Security attacks
Name
Haider Abbas
Reg No
2018-kiu-5495
Date
12/10/2020
Department
BS IT 4th
Course
Information Security
Q # 1 Answer the following Question
1. What are the types of security attacks?
Answer: A security attack is an unauthorized attempt to steal, damage, or
expose data from an information system such as your website. Malicious
hackers can go about this in a variety of ways, including the ones listed
below. There are many types of security attacks some are following.
1. Malware,
2. Drive-by downloads
3. Phishing
2. Describe authentication factors in details
Answer: Authentication is the process of recognizing a user’s identity. It is the
mechanism of associating an incoming request with a set of identifying credentials.
The credentials provided are compared to those on a file in a database of the
authorized user’s information on a local operating system or within an authentication
server. Authentication process can be described in two distinct phases
1. Identification
2. Actual
Identification
Identification phase provides a user identity to the security system. This
identity is provided in the form of a user ID. The security system will
search all the abstract objects that it knows and find the specific one of
which the actual user is currently applying. Once this is done, the user has
been identified. The fact that the user claims does not necessarily mean
that this is true.
Actual
An actual user can be mapped to other abstract user object in the system,
and therefore be granted rights and permissions to the user and user must
give evidence to prove his identity to the system. The process of
determining claimed user identity by checking user-provided evidence is
called authentication and the evidence which is provided by the user
during process of authentication is called a credential.
3. Discuss Access Control and Its types.
Answer: Access control is a method of guaranteeing that users are who
they say they are and that they have the appropriate access to company
data. There are three types of access control
1. Mandatory Access Control (MAC)
2. Role-Based Access Control (RBAC)
3. Discretionary Access Control (DAC)
4. Define Fail-Safe Principal?
Answer: A control operation or function that prevents improper system functioning
or catastrophic degradation in the event of a failure within the system or in the
event of an operator error. The capability of a device to fail without creating
danger to operating personnel, to itself, or to other devices.
5. Explain Vegenere Cipher.
Answer: Vigenere cipher is a poly-alphabetic substitution system that use
a key and a double-entry table.
In order to cipher a text, take the first letter of the message and the first
letter of the key, add their value (letters have a value depending on their rank
in the alphabet, starting with 0). The result of the addition modulo 26 (26=the
number of letter in the alphabet) gives the rank of the ciphered letter.
6. Encrypt Plaintext “Defend the east wall of the castle” using Caesar cipher.
Answer:
Plaintext: Defend the wall of the castle.
Cipher Text: Ghihqg wkh hdvw zdoo ri wkh fdvwoh
Q # 2. Solve the following Question.
1. Consider the following: Plaintext: “PROTOCOL” Secret key: “NETWORK”
What is the corresponding cipher text using play fair cipher method?
Answer:
Plane text: PROTOCOL
Key: NETWORK
Cipher Text: LANWCINS
2. Construct a table for the Keyword “Warning” and encrypt the following
message (Plaintext) “Hide yourself as soon as possible” using play-fair
Cipher.
Answer:
W
A
R
N
I
G
B
C
D
E
F
K
H
L
M
O
P
Q
S
T
U
V
X
Y
Z
KEY WORD: WARNING
PLAINE TEXT: HIDE YOURSELF AS SOON AS
POSSIBLE
CIPHER TEXT: MAEG USXWTDMH NP TPSW NP QPQYTNDHCZ
3. Encrypt the Plaintext HELLO with Key XMCKL using one-time pad cipher.
ANSWER:
Cipher Text: Eqnvz
4. What are the characteristics of Auto Key Cipher? Take a plaintext os your
choice and encrypt by using Auto Key Cipher.
Answer:
Characteristics of auto key cipher
600/5 = 120 characters will be encrypted with each alphabet. If someone attacks
our cipher and is able to determine the length of the keyword, they can strip the.
Plane text: go in side
Key word: attention
Cipher text: gh br fbl
The end.
…