2023F-T2 ISN 1604 - Inclassassignment1

pdf

School

Lambton College *

*We aren’t endorsed by this school

Course

002

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

8

Uploaded by JusticeFreedom103098

Report
Cyber Security and Computer Forensics 2023F-T2 ISN 1604 - Hacker Techniques, Tools, and Incident Handling 01 (CSFM Group 1) In Class Assignment – 1 Submitted By: Jewel Tiju Thomas C0896114
A. What is the difference between LDAP and Radius? Answer: The protocols used for network authentication and directory services include LDAP (Lightweight Directory Access Protocol) and RADIUS (Remote Authentication Dial-In User Service), however they have various functions and unique properties. The following are the main variations between LDAP and RADIUS: LDAP (Lightweight Directory Access Protocol): To query and manage directory information, including user accounts, groups, and organisational data, LDAP is generally used as a directory service protocol. In programmes like email servers and network directories, it is frequently used for user authentication, authorisation, and directory services. LDAP is mostly used for user authentication and directory information searches. In addition to retrieving directory information, it authenticates a user's identity. It is mostly utilised for directory services and single sign-on (SSO). TCP is commonly used by LDAP on port 389 (or 636 for LDAPS, the secure version), with TLS for secure connections as an option. RADIUS (Remote Authentication Dial-In User Service) An authentication, authorisation, and accounting (AAA) protocol used for networking is called RADIUS. Especially in situations like remote access servers, wireless access points, and VPNs, it is frequently used to govern access to network resources. RADIUS focuses more on limiting network access. It authorises users' access to network resources by confirming their identity and allowing or denying them access in accordance with user policies and credentials. RADIUS's transport protocol is UDP. For authentication, it uses port 1812, and for accounting, it uses port 1813. Additionally, RADIUS may be used with a number of security protocols, such as RADIUS over TLS (RadSec).
B: Research on any one Asymmetric Key Algorithm and explain the process. Answer : The RSA (Rivest-Shamir-Adleman) algorithm is one of the most used asymmetric key algorithms. In many applications, RSA is frequently used for encryption, digital signatures, and safe data transmission. Here is a description of the RSA algorithm's operation: Key Generation: To generate a pair of keys in RSA, the following steps are taken: 1. Choose two prime numbers, p and q, which are both large. 2. Find their product, n = p * q. This value will be used as the modulus for both the public and private keys. 3. Calculate the totient (φ) of n, which can be found by multiplying (p- 1) and (q-1). 4. Select an integer, e, such that it is greater than 1 and less than φ(n). It is important that e is coprime with φ(n). This chosen value becomes the public exponent. 5. Compute the modular multiplicative inverse of e modulo φ(n), denoted as d. d then becomes the private exponent. 6. The public key is represented as (n, e), while the private key is represented as (n, d). The modulus, n, is used for both encryption and decryption processes. Encryption: To secure a message (plaintext) M by utilizing the public key (n, e) of the intended recipient, the process of encrypting (ciphertext) C is as follows: C = M^e mod n. The decryption of C is only possible for the recipient, who possesses the private key containing the exclusive private exponent d. Decryption : To perform decryption of the ciphertext C using the private key (n, d), the original message M can be calculated as follows: M = (C raised to the power of d) modulo n.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Digital Signatures : RSA is also employed for the purpose of generating digital signatures. To sign a message, the sender utilizes their private key to encrypt a hash of the message. This process yields a digital signature. The receiver, on the other hand, can utilize the sender's public key to decrypt the signature and ascertain the integrity of the message. C : Describe TCP/IP layers briefly. Answer : The four conceptual levels that make up the TCP/IP (Transmission Control Protocol/Internet Protocol) paradigm, sometimes referred to as the Internet protocol suite, specify how data is transported over networks. These strata are as follows, going from lowest to highest: Link Layer (Network Interface Layer): The physical and data connection components of network communication are handled by the lowest layer. It consists of both hardware and software that control how a device connects to a physical media (like Ethernet or Wi-Fi). Responsible for structuring and addressing data for transmission.\ Network layer (Internet layer): The forwarding and routing of data packets between various networks is the primary function of the Internet layer. The Internet Protocol (IP), which offers routing and addressing (IPv4 and IPv6), is a key protocol in this layer. Data can travel across many network segments to reach to its destination.
Transport Layer: Data dependability and end-to-end communication are the responsibilities of the transport layer. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are examples of such protocols. While UDP is connectionless and utilised in situations where speed is more essential than error checking, TCP offers dependable, connection-oriented communication with capabilities like error repair and flow management. Application Layer: The top layer, the application layer oversees end-user services and apps. Numerous protocols and services are included in this layer, such as HTTP (web surfing), FTP (file transfer), SMTP (email), DNS (domain name resolution), and many more. It makes user-level communication and network resource interaction possible. D: Explain the CIA triad with examples related to a hacking incident. Answer: The CIA triad is a fundamental concept in information security, which encompasses the principles of Confidentiality, Integrity, and Availability. These three principles are essential for protecting any secure system or environment. Let's delve into each aspect of the CIA triad by examining examples of a hacking incident: Confidentiality: Confidentiality ensures that information remains private and is accessible only to authorized individuals or systems. Breaches of confidentiality occur when unauthorized parties gain access to sensitive data. Hacking incidents that compromise confidentiality may include: Data Breach: In this scenario, an attacker successfully breaches a company's database and steals customer information
such as names, addresses, and credit card numbers. This stolen information can then be used for identity theft or financial fraud. Insider Threat: In this case, a company employee with access to confidential data intentionally leaks sensitive information to a competitor or external party. Integrity: Integrity makes ensuring that data is correct and unaltered, guarding it against unauthorised changes. Integrity-threatening hacking attacks might include: Data tampering is when an attacker obtains access to a system for keeping track of medical records and modifies patient. information, changing diagnoses or prescriptions. The patients engaged may suffer severe health effects because of this. Attack using ransomware: A hacker encrypts crucial files belonging to a company and requests a ransom in exchange for the decryption key. Data recovery may result by paying the ransom, but there is no assurance that the hacker won't alter the data. Availability: Data and resources must be available to be used as required. Availability disruptions caused by hacking attacks include: DDoS (distributed denial of service) attacks can place when hackers overwhelm a network or website with traffic, blocking normal users from accessing it. This may result in financial losses and corporate activities being disrupted. Malware Infection: A vital server may become inaccessible if it becomes infected with malware. For instance, if a hospital's electronic health record system is compromised by malware, it can stop working, which would have an impact on patient care.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
E. Convert the following numbers (Please show all steps performed to get results) a. Convert 1100011 to Decimal b. Convert 49 to binary. c. Convert Octal 34 to binary d. Covert 1100111 to Octal e. Convert F3D to binary Answer: a. Convert 1100011 to Decimal: (1 * 2^6) + (1 * 2^5) + (0 * 2^4) + (0 * 2^3) + (0 * 2^2) + (1 * 2^1) + (1 * 2^0) = 64 + 32 + 2 + 1 = 99 So, 1100011 in binary is equal to 99 in decimal. b. Convert 49 to Binary: 49 divided by 2 is 24 remainder 1 24 divided by 2 is 12 remainder 0 12 divided by 2 is 6 remainder 0 6 divided by 2 is 3 remainder 0 3 divided by 2 is 1 remainder 1 1 divided by 2 is 0 remainder 1 Now, read the remainders from bottom to top, and you get the binary representation: 110001. So, 49 in decimal is equal to 110001 in binary. c. Convert Octal 34 to Binary: Octal 3 is equivalent to binary 011. Octal 4 is equivalent to binary 100. So, Octal 34 in binary is 011100.
d. Convert 1100111 to Octal: 001 100 111 001 in binary is 1 in octal. 100 in binary is 4 in octal. 111 in binary is 7 in octal. So, 1100111 in binary is equal to 147 in octal. e. Convert F3D to binary Convert the hexadecimal digits to their 4-bit binary equivalents: F is 1111 in binary. 3 is 0011 in binary. D is 1101 in binary. Concatenate the binary representations: F3D in hexadecimal is equivalent to 111100111101 in binary.