What is the algorithm of message sending in PGP? Number below operations in the right order

2… PGP prompts the user for the passphrase to recover the unencrypted private key.

6… The session key component of the message is constructed.

1… PGP retrieves the sender's private key from the private-key ring using your_userid as an index. If your_userid was not provided in the command, the first private key on the ring is retrieved.

4… PGP generates a session key and encrypts the message.

5… PGP retrieves the recipient's public key from the public-key ring using her_userid as an index.

3… The signature component of the message is constructed.

7) What are the types of ‘headers’ that involve in IPSec? Describe these headers in few words.

Support for these features is mandatory for IPv6 and optional for IPv4. In both cases, the security features are implemented as extension headers that follow the main IP header. The extension header for authentication is known as the Authentication header; that for encryption is known as the Encapsulating Security Payload (ESP) header.

Describe Alert Protocol involving in SSL.

Ø conveys SSL-related alerts to peer entity

Ø severity

· warning or fatal

Ø specific alert

· fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter

· warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown

Ø compressed & encrypted like all SSL data

Describe the Intrusion Detection System. What is a Statistical Anomaly Detection?

Ø inevitably will have security failures

Ø so need also to detect intrusions so can

· block if detected quickly

· act as deterrent

· collect info to improve security

Ø assume intruder will behave differently to a legitimate user

· but will have imperfect distinction between

Statistical Anomaly Detection

Ø threshold detection

l count occurrences of specific event over time

l if exceed reasonable value assume intrusion

l alone is a crude & ineffective detector

Ø profile based

l characterize past behavior of users

l detect significant deviations from this

l profile usually multi-parameter

What is a Firewall? Name the types of Firewall and describe any one of them.


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: