18bcs1674 Assignment-2 Swl Csb-471
18bcs1674 Assignment-2 Swl Csb-471
SWL
CSB-471 / ITB-471
Name - Ayush Tickoo
UID - 18BCS1674
SECTION - 18CSE 6 (B)
(2 Marks Each)
i. HTTP
ii. Email
iii. Firewalls
A1.
A2.
There are four types of network services: user management, email, printing, and
system administration.
i. User Management -
● Some apps are newer and nicer, while others utilize more network
bandwidth and are more critical to the network's continuous operation. Email, on
the other hand, is the method by which people communicate with one another.
It's not flashy, but it's necessary.
A3.
3. Cloud Attacks - A cloud cyber attack is any cyber attack that targets off-site service
platforms that provide storage, computing, or hosting services via their cloud
infrastructure. This can involve assaults against service platforms that use SaaS, IaaS,
and PaaS service delivery paradigms. In cloud environments, users store many sorts of
data, and most of that data involves sensitive information about individuals or company
activities. However, as a result of human activities, application vulnerabilities, and
unforeseen situations, this data is vulnerable to loss, breach, or damage. API
vulnerabilities may also substantially impact the security of cloud orchestration,
management, provisioning, and monitoring.
4. IoT Attacks - IoT devices are computational, digital, and mechanical devices that can
send data over the internet on their own. Desktops, refrigerators, voice assistants, smart
wearables, and other IoT devices are examples. As the popularity of IoT devices grows
at an unprecedented rate, so are the cyber security challenges. In the first half of 2021,
1.5 billion smart device attacks were recorded, with attackers attempting to steal data,
mine cryptocurrencies, or create botnets. According to analysts, cyberattacks against
internet-of-things (IoT) devices increased by more than 100 percent in the first six
months of 2021. According to a Kaspersky analysis of data from honeypots shared with
Threatpost, the company detected over 1.5 billion IoT threats in the first half of the year,
up from 639 million in the previous half.
Q4: Discuss and define the intrusion detection in detail.
A4.
1. A monitoring system that identifies suspicious activity and generates alerts is
known as an intrusion detection system (IDS). A security operations center
(SOC) analyst or incident responder can analyze the issue and take the
necessary steps to mitigate the threat based on these notifications.
2. There is no such thing as a reliable firewall or an inaccessible network. Hackers
are constantly coming up with new ways to attack the system. The Intrusion
Detection System (IDS) is a technology that detects network attacks. It takes
prompt action to assess and restore normalcy to such operations. As a result,
IDS in network security is critical. It will aid in the detection of traffic. IDS will
issue an alert right away. This will aid the IT team in resolving such difficulties.
3. The features of IDS that make it popular among its diverse clients are as follows:
a. Routers, firewalls, key management servers, and files are all monitored by
it.
4. Working - An intrusion detection system (IDS) monitors traffic to and from all
devices on a network. The system works as a secondary filter for malicious
packets behind a firewall, and it primarily looks for two suspicious clues:
6. The most common attacks an IDS can flag with pattern correlation are:
b. Scanning attacks that send packets to the network to gather info about
open or closed ports, types of permitted traffic, active hosts, and software
versions.
c. Asymmetric routing that sends a malicious packet and bypasses security
controls with different entry and exit routes.
d. Buffer overflow attacks that replace database content with malicious
executable files.
e. Protocol-specific attacks that target a specific protocol (ICMP, TCP, ARP,
etc.).
7. When an IDS detects a problem, the system flags it and sounds the alarm. The
alarm could be as basic as a notation in an audit record or as urgent as a
communication to an IT administrator. The team next troubleshoots the issue
and pinpoints the source of the problem.
A5.
I. Firewalls:
1. Firewalls are network security devices that monitor and 'curate' network traffic
according to a set of predetermined rules. A firewall creates a barrier between
your internal private network and the rest of the internet.
2. Software applications and hardware devices can both be used as firewalls.
Along with network protection, hardware firewalls can perform other tasks, such
as dynamically assigning identifying IP addresses to networked devices.
3. To prevent unwanted access over the internet, firewalls are employed at the
'border' of a private network. Before they may leave or enter the private
network, the firewall scans all inbound and outgoing messages. During the
scan, the firewall runs the message (also known as a network packet) through a
security checklist, which is a set of criteria that determines whether or not a
message is safe. A message is only permitted to move ahead if it checks all of
the boxes.
II. Antivirus :
2. Initially, antivirus software could only tackle viruses. However, they now offer
protection against worms, Trojans, ransomware, and spyware, among other
threats. Some antivirus software can help guard against phishing attempts made
over email. Your network security devices / tools should, in theory, be able to
detect security risks coming from any source, including harmful programmes and
viruses sent via email.
A6.
A7.
2. Worms - Worms are also self-replicating, but they don't attach themselves to the
host computer's programme. Worms are network-aware, which is the most
significant distinction between viruses and worms. They may readily go from one
computer to another if a network is available, and they will not cause much harm
on the target machine; for example, they will occupy hard disc space, slowing
down the computer.
3. Trojans - The name Trojan comes from the Greek mythology story of the 'Trojan
Horse,' which describes how the Greeks were able to penetrate the fortified city
of Troy by concealing their men in a large wooden horse given to the Trojans as
a gift. The Trojans adored horses and put their faith in the gift without question.
Soldiers appeared in the middle of the night and attacked the city from within.
Their goal is to hide themselves inside software that appears to be legitimate,
and when that programme is run, they will carry out their mission of stealing
information or performing any other work for which they were created.
4. Bots - Bots are a more evolved version of worms. They are computer-assisted
operations that communicate over the internet without requiring human
intervention. They can be beneficial or harmful. A malicious bot can infect a
single system and then establish a link to a central server, which will issue
commands to all infected hosts connected to the Botnet.
5. Adware - Adware isn't dangerous, but it does intrude on consumers' privacy.
They place advertisements on a computer's desktop or within specific
programmes. They come with free-to-use software, which is the primary source
of income for such developers. They keep track of your preferences and show
you advertising that are relevant to you. Adware can monitor your system activity
and potentially infect your PC if malicious code is embedded in the software.
6. Spyware - It is a programme, or software, that monitors your computer activities
and discloses the information obtained to a third party. Trojans, viruses, and
worms are the most common sources of spyware. They install themselves and sit
silently to evade detection once dropped. KEYLOGGER is one of the most
frequent spyware examples. A
keylogger's primary function is to record user keystrokes with a timestamp. As a
result, information such as usernames, passwords, and credit card numbers is
captured.
1. Security has been a cornerstone of the Linux operating system since its creation.
Each user must be isolated from other users, and a password and user ID are
necessary to utilize Linux.
2. Users also have fewer automatic access permissions, making it more difficult for
them to propagate malware by gaining access to a variety of files on the
computer.
3. The open source format, which supports a wide range of operating systems,
system architectures, and components, such as email clients, makes it more
difficult for malware to spread.
4. In terms of security, Linux users have a distinct advantage over their Windows or
Mac counterparts. Unlike proprietary operating systems, Linux has security
integrated into its core design in numerous ways.
5. The increasingly popular open-source operating system has a lot of freedom, is
flexible, and has a lot of options. It also has a rigorous user privilege model
and a number of built-in kernel security countermeasures to protect against
attacks and vulnerabilities. Because of the open nature of Linux source code,
vulnerabilities - which are unavoidable in any operating system - are virtually
always resolved quickly.
6. Open-Source Security Model - Members of the lively, global open-source
community analyze Linux source code on a regular basis, and as a result of this
inspection, Linux security flaws are generally detected and fixed quickly. In
contrast, proprietary companies such as Microsoft and Apple use a technique
known as "security by obscurity," in which source code is kept from outsiders in
an effort to keep vulnerabilities secret from threat actors.
7. User Privilege Model - Unlike Windows, where "everyone is an administrator,"
Linux has a rigorous user privilege paradigm to limit root access. On Linux, the
superuser has complete control over all rights, whereas ordinary users are
merely given the access they need to do common tasks. It is more difficult to
distribute malware and rootkits on a Linux system because users have limited
default access rights and must request additional permissions to view
attachments, access files, or change kernel parameters. As a result, these built-
in constraints serve as a crucial line of security against attacks and system
compromise.
8. Built-In Kernel Security Defenses - Firewalls that use packet filters in the
kernel, the UEFI Secure Boot firmware verification mechanism, the Linux Kernel
Lockdown configuration option, and the SELinux or AppArmor Mandatory Access
Control (MAC) security augmentation systems are all incorporated into the Linux
kernel. Administrators can add an extra layer of security to their systems by
enabling these features and customizing them to give the maximum level of
security, a process known as Linux kernel self-protection.
9. Highly Customizable & Configurable - Linux administrators have many more
configuration and control options than Windows users, many of which can be
utilized to
improve security. Linux sysadmins, for example, can use SELinux or AppArmor to
lock down their system with security policies that provide granular access
controls, adding an important layer of security to the system. Admins can also
harden the sysctl.conf file - the main kernel parameter configuration point for a
Linux system - to offer their system a more secure foundation, and employ the
Linux Kernel Lockdown configuration option to strengthen the separation
between userland processes and kernel code.
10. Audit Trails - Linux kernel 2.6 comes with auditd daemon. It’s responsible for
writing audit records to the disk. During startup, the rules in /etc/audit.rules
are read by this daemon. You can open /etc/audit.rules file and make changes
such as setup audit file log location and other options. The default file is good
enough to get started with auditd.
Q10: Is there any way to check which ports are listening on my Linux Server?
A10.
There are 4 ways to check which ports are listening on a Linux server :-
2. Using nmap command- Nmap is a network scanner utility used for port
mapping, host discovery and vulnerability scanning. Most of its functions are
based on using IP packet
analysis to detect and identify remote hosts, operating systems and services.
Since it is not installed by default, we can install it on our system using any
package installer :-
To scan all open/listening ports in your Linux system, run the following
command :-
4. Using lsof command - lsof command is used to list open files in Linux. Since
everything is a file in Unix/Linux, an open file may be a stream or a network file.
To list all Internet and network files, use the -i option. Note that this command
shows a mix of service names and numeric ports.
$ sudo lsof -i