate were helpless as
there was no legal redress for such issues. But the IT Act, 2000 changes the scene altogether
Grey Areas:
The Grey Areas of the IT Act, 2000:
1. The IT Act, 2000 is likely to cause a conflict of jurisdiction.
2. Electronic commerce is based on the system of domain names. The IT Act, 2000 does not even
touch
the issues relating to domain names. Even domain names have not been defined and the rights
and
liabilities of domain name owners do not find any mention in the law.
3. The IT Act, 2000 does not deal with any issues concerning the protection of Intellectual
Property
Rights I the context of the online environment. Contentious yet very important issues concerning
online
copyrights, trademarks and patents have been left untouched by the law, thereby leaving many
loopholes.
4. As the cyber law is growing, so are the new forms and manifestations of cyber crimes. The
offences
defined in the IT Act, 2000 are by no means exhaustive. However, the drafting of the relevant
provisions
of the IT Act, 2000 makes it appear as if the offences detailed therein are the only cyber offences
possible
and existing. The IT Act, 2000 does not cove various kinds of cyber crimes and Internet related
crimes.
This Include:a) Theft of Internet hours
b) Cyber theft
c) Cyber stalking
d) Cyber harassment
e) Cyber defamation
f) Cyber fraud
g) Misuse of credit card numbers
h) Chat room abuse
5. The IT Act, 2000 has not tackled several vital issues pertaining to e-commerce sphere like
privacy and
content regulation to name a few. Privacy issues have not been touched at all.
6. Another grey area of the IT Act is that the same does not touch upon any anti- trust issues.
ISSUES IN DATA AND SOFTWARE PRIVACY:
Privacy software provides some of the tools needed to guarantee personal data privacy.
Data Privacy.
b. Using a block diagram, explain main components of a Biometric system. What are
the main criteria for selecting a Biometric system.
Ans.
c. What is Cryptanalysis? Explain various types of cryptanalytic attacks ?
Ans.
Cryptanalysis refers to the study of ciphers, ciphertext, or cryptosystems (that is, to secret code
systems) with a view to finding weaknesses in them that will permit retrieval of the plaintext
from the ciphertext, without necessarily knowing the key or the algorithm. This is known as
breaking the cipher, ciphertext, or cryptosystem.
1) Known-plaintext analysis: With this procedure, the cryptanalyst has knowledge of a portion of
the plaintext from the ciphertext. Using this information, the cryptanalyst attempts to deduce
the key used to produce the ciphertext.
2) Chosen-plaintext analysis (also known as differential cryptanalysis): The cryptanalyst is able to
have any plaintext encrypted with a key and obtain the resulting ciphertext, but the key itself
cannot be analyzed. The cryptanalyst attempts to deduce the key by comparing the entire
ciphertext with the original plaintext. The Rivest-Shamir-Adleman encryption technique has
been shown to be somewhat vulnerable to this type of analysis.
3) Ciphertext-only analysis: The cryptanalyst has no knowledge of the plaintext and must work
only from the ciphertext. This requires accurate guesswork as to how a message could be
worded. It helps to have some knowledge of the literary style of the ciphertext writer and/or the
general subject matter.
4) Man-in-the-middle attack: This differs from the above in that it involves tricking individuals
into surrendering their keys. The cryptanalyst/attacker places him or herself in the
communication channel between two parties who wish to exchange their keys for secure
communication (via asymmetric or public key infrastructure cryptography). The
cryptanalyst/attacker then performs a key exchange with each party, with the original parties
believing they are exchanging keys with each other. The two parties then end up using keys that
are known to the cryptanalyst/attacker. This type of attack can be defeated by the use of a hash
function.
5) Timing/differential power analysis: This is a new technique made public in June 1998,
particularly useful against the smart card, that measures differences in electrical consumption
over a period of time when a microchip performs a function to secure information. This
technique can be used to gain information about key computations used in the encryption
algorithm and other functions pertaining to security. The technique can be rendered less
effective by introducing random noise into the computations, or altering the sequence of the
executables to make it harder to monitor the power fluctuations. This type of analysis was first
developed by Paul Kocher of Cryptography Research, though Bull Systems claims it knew about
this type of attack over four years before.
A ciphertext-only attack is one in which the cryptanalyst obtains a sample of ciphertext, without
the plaintext associated with it. This data is relatively easy to obtain in many scenarios, but a
successful ciphertext-only attack is generally difficult, and requires a very large ciphertext
sample. A known-plaintext attack is one in which the cryptanalyst obtains a sample of ciphertext
and the corresponding plaintext as well.
A chosen-plaintext attack is one in which the cryptanalyst is able to choose a quantity of
plaintext and then obtain the corresponding encrypted ciphertext.
An adaptive-chosen-plaintext attack is a special case of chosen-plaintext attack in which the
cryptanalyst is able to choose plaintext samples dynamically, and alter his or her choices based
on the results of previous encryptions.
A chosen-ciphertext attack is one in which cryptanalyst may choose a piece of ciphertext and
attempt to obtain the corresponding decrypted plaintext. This type of attack is generally most
applicable to public-key cryptosystems.
An adaptive-chosen-ciphertext is the adaptive version of the above attack. A cryptanalyst can
mount an attack of this type in a scenario in which he has free use of a piece of decryption
hardware, but is unable to extract the decryption key from it.
3. Attempt any two parts:
(2 x 6 = 12)
a. What is Firewall ? Explain in detail various types of Firewalls. Write the pros n
cons of each of the types
Ans. A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to prevent unauthorized Internet users from
accessing private networks connected to the Internet, especially intranets. All messages entering
or leaving the intranet pass through the firewall, which examines each message and blocks those
that do not meet the specified security criteria.
Packet Filter
Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
Application Gateway
Applies security mechanisms to specific applications, such as FTP and Telnetservers. This is very effective, but can impose a
performance degradation.
Circuit-level Gateway
Applies security mechanisms when a TCP or UDPconnection is established. Once the connection has been made, packets can flow
between the hosts without further checking.
Proxy Server
Intercepts all messages entering and leaving the network. The proxy servereffectively hides the true network addresses.
b. How can one build security into software life cycle ?
Ans. The National Institute of Standards and Technology (NIST) Special Publication (SP) 80064, Security Considerations in the System Development Life Cycle, has been developed to
assist federal government agencies in integrating essential information technology (IT)
security steps into their established IT system development life cycle (SDLC). This guideline
applies to all federal IT systems other than national security systems. The document is
intended as a reference resource rather than as a tutorial and should be used in conjunction
with other NIST publications as needed throughout the development of the system.
This publication serves a federal audience of information system and information security
professionals, including information system owners, information owners, information
system developers and program managers.
To be most effective, information security must be integrated into the SDLC from system
inception. Early integration of security in the SDLC enables agencies to maximize return on
investment in their security programs, through:
Early identification and mitigation of security vulnerabilities and misconfigurations,
resulting in lower cost of security control implementation and vulnerability mitigation;
Awareness of potential engineering challenges caused by mandatory security
controls;
Identification of shared security services and reuse of security strategies and tools to
reduce development cost and schedule while improving security posture through proven
methods and techniques; and
Facilitation of informed executive decision making through comprehensive risk
management in a timely manner.
This guide focuses on the information security components of the SDLC. First, descriptions of
the key security roles and responsibilities that are needed in most information system
developments are provided. Second, sufficient information about the SDLC is provided to
allow a person who is unfamiliar with the SDLC process to understand the relationship
between information security and the SDLC.
c. (i) What are security issues in Data mining ?
(ii)
Explain the terms Authentication, Non-repudiation and Availability
Authentication is the process of determining whether someone or
something is, in fact, who or what it is declared to be. In private and
public computer networks (including the Internet), authentication is
commonly done through the use of logon passwords.
Authorization is the process of giving someone permission to do or have
something. In multi-user computer systems, a system administrator
defines for the system which users are allowed access to the system and
what privileges of use (such as access to which file directories, hours of
access, amount of allocated storage space, and so forth).
Nonrepudiation is the assurance that someone cannot deny something.
Typically, nonrepudiation refers to the ability to ensure that a party to a
contract or a communication cannot deny the authenticity of their
signature on a document or the sending of a message that they
originated.
4. Write short notes on any two :
(2 x 6 = 12)
a. E-governance
It is widely believed today that e-govemance means getting automated. However, it does not
mean getting the several government departments automated so that they act like isolated
islands of information and services provided with the help of new technology. E-governanee
means providing citizen’s with a central point of access to government services.
E-governance requires net-centric attitude. Net-centric means leveraging the power of the
network. For most of us, this means using the Internet. However, this can also be local network
resource or it could be an internet. The main difference between being net-centric and focused
on information technology is that in the net-centric model, we enable collaboration and
through this collaboration, we create highly productive teams rather than more productive
individuals.
Automating tasks might not necessarily improve anything. This is particularly true if we are
simply automating outmoded ways of doing things and inefficient processes. Net-centric
focuses on allowing virtual teams focused on a common goal to come together on the network.
India has shown that they are developing their information technology economy using netcentric tools. They are delivering products and services using the net-work.
b. Copyright
Copyright is a bunch of rights in certain creative works such as text, artistic works, music,
computer programs, sound recordings and films. The rights are granted exclusively to the
copyright owner to reproduce the material, and for some material, the right to perform or show
the work to the public. Copyright owners can prevent others from reproducing or
communicating their work without their permission or may sell these rights to someone else.
Copyright protection exists from the moment a work is created in a fixed, tangible form of
expression. The copyright immediately becomes the property of the author who created the
work. Only the author, or those deriving their rights through the author, can rightfully claim
copyright. In the case of works made for hire, the employer—not the writer—is considered the
author.
c.
Mobile computing Security
Mobile computing has its fair share of security concerns as any other technology. Due to their nomadic nature,
it's not easy to monitor the proper usage. User might have different intentions on how to utilize this privilege.
Improper and unethical practices such as hacking, industrial espionage, pirating, online fraud and malicious
destruction are some but few of the problems experienced by mobile computing.
Another big problem plaguing mobile computing is credential verification. It's not possible to that the person
using that person is the true barrier. Other users share username and passwords. This is also a major threat to
security. This being a very sensitive issue, most companies are very reluctant to implement mobile computing
to the dangers of misrepresentation.
The problem of identity theft is very difficult to contain or eradicate. Issues with unauthorized access to data
and information by hackers, is also a plaguing problem. They gain access to steal vital data from companies.
This problem has been a major headache and hindrance in rolling out mobile computing services.
No company wants to lay open their secrets to hacker and other intruders, who will in terms sell them to their
competitors. It's also important to take the necessary precautions to minimize these threats from taking place.
Some of those measures include −

Hiring qualified personnel.

Installing Security Hardware and Software.

Educating the Users on proper Mobile computing ethics.

Auditing and developing sound, effective policies to govern mobile computing.

Enforcing proper access rights and permissions.
*****************************
Download