COMPUTER STUDIES INTERNET & INTRANET SECURITY

Authors Avatar

ly those are authorized to access resources. (3)

reasonable level of assurance to it users only those are authori

NCC INTERNATIONAL ADVANCED DIPLOMA

IN

COMPUTER STUDIES

INTERNET & INTRANET SECURITY

DECEMBER 2003 EXAM CYCLE

CANDIDATES SHOULD ATTEMPT FOUR QUESTIONS ONLY

Date : 23rd November, 2003

Time Allowed: 3 Hours

MARKING SCHEME

Please attempt any four from question 1 to 6

Clearly cross out surplus answers


ANSWER ANY FOUR QUESTIONS ONLY

QUESTION 1 (25 points)

As a security manager, you need to implement security measures to detect intrusions from LAN. You boss need some understanding of IDS before approving your solution.

a)         How many types of IDS are available? Name them all and describe each         (8 marks)

Ans:        -Host Based IDS (HIDS) – Similar to NIDS but only analyzes network traffic to and from a single machine   (1.6)                

- Network IDS (NIDS) - Analyzes packets on a network and tries to determine if a hacker is trying to break into a system. An NIDS typically runs on a hub or a router, analyzing all traffic flowing through the device (1.6)

- System Integrity Verifier (SIV) – keeps track of critical system files and notifies an administrator when they are altered.  (1.6)        

                - Log file Monitor (LFM) – Scan through logs generated by network services looking for attacks

Patterns.  (1.6)

                - Honeypot – A deception system that has false services to attract hacker attention. (1.6)

b)         What are the limitations of host based IDS (HIDS)?                                 (8 marks)

Ans:        - Traffic overloading can easily crash a HIDS since it is usually installed and running on a platform such as a software OS, (2)

- HIDS cannot examine encrypted network traffic passing through. (2)

- It is specific to types of systems and makes them impractical for many environments. If the server is running multiple services such as DNS, file sharing, SMTP and so on, the host based IDS system might not be able to detect intrusions. (2)

- It runs as a background process and do not have access to the core communication functionality of the system. If an attacker fins a way to the access the OS somehow, IDS could be disabled. (2)

OR SIMILAR         (4 items with description needed)

  1. Please describe SYN attack.                                                 (5 marks)

Ans:        A SYN attack exploits the use of a small buffer space during the TCP three hand shake in order to prevent a server from accepting inbound TCP connection. When a server receives the first SYN=1 packet, it stores this connection request in a small “in-process: queue. Since sessions tend to be established quickly, this queue is small and can store only small number of connection requests. This method is taken for optimizing memory. (2.5)

A SYN attack floods this smaller queue with connection requests. When the target system replies, the attacking system does not respond and leaves the connection request in the smaller queue for time expiration. By filling up this queue with bogus requests, the target system can no longer to accept legitimate requests. A form of Denial of Service. (2,5)

  1. What are the ways to minimize the SYN attack? (4 marks)

Ans:        Increase the size of the in process queue which can provide additional space so that additional connection requests can be queued. (2) OR Decrease the amount of time before stale entries are purged from the in process queue. It can prevent busy systems connected by a slow network link from being refused a connection. (2)

QUESTION 2 (25 points)

a)         In encryption, what are symmetric and asymmetric keys?  How they differ?         (6 marks)

Join now!

Ans:        Symmetric key uses the same key to encrypt and decrypt data. However, they are easy to be captured during key exchange between two networked hosts. If any one key is lost to an attacker, the traffic content can be compromised. The major advantage is the comparatively high speed for encryption and decryption of data between (3)

        Asymmetric key uses two mathematically different keys to encrypt (Private) and decrypt (Public). During a key exchange, it is harder to capture content of keys and reuse it for decryption since private key will not be exchanged (3)

        OR Similar

  1. In PKI, ...

This is a preview of the whole essay