2. Q: Give the Principle of Security: CIA Model.
● Confidentiality, integrity and availability, also known
as the CIA triad.
● The CIA (Confidentiality, Integrity, and Availability)
triad is a well-known model for security policy
development.
● The model consists of these three concepts:
2
4. 1)Confidentiality:
● Confidentiality is almost equivalent to privacy.
● Confidentiality – ensures that sensitive information
are accessed only by an authorized person and kept
away from those not authorized to possess them.
4
5. ● It is implemented using security mechanisms such as
usernames, passwords, access control lists (ACLs), and
encryption.
● It is also common for information to be categorized
according to the extent(limit) of damage that could be
done should it fall into unintended hands. (credit card)
Security measures can then be implemented accordingly.
5
6. 2) Integrity – ensures that information are in a format
that is true and correct to its original purposes.
● The receiver of the information must have the
information the creator intended him to have.
● The information can be edited by authorized persons
only. (example our data-server)
6
7. ● integrity is implemented using security mechanism,
such as data encryption.
● Note that the changes in data might also occur as a
result of non-human-caused events , such as an server
crash.
● so ,it’s important to have the backup procedure.
7
8. ● Availability – ensures that information and resources
are available to those who need them.
● It is implemented using methods such as hardware
maintenance, software patching and network
optimization.
8
9. ● Extra security equipment or software such as
firewalls and proxy servers can guard against
downtime and unreachable data due to malicious
actions such as denial-of-service (DoS) attacks and
network intrusions.
9
10. ● Safeguards against data loss or interruptions in
connections must include unpredictable events such
as natural disasters and fire.
● To prevent data loss from such occurrences, a backup
copy may be stored in a geographically-isolated
location, perhaps even in a fireproof, waterproof safe.
10
12. ● It enables a computer or network-enabled device to
send and receive data across shared or public
networks as if it were directly connected to the
private network,
● while benefiting from the functionality, security and
management policies of the private network.
12
13. ● A VPN is created by establishing a virtual point-to-
point connection through the use of dedicated
connections, virtual tunneling protocols, or traffic
encryption.
● One major limitation of traditional VPNs is that they
are point-to-point, and do not tend to support or
connect broadcast.
13
14. ● Packets travelling on the shared or public network
cannot be read without the encryption keys.
● The portion of the connection in which the private
data is encapsulated is known as the tunnel.
● The area of network in which the private data
remains encrypted is known as the virtual private
network connection.
14
15. ● VPNs allow employees to securely access their
company's intranet while traveling outside the office.
● Similarly, VPNs securely connect geographically
separated offices of an organization.
15
16. ● TYPES OF VPN:
1) SITE to SITE VPN:
● Site-to-Site IPSec VPN Tunnels are used to allow the
secure transmission of data, voice and video between
two sites (e.g offices or branches).
16
17. ● The VPN tunnel is created over the Internet public
network and encrypted using a number of advanced
encryption algorithms to provide confidentiality of
the data transmitted between the two sites.
17
18. 2) DM VPN:
● Dynamic Multipoint VPN.
● It is not more popular.
● DMVPN is initially configured to build out a hub and
spoke network by statically configuring the hubs on
the spokes, no change in the configuration on the hub
is required to accept new spokes.
18
20. ● Using this initial hub-and-spoke network, tunnels
between spokes can be dynamically built on demand
(dynamic-mesh) without additional configuration on
the hubs or spokes.
20
21. Q: Give the name of VPN protocols.
● In VPN technology there are three protocols are used
which is PPTP,L2TP,IPSec.
21
22. Q: Explain PPTP.
● The Point-to-Point Tunneling Protocol (PPTP) is a
method for implementing virtual private networks.
● Basic version, windows NT.
● Supports connectivity between a uses and LAN.
22
23. ● PPTP does not provide confidentiality or encryption.
23