The document is a solved question bank on Network and System Security (NSS) covering key concepts such as network security, security principles, types of attacks, security services, cryptography, and mechanisms like firewalls and VPNs. It emphasizes the importance of confidentiality, integrity, and availability in protecting data and systems from various threats. Additionally, it discusses frameworks like PKI and zero trust architecture, along with the differences between various security methods and attacks.
The document is a solved question bank on Network and System Security (NSS) covering key concepts such as network security, security principles, types of attacks, security services, cryptography, and mechanisms like firewalls and VPNs. It emphasizes the importance of confidentiality, integrity, and availability in protecting data and systems from various threats. Additionally, it discusses frameworks like PKI and zero trust architecture, along with the differences between various security methods and attacks.
Network and System Security (NSS) - Solved Question Bank
1. Define network security and explain why it is important.
Network security protects systems from attacks. It ensures confidentiality, integrity, and availability of data, preventing unauthorized access and cyber threats.
2. What are the basic principles of security?
Confidentiality: Restricts access. Integrity: Ensures data accuracy. Availability: Ensures resources are accessible. Authentication: Confirms identity. Non-repudiation: Prevents denial of actions.
3. Describe different types of security attacks with examples.
Passive (eavesdropping), Active (DoS, malware), Insider attacks, and Man-in-the-Middle.
4. What are security services? List and explain any three.
Ensures a sender cannot deny an action. Used in digital signatures. 14. Describe firewalls. Security mechanism filtering network traffic, blocking unauthorized access.
15. What is a model for network security?
Defines security policies and mechanisms like firewalls, IDS, monitoring.
16. Explain digital signatures.
Ensures data authenticity using encryption (private key signing, public key verification).
17. Describe PKI.
Framework for managing digital keys and certificates for secure communication.
18. IDS vs. IPS.
IDS detects threats; IPS prevents/block threats in real-time.
19. Zero trust architecture.
Requires authentication at every step, continuous monitoring, least privilege access.
20. How does a VPN work?
Encrypts traffic, prevents eavesdropping, secures communication with tunneling protocols.
21. Wireless security mechanisms.
WPA3 (Wi-Fi encryption), AES encryption, MAC filtering to restrict access.