computer-nec-license
  • NEC-Computer
  • 1. Concept of Basic Electrical and Electronics Engineering
    • 1.1 Basic Concepts
    • 1.2 Network Theorems
    • 1.3 Alternating Current Fundamentals
    • 1.4 Semiconductor Device
    • 1.5 Signal Generator
    • 1.6 Amplifiers
    • MCQs
      • MCQs On Basic Electrical
        • set-1
        • set-2
      • MCQs On Basic Electronics
        • set-1
        • set-2
  • 2. Digital Logic and Microprocessor
    • 2.1 Digital Logic
    • 2.2 Combinational & Arithmetic Circuit
    • 2.3 Sequential Logic Circuits
    • 2.4 Microprocessor
    • 2.5 Microprocessor System
    • 2.6 Interrupt Operations
    • MCQs
      • MCQs On Digital Logic
        • set-1
        • set-2
        • set-3
        • set-4
        • set-5
        • set-6
        • set-7
        • set-8
        • set-9
        • set-10
        • set-11
        • set-12
      • MCQs On Microprocessor
        • set-1
        • set-2
        • set-3
        • set-4
        • set-5
        • set-6
        • set-7
        • set-8
        • set-9
  • 3. Programming Language and Its Applications
    • 3.1 Introduction to C Programming
    • 3.2 Pointers, Structures, and Data Files
    • 3.3 C++ Language Constructs with Objects and Classes
    • 3.4 Features of Object-Oriented Programming
    • 3.5 Pure Virtual Functions and File Handling
    • 3.6 Generic Programming and Exception Handling
    • MCQs
      • set-1
      • set-2
      • set-3
      • set-4
      • set-5
  • 4. Computer Organization and Embedded System
    • 4.1 Control and CPU
    • 4.2 Computer Arithmetic and Memory System
    • 4.3 I/O Organization and Multiprocessor
    • 4.4 Embedded System Design
    • 4.5 Real-Time Operating and Control Systems
    • 4.6 Hardware Description Language (VHDL) and IC Technology
    • MCQs
      • set-1
      • set-2
      • set-3
      • set-4
      • set-5
      • set-6
      • set-7
      • set-8
      • set-9
      • set-10
      • set-11
  • 5. Concept of Computer Network and Network Security System
    • 5.1 Introduction to Computer Networks
    • 5.2 Data Link Layer
    • 5.3 Network Layer
    • 5.4 Transport Layer
    • 5.5 Application Layer
    • 5.6 Network Security
    • MCQs
      • Basic Networking
        • set-1
        • set-2
      • Advanced Networking
        • set-1
        • set-2
        • set-3
        • set-4
        • set-5
        • set-6
  • 6. Theory of Computation and Computer Graphics
    • 6.1 Introduction to Finite Automata
    • 6.2 Introduction to Context-Free Languages (CFL)
    • 6.3 Turing Machines (TM)
    • 6.4 Introduction to Computer Graphics
    • 6.5 Two-Dimensional Transformation
    • 6.6 Three-Dimensional Transformation
    • MCQs
      • MCQs on Theory of Computation
        • set-1
        • set-2
        • set-3
      • MCQs On Computer Graphics
        • set-1
        • set-2
        • set-3
        • set-4
        • set-5
        • set-6
  • 7. Data Structures and Algorithm, Database System and Operating System
    • 7.1 Introduction to Data Structures, Lists, Linked Lists, and Trees
    • 7.2 Sorting, Searching, Hashing and Graphs
    • 7.3 Introduction to Data Models, Normalization, and SQL
    • 7.4 Transaction Processing, Concurrency Control, and Crash Recovery
    • 7.5 Introduction to Operating System and Process Management
    • 7.6 Memory Management, File Systems, and System Administration
    • MCQs
      • MCQs ON DSA
        • set-1
        • set-2
        • set-3
        • set-4
        • set-5
        • set-6
      • MCQs On DBMS
        • set-1
        • set-2
      • MCQs On Operating System
        • set-1
        • set-2
        • set-3
        • set-4
        • set-5
        • set-6
        • set-7
        • set-8
        • set-9
        • set-10
        • set-11
        • set-12
  • 8. Software Engineering and Object-Oriented Analysis & Design
    • 8.1 Software Process and Requirements
    • 8.2 Software Design
    • 8.3 Software Testing, Cost Estimation, Quality Management, and Configuration Management
    • 8.4 Object-Oriented Fundamentals and Analysis
    • 8.5 Object-Oriented Design
    • 8.6 Object-Oriented Design Implementation
    • MCQs
      • set-1
      • set-2
      • set-3
      • set-4
      • set-5
      • set-6
      • set-7
      • set-8
      • set-9
  • 9. Artificial Intelligence and Neural Networks
    • 9.1 Introduction to AI and Intelligent Agents
    • 9.2 Problem Solving and Searching Techniques
    • 9.3 Knowledge Representation
    • 9.4 Expert System and Natural Language Processing
    • 9.5 Machine Learning
    • 9.6 Neural Networks
    • MCQs
      • set-1
      • set-2
      • set-3
      • set-4
      • set-5
      • set-6
      • set-7
      • set-8
      • set-9
  • 10. Project Planning, Design and Implementation
    • 10.1 Engineering Drawings and Its Concepts
    • 10.2 Engineering Economics
    • 10.3 Project Planning and Scheduling
    • 10.4 Project Management
    • 10.5 Engineering Professional Practice
    • 10.6 Engineering Regulatory Body
    • MCQs
      • MCQs On Engineering Drawing
        • set-1
        • set-2
      • MCQs On Engineering Economics
      • MCQs On Project Planning & Scheduling
      • MCQs On Project Mangement
      • MCQs On Engineering Professional Practice
      • MCQs On Engineering Regulatory Body
  • Questions Sets
    • Set 1 (Chaitra, 2080)
      • Short Questions (60*1=60 Marks)
      • Long Questions (20*2=40 Marks)
    • Set 2 (Aasadh, 2081)
      • Short Questions (60*1=60 Marks)
      • Long Questions (20*2=40 Marks)
    • Set 3 (Asojh, 2080)
      • Short Questions (60*1=60 Marks)
      • Long Questions (20*2=40 Marks)
    • Model Set - Computer Engineering By NEC
      • Short Questions (60*1=60 Marks)
      • Long Questions (20*2=40 Marks)
    • Model Set - Software Engineering By NEC
      • Short Questions (60*1=60 Marks)
      • Long Questions (20*2=40 Marks)
  • Tips & Tricks
Powered by GitBook
On this page
  • 1. Types of Computer Security
  • 2. Types of Security Attacks
  • 3. Principles of Cryptography
  • 4. RSA Algorithm
  • 5. Digital Signatures
  • 6. Securing E-mail (PGP)
  • 7. Securing TCP Connections (SSL/TLS)
  • 8. Network Layer Security (IPsec, VPN)
  • 9. Securing Wireless LANs (WEP, WPA)
  • 10. Firewalls
  • Conclusion
  1. 5. Concept of Computer Network and Network Security System

5.6 Network Security

Network security is crucial for protecting data and systems from unauthorized access, misuse, or damage. It involves various technologies, protocols, and practices designed to protect networks and their components.

In this section, we will cover key topics related to Network Security:


1. Types of Computer Security

Computer security encompasses measures and practices designed to protect data, systems, and networks from unauthorized access, data breaches, and attacks. The key principles of computer security include Confidentiality, Integrity, Availability, Authentication, and Non-repudiation.

  • Confidentiality:

    • Ensures that sensitive information is accessible only to authorized users and protected from unauthorized access.

    • Encryption is commonly used to ensure confidentiality.

  • Integrity:

    • Ensures that data is accurate and has not been tampered with during transmission.

    • Hashing algorithms (e.g., MD5, SHA) are used to verify data integrity.

  • Availability:

    • Ensures that authorized users can access the information and systems when needed, without delays.

    • Protection against denial-of-service (DoS) attacks is critical for maintaining availability.

  • Authentication:

    • Ensures that the user or system requesting access is who they claim to be.

    • Techniques include passwords, biometrics, and public key infrastructure (PKI).

  • Non-repudiation:

    • Ensures that the sender of a message cannot deny having sent the message.

    • Digital signatures are used to ensure non-repudiation.


2. Types of Security Attacks

Security attacks are intentional actions taken by individuals or groups with malicious intent to compromise the security, availability, or integrity of systems and data. These attacks can be classified into different categories, including Passive Attacks, Active Attacks, Insider Attacks, Spoofing, and Phishing.

  • Passive Attacks:

    • Eavesdropping or Sniffing: Unauthorized interception and monitoring of data transmission.

    • The goal is to gather information without affecting the system’s performance.

  • Active Attacks:

    • Modification of Data: Attacker alters or injects data during transmission (e.g., Man-in-the-Middle attack).

    • Denial of Service (DoS): Attackers attempt to make a service or system unavailable to users.

    • Replay Attacks: Attacker intercepts and retransmits legitimate data to impersonate the sender.

  • Insider Attacks:

    • Attacks originating from within the organization, often by trusted individuals with access to the system.

  • Spoofing:

    • Faking identity to gain unauthorized access or perform actions under the guise of a legitimate user or device.

  • Phishing:

    • Social engineering attack where attackers trick users into revealing sensitive information, typically through fake emails or websites.


3. Principles of Cryptography

Cryptography is the science of encoding and decoding information to keep it secure from unauthorized access. It relies on several principles:

  • Confidentiality: Ensuring that only authorized parties can access sensitive data.

  • Integrity: Ensuring that the data is not altered in an unauthorized way during storage or transmission.

  • Authentication: Verifying the identity of the parties involved in communication.

  • Non-repudiation: Ensuring that a sender cannot deny sending a message, or a receiver cannot deny receiving it.

  • Key Management: Ensuring the secure generation, distribution, and storage of cryptographic keys.

Cryptographic methods include:

  • Symmetric Key Cryptography: The same key is used for both encryption and decryption (e.g., AES).

  • Asymmetric Key Cryptography: Different keys are used for encryption and decryption (e.g., RSA).

  • Hash Functions: Converts data into a fixed-length hash (e.g., SHA-256) for data integrity verification.


4. RSA Algorithm

RSA (Rivest-Shamir-Adleman) is a widely used asymmetric encryption algorithm. It is based on the difficulty of factoring large prime numbers.

Steps of RSA:

  1. Key Generation:

  • Select two large prime numbers ppp and qqq.

  • Compute n=p×qn = p \times qn=p×q, and ϕ(n)=(p−1)(q−1)\phi(n) = (p - 1)(q - 1)ϕ(n)=(p−1)(q−1).

  • Choose a public exponent eee such that 1<e<ϕ(n)1 < e < \phi(n)1<e<ϕ(n) and eee is coprime with ϕ(n)\phi(n)ϕ(n).

  • Compute the private key ddd such that e×d≡1 (mod ϕ(n))e \times d \equiv 1 \ (\text{mod} \ \phi(n))e×d≡1 (mod ϕ(n)).

  1. Encryption:

  • The public key (e,n)(e, n)(e,n) is used to encrypt the plaintext MMM into ciphertext CCC: C=Me (mod n)C = M^e \ (\text{mod} \ n)C=Me (mod n)

  1. Decryption:

  • The private key (d,n)(d, n)(d,n) is used to decrypt the ciphertext CCC back into the plaintext MMM: M=Cd (mod n)M = C^d \ (\text{mod} \ n)M=Cd (mod n)


Applications:

RSA is widely used for securing data transmission over the internet, particularly in protocols like HTTPS.


5. Digital Signatures

A Digital Signature is a cryptographic method used to verify the authenticity and integrity of a message or document.

  • A digital signature uses asymmetric encryption: the sender encrypts the message hash with their private key, and the recipient decrypts it using the sender's public key.

  • If the decrypted hash matches the hash of the received message, it confirms that the message is authentic and has not been altered.

Steps:

  1. Sender: Generates a message hash and encrypts it with their private key to create the signature.

  2. Receiver: Decrypts the signature using the sender's public key and compares the resulting hash with the hash of the received message.


6. Securing E-mail (PGP)

PGP (Pretty Good Privacy) is an encryption program used for securing email communication. It provides:

  • Confidentiality: By encrypting the email using the recipient's public key.

  • Authentication: By digitally signing the email with the sender's private key.

  • Integrity: Ensures the email hasn’t been altered during transmission.

PGP uses a combination of:

  • Asymmetric Encryption: To encrypt the symmetric encryption key (using public/private keys).

  • Symmetric Encryption: To encrypt the actual message using a shared secret key.

PGP is widely used for email encryption and file encryption.


7. Securing TCP Connections (SSL/TLS)

SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are protocols used to establish secure connections between a client and a server over a network.

  • SSL/TLS ensures that the communication between two devices is encrypted and authenticated.

  • SSL/TLS Handshake: A process where the client and server agree on encryption algorithms, exchange keys, and verify identities.

Steps of SSL/TLS:

  1. Handshake:

    • Client and server exchange messages to authenticate each other and negotiate encryption algorithms.

  2. Session Key Generation:

    • The client and server agree on a shared session key used to encrypt the data.

  3. Data Transmission:

    • Data is encrypted with the session key and transmitted securely.

  4. Session Termination:

    • The session is closed securely when the communication ends.

SSL/TLS is commonly used to secure HTTPS connections.


8. Network Layer Security (IPsec, VPN)

Network Layer Security ensures that data transmitted across a network is protected from unauthorized access, tampering, and eavesdropping. Two key technologies used in this domain are IPsec and VPN.

  • IPsec (Internet Protocol Security):

    • IPsec is a suite of protocols used to secure Internet Protocol (IP) communications.

    • It provides encryption, authentication, and data integrity at the network layer.

    • Modes of Operation: Transport Mode (only encrypts the payload) and Tunnel Mode (encrypts the entire packet).

  • VPN (Virtual Private Network):

    • A VPN creates a secure, encrypted connection over a public network, allowing users to securely access a private network.

    • VPN Types:

      • Remote Access VPN: Connects individual users to a network.

      • Site-to-Site VPN: Connects entire networks, typically used by organizations.

IPsec is commonly used in VPN implementations.


9. Securing Wireless LANs (WEP, WPA)

Wireless Local Area Networks (WLANs) are vulnerable to unauthorized access if not properly secured. Two major protocols that have been used to secure WLANs are WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Over time, WPA has evolved into stronger versions, with WPA2 being the most secure option today.

  • WEP (Wired Equivalent Privacy):

    • WEP is an outdated security protocol used to secure wireless networks.

    • It uses RC4 encryption but is considered insecure due to weaknesses in the encryption process and key management.

  • WPA (Wi-Fi Protected Access):

    • WPA improves upon WEP by offering stronger encryption using AES (Advanced Encryption Standard).

    • WPA2 is the most secure version of WPA and is widely used in wireless networks.


10. Firewalls

A Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Types of Firewalls:

    • Packet Filtering Firewall: Inspects packets and blocks those that don’t meet predefined security criteria.

    • Stateful Inspection Firewall: Tracks the state of active connections and makes decisions based on the state of the traffic.

    • Proxy Firewall: Acts as an intermediary between the client and server, masking the client's identity.

  • Firewall Rules:

    • Firewalls use access control lists (ACLs) to define rules for allowing or blocking traffic.

    • Rules are based on factors like IP addresses, port numbers, and protocols.


Conclusion

  • Network Security is essential to protect data, prevent unauthorized access, and ensure confidentiality, integrity, and availability.

  • Key concepts in network security include cryptography, RSA, digital signatures, PGP, **SSL/TLS

**, and firewalls.

  • Implementing robust network security mechanisms is crucial to protect systems and data from attacks such as DoS, spoofing, and man-in-the-middle attacks.

Previous5.5 Application LayerNextMCQs

Last updated 3 months ago