INFORMATION NETWORK AND SECURITY – PART 3
Q. Explain man in middle attack
A. Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur
when attackers insert themselves into a two-party transaction. Once the attackers
interrupt the traffic, they can filter and steal data. The goal of an attack is to steal
personal information, such as login credentials, account details and credit card
numbers. Targets are typically the users of financial applications, SaaS businesses,
e-commerce sites and other websites where logging in is required.
Q. Explain lifecycle of virus.
A The typical life-cycle of a computer virus takes place in four stages; the dormant
phase, the propagation phase, the triggering phase, and the execution phase.
During the dormant phase, the virus has accessed its victim's computer or
software, but it does not do anything yet.
, In the propagation phase, the virus is fruitful and multiplies. The virus will start to
insert copies of itself into other programs or areas on the disk.
The triggering phase is designated when the virus changes from being dormant to
being activated.
Finally, during the execution phase, the virus gets to work. The virus's payload is
released, and the end user will begin to notice problems with their computer such
as deleted files, the systemcrashing, or endless popups on the screen.
Q. AES
A. Advanced Encryption Standard (AES) is used for encryption of electronic data
established by the U.S National Institute of Standards and Technology (NIST) in
2001. AES is widely used today as it is a much stronger than DES and triple DES
despite being harder to implement.
Points to remember :
AES is a block cipher.
The key size can be 128/192/256 bits.
Encrypts data in blocks of 128 bits each.
Advantages of AES :
s it is implemented in both hardware and software, it is most robust security
A
protocol.
It uses higher length key sizes such as 128, 192 and 256 bits for encryption. Hence
it makes AES algorithm more robust against hacking.
No one can hack your personal information
Disadvantages of AES:
Q. Explain man in middle attack
A. Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur
when attackers insert themselves into a two-party transaction. Once the attackers
interrupt the traffic, they can filter and steal data. The goal of an attack is to steal
personal information, such as login credentials, account details and credit card
numbers. Targets are typically the users of financial applications, SaaS businesses,
e-commerce sites and other websites where logging in is required.
Q. Explain lifecycle of virus.
A The typical life-cycle of a computer virus takes place in four stages; the dormant
phase, the propagation phase, the triggering phase, and the execution phase.
During the dormant phase, the virus has accessed its victim's computer or
software, but it does not do anything yet.
, In the propagation phase, the virus is fruitful and multiplies. The virus will start to
insert copies of itself into other programs or areas on the disk.
The triggering phase is designated when the virus changes from being dormant to
being activated.
Finally, during the execution phase, the virus gets to work. The virus's payload is
released, and the end user will begin to notice problems with their computer such
as deleted files, the systemcrashing, or endless popups on the screen.
Q. AES
A. Advanced Encryption Standard (AES) is used for encryption of electronic data
established by the U.S National Institute of Standards and Technology (NIST) in
2001. AES is widely used today as it is a much stronger than DES and triple DES
despite being harder to implement.
Points to remember :
AES is a block cipher.
The key size can be 128/192/256 bits.
Encrypts data in blocks of 128 bits each.
Advantages of AES :
s it is implemented in both hardware and software, it is most robust security
A
protocol.
It uses higher length key sizes such as 128, 192 and 256 bits for encryption. Hence
it makes AES algorithm more robust against hacking.
No one can hack your personal information
Disadvantages of AES: