1
JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY
BBIT 4.1
COMPUTER SECURITY AND CRYPTOGRAPHY
ICS 2411
MR. RON MUHANDE
, 2
GROUP D MEMBERS
NAME REGISTRATION NO. CLASS NO.
1. Christine Atieno Omollo HDB212-0206/2020 99
2. Momanyi Prudence Bosibori HDB212-0310 /2020 61
3. Mahalia Gitau HDB212-0283/2020 89
4. Ngigi Caroline Njango HDB212-0254/2020 72
5. Purity Moraa Makori HDB212-0360/2020 98
6. Jeremy Mwangi HDB 212-0757/2020 115
7. Anthony Kabuthu HDB212-0229/2020 137
8. Fredrick Ng'ang'a HDB212-0752/2020 108
9. Simon Mwangi HDB212-0213/2020 80
10. Wilfred Nyakweba HDB212-0326/2020 39
11. Anne Nakhabi Wakhungu HDB212-0288/2020 149
12. Isanya Faith Itsutsa HDB212-0325/2020 60
13. Kabue Rita Nkatha HDB212-0285/2020 88
14. Ndung'u Joseph Kori HDB212-0338/2020 109
15. Emmanuel Muthomi HDB212-0731/2020 38
16. Keziah Gathigia HDB212-0650/2020 160
, 3
TABLE OF CONTENTS
Contents
GROUP D MEMBERS....................................................................................................................2
TABLE OF CONTENTS.................................................................................................................3
FIREWALL AND FIREWALL PROTECTION.............................................................................5
What does a firewall do................................................................................................................5
How does a firewall work............................................................................................................5
Types of firewalls.........................................................................................................................5
Risks of not having a firewall....................................................................................................10
DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11
Types of DNS attacks.................................................................................................................11
How to prevent DNS attacks......................................................................................................14
INTRUSION DETECTION...........................................................................................................18
Definition...................................................................................................................................18
Examples of intrusions in cryptography include:.......................................................................18
Detection Types/ Techniques.....................................................................................................19
Types of IDS’S...........................................................................................................................20
Functions of Intrusion Detection................................................................................................20
Benefits of intrusion detection systems......................................................................................21
False Positives and Negatives....................................................................................................22
Advantages of IDS.....................................................................................................................23
Disadvantages of IDS.................................................................................................................23
, 4
Capabilities of intrusion detection systems................................................................................24
................................................................................................................................................25
Intrusion Prevention System (IPS).............................................................................................25
Techniques to evade IDS systems..............................................................................................25
Challenges associated with intrusion detection systems (IDS)..................................................26
SECURITY ASSURANCE AND AUDITING.............................................................................27
Definition...................................................................................................................................27
Security assurance..................................................................................................................27
Auditing..................................................................................................................................27
Objectives of Conducting a System Audit:................................................................................28
Security Assurance Program.....................................................................................................28
SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31
Definition of terms.....................................................................................................................31
Symmetric ciphers......................................................................................................................31
Asymmetric ciphers....................................................................................................................32
Differences between Symmetric and Asymmetric Ciphers.......................................................32
CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34
Definition...................................................................................................................................34
Common Classical Techniques:.................................................................................................34
Common Intrusion Techniques:.................................................................................................35
How to Defend Against These Attacks:.....................................................................................36
REFERENCES..............................................................................................................................37
JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY
BBIT 4.1
COMPUTER SECURITY AND CRYPTOGRAPHY
ICS 2411
MR. RON MUHANDE
, 2
GROUP D MEMBERS
NAME REGISTRATION NO. CLASS NO.
1. Christine Atieno Omollo HDB212-0206/2020 99
2. Momanyi Prudence Bosibori HDB212-0310 /2020 61
3. Mahalia Gitau HDB212-0283/2020 89
4. Ngigi Caroline Njango HDB212-0254/2020 72
5. Purity Moraa Makori HDB212-0360/2020 98
6. Jeremy Mwangi HDB 212-0757/2020 115
7. Anthony Kabuthu HDB212-0229/2020 137
8. Fredrick Ng'ang'a HDB212-0752/2020 108
9. Simon Mwangi HDB212-0213/2020 80
10. Wilfred Nyakweba HDB212-0326/2020 39
11. Anne Nakhabi Wakhungu HDB212-0288/2020 149
12. Isanya Faith Itsutsa HDB212-0325/2020 60
13. Kabue Rita Nkatha HDB212-0285/2020 88
14. Ndung'u Joseph Kori HDB212-0338/2020 109
15. Emmanuel Muthomi HDB212-0731/2020 38
16. Keziah Gathigia HDB212-0650/2020 160
, 3
TABLE OF CONTENTS
Contents
GROUP D MEMBERS....................................................................................................................2
TABLE OF CONTENTS.................................................................................................................3
FIREWALL AND FIREWALL PROTECTION.............................................................................5
What does a firewall do................................................................................................................5
How does a firewall work............................................................................................................5
Types of firewalls.........................................................................................................................5
Risks of not having a firewall....................................................................................................10
DOMAIN NAME SYSTEM ATTACKS (DNS)..........................................................................11
Types of DNS attacks.................................................................................................................11
How to prevent DNS attacks......................................................................................................14
INTRUSION DETECTION...........................................................................................................18
Definition...................................................................................................................................18
Examples of intrusions in cryptography include:.......................................................................18
Detection Types/ Techniques.....................................................................................................19
Types of IDS’S...........................................................................................................................20
Functions of Intrusion Detection................................................................................................20
Benefits of intrusion detection systems......................................................................................21
False Positives and Negatives....................................................................................................22
Advantages of IDS.....................................................................................................................23
Disadvantages of IDS.................................................................................................................23
, 4
Capabilities of intrusion detection systems................................................................................24
................................................................................................................................................25
Intrusion Prevention System (IPS).............................................................................................25
Techniques to evade IDS systems..............................................................................................25
Challenges associated with intrusion detection systems (IDS)..................................................26
SECURITY ASSURANCE AND AUDITING.............................................................................27
Definition...................................................................................................................................27
Security assurance..................................................................................................................27
Auditing..................................................................................................................................27
Objectives of Conducting a System Audit:................................................................................28
Security Assurance Program.....................................................................................................28
SYMMETRIC VS ASYMMETRIC CIPHERS............................................................................31
Definition of terms.....................................................................................................................31
Symmetric ciphers......................................................................................................................31
Asymmetric ciphers....................................................................................................................32
Differences between Symmetric and Asymmetric Ciphers.......................................................32
CLASSICAL AND INTRUSION TECHNIQUES.......................................................................34
Definition...................................................................................................................................34
Common Classical Techniques:.................................................................................................34
Common Intrusion Techniques:.................................................................................................35
How to Defend Against These Attacks:.....................................................................................36
REFERENCES..............................................................................................................................37