Course Introduction
Course Introduction
Course Introduction
Ashutosh Bhatia
BITS Pilani
[email protected]
Overview
Cyber Security Facts
Grading Policy
Security Concepts
Goals
Attacks
Services
Mechanisms
Cyber Security Facts
A new Zero-Day vulnerability is discovered every week.
600 percent increase in overall IoT attacks in 2017, which means that
cyber criminals could exploit the connected nature of these devices
for mining purpose.
An alternative approach taken by attackers is to inject malware implants into the supply chain to
infiltrate unsuspecting organizations.
There is a a 200 percent increase in such attack with one every month of 2017 as compared to
four attacks annually in years prior.
Hijacking software updates provides attackers with an entry point for compromising well-
protected targets
The Petya (Ransom.Petya) outbreak was the most notable example: after using Ukrainian
accounting software as the point of entry, Petya/NotPetya used a variety of methods to spread
across corporate networks to deploy the attackers’ malicious payload.
• Mid-Term 30%
• Final Exam (Open Book) 40%
• Assignments (2) 15%
• Project 15%
Why Security
Authorized Users
Content (Data)
Time
Information Security Goals
• Threatening Confidentiality
Attacks • Threatening Integrity
• Threatening Availability
Security
Attacks
Traffic Denial of
Snooping Modification Masquerading Replaying Repudiation
Analysis Service
Classifying Attacks
• A means of classifying security
attacks, used both in X.800 and
RFC 4949, is in terms of passive
attacks and active attacks
• Involve some modification of the • Takes place when one entity pretends
to be a different entity
Masquerade
data stream or the creation of a • Usually includes one of the other
forms of active attack
false stream
• Involves the passive capture of a data
unit and its subsequent
Replay
• Difficult to prevent because of the retransmission to produce an
unauthorized effect
wide variety of potential physical,
software, and network • Some portion of a legitimate message
vulnerabilities Modification is altered, or messages are delayed or
reordered to produce an
of messages unauthorized effect
Internet Society
• ISOC is a professional membership society with world-wide organizational and individual membership
• Provides leadership in addressing issues that confront the future of the Internet and is the organization home for the groups
responsible for Internet infrastructure standards
ITU-T
• The International Telecommunication Union (ITU) is an international organization within the United Nations System in which
governments and the private sector coordinate global telecom networks and services
• The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors of the ITU and whose mission is the
development of technical standards covering all fields of telecommunications
ISO
• The International Organization for Standardization is a world-wide federation of national standards bodies from more than
140 countries
• ISO is a nongovernmental organization that promotes the development of standardization and related activities with a view to
facilitating the international exchange of goods and services and to developing cooperation in the spheres of intellectual,
scientific, technological, and economic activity
Services and Mechanisms
• ITU-T provides some security services and some mechanisms to implement
those services.
Threat to
Threat to integrity Threat to Availability
Confidentiality
Traffic Denial of
Snooping Modification Replaying Masquerading Repudiation
Analysis Service
Security Services
Proof of Proof of
Anti Change Anti Replay Peer Entity Data Origin
Origin Delivery
Security Mechanisms
Encipherment Hiding or covering data
Authentication
Challenge/Response Mechanism
Exchange
Security Mechanisms
Traffic Padding To avoid traffic analysis
Threat Attack
Quiz-1
Which security services and mechanisms are involved in each of the
following cases?
a) BITS demand your user name and password to use the internet.
b) You automatically get disconnected if you are logged in for more than two hours
c) A professor provides your grades to you through mail only on receiving a mail from
your side containing a value that was preassigned by him to you.
d) BITS does not allow you to reach a certain types of sites
e) To withdraw from the Cryptography course your professor required signed withdrawal
form from you.
f) Night canteen requires your ID to give you food
g) Requesting AUGUSD division to repeat cryptography course by producing an
application duly signed by the course in-charge
h) Professor coming up a mechanism so that the students cannot add/delete the
contents in the answer sheets during marks distribution
Thank You