tag:blogger.com,1999:blog-21962427438695053072024-03-05T01:03:16.849-08:00Network SecurityFirdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-2196242743869505307.post-84840204811310651132009-10-28T23:48:00.000-07:002009-10-28T23:52:24.062-07:00Lab 10 : Lab TestHeld in System Lab.<br />Question 1 about File Permission on windows server 2003.<br />Question 2 about PGP (Pretty Good Privacy) how encrypt content messages.<br />Question 3 about IPSec.<br /><br />I had answer all question.Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-24397017705822230902009-10-28T23:21:00.000-07:002009-10-28T23:48:14.510-07:00Lecture 10 : Legal and Ethical Issues in Computer Security::Law
<br />
<br />- a rule of conduct or action by authority that need to recognized first.
<br />
<br />::Ethics
<br />
<br />- a set of moral principles or values
<br />- standard about something right or wrong
<br />- principle that conduct governing an individual or a group.
<br />
<br />::Protecting Program or Data
<br />
<br />a) copyright - the right of developer of the system or the application.
<br />b) patent - a kind of the program or types of data.
<br />c) trade secret - the owner must protect the secret of the content, such as by storing it and by making employees sign a statement that they will not disclose the secret.<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 16</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} .O1 {color:black; font-size:149%;} a:link {color:#FFDE66 !important;} a:active {color:#AC66BB !important;} a:visited {color:#D490C5 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#f4e7ed,#b13f9a,#b83d68,#ac66bb,#ffde66,#d490c5"> <div shape="_x0000_s1026"> <div class="O1" style=""><span style=";font-family:";font-size:111%;" ><span style="color: rgb(249, 182, 57); position: absolute; left: -2.42%; top: 0.22em;font-family:";font-size:80%;" >¡</span></span><span style=";font-family:";font-size:20pt;" ></span><span style=";font-family:";font-size:20pt;" ></span></div> <div class="O" style=""></div> </div> </p:colorscheme>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-8265544903700684812009-10-28T22:55:00.000-07:002009-10-28T23:21:03.668-07:00Lab 9 : Backtrack 2:: What is Backtracking ?<br /><br />- Backtracking is a general algorithm for finding all or some solutions to some computational problem.<br />- Currently Backtrack 4 has released.<br />- Backtrack 3 interface<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0nEKw8PhqM5Gw8dq-Af3UjZQYg9yIkNiENzILcuEEHXE09jyqQK6jwpzMWD7hITXg7g4ORgQSQGShuGFCrrPpg0FQ1E0dorxv5wFfQVPQ6Ydz3wG6roV0vZxnhNSKwkS8awgV3CAnz65t/s1600-h/21.JPG"><img style="cursor: pointer; width: 320px; height: 151px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0nEKw8PhqM5Gw8dq-Af3UjZQYg9yIkNiENzILcuEEHXE09jyqQK6jwpzMWD7hITXg7g4ORgQSQGShuGFCrrPpg0FQ1E0dorxv5wFfQVPQ6Ydz3wG6roV0vZxnhNSKwkS8awgV3CAnz65t/s320/21.JPG" alt="" id="BLOGGER_PHOTO_ID_5397902186870149794" border="0" /></a><br /><br /><br />Backtrack as far as i know is to crack WEP wireless key.<br /><br />Command line for backtrack.<br /><br />a) iwconfig [name of device] - configure wireless device<br />b) ifconfig [name of device] up - start service<br />c) kismet- scan the area<br />d) air0dump -ng --ivs - to capture packet<br />e) air0dump -ng --ivs -w [folder name] --channel 1 [name of device] - to scan all channel and dump into folder<br />f)airplay -ng --interactive -b [MAC address connected to SSID] -h [client to ID destination] -x 512 [name of device] - fasten up capture packetsFirdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-40048666062734280652009-10-28T22:36:00.000-07:002009-10-28T22:54:22.911-07:00Lecture 9 : Intrusion Detection System<span style="font-size:100%;">::Security Intrusion<br /><br />- access to a system w</span><span style="font-size:100%;">ith</span><span style="font-size:100%;">out authorization, attempt to cracking.<br /></span><br />::Intrusion Detection<br /><br />- security service that monitors and analyzes system events for the purpose to finding & providing real-time or near real-time warning of attempts to access system resources.<br /><br /><span style="font-size:100%;">a)Host-based IDS: monitor single host activity<br />b)Network-based IDS: monitor net</span><span style="font-size:100%;">work traffic</span><br /><br />:: 3 Types Of IDS<br /><br />a) <span style="font-weight: bold;">Host IDS</span> - specialized software to monitor system activity to<br /> detect suspicious behavior<br />- anomaly detection - defines normal/expected behavior<br />- signature detection - defines proper behavior<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8ZUcB8zB2EDGfwuoyxjt8k0vwHTOucVWOCNq4BpB9SBofJN_krg07VAZvQG0vOP6oPFdB2zrhIA58v4nYi9VEQjxVBKUtgdXOtUS1kNMqhCwbc_D37vka3rtbPkbjJnnkIVOAR5aRT6kB/s1600-h/20.JPG"><img style="cursor: pointer; width: 320px; height: 113px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8ZUcB8zB2EDGfwuoyxjt8k0vwHTOucVWOCNq4BpB9SBofJN_krg07VAZvQG0vOP6oPFdB2zrhIA58v4nYi9VEQjxVBKUtgdXOtUS1kNMqhCwbc_D37vka3rtbPkbjJnnkIVOAR5aRT6kB/s320/20.JPG" alt="" id="BLOGGER_PHOTO_ID_5397895948808805826" border="0" /></a><br /><br /><span style="font-size:100%;">b)<span style="font-weight: bold;">Network IDS</span> - monitor traffic at selected points on a network<br />in (near) real time to detect intrusion patterns; may examine network, transport and/or application level prot</span><span style="font-size:100%;">ocol activity directed toward systems. it comprises a number of sensors<br /><br /></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKevrq_TYlJ-vOAXUq3PXxfXKjD7AotXNuWYgNMtwhbXrJifZrc5HgZtU7vZ8dqtGOj1O7AL9PnY97NEyAUkVEMBoxWDaIjftDBAD5nhIOdrh-016ilTdhgACiKrNXZxfU1U7q25h9fu54/s1600-h/19.JPG"><img style="cursor: pointer; width: 245px; height: 203px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKevrq_TYlJ-vOAXUq3PXxfXKjD7AotXNuWYgNMtwhbXrJifZrc5HgZtU7vZ8dqtGOj1O7AL9PnY97NEyAUkVEMBoxWDaIjftDBAD5nhIOdrh-016ilTdhgACiKrNXZxfU1U7q25h9fu54/s320/19.JPG" alt="" id="BLOGGER_PHOTO_ID_5397895611564821298" border="0" /></a><br /><br />3)<span style="font-style: italic;"> </span><span style="font-weight: bold;">Distributed IDS</span><br /><br />- the monIDS monitoring module was developed. It collects and publishes the information generated by a local instrusion detection engine<br />- specialized IDS Agent is running on the MonALISA service and in case of an alert it takes custom reactive actions & also broadcasts the alert in its communication group.<br />- the attacking hosts are dynamically moved in a black-list based on the attacks level and the frequencies of them.<br />- A periodical report containing the intrusion alerts is generated and sent to the farm administrator.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWtC74p3t26CGkQe9iRRe8HYTktyGdFeksbb_El9tpw40vR5MT6BmONGDaGGo8K7VQPq2NyLRbHr-Q7oMUcuMzWgMx0KCNNSbixfJgRq7yZEm9QbGol8p32m8U76dLGm1LorjhSBCQR7MS/s1600-h/18.JPG"><img style="cursor: pointer; width: 320px; height: 173px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWtC74p3t26CGkQe9iRRe8HYTktyGdFeksbb_El9tpw40vR5MT6BmONGDaGGo8K7VQPq2NyLRbHr-Q7oMUcuMzWgMx0KCNNSbixfJgRq7yZEm9QbGol8p32m8U76dLGm1LorjhSBCQR7MS/s320/18.JPG" alt="" id="BLOGGER_PHOTO_ID_5397895240288095394" border="0" /></a>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-59307654232593344022009-10-28T21:54:00.000-07:002009-10-28T22:33:59.755-07:00Lecture 8 : Firewall:: What is Firewall?
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 5</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:#080808; font-size:149%;} .O1 {color:#080808; font-size:149%;} a:link {color:#377B89 !important;} a:active {color:#76669A !important;} a:visited {color:#1A4E54 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#7aa6b0,#080808,#080808,#000000,#917aa4,#76669a,#377b89,#1a4e54"> <div shape="_x0000_s1026"> <div class="O" style=""><span style=";font-family:";font-size:156%;" ><span style="color: rgb(60, 96, 95); position: absolute; left: -4.77%; top: 0.3em;font-family:Wingdings;font-size:75%;" >n</span></span></div> - a choke point of control and monitoring
<br />- interconnects networks with differing trust
<br />- imposes restrictions on network services : only authorized traffic is allowed
<br />- auditing and controlling access <div class="O1" style=""><span style=";font-family:";font-size:133%;" ><span style="color: rgb(60, 96, 95); position: absolute; left: -4.08%; top: 0.3em;font-family:Wingdings;font-size:75%;" >n</span></span></div> - can implement alarms for abnormal behavior :provide NAT & usage monitoring
<br />- implement VPNs using IPSec
<br />- must be immune to penetration<div class="O" style=""><span style=";font-family:";font-size:28pt;" lang="EN-AU" > </span></div> </div> </p:colorscheme>
<br />:: Firewall Limitations ?
<br />
<br />- cannot protect from attacks bypassing it
<br />- cannot protect against internal threat
<br />- cannot protect against transfer of all virus infected programs or files
<br />
<br />::3 Common types of firewall
<br />
<br />a) packet filters
<br />- simple,fast and transparent
<br />- foundation of any firewall system
<br />- examine each IP packet (no context) and permit or deny according to rules
<br />- hence restricted access to services (ports)
<br />- possibles defaults policies
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPioTUTNFFMC75knPhffsFOP8-hO9P-TCphMuoiTE-5i0mM3zAPNv6Ka6yLeaWfuiQwxddzYIPSCVqR8bTnIe27v2jzIZ-QYTsRUegKVMLdbMcoNQYa3fpYe6FXytCbTSH6PVzxnO7uwMC/s1600-h/15.JPG"><img style="cursor: pointer; width: 320px; height: 111px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPioTUTNFFMC75knPhffsFOP8-hO9P-TCphMuoiTE-5i0mM3zAPNv6Ka6yLeaWfuiQwxddzYIPSCVqR8bTnIe27v2jzIZ-QYTsRUegKVMLdbMcoNQYa3fpYe6FXytCbTSH6PVzxnO7uwMC/s320/15.JPG" alt="" id="BLOGGER_PHOTO_ID_5397889021554709586" border="0" /></a>
<br />
<br />b) Application Level Gateway (Proxy)
<br />- have application specific gateway/proxy
<br />-has full access of protocol
<br />- need separate proxies for each services
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZSAXww_P8ovCLLQ7SP9ulOmO2rvSjGRArjGi7ZpYycmian4nJxS9n9olqKCkGcDq29e1SdTr8Noqu_WfGAzkGF8uY3ekLI5mNsjufrHn5P27A9YBeh7I433FmelMWZKc8tmugqGQO4krh/s1600-h/16.JPG"><img style="cursor: pointer; width: 323px; height: 92px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZSAXww_P8ovCLLQ7SP9ulOmO2rvSjGRArjGi7ZpYycmian4nJxS9n9olqKCkGcDq29e1SdTr8Noqu_WfGAzkGF8uY3ekLI5mNsjufrHn5P27A9YBeh7I433FmelMWZKc8tmugqGQO4krh/s320/16.JPG" alt="" id="BLOGGER_PHOTO_ID_5397890243032934514" border="0" /></a>
<br />
<br />c) Circuit Level Gateway
<br />- relays 2 TCP connections
<br />- imposes security by limiting which such connection are allowed
<br />- one created usually relay traffic without examining contents
<br />- used when trust internal users'
<br />- SOCKS commonly used
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjonaqYpAAcqNZsY0uWnvQGP31JDachCpKExZZfIwVQa-oQhzG49_eKJGidY4fafDhOOzQCzLIh5GdEPYGnil3UcqsAYX6gJvlJnejyDcA_QLx0rO58YAv3UyN68833JCm7RyhWWc8B94BQ/s1600-h/17.JPG"><img style="cursor: pointer; width: 327px; height: 101px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjonaqYpAAcqNZsY0uWnvQGP31JDachCpKExZZfIwVQa-oQhzG49_eKJGidY4fafDhOOzQCzLIh5GdEPYGnil3UcqsAYX6gJvlJnejyDcA_QLx0rO58YAv3UyN68833JCm7RyhWWc8B94BQ/s320/17.JPG" alt="" id="BLOGGER_PHOTO_ID_5397890516134820994" border="0" /></a>
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 6</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:#080808; font-size:149%;} a:link {color:#377B89 !important;} a:active {color:#76669A !important;} a:visited {color:#1A4E54 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important</style><p:colorscheme colors="#7aa6b0,#080808,#080808,#000000,#917aa4,#76669a,#377b89,#1a4e54"><div shape="_x0000_s1026" class="O"><div style=""><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 6</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:#080808; font-size:149%;} a:link {color:#377B89 !important;} a:active {color:#76669A !important;} a:visited {color:#1A4E54 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#7aa6b0,#080808,#080808,#000000,#917aa4,#76669a,#377b89,#1a4e54"> <div shape="_x0000_s1026" class="O"> <div style=""><span style=";font-family:";font-size:133%;" ><span style="color: rgb(60, 96, 95); position: absolute; left: -3.31%; top: 0.3em;font-family:Wingdings;font-size:75%;" >
<br /></span></span></div> </div></p:colorscheme></div></div></p:colorscheme>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-26542255494786106702009-10-28T21:41:00.000-07:002009-10-28T22:29:08.835-07:00Lab 7 : Identify vulnerabilities of FTP<ol><li>Two workstation with platform windows server 2003 - as server and client</li><li>Install wireshark application on server<br /></li><li>Assign static IP addresses : server - 192.168.1.2 & client -192.168.1.3</li><li>Test the connection by using PING.<br /></li><li>Start Telnet & FTP services for both platforms.<br /></li><li>Test FTP connection : client logon to server using username & password</li><li>Server should be capturing the packets using wireshark<br /></li><li>Wireshark will show username and password</li><li>FTP somehow is not secured.</li></ol><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV7hAOawvxu5BgGu3sqzeeLHu5gn00BVhrrzJ05I3g9UghTKpI6arulJ5UGs-KOOLvp5XZBSD6CVqDJalmb2bBl4xl-wleBNZ-vvhuyvgnCjawAiY7NaboOVUiF371vhtipZwHggmV_Uls/s1600-h/14.JPG"><img style="cursor: pointer; width: 320px; height: 141px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV7hAOawvxu5BgGu3sqzeeLHu5gn00BVhrrzJ05I3g9UghTKpI6arulJ5UGs-KOOLvp5XZBSD6CVqDJalmb2bBl4xl-wleBNZ-vvhuyvgnCjawAiY7NaboOVUiF371vhtipZwHggmV_Uls/s320/14.JPG" alt="" id="BLOGGER_PHOTO_ID_5397880240171248642" border="0" /></a>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-29562133110248172652009-10-28T20:47:00.001-07:002009-10-28T21:41:32.738-07:00Lecture 7 : Wireless Security:: Wireless LANs<br /><br />Standard :802.11 - Wi-Fi (Wireless Fidelity)<br />Speed - 1Mbps & 2Mbps<br />Focus on layer 1 & 2 OSI model - Physical Layer & Data Link Layer<br /><br />::802.11 Components<br /><br />a) Worskstation - notebook or PDA<br />b) Access Point (AP)<br /><br />::802.11 Modes<br /><br />a) Basic Service Station (BSS) - One AP<br />b) Extend Services Set- 2 or more BSSs<br />c) Coporates in LANs modes<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwyaorBYtNjk1GOtxr54sQSksJHdvKQRFKRigJsVIR_ilVaUNfe4U40Z0RQSEgGsHysGJB5zqNC0o_hMXdapWbbBDnxAkhkj6NhlV8qcNM8hTqa4pdX2pyAYrsGbXwXiKMNwWQqd4ojfc/s1600-h/12.JPG"><img style="cursor: pointer; width: 320px; height: 180px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwwyaorBYtNjk1GOtxr54sQSksJHdvKQRFKRigJsVIR_ilVaUNfe4U40Z0RQSEgGsHysGJB5zqNC0o_hMXdapWbbBDnxAkhkj6NhlV8qcNM8hTqa4pdX2pyAYrsGbXwXiKMNwWQqd4ojfc/s320/12.JPG" alt="" id="BLOGGER_PHOTO_ID_5397869814817283282" border="0" /></a><br /><br />Ad Hoc Modes<br /><br />a) Peer to peer. One way.<br />b) Independent BAsic Service Set<br />c) Directly communicate without AP<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMUuPMT5d18LOyRamikOy2wT3-vXS8rBjC7yOWA_xceMBdq5gbQYUbhW7EjwHIc8ocy0bb7RWjEePwDhlj3r3UhWvODnOlMHNgVIdletBuHceyRMlm9H6uFhcBxBN_dqJCrGviP89Krbh/s1600-h/13.JPG"><img style="cursor: pointer; width: 320px; height: 129px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMUuPMT5d18LOyRamikOy2wT3-vXS8rBjC7yOWA_xceMBdq5gbQYUbhW7EjwHIc8ocy0bb7RWjEePwDhlj3r3UhWvODnOlMHNgVIdletBuHceyRMlm9H6uFhcBxBN_dqJCrGviP89Krbh/s320/13.JPG" alt="" id="BLOGGER_PHOTO_ID_5397871690051768546" border="0" /></a><br /><br />:: Secutity 8 Threat in Wireless<br /><br /> Have 2 security services - authentication & WEP (Wired Equivalence Key)<br /><br />::Cracking WEP key<br /><br /> a) WepCrack<br /> b) Airsnort<br /> c) Using backtrack 3 (latest 4)<br /><br />WPA (Wi -Fi Protected Access )<br /><br />- difficult to crack the keyFirdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-35701103178256697162009-10-28T13:32:00.000-07:002009-10-28T22:29:08.835-07:00Lab 6 : Security in Network<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1954484243; mso-list-type:hybrid; mso-list-template-ids:-1049048782 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l0:level1 {mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="ListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;"><!--[if !supportLists]--><b style=""><span style="line-height: 115%;font-family:";font-size:12pt;" ><span style=""></span></span></b></p>1. Discuss the potential perpetrators that can threaten Network security and it goal for attacking network services.
<br />
<br />In general network security can been said as a prevention from nosy people from getting data they are not authorized or worse yet, modify messages intended for other recipients. It is concerned with people trying to access remote services that are not authorized to use. Most problems are intentionally caused by malicious people trying to gain some benefit or bring harm to someone else.
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:618416999; mso-list-type:hybrid; mso-list-template-ids:-684264370 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:.75in; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:1954484243; mso-list-type:hybrid; mso-list-template-ids:-1049048782 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l1:level1 {mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="ListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;"><!--[if !supportLists]--><b style=""><span style="line-height: 115%;font-family:";font-size:12pt;" ><span style=""></span></span></b></p>2. Network security problems can be divided roughly into FOUR (4) intertwined areas, List and explain in details each area.
<br />
<br /><span style="font-weight: bold;">Secrecy</span> - also called confidentiality, has to do with keeping information out of the hands of unauthorized users. It protects against disclosure of information to entities not authorized to have that information. Entities might be people or organization.
<br />
<br /><span style="font-weight: bold;">Authentication</span> - deals with determining whom you are talking to before revealing sensitive information or entering into a business deal.
<br />
<br /><span style="font-weight: bold;">Non-Repudiation</span> - deals with signatures. It protects user against the threat that the value or existence of the data might be changed in a way inconsistent with the recognized security policy.
<br />
<br /><span style="font-weight: bold;">Integrity</span> control how - can you be sure that a message you received was really the one sent and not something that a malicious adversary modified in transit.
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1954484243; mso-list-type:hybrid; mso-list-template-ids:-1049048782 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l0:level1 {mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="ListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;"><!--[if !supportLists]--><b style=""><span style="line-height: 115%;font-family:";font-size:12pt;" ><span style=""></span></span></b></p>3. What is the significance difference between the wireshark output in Task 1 and Task 2; explain in detail the function of IPSec in Task 2?
<br />
<br />During Task 1, wireshark successful captured both username and password in File Transfer Protocol (FTP). Username = ‘administrator’ and Password = ‘abc123’. But all these things not happen in Task 2, this is because both username and password are already encrypted even the data are captured. This is because in the Task 2, we using IPSec to secure FTP Transaction. IPSec is one of the solutions to safeguard the transmission of data over FTP from being seen by an unauthorized user. It will protect the information from being manipulated.
<br />
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1954484243; mso-list-type:hybrid; mso-list-template-ids:-1049048782 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l0:level1 {mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="ListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;"><!--[if !supportLists]--><b style=""><span style="line-height: 115%;font-family:";font-size:12pt;" ><span style=""></span></span></b></p>4. What is the benefit of using IPSec?
<br />
<br />IPSec is typically used to attain confidentiality, integrity, and authentication in the transport of data across insecure channels. Though it's original purpose was to secure traffic across public networks, it's implementations are often used to increase the security of private networks as well, since organizations cannot always be sure if weaknesses in their own private networks are susceptible to exploitation. If implemented properly, IPSec provides a private channel for sending and exchanging vulnerable data whether the data is email, ftp traffic, news feeds, partner and supply chain data, medical records, or any other type of TCP/IP based data.
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1022324538; mso-list-type:hybrid; mso-list-template-ids:-1699827052 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:.75in; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:1954484243; mso-list-type:hybrid; mso-list-template-ids:-1049048782 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l1:level1 {mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="ListParagraphCxSpFirst" style="margin-bottom: 0.0001pt; text-indent: -0.25in;"><!--[if !supportLists]--><b style=""><span style="line-height: 115%;font-family:";font-size:12pt;" ><span style=""></span></span></b></p>5. Explain what are AH and ESP in IPSec protocol suite?
<br />
<br />Authentication Header (AH): ties data in each packet to a verifiable signature (similar to PGP email signatures) that allows you to verify both the identity of the person sending the data and that the data has not been altered. · Encapsulation Payload (ESP): scrambles the data (and even certain sensitive IP addresses) in each packet using hard core encryption. So a sniffer somewhere on the network doesn’t get anything usable.<p class="ListParagraphCxSpLast" style="margin: 0in 0in 0.0001pt 0.75in; text-indent: -0.25in;"><span style="line-height: 115%;font-family:";font-size:12pt;" ><o:p></o:p></span></p>
<br /><p class="ListParagraphCxSpLast" style="margin-bottom: 0.0001pt;"><span style="line-height: 115%;font-family:";font-size:12pt;" ><o:p></o:p></span></p> <span style="line-height: 150%; color: rgb(102, 102, 0); font-size: 100%;"><span style=""></span></span>6. Explain in detail how to enable IPSec option in a linux environment.
<br />
<br /><span style="line-height: 150%; font-size: 100%;"><span style="color: rgb(102, 102, 0);"></span><o:p></o:p></span> <p class="MsoListParagraph" style="margin: 0cm 0.9pt 0.0001pt 54pt; text-align: justify; text-indent: -18pt; line-height: 150%; color: rgb(255, 255, 255); font-family: times new roman;"><!--[if !supportLists]--><span style="line-height: 150%; font-size: 100%;"></span></p>Enable-dpd: enables dead peer detection (DPD). DPD is a method for detecting wether any of the hosts for which security associations are set up is unreachable. When this is the case the security associations to that host can be removed. enable-natt: enables NAT traversal (NAT-T). Since NAT alters the IP headers, this causes problems for guaranteeing authenticity of a packet. NAT-T is a method that helps overcoming this problem.
<br />
<br /><p class="MsoListParagraph" style="margin-bottom: 0.0001pt; text-align: justify; text-indent: -18pt; line-height: 150%; font-family: times new roman;"><span style="font-size: 100%;"><b style="color: rgb(102, 102, 0);"><span style="line-height: 150%;"><span style=""><span style=""> </span></span></span></b><b style=""><span style="line-height: 150%;"><span style="color: rgb(102, 102, 0);"></span></span></b></span></p>7. Are there any other methods to secure FTP connection other than using IPSec? (list at least 3 methods).
<br /> <meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:"Times New Roman";} span.apple-style-span {mso-style-name:apple-style-span;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:2087259822; mso-list-type:hybrid; mso-list-template-ids:1075101818 67698715 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:81.0pt; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="ListParagraphCxSpFirst" style="margin: 0in 0in 0.0001pt 81pt; text-indent: -81pt; line-height: 150%;"><!--[if !supportLists]--><span class="apple-style-span"><span style="font-size: 12pt; line-height: 150%; font-family: "Times New Roman"; color: black;"><span style=""><span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span></span></p> i. SQL Server Integration Services)
<br /> ii. SFTP (secure FTP with SSH2 protocol)
<br /> iii. FTPS (FTP over SSL) site<p class="ListParagraphCxSpLast" style="margin: 0in 0in 0.0001pt 81pt; text-indent: -81pt; line-height: 150%;"><span class="apple-style-span"><span style="font-size: 12pt; line-height: 150%; font-family: "Times New Roman"; color: black;"></span></span><span style="font-size: 12pt; line-height: 150%; font-family: "Times New Roman";"><o:p></o:p></span></p> <span style="line-height: 150%; font-size: 100%;"></span><p class="MsoNormal" style="margin: 0in 0in 0.0001pt 0.5in; text-align: justify;"><span style="line-height: 115%;font-family:";font-size:12pt;" ><o:p></o:p></span></p>
<br /><p class="MsoNormal" style="margin: 0in 0in 0.0001pt 0.5in;"><span style="line-height: 115%;font-family:";font-size:12pt;" ><o:p></o:p></span></p> Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-15591716355683633272009-10-28T13:31:00.000-07:002009-10-29T01:41:48.607-07:00Lecture 6 : Security in Networks & Applications:: Who cause security problem ?<br /><br />- Hacker, spy, student, businesman, ex - employee, stockrbroker, terrorist, programmer.<br /><br />:: Network security area :<br /><br />- authentication, secrecy, non-repudiation, integrity control.<br /><br />:: Network security issues:<br /><br />- Sharing, complexity, unknown parameter, many point of attack, unknown path, label format differences, anonymity<br /><br />:: Threat in Networks<br /><br />- Privacy, data integrity,authenticity,covert channels, impersonating,eavesdropping,denial of service, packet replay and packet modification.<br /><br />::Network Security Control<br /><br />- Encryption, firewall, VPN (Virtual Private Network), SSH Encryption, SSL Encryption , IPSec, kerberos.Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-82494426057218030472009-10-28T13:20:00.000-07:002009-10-28T13:30:04.681-07:00Lab 5 : Web Application Security<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} span.apple-style-span {mso-style-name:apple-style-span;} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:69886451; mso-list-type:hybrid; mso-list-template-ids:-1895940138 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:76.5pt; mso-level-number-position:left; margin-left:76.5pt; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:1354573230; mso-list-type:hybrid; mso-list-template-ids:-906744692 67698703 67698689 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l1:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level2 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:1.0in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> 1.Discuss the differences between GET and POST method in submitting variable in web application. Which method is vulnerable to attack? ·
<br />
<br /><span style="font-weight: bold;">Post</span> - method can use for sending large amount of data.
<br />There is no limitation on the number of Variables passed from the form.
<br />This is a transparent way of transmitting variables to the webserver where hidden variable are always hidden ·
<br />
<br /><span style="font-weight: bold;">Get</span> - method can use small scale of data.
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:69886451; mso-list-type:hybrid; mso-list-template-ids:-1895940138 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:76.5pt; mso-level-number-position:left; margin-left:76.5pt; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:1354573230; mso-list-type:hybrid; mso-list-template-ids:-906744692 67698703 67698689 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l1:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level2 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:1.0in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--><span style="line-height: 150%;font-family:";font-size:12pt;" ></span>2. List 2 configuration that can be made to the configuration file of an apache web server so that it become more secure
<br />
<br />- Permission on server directory
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Calibri; mso-font-alt:"Century Gothic"; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraph, li.ListParagraph, div.ListParagraph {mso-style-name:"List Paragraph"; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst {mso-style-name:"List ParagraphCxSpFirst"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle {mso-style-name:"List ParagraphCxSpMiddle"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:.5in; margin-bottom:.0001pt; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast {mso-style-name:"List ParagraphCxSpLast"; mso-style-type:export-only; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:.5in; mso-add-space:auto; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:69886451; mso-list-type:hybrid; mso-list-template-ids:-1895940138 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:76.5pt; mso-level-number-position:left; margin-left:76.5pt; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:1354573230; mso-list-type:hybrid; mso-list-template-ids:-906744692 67698703 67698689 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l1:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1:level2 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:1.0in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]-->3 List 3 configuration setting than can be made to PHP so that it become more secure ·
<br />
<br />- Disable register globals and use E_STRICT to find uninitialized variables. ·
<br />- Ensure that all file and streams functions (stream_*) are carefully vetted ·
<br />- Disable allow_url_fopen and allow_url_include in php.ini
<br />
<br /><span style="font-weight: bold; color: rgb(102, 102, 0);font-size:100%;" ></span>4. List 3 prevention measure that can be taken to overcome the Insecure direct object reference and Cross site request forgery vulnerabilities.
<br />
<br />The prevention that can be taken to overcome the insecure direct object reference and Cross site request forgery vulnerabilities are input validation. Every input supplied to a system must be validated before it sends to be processed by server. Besides that, we must ensure that all user-supplied data is appropriately entity encoded before rendering. Next, we must use an index, indirect reference map or another indirect method to avoid direct references. This is to prevent exposure of direct object references.
<br />
<br /><span style="font-size:100%;"><span style="font-weight: bold; color: rgb(102, 102, 0);"></span></span>5. Do the exercise under Improper Error Handling | Fail open Authentication Scheme, What is the vulnerability found in this exercise and can you prevent it from happening?
<br />
<br />In this exercise, user can login without any password. There is no validation if the user left the password field blank (Due to the deletion by WebScarab). It will send directly to server. In order to prevent from this happening, the java code must be validated and enhances in security particularly on the authentication part.
<br />
<br />
<br /><p class="ListParagraph" style="margin: 0in 0in 0.0001pt 76.5pt; text-indent: -0.25in; line-height: 150%;"><span style="line-height: 150%;font-family:";font-size:12pt;" ><o:p></o:p></span></p>
<br /><p class="ListParagraph" style="margin: 0in 0in 0.0001pt 76.5pt; text-indent: -0.25in; line-height: 150%;"><span style="line-height: 150%;font-family:";font-size:12pt;" ><o:p></o:p></span></p>
<br /><p class="MsoNormal" style="margin: 0in 0in 0.0001pt 76.5pt; text-indent: -0.25in; line-height: 150%;"><span style="line-height: 150%;font-family:";font-size:12pt;" ><span style="font-family:arial;"></span></span><span style="line-height: 150%;font-family:";font-size:12pt;" ><span style="color:black;"><o:p></o:p></span></span></p> Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-57451394906434911522009-10-28T12:42:00.000-07:002009-10-28T13:20:07.958-07:00Lecture 5 : Authentication & Access Control::What is authentication ?
<br />
<br />Verification of someone, that may have generated some data such as password, passport, signature or biometric.
<br />
<br />::Tips of protection password :-
<br />
<br />a) Do not let somebody have your password
<br />b) Do not write your password anywhere, example in a piece of small paper.
<br />
<br />::Tips of choosing good password :-
<br />
<br />a) Use password hard to guess and easy to remember.
<br />b) Not shorten from 6 characters and not in pattern of keyboard.
<br />c) Using character and number.
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 4</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} .O1 {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <div shape="_x0000_s1026"> <div class="O" style=""><span style=";font-family:";font-size:111%;" ><span style="color: rgb(218, 31, 40); position: absolute; left: -5.1%; top: 0.61em;font-family:Wingdings;font-size:60%;" >¨</span></span><span style=";font-family:";font-size:20pt;" ></span></div>::Calculations on password
<br />
<br />- Password population, N =rs
<br />- Probability of guessing a password = 1/N
<br />- Probability of success, P=nt/N
<br />
<br />::Tips of guessing password
<br />
<br />a) Try default password. (123456, abc123,tmadmin)
<br />b) Try all short word. 1 -3 character
<br />c) Use Dictionary word.
<br />d) Collect information about user's.
<br />e) Try phone number, NRIC number.
<br />
<br />
<br />::What is Biometrics ?
<br />
<br />Biometrics is a measurement of statistical analysis of biological data (unique)
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 23</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <div shape="_x0000_s1026" class="O"> <div style=""><span style=";font-family:";font-size:128%;" ><span style="color: rgb(218, 31, 40); position: absolute; left: -2.64%; top: 0.61em;font-family:Wingdings;font-size:60%;" >¨</span></span></div> <div style=""></div> </div> </p:colorscheme>
<br /><div class="O1" style=""><span style=";font-family:";font-size:16pt;" ></span></div> <div class="O" style=""></div> </div> </p:colorscheme>::List of biometric method :-
<br />
<br />a) Vein recognition
<br />b) Palm print
<br />c) Gait Reconition (Gaya berjalan)
<br />d) Body odour
<br />e) Ear shape
<br />f) DNA
<br />g) Keystroke dynamic
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 29</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout>
<br />:: Static VS Dynamic Biometric Method
<br />
<br />Static - authentication based on feature that is always present. (retina, fingerprint)
<br />Dynamic - Authentication based on a certain behaviour pattern.(keystroke.signature)
<br />Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-87539031916015664812009-10-28T12:41:00.000-07:002009-10-28T22:29:09.635-07:00Lab 4 : Modern CryptographyFirdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.com0tag:blogger.com,1999:blog-2196242743869505307.post-2391523213397104262009-10-28T11:45:00.000-07:002009-10-28T12:41:45.286-07:00Lecture 4 : Program Security<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 7</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#8DC765 !important;} a:active {color:#FEB80A !important;} a:visited {color:#AA8A14 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><span style="font-size:100%;">::Viruses and ”Malicious Programs”
<br />
<br />a) Computer viruses has ability to replicate them self i</span><span style="font-size:100%;">nto large number of computer. Spread by floppy disk and USB drive or nowadays is through internet.
<br />
<br />b) Malicious programs may be installed by ha</span><span style="font-size:100%;">nd on a single machine. But may built into software packages. It likes Trojan Horse, Traps Doors and Logic Bombs.</span>
<br /><span style="font-size:100%;">
<br /><span style="font-weight: bold;">:: </span></span><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 8</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#8DC765 !important;} a:active {color:#FEB80A !important;} a:visited {color:#AA8A14 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout style="font-weight: bold;" ext="edit"></o:shapelayout><o:idmap style="font-weight: bold;" ext="edit" data="1"></o:idmap><span style="font-weight: bold;">Malicious Programs ::
<br /></span>
<br />
<br />Malicious program split into two:
<br />
<br />* Need host program - Trap doors, Logic Bombs, Trojan Horses, Viruses.
<br />*Independent - Bacteria, Worms.
<br />
<br />
<br />:: Examples of malicious code
<br />
<br />1) Trojan Horse - <meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 9</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#8DC765 !important;} a:active {color:#FEB80A !important;} a:visited {color:#AA8A14 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><span style="font-size:100%;"> a program which performs a useful function, but also performs an unexpected action.
<br />
<br />2) Virus - code segment that replicates and attach to existing programs.
<br /> </span><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 9</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#8DC765 !important;} a:active {color:#FEB80A !important;} a:visited {color:#AA8A14 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><span style="font-size:100%;">Transient - executes when the program that it is attached to runs.
<br /> Resident - stay in program when execute, stay till it trigger again.
<br /></span><div shape="_x0000_s1026" class="O" style=""></div> <div shape="_x0000_s1026" class="O" style=""></div>
<br />3) Worm - program that replicates and copy the file/folder it locates.
<br />4) Bacteria - program that replicates itself until fills up all spaces or CPU cycles.
<br />5) Logic Bomb/ Time Bomb - malicious code that activates on an event.
<br />6) Trap Door - written entry point, that cause unwanted users.
<br />7) Spyware - Steal info, see web sites visited, see contents of files, popUp ads, slow down computer and crash the computer too.
<br />
<br />
<br /><p:colorscheme colors="#ffffff,#000000,#e7dec9,#4f271c,#3891a7,#feb80a,#8dc765,#aa8a14"><div shape="_x0000_s1026" class="O" style=""><span style=";font-family:";font-size:39pt;" > </span></div> </p:colorscheme>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-7803283977723080782009-10-28T11:29:00.000-07:002009-10-28T11:42:03.942-07:00Lab 3 : Classic Cryptography<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><link rel="Edit-Time-Data" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_editdata.mso"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} </style> <![endif]--><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} @font-face {font-family:"Arial Narrow"; panose-1:2 11 5 6 2 2 2 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:Calibri; mso-fareast-language:AR-SA;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1; mso-list-type:simple; mso-list-template-ids:1; mso-list-name:WW8Num1;} @list l0:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--><!--[if gte mso 9]><xml> <o:shapedefaults ext="edit" spidmax="1029"> </xml><![endif]--><!--[if gte mso 9]><xml> <o:shapelayout ext="edit"> <o:idmap ext="edit" data="1"> </o:shapelayout></xml><![endif]--><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:Calibri; mso-fareast-language:AR-SA;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1; mso-list-type:simple; mso-list-template-ids:1; mso-list-name:WW8Num1;} @list l0:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--><span style="font-weight: bold;">1. What is the difference between monoalphabetic and polyalphabetic encipherment?</span><b style=""><span style=";font-family:";" ><o:p></o:p></span></b> Monoalphabetic cipher: Here a single cipher alphabet is used. Polyalphabetic cipher: Here a set of related mono alphabetic substitution rules is used.<span style="line-height: 115%;font-family:";font-size:12pt;" lang="EN-MY" >
<br /></span> <meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link style="font-weight: bold;" rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:Calibri; mso-fareast-language:AR-SA;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1; mso-list-type:simple; mso-list-template-ids:1; mso-list-name:WW8Num1;} @list l0:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--><span style="font-weight: bold;">2. Decrypt the following Caesar cipher text</span>
<br />
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ-7jI0CuM4B77_8Vu86MgjHnmE0ho12KVGA_duGdPE52A9CjeYsnDohAw7UHV1zLJGKJXU5BtheCOqRLihimVIAGdoWRY-wgPUSjJg0E5EJwjPSuwbOet_9LUQoKeZlUUgMGHKX1lRuML/s1600-h/8.JPG"><img style="cursor: pointer; width: 320px; height: 80px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ-7jI0CuM4B77_8Vu86MgjHnmE0ho12KVGA_duGdPE52A9CjeYsnDohAw7UHV1zLJGKJXU5BtheCOqRLihimVIAGdoWRY-wgPUSjJg0E5EJwjPSuwbOet_9LUQoKeZlUUgMGHKX1lRuML/s320/8.JPG" alt="" id="BLOGGER_PHOTO_ID_5397720349942813794" border="0" /></a>
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggvrxRTHy84Ie-WyJbdLS7pqc0Y40mvwPcmbZZB4wDFuif_ejVjekcQTo3vnhq51ePrjei5pD9IKssbQXGpA02VHS5t0g6qOpM52yBFJHWVzc1rhFAAZzkcHbGF6pzOwOPCuU3X04D_VEo/s1600-h/9.JPG"><img style="cursor: pointer; width: 320px; height: 79px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggvrxRTHy84Ie-WyJbdLS7pqc0Y40mvwPcmbZZB4wDFuif_ejVjekcQTo3vnhq51ePrjei5pD9IKssbQXGpA02VHS5t0g6qOpM52yBFJHWVzc1rhFAAZzkcHbGF6pzOwOPCuU3X04D_VEo/s320/9.JPG" alt="" id="BLOGGER_PHOTO_ID_5397720952956189522" border="0" /></a>
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:Calibri; mso-fareast-language:AR-SA;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <span style="font-size:100%;">Plaintext (by using shift-13 Ceaser Cipher): WEST ART THE ATTACK AT EIGHT PM TO NIGHT BEG I BY ATTACKING THE MAIN POST OUR OBJECTIVE IS TOTAL DESTRUCTION OF THE ENEMY BASED SPARE NO ONE AND ANYTHING DESTROY EVERYTHING ON YOUR PATH.
<br />
<br /></span><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:Calibri; mso-fareast-language:AR-SA;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1; mso-list-type:simple; mso-list-template-ids:1; mso-list-name:WW8Num1;} @list l0:level1 {mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--><span style="font-weight: bold;">3. Decrypt the following Vigeneré cipher text</span><b style="font-weight: bold;"><span style=";font-family:";" ><o:p></o:p></span></b>
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieKArKy-xm8clG-f8mQGh2zNjjs_L2_dwivrN0bW0jQSEunIwzfhO5SsrN0jXyQr6CF4mtE6tA7TPK-UBHFwjKdUxnStMb2mHMJbz-27hKymHu6N76Wg1emWQALGki49xcMAjcRXkoycYd/s1600-h/10.JPG"><img style="cursor: pointer; width: 320px; height: 84px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieKArKy-xm8clG-f8mQGh2zNjjs_L2_dwivrN0bW0jQSEunIwzfhO5SsrN0jXyQr6CF4mtE6tA7TPK-UBHFwjKdUxnStMb2mHMJbz-27hKymHu6N76Wg1emWQALGki49xcMAjcRXkoycYd/s320/10.JPG" alt="" id="BLOGGER_PHOTO_ID_5397721472657775682" border="0" /></a>
<br />
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Calibri; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; mso-hyphenate:none; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:Calibri; mso-fareast-language:AR-SA;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1; mso-footnote-position:beneath-text;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal" style="margin-left: 0.5in;"><b><span style=";font-family:";" lang="EN-GB"></span></b></p>By using Google search kasiski method to help you in solving this problem
<br />
<br /><span style="font-size:100%;">Plaintext: JULIUS CAESAR USED A CRYPTO SYSTEM IN HIS WAR WHICH IS NO REFERRED TO AS CAESAR CIPHER. IT IS AS HIT CIPHER WITH THE KEY</span><p class="MsoNormal" style="margin-left: 0.5in;"><span style=";font-family:";" ></span></p>
<br /><p class="MsoNormal" style="margin: 0in 0in 0.0001pt 0.5in;"><span style=";font-family:";color:black;" ><o:p></o:p></span></p>
<br />Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-82913432279894678862009-10-28T11:07:00.000-07:002009-10-28T11:44:05.986-07:00Lecture 3 : Modern Cryptography::Stream ciphers<br /><br />- a symmetric key cipher where plaintext bits are combined with a pseudorandom cipher bit stream (keystream).<br />- typically by an exclusive-or (xor) operation.<br />-In a stream cipher the plaintext digits are encrypted one at a time, and the transformation of successive digits varies during the encryption. An alternative name is a state cipher, as the encryption of each digit is dependent on the current state<br /><br />::Block ciphers<br /><br />- a block cipher is a symmetric key cipher operating on fixed-length groups of bits, termed blocks, with an unvarying transformation.<br />- A block cipher encryption algorithm might take (for example) a 128-bit block of plaintext as input, and output a corresponding 128-bit block of ciphertext.<br /><br />::Data Encryption Standards (DES)<br /><br />-The plaintext is divided into 64 bit blocks with a key of 56 bits(with 8 bit parity)<br />-through 16 round of Expansion, substitution, key mixing and permutation process<br />-Triple DES has been introduced<br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhucSm7zDBNq0uXJp_zd-cgwhqBArRzQ0BHiIHYBPoC8klrdln-kGcNSBcOc5uat5UkvrxduH1jx-oZIcCxdEJdny357C8LDIic2vjs0OuqfQKat5-fPcimmVzjiO-6_mwRViSA2Zqgld0b/s1600-h/6.JPG"><img style="cursor: pointer; width: 280px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhucSm7zDBNq0uXJp_zd-cgwhqBArRzQ0BHiIHYBPoC8klrdln-kGcNSBcOc5uat5UkvrxduH1jx-oZIcCxdEJdny357C8LDIic2vjs0OuqfQKat5-fPcimmVzjiO-6_mwRViSA2Zqgld0b/s320/6.JPG" alt="" id="BLOGGER_PHOTO_ID_5397718018763692354" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBSkOFATifIbOojiipDKDsy2ZbSG6LJ_QnN6VAttPbn-0KFTNQTcpf5Mb-SFQDGPRrKgcpvb5GpzqyHyIbfCvMoiWAcGk01YhH0bPsg0eHLdWIwujLcIRBPsL025hKhNQM4qcqJrw8haZO/s1600-h/7.JPG"><img style="cursor: pointer; width: 320px; height: 248px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBSkOFATifIbOojiipDKDsy2ZbSG6LJ_QnN6VAttPbn-0KFTNQTcpf5Mb-SFQDGPRrKgcpvb5GpzqyHyIbfCvMoiWAcGk01YhH0bPsg0eHLdWIwujLcIRBPsL025hKhNQM4qcqJrw8haZO/s320/7.JPG" alt="" id="BLOGGER_PHOTO_ID_5397718408137324178" border="0" /></a>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-27643311663424597432009-10-28T11:01:00.002-07:002009-10-28T11:44:05.987-07:00Lab 2 : The Goals of Information Technology<meta http-equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" LatentStyleCount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal"><strong>1. What file system is compatible by Windows 2003?</strong><b><span style="color: rgb(102, 102, 0);">
<br /></span></b>
<br />Both NTFS and FAT.
<br />FAT is compatible with all OS while NTFS offers local file security and only compatible with newer OS, such as Windows NT, 2000, 2003, or XP.
<br />
<br />
<br /><strong>2. What is the default permission when a partition is formatted with NTFS?<o:p></o:p></strong></p> <p class="MsoNormal">
<br />The default permissions for Users are Read & Execute, List Folder Contents, and Read. But also gets the special permissions to Create Folders\Append Data and Create Files\Write Data.
<br />
<br />
<br />
<br />
<br /><strong>3. Who has access to the volume when a partition is formatted with NTFS?</strong>
<br />
<br />Guests and users with limited access usually have Read access unless admin sets specific folders as private. Admin will have access.
<br />
<br /><strong>4. What is the best way to secure files and folders that you share on NTFS partitions?</strong><b><span style="color: rgb(102, 102, 0);">
<br /></span></b>
<br />First, put all of the files and folders in 1 shared folder. Then assign NTFS permission to users and groups.
<br />
<br /><strong>5. What is the definition of data confidentiality?<span style="color: rgb(102, 102, 0);"> </span></strong>
<br />
<br />It provides protection to computer related assets from being used by unauthorized user. Its mean only the right person who has the authority can read, view, print or even knowing the existing of the object. It also called as privacy or secrecy. NTFS protect data from intruders by locking folders or files.
<br />
<br /><strong>6. If a user has Write permission for a folder and is also a member of a group with Read permission for the folder, what are the user's effective permissions for the folder?</strong><b><span style="color: rgb(102, 102, 0);">
<br /></span></b>
<br />Read and write.
<br />
<br /><strong>7. What is the best way to define the data availability?</strong>
<br />
<br />Ensure authorized user can access information at any time without any failure.<br style=""> <!--[if !supportLineBreakNewLine]--><br style=""> <!--[endif]--></p> <p class="MsoNormal">
<br />
<br /><strong>8. How the data confidentiality affect data availability?</strong><b><span style="color: rgb(102, 102, 0);">
<br /></span></b>
<br />If concentrated on providing the total confidentiality of the information then the availability of the data is less. Thus the balance between the elements is very important.
<br />
<br />
<br /><strong>9. List two technologies can be used to help reduce downtime and increase the time data is readily available.</strong><b><span style="color: rgb(102, 102, 0);">
<br /></span></b>
<br />a) Clustering
<br />b) load balancing
<br />
<br />
<br /><strong>10. What is the definition of data integrity?</strong>
<br />
<br />Ensures data can be modified by authorized parties and by authorized mechanism only. Encryption is one of the mechanisms used in providing data integrity.
<br />
<br />
<br /><strong>11. List two threats that can be used to damage the data integrity.</strong>
<br />
<br />a) Malicious corruption can be done by a virus, worm, or hacker.
<br />b) Accidental changes made to data that conflict with other changes to the same data can damage data integrity.
<br />
<br />
<br /><strong>12. Data integrity can also be threatened by environmental hazards such as dust, surges and excessive heat. True or False?</strong>
<br />
<br />True.</p> Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-89829886424373919522009-10-28T10:26:00.001-07:002009-10-28T11:44:05.987-07:00Lecture 2 : Basic Cryptogrphy<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 11</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <font size="3">::Cryptography Concept
<br />
<br />Disguise the information in such a way that it meaning make a unintelligible to an authorized person. So we have many way to prevent oth</font></p:colorscheme></font><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><font size="3">ers to read or manipulate our message content.
<br />
<br />:<font size="3">:Cryptography Terminology</font>
<br /></font></p:colorscheme></font>
<br /><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><font size="3">There are many term in cryptography that i had </font></p:colorscheme></font><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><font size="3">learn such as plaintext, ciphertext, encrypt and decrypt.</font></p:colorscheme></font>
<br />
<br /><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><font size="3">
<br />::Cryptography Algorithm</font></p:colorscheme></font>
<br />
<br /><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><font size="3">Symmetric algorithms <font style="font-weight: bold;" size="4">P = D (K,E (K,P))</font>
<br /></font></p:colorscheme></font>
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 14</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <div shape="_x0000_s1026" class="O" style=""><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTc-Him85W5tWDqUmiz8knB3PpAIkuXHVeHrmO9xFZLG66ZpHfwmzVkK3m0eVFOpNmQBfOPR32H1JbmmvbfAV7NY_v4TpqiUedhWR0v_iNM00wq5GmiwTmoz1o4-y2Eitwni5cP-dhp5nG/s1600-h/1.JPG"><img style="cursor: pointer; width: 320px; height: 71px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTc-Him85W5tWDqUmiz8knB3PpAIkuXHVeHrmO9xFZLG66ZpHfwmzVkK3m0eVFOpNmQBfOPR32H1JbmmvbfAV7NY_v4TpqiUedhWR0v_iNM00wq5GmiwTmoz1o4-y2Eitwni5cP-dhp5nG/s320/1.JPG" alt="" id="BLOGGER_PHOTO_ID_5397707663775646514" border="0"></a></div> </p:colorscheme><img src="file:///C:/DOCUME%7E1/pidi/LOCALS%7E1/Temp/moz-screenshot.png" alt="">
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 14</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} .O1 {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <div shape="_x0000_s1026"> <div class="O1" style=""><font style="" face=""" size="133%"><font style="color: rgb(218, 31, 40); position: absolute; left: -5.6%; top: 0.61em;" face="Wingdings" size="60%">q</font></font><font size="3">Asymmetric algorithms</font> <font style="font-weight: bold;" size="4">P=D(Kd, E(Ke, P))</font>
<br /><font style="font-weight: bold;" size="4">
<br /></font><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRWGdO69MvMRLF_w-8b8G7xx39MSvgFh2oQ7S3UZ4xIMeQtWIh5LI-F17aZXkTTDO_Gx_nqeDwC5aw0u3GyN7d4pWFxeSjIsGoG1v5fqYEBjVw4y5asdg_qBp25REzVNl300y42DbFadK-/s1600-h/2.JPG"><img style="cursor: pointer; width: 320px; height: 101px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRWGdO69MvMRLF_w-8b8G7xx39MSvgFh2oQ7S3UZ4xIMeQtWIh5LI-F17aZXkTTDO_Gx_nqeDwC5aw0u3GyN7d4pWFxeSjIsGoG1v5fqYEBjVw4y5asdg_qBp25REzVNl300y42DbFadK-/s320/2.JPG" alt="" id="BLOGGER_PHOTO_ID_5397708565468222674" border="0"></a>
<br /><font style="font-weight: bold;" size="4">
<br /></font><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 16</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap> <div shape="_x0000_s1026" class="O" style=""><font size="3">Symmetric Cryptography Principles</font></div> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqQLeuVQNu31O9OnzniAucNOPrO0W6oZj1DjVOQc5hwrhj5Sk-xP1IZoSopu0d4KOwQxRVVsOYFAO5KMWfsGmQy60IkBUITB5lzIQY-MiCcvrsMsK9u_RnITVDxjpMkvn4XAyI9x5mv5t/s1600-h/3.JPG"><img style="cursor: pointer; width: 320px; height: 132px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqQLeuVQNu31O9OnzniAucNOPrO0W6oZj1DjVOQc5hwrhj5Sk-xP1IZoSopu0d4KOwQxRVVsOYFAO5KMWfsGmQy60IkBUITB5lzIQY-MiCcvrsMsK9u_RnITVDxjpMkvn4XAyI9x5mv5t/s320/3.JPG" alt="" id="BLOGGER_PHOTO_ID_5397709433089060530" border="0"></a>
<br />
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 17</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap> <div shape="_x0000_s1026" class="O" style=""><font size="3">Symmetric Cryptography Requirements</font></div> <meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 17</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} .O1 {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <div shape="_x0000_s1026"> <div class="O" style=""><font style="" face=""" size="144%"><font style="color: rgb(218, 31, 40); position: absolute; left: -3.52%; top: 0.61em;" face="Wingdings" size="60%">q</font></font></div><font size="3">1 ) two requirements for secure use of symmetric encryption:
<br /> * a strong encryption algorithm
<br /> * a secret key known only to sender / receiver
<br /></font>
<br /><font size="3">2) mathematically have: C = EK(P) P = DK(C)
<br />3) assume encryption algorithm is known implies a secure channel to distribute key
<br />
<br />
<br /></font><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 19</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap> <div shape="_x0000_s1026" class="O" style=""><font size="3">Encryption using Asymmetric Cryptography</font></div> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZrVSM7cGBH_n0klOdIQ3VyF2Gcs8Gd_zPFV-bFleG4ySM60HIOWvl1kIk2DoVemUDmhq40LCeypKtWIBMs9PKD4Fp95vTwgwxwd9fzoDOHW47U7P07TxYRKJTIGKBJABXQzE5iw6ju1u9/s1600-h/4.JPG"><img style="cursor: pointer; width: 320px; height: 210px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZrVSM7cGBH_n0klOdIQ3VyF2Gcs8Gd_zPFV-bFleG4ySM60HIOWvl1kIk2DoVemUDmhq40LCeypKtWIBMs9PKD4Fp95vTwgwxwd9fzoDOHW47U7P07TxYRKJTIGKBJABXQzE5iw6ju1u9/s320/4.JPG" alt="" id="BLOGGER_PHOTO_ID_5397710971038074802" border="0"></a><div class="O" style=""><font style="" face=""" size="26pt"></font><font style="" face=""" lang="EN-AU" size="26pt"> </font></div> <div class="O" style=""></div> </div> </p:colorscheme></div> </div> </p:colorscheme>
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 20</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap> <div shape="_x0000_s1026" class="O" style=""><font size="3">Methods use in Cryptography Algorithm</font></div>
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 20</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} .O1 {color:black; font-size:149%;} .O2 {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> <div shape="_x0000_s1026"> <div class="O" style=""><font style="" face=""" size="161%"><font style="color: rgb(218, 31, 40); position: absolute; left: -3.94%; top: 0.61em;" face="Wingdings" size="60%">¨</font></font><font style="" face=""" size="29pt"></font></div><font size="3"><font style="font-weight: bold;">Substitution </font>
<br />a) monoalphabetic substitution
<br /> - Formed by shifting the letters of the original alphabet
<br />b) polyalphabetic substitution
<br /> - Extension of monoalphabetic substitution system
<br /> - Using Vigenere Tableau
<br />
<br /><font style="font-weight: bold;">Transposition</font>
<br />a) unkeyed transposition
<br /> - Rearrange letters by using matrix
<br />b) keyed transposition
<br /> - Rearrange letters by using matrix where the size of matrix is determined by the length of the key used. </font><div class="O2" style=""><font style="" face=""" size="20pt"></font></div> <div class="O" style=""></div> </div> </p:colorscheme>
<br /><font size="1"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><font size="3">
<br /></font></p:colorscheme></font><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 12</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> </p:colorscheme>Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.com0tag:blogger.com,1999:blog-2196242743869505307.post-82882201984033552062009-10-28T10:23:00.000-07:002009-10-28T11:44:05.987-07:00Lab 1 - Introduction to Virtualization & VMware<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5Cpidi%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:131334574; mso-list-type:hybrid; mso-list-template-ids:-1661450590 67698711 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l0:level1 {mso-level-number-format:alpha-lower; mso-level-text:"%1\)"; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} @list l1 {mso-list-id:446317249; mso-list-type:hybrid; mso-list-template-ids:-610642252 67698711 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l1:level1 {mso-level-number-format:alpha-lower; mso-level-text:"%1\)"; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} @list l2 {mso-list-id:770861097; mso-list-type:hybrid; mso-list-template-ids:448593650 67698711 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l2:level1 {mso-level-number-format:alpha-lower; mso-level-text:"%1\)"; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal" style="text-align: justify;"><b style="">Answer Q1<o:p></o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b style=""><o:p> </o:p></b></p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in; text-align: justify;"><!--[if !supportLists]--><span style="">a)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->System Call Interface or OS level</p><div style="text-align: justify;"> </div><p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><span style=""> </span><span style="">System call</span> interface is the method or sequences used by an application program <span style=""> </span>to request service or operation from the operating system based on the huge <span style=""> </span>kernel or to system servers on operating systems based on the microkernel-<span style=""> </span>structure.</p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">b)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->Instruction Set Architectures (ISA) level</p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><span style=""> </span>ISA is part of computer architecture, involves in programming that including data <span style=""> </span>types, instruction, registers, addressing modes, memory architectures, interrupt <span style=""> </span>and exception handling. All of these actions and techniques made in CPU or <span style=""> </span>processors.</p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">c)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->Hardware Abstraction Layer (HAL) level</p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><span style=""> </span>Hardware Abstraction Layer is a layer of programming that allows a computer <span style=""> </span>operating system to interact with a hardware device at a general or abstract level <span style=""> </span>rather than at a detailed hardware level. Its function is to hide differences in <span style=""> </span>hardware from most of the operating system kernel, so that most of the kernel-<span style=""> </span>mode code does not need to be changed to run on systems with different <span style=""> </span>hardware.</p><p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;">
<br /></p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><b style="">Answer Q2<o:p></o:p></b></p> <p class="MsoNormal" style=""><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">a)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->Create a virtual machine that can be installed with different kinds of Operating System, so from that we can learn several of OS platforms. </p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">b)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->No need to install an actual operating system on you hard disk.</p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">c)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->We can run multiple operating systems on a single platform without log out the system.</p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">d)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->Help me to explore the architectures of other operating system using VMWare application.</p><p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;">
<br /></p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><b style="">Answer Q3</b></p><p class="MsoNormal" style="text-align: justify;">
<br /><b style=""><o:p></o:p></b></p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.25in;"><strong>Create a new virtual machine called linuxserv</strong><b><span style="color: rgb(255, 204, 51);">
<br /></span></b>
<br />a) <span style=""> </span>From the home tab click on [New Virtual Machine], to open the virtual machine<span style=""> </span><span style=""> </span>wizard.
<br />b)<span style=""> </span>Choose the typical configuration to proceed.
<br />c)<span style=""> </span>Choose the type of OS to be installed on the virtual machine.
<br />d) <span style=""> </span>Name the virtual machine and specify the location where the disk image for the <span style=""> </span>virtual machine will be stored in the hard disk. Name the virtual machine as <span style=""> </span>linuxserv.
<br />e) <span style=""> </span>For the network type select [Use host-only Networking], this selection will create <span style=""> </span>LAN between the other virtual machine. In order to make the virtual machine <span style=""> </span>connected to the real network select [Use bridged networking]. This setting can be <span style=""> </span>changed once the virtual machine is created.
<br />f) <span style=""> </span>Specify the disk capacity of the virtual machine. Initially the size of the disk <span style=""> </span>image you created is small and as you installed your virtual machine with OS and <span style=""> </span>other software, the size will increase up to the storage capacity set in this <span style=""> </span>configuration.
<br />g) <span style=""> </span>Select [Allocate disk space now] and click [Finish] to start creating your virtual <span style=""> </span>machine. This will take several minutes.</p><p class="MsoNormal" style="margin-left: 0.25in;">
<br /></p> <p class="MsoNormal" style="margin-left: 0.25in;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.25in; text-indent: 9pt;"><strong><span style=""> </span>Install it with Fedora core 9</strong>
<br />
<br />a) <span style=""> </span>Place the Fedora core 9 installer CD in your CDROM drive.
<br />b)<span style=""> </span> From the command menu click on [start the virtual machine] or you can click on <span style=""> </span>the start button on the toolbar, your virtual machine is starting and will be booting <span style=""> </span>from your CDROM drive.
<br />c) <span style=""> </span>Once the linuxserv booting you will see the familiar Fedora core 9 installation <span style=""> </span>page, from this point onward you can follow the Fedora core 9 installation step.
<br />d) <span style=""> </span>After the installation process is finish, you will see the Fedora core 9 login page.
<br />e)<span style=""> </span>Click on the console to start using the Fedora core 9, to get the mouse pointer back <span style=""> </span>to your host desktop, type CTRL + ALT on the keyboard.
<br />f)<span style=""> </span>You can try taking the snapshot of your OS by clicking on the [snapshot] button <span style=""> </span>on the toolbar. If anything happened to your OS you can simply click the [Revert] <span style=""> </span>button and choose your previous state.
<br />g) <span style=""> </span>You can also manage the size of your console screen by click on the [Quick <span style=""> </span>switch] and [Full Screen] view option button on the toolbar.</p><p class="MsoNormal" style="margin-left: 0.25in; text-indent: 9pt;">
<br /></p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><b style="">Answer Q4</b></p><p class="MsoNormal" style="text-align: justify;">
<br /><b style=""><o:p></o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;">Take the snapshot of OS by click on the [snapshot] button on the toolbar. If anything happened to OS, just simply click the [Revert] button and choose the previous state.</p><p class="MsoNormal" style="text-align: justify;">
<br /></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><b style="">Answer Q5<o:p></o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b style=""><o:p> </o:p></b></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">a)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->Bridged Network</p> <p class="MsoNormal" style="text-align: justify;"><span style=""> </span>Bridged networking connects a virtual machine to a network using the host <span style=""> </span>computer's Ethernet adapter. The virtual machine is seen by the network as having <span style=""> </span>its own IP address and ethernet hardware address as if it were an autonomous <span style=""> </span>physical machine. It seems work through via another workstation as a host.</p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">b)<span style=";font-family:";font-size:7pt;" > </span></span><!--[endif]-->Host Only Networking</p> <p class="MsoNormal" style="text-align: justify;"><span style=""> </span>Host-only networking creates a network that is completely contained within the <span style=""> </span>host computer.</p><p class="MsoNormal" style="text-align: justify;">
<br /></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><b style="">Answer Q6<o:p></o:p></b></p> <p class="MsoNormal" style="margin-left: 0.25in; text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="margin-left: 0.25in;">If i already had a disk containing window XP, I<span style=""> </span>just need to select the current virtual machines and use it. <span style=""> </span></p> Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-5496135608839707852009-10-28T09:54:00.000-07:002009-10-28T11:44:05.987-07:00Lecture 1 : Introduction to Information Security<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 1</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> ::Week 1
<br />
<br />What is security ?
<br />
<br />Security to me, it all about how you control your machine to save from outsider threat when connecting with other workstation trough the internet. So, in my mind it show several devices and application such as network firewall, anti virus, or other application to prevent attackers done their jobs.
<br />
<br />Information Security?
<br />
<br />Information Security is the protection of information and the systems and hardware that use, store and transmit that information.
<br />
<br />There are 3 security area :
<br />
<br />a) Detection - detect the threat, which it will scan the incoming packet from exterior network.
<br />
<br />b) Prevention - prevent the threat before it will crash the system or data or any information, basically using tools such as firewall and proxy.
<br />
<br />c) Recovery - after the threat attack, we had to recover or repair the problem or learn from it.
<br />
<br /></p:colorscheme>There are 3 security principles :
<br />
<br />a) Confidentiality - Prevention of unauthorized <meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 7</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap> <span style="font-size:100%;"><span style="">disclosure of</span></span> <span style="font-size:100%;"><span style="">information. </span></span><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"><div shape="_x0000_s1026" class="O"> <div style=""></div> </div> </p:colorscheme>
<br /><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="PowerPoint.Slide"><meta name="Generator" content="Microsoft PowerPoint 11"><!--[if !mso]> <style> v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} p\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} v\:textbox {display:none;} </style> <![endif]--><title>Slide 3</title><meta name="Description" content="10/29/2009"><!--[if !ppt]--><style> .O {color:black; font-size:149%;} a:link {color:#FF8119 !important;} a:active {color:#DA1F28 !important;} a:visited {color:#44B9E8 !important;} </style><style media="print"> <!--.sld {left:0px !important; width:6.0in !important; height:4.5in !important; font-size:103% !important;} --> </style><!--[endif]--><o:shapelayout ext="edit"></o:shapelayout><o:idmap ext="edit" data="1"></o:idmap><span style="font-weight: bold;font-size:100%;" ><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8"> </p:colorscheme></span><span style="font-size:100%;"><p:colorscheme colors="#ffffff,#000000,#def5fa,#464646,#2da2bf,#da1f28,#ff8119,#44b9e8">b) </p:colorscheme></span>Integrity - Prevention of unauthorized modification of information.
<br />
<br />c) Availability - Prevention of unauthorized withholding of information or resources.
<br />
<br />
<br />There are passive and active attacks. Passive attack only some attackers attempt to eavesdropping and monitor what we done or the flow. Active attack seem to modify the data or information in order to obtain authorization of the system or machine itself.
<br />Firdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.comtag:blogger.com,1999:blog-2196242743869505307.post-48920819574490160692009-10-28T09:41:00.000-07:002009-10-28T10:01:25.244-07:00Introduction Of Lesson PlanNetwork security in my point of view , i thought first it all about hacking. But surely it just a basic knowledge before move into something new in network security. So, it will be more exciting while learning to encrypt and decrypt something using primitive method or application.<br /><br />So, below will be thellist of chapter that Mr Zaki will teach :<br /><br />::Introduction to Information Security<br />::Authentication and Basic Cryptography<br />::Program Security<br />::Operating System Security<br />::Database Security<br />::Security in Networks<br />::Security in Applications<br />::Wireless Security<br />::Legal and Ethical Issues in Computer Security<br />::Cyberlaws<br />::Administering Security<br />::Designing, Implementing and Maintaining the Recovery SolutionFirdaushttp://www.blogger.com/profile/15289370768674186774noreply@blogger.com