0% found this document useful (0 votes)
14 views12 pages

Cnns p2

Network security encompasses strategies and technologies aimed at protecting data integrity, confidentiality, and availability. Key concepts include confidentiality through encryption, integrity via hash functions, and availability to ensure continuous access. Common threats include malware and phishing, while cryptographic protocols like SSL/TLS and firewalls play crucial roles in safeguarding networks.

Uploaded by

bharathkiv2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views12 pages

Cnns p2

Network security encompasses strategies and technologies aimed at protecting data integrity, confidentiality, and availability. Key concepts include confidentiality through encryption, integrity via hash functions, and availability to ensure continuous access. Common threats include malware and phishing, while cryptographic protocols like SSL/TLS and firewalls play crucial roles in safeguarding networks.

Uploaded by

bharathkiv2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

11.

Define network security and its importance in modern


networks.
Network security involves strategies, policies, and
technologies designed to protect the integrity,
confidentiality, and availability of computer networks and
data.
Importance:
- Prevents unauthorized access.
- Safeguards sensitive data.
- Protects against cyber threats (viruses, malware).
- Ensures business continuity.
12. Explain the concept of confidentiality in network
security.
Confidentiality ensures that sensitive information is
accessible only to authorized individuals.
Methods to achieve confidentiality:
- Encryption (data is encoded to prevent unauthorized
access).
- Access control mechanisms.
- Secure protocols (like HTTPS).
13. Describe the role of integrity in ensuring secure
communications.
Integrity ensures that data is not altered during
transmission or storage.
Key points:
- Detects unauthorized modifications.
- Uses checksums, hash functions (e.g., SHA-256).
- Digital signatures validate data integrity.
14. What is availability in the context of network security?
Availability ensures that authorized users have continuous
access to data and services.
Importance:
- Prevents downtime from attacks (e.g., DDoS).
- Uses redundant systems and backups.
- Implements failover mechanisms.
15. Explain common threats in network security.
- Malware: Viruses, worms, trojans.
- Phishing: Fraudulent emails to steal sensitive data.
- Denial of Service (DoS): Overloading a system to make it
unavailable.
- Man-in-the-Middle (MitM): Intercepting communications
between two parties.
- SQL Injection: Inserting malicious queries into databases.
16. Discuss the types of vulnerabilities present in network
systems.
- Software vulnerabilities: Bugs or flaws in software code.
- Misconfigurations: Incorrect settings in devices or
applications.
- Weak passwords: Easily guessed or reused passwords.
- Unpatched systems: Systems not updated with security
fixes.
- Physical vulnerabilities: Insecure access to hardware.
17. Define cryptography and its role in network security.
Cryptography is the practice of securing information by
converting it into unreadable formats, only accessible with
a decryption key.
Role:
- Ensures confidentiality and integrity.
- Provides authentication and non-repudiation.
- Used in secure communication protocols (SSL/TLS).
18. Explain the concept of symmetric encryption.
Symmetric encryption uses the same key for both
encryption and decryption.
Examples: AES, DES.
Advantages:
- Faster and efficient for large data.
Disadvantages:
- Key distribution is challenging.
19. Describe asymmetric encryption and its advantages.
Asymmetric encryption uses a pair of keys: a public key for
encryption and a private key for decryption.
Examples: RSA, ECC.
Advantages:
- Secure key distribution.
- Enables digital signatures.
20. Compare symmetric and asymmetric encryption
methods.
Network Security Questions and Answers

Part 3: Hash Functions and Authentication Mechanisms


21. Explain the function of hash functions in security.
Hash functions convert input data into a fixed-size string of
characters (hash).
Functions in security:
- Ensure data integrity by detecting changes.
- Used in password storage (hashed passwords).
- Examples: SHA-256, MD5.
22. Describe the purpose of digital signatures in secure
communications.
Digital signatures authenticate the sender and ensure the
message hasn't been altered.
Key roles:
- Verifies sender's identity.
- Ensures message integrity.
- Provides non-repudiation (sender can’t deny sending).
23. Explain the concept of Message Authentication Codes
(MACs).
MACs are short pieces of information used to verify data
integrity and authenticity.
Key points:
- Generated using a secret key and the message.
- If the MAC matches at both ends, the message is verified.
- Common algorithms: HMAC (Hash-based MAC).
24. Describe the significance of cryptographic protocols in
networks.
Cryptographic protocols secure data transmission over
networks.
Examples:
- SSL/TLS: Secure web communications.
- IPSec: Secure IP communications.
- SSH: Secure remote access.
Significance:
- Ensures confidentiality, integrity, and authentication.
25. What is a Hash Function and why do we need it?
A hash function transforms input data into a fixed-size hash
value.
Why needed:
- To detect data tampering (integrity checks).
- Efficient data retrieval (hash tables).
- Secure password storage and verification.
UNIT IV

Part 4: Network Security Protocols


1. Explain the purpose and functioning of SSL/TLS protocols.
Purpose: To secure data transmission over the internet.
Functioning:
- Encrypts data between client and server.
- Uses certificates to verify server identity.
- SSL (Secure Sockets Layer) and TLS (Transport Layer
Security) ensure secure browsing (HTTPS).
2. Describe the main features of the IPSec protocol.
IPSec secures IP communications through encryption and
authentication.
Features:
- Encrypts IP packets for secure data transmission.
- Supports Authentication Header (AH) and Encapsulating
Security Payload (ESP).
- Works in Transport Mode (data encryption) and Tunnel
Mode (entire packet encryption).
3. Compare SSL/TLS and IPSec in terms of application.
Comparison between SSL/TLS and IPSec:

SSL/TLS IPSec
Feature
Layer Application Layer Network Layer

Use Securing websites, emails Secure VPNs, IP


Case (HTTPS) communications |

Setup Easier (browser-based) Complex (system configuration)


|

4. Explain the significance of wireless security protocols.


Wireless security protocols protect data transmitted over
wireless networks from unauthorized access.
Significance:
- Prevents eavesdropping and unauthorized access.
- Ensures secure connections in public Wi-Fi.
Examples: WEP, WPA, WPA2.
5. Describe the purpose of WPA in securing wireless
networks.
WPA (Wi-Fi Protected Access) improves security over WEP
by:
- Using TKIP (Temporal Key Integrity Protocol) for better
encryption.
- Dynamic key generation to prevent key reuse.
- Providing stronger authentication mechanisms.
6. Discuss the differences between WPA and WPA2.
Differences between WPA and WPA2:

Feature WPA WPA2

Encryption | TKIP (Temporal Key | AES (Advanced


Protocol Integrity Protocol) Encryption Standard)

Security | Moderate | High |


Level

| Slower due to TKIP | Faster and more efficient


Performance with AES |

| Susceptible to some | Stronger against attacks


Vulnerability attacks

|
7. Explain the concept of a Virtual Private Network (VPN).
A VPN creates a secure, encrypted connection over a public
network, ensuring privacy and security.
Key points:
- Encrypts data to protect against eavesdropping.
- Masks the user's IP address for anonymity.
- Commonly used for secure remote work.
8. Describe the functioning of secure tunneling in VPNs.
Secure tunneling in VPNs encapsulates data packets within
encrypted protocols.
Functioning:
- Data is encrypted before transmission.
- Encrypted data travels through a 'tunnel' over the public
internet.
- Protocols used: PPTP, L2TP, IPSec.
9. Define a firewall and its role in network security.
A firewall is a security device or software that monitors
and controls incoming and outgoing network traffic.
Role:
- Blocks unauthorized access while permitting legitimate
communication.
- Filters traffic based on predefined security rules.
- Can be hardware-based, software-based, or both.
10. Differentiate between different types of firewalls.
Types of Firewalls:
- **Packet-Filtering Firewalls**: Inspect individual
packets based on rules.
- **Stateful Inspection Firewalls**: Monitor active
connections and track their state.
- **Application-Level Gateways (Proxy Firewalls)**:
Filter traffic at the application layer.
- **Next-Generation Firewalls (NGFW)**: Combine
traditional firewall functions with advanced features like
intrusion prevention.
11. Explain the importance of packet filtering in firewalls.
Packet filtering is a firewall technique that controls data
flow based on predefined rules.
Importance:
- Blocks unauthorized IP addresses or ports.
- Filters out harmful traffic before it reaches the internal
network.
- Provides a basic layer of security with minimal resource
usage.
12. Describe the concept of stateful inspection in firewalls.
Stateful inspection monitors the state of active connections
and makes decisions based on the context of the traffic.
Key points:
- Tracks the state and characteristics of network
connections.
- Allows or blocks traffic based on the connection state
(e.g., established, new).
- More secure than basic packet filtering.
13. Explain how firewalls prevent unauthorized access.
Firewalls prevent unauthorized access by:
- **Blocking suspicious traffic**: Based on IP addresses,
protocols, or ports.
- **Setting access control rules**: Only trusted sources
are allowed.
- **Monitoring traffic patterns**: Detecting and stopping
unusual activity.
14. Describe the purpose of Intrusion Detection Systems
(IDS).
An IDS monitors network or system activities for malicious
activities or policy violations.
Purpose:
- Identifies potential threats or breaches.
- Alerts administrators of suspicious activities.
- Analyzes traffic patterns to detect anomalies.
15. Compare Intrusion Detection Systems (IDS) and Intrusion
Prevention Systems (IPS).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy