15 big Questions with Answers
15 big Questions with Answers
15 big Questions with Answers
It is the most important phase and it begins with an examination of the event or plan that
initiates the process.
During this phase, the objectives, constraints, and scope of the project are specified.
Investigation
Analysis
Logical Design
Physical Design
Implementation
Maintenance and change
Champion
Team Leader
Security policy developers
Risk assessment specialists
Security Professionals
System Administrators
End users
3. Discuss in detail the NSTISSC security model.
National Security Telecommunications & Information systems security committee’
document.
It is now called the National Training Standard for Information security
professionals.
The NSTISSC Security Model provides a more detailed perspective on security.
• Software
• Hardware
• People
• Data
• Procedures
• Networks
5. What are the phases in the Security Systems development life cycle (SSDLC)?
Explain in detail.
The Secure Systems Development Lifecycle (SSDLC) defines security requirements and
tasks that must be considered and addressed within every system, project or application that
is created or updated to address a business need.
Some are
Role-Based Access Control (RBAC) + Discretionary Access Control (DAC)
Mandatory Access Control (MAC) + Discretionary Access Control (DAC)
Role-Based Access Control (RBAC) + Attribute-Based Access Control (ABAC)
Network Security. Most attacks occur over the network, and network security
solutions are designed to identify and block these attacks. ...
Cloud Security
Endpoint Security
Mobile Security
IoT Security
Application Security
Zero Trust
The Digital Signature Algorithm (DSA) is a cryptographic algorithm used to generate and
verify digital signatures, ensuring the authenticity and integrity of digital messages or
documents.
The primary purpose of DSA is to provide a means for authenticating the sender of a message
and ensuring that the message has not been altered during transmission. It is commonly used
in various security protocols, including SSL/TLS, and is a key component of digital
certificates.
2. Explain the format of the X.509 certificate. Provide any one real time case study for
the use of X.509 certificate. (Nov/Dec 2023)
X. 509 digital certificate is a certificate-based authentication security framework that can be
used for providing secure transaction processing and private information. These are primarily
used for handling the security and identity in computer networking and internet-based
communications.
1. Explain in detail about architecture of IP Security. Depict how email message could
be sent secured with a neat example. (Nov/Dec 2023)
The IPSec (IP Security) architecture utilizes two protocols to protect traffic or data transfers.
These protocols are ESP and AH (Encapsulation Security Payload) (Authentication Header).
The IPSec Architecture includes protocols, algorithms, DOI, and key management.
2. Explain the operation description of PGP. Provide real time case study for
understanding its real time working. (Nov/Dec 2023)
PGP uses the public key system in which every user has a unique encryption key known
publicly and a private key that only they know. A message is encrypted when a user sends it
to someone using their public key, then decrypted when the recipient opens it with their
private key.
3. Explain S/MIME operational descriptions, message content types and enhanced
security services.
S/MIME - Secure Multipurpose Internet Mail ExtensionS/MIME is compatible with
most enterprise email clients. In simple terms, S/MIME is an encryption protocol used
to digitally sign and encrypt an email to ensure that the email is authenticated and its
content is not altered.
4. Illustrate email architecture and explain its protocols.
Email clients use Mail Access protocols like the POP/ IMAP protocols to retrieve/
sync emails from the server. Basically, mail access protocols are used to download or
sync emails from the server. Email clients use transfer protocol - the SMTP protocol to
transfer/ send emails through the server.
5. Illustrate the ESP along with its modes.
Encapsulating security payload, also abbreviated as ESP plays a very important role in
network security. ESP or Encapsulating security payload is an individual protocol in
IPSec. ESP is responsible for the CIA triad of security (Confidentiality, Integrity,
Availability), which is considered significant only when encryption is carried along
with them. Securing all payload/ packets/ content in IPv4 and IPv6 is the responsibility
of ESP.
UNIT V WEB SECURITY
PART B
1. Describe the SSL Architecture in detail and explain how it helps in maintaining
secure end-to-end Communication. (Nov/Dec 2023)
Secure Socket Layer (SSL) provides security to the data that is transferred between web
browser and server. SSL encrypts the link between a web server and a browser which ensures
that all data passed between them remain private and free from attack. In this article, we are
going to discuss SSL in detail, its protocols, the silent features of SSL, and the version of
SSL.
2. Describe the working of SET with neat diagram and elaborate its role in transaction
processing. (Nov/Dec 2023)
Secure Electronic Transaction (SET) is a system and electronic protocol to ensure the
integrity and security of transactions conducted over the internet. E-commerce websites
implemented this early protocol to secure electronic payments made via debit and credit
cards.
SET blocks out all personal details on the card, preventing hackers and data thieves from
accessing or stealing the cardholder's information. The merchant also cannot see these
personal details, which are transferred directly to the credit card company for
user authentication and verification.
3. Explain about S-HTTP.
Also known as HTTPS, this is an extension of Hypertext Transport Protocol (HTTP) that
provides security services for transaction confidentiality, authenticity and integrity between
HTTP servers and clients.
4. List the parameters of session state in TLS. Explain briefly.
The parameters that define an SSL/TLS session state include: Session ID: A unique identifier
assigned by the server to a particular SSL/TLS session, which allows the client to resume the
session later without the need for a full handshake.
5. Explain about Heartbeat protocol.
A heartbeat protocol is generally used to negotiate and monitor the availability of a resource,
such as a floating IP address, and the procedure involves sending network packets to all the
nodes in the cluster to verify its reachability. The Heartbeat <0> is useful for monitoring the
status of the communication link and to identify when the last of a string of messages was not
received. When either end of a FIX connection has not sent any data for [HeartBtInt <108>]
seconds, it will transmit a Heartbeat <0> message.