ISS Notes Unit-1
ISS Notes Unit-1
Technology, Jaipur
Presented By:
Satish Kumar Alaria
Department of CSE/IT
Subject: Information Security System
What is Security ?
1. “The quality or state of being secure—to be free from
danger”
2. A successful organization should have multiple layers of
security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
Introduction : ISS
Information systems security, more commonly referred
to as INFOSEC, refers to the processes and
methodologies involved with keeping information
confidential, available, and assuring its integrity.
It also refers to:
Access controls, which prevent unauthorized personnel
from entering or accessing a system.
Protecting information no matter where that
information is, i.e. in transit (such as in an email) or in
a storage area.
The detection and remediation of security breaches, as
well as documenting those events.
Information systems security does not just deal with computer
information, but also protecting data and information in all of its
forms, such as telephone conversations.
Risk assessments must be performed to determine what
information poses the biggest risk.
For example, one system may have the most important
information on it and therefore will need more security measures
to maintain security. Business continuity planning and disaster
recovery planning are other facets of an information systems
security professional. This professional will plan for what could
happen if a major business disruption occurs, but still allow
business to continue as usual.
INFOSEC is Combination of:
Hardware
Physical security policies
Securing physical location important
Laptops
Flash memory
Data
Often most valuable asset
Main target of intentional attacks
People
Weakest link
Social engineering
Must be well trained and informed
Procedures
Threat to integrity of data
Networks
Locks and keys won’t work
Security Principles
Confidentiality – this is the most obvious idea associated with
encryption. Data is encrypted using algorithms and secret keys which are
only known by the sender and receiver. This makes it hard for attackers
to decrypt the message.
Availability- meaning that the assets are accessible to the authorized
parties in a timely manner (as determined by the systems requirements).
The failure to meet this goal is called a denial of service.
Integrity – these are the means employed to ensure a receiver gets the
message which was intended for them and vice versa. Through integrity,
one can ensure that no transmission has been altered or transferred
message appears as it was when send.
Non-repudiation – these are measures put in place ensure the sender
agrees to have sent the message, not an impersonator. This is basically a
legal liability. If you agree to the message, it means that you are legally
obligated. Non-repudiation can be compared to a signature on the
contract.
Authentication is the process of making sure that the piece of data
being claimed by the user belongs to it.
Security Attack
Basically Attacks are two types:
1. Theoretical Attacks-> (Also Called Active and
Passive Attack) It is further divided in 4 parts:
(a) Interception (Passive) (b) Modification (Active)
(c) Fabrication (Active) (d) Interruption (Active)
2. Practical Attacks: It is Divided in 2 Parts
(a) Application Level Attack
(b) Network Level Attack
Theoretical Attacks:
Passive Attacks: The attacker observes the content of messages or
copy the content of messages. Passive Attack is danger for Confidentiality.
Due to passive attack, there is no any harm to the system. The most
important thing is that In passive attack, Victim does not get informed
about the attack.
Active Attacks: The attacker efforts to change or modify
the content of messages. Active Attack is danger for Integrity as well as
availability. Due to active attack system is always damaged and System
resources can be changed. The most important thing is that, In active
attack, Victim gets informed about the attack.
Passive attacks: A Passive attack attempts to learn or make use of information
from the system but does not affect system resources. Passive Attacks are in
the nature of eavesdropping on or monitoring of transmission. The goal of the
opponent is to obtain information is being transmitted. Types of Passive
attacks are as following:
In active attack, Modification in information While in passive attack, Modification in the information
1.
take place. does not take place.
In active attack, Victim gets informed about the While in passive attack, Victim does not get informed about
5.
attack. the attack.
In active attack, System resources can be
6. While in passive attack, System resources are not change.
changed.
Active attack influence the services of the While in passive attack, information and messages in the
7.
system. system or network are acquired.
In active attack, information collected through While passive attack are performed by collecting the
8.
passive attacks are used during executing. information such as passwords, messages by itself.
Active attack is tough to restrict from entering Passive Attack is easy to prohibited in comparison to active
9.
systems or networks. attack.
Practical Side Attacks:
It is Divided in 2 parts- (a) Application Level Attack
(b) Network Level Attack
Security Value/Disadvantage
Caesar Cipher is not a secure cryptosystem because there are only
26 possible keys to try out. An attacker can carry out an
exhaustive key search with available limited computing resources.
Simple Substitution Cipher/Modified
Caesar Cipher
It is an improvement to the Caesar Cipher.
Instead of shifting the alphabets by some number, this
scheme uses some permutation of the letters in
alphabet.
With 26 letters in alphabet,we have 25 possibilities o
replacement.
The sender and the receiver may choose any one of
these possible permutation as a ciphertext alphabet.
This permutation is the secret key of the scheme.
Process of Simple Substitution Cipher
Security Value
Simple Substitution Cipher is a considerable improvement over
the Caesar Cipher.
However, the Simple Substitution Cipher has a simple design
and it is prone to design flaws, say choosing obvious
permutation, this cryptosystem can be easily broken.
Monoalphabetic Cipher
Rather than just shifting the alphabet
Could shuffle (jumble) the letters arbitrarily
Each plaintext letter maps to a different random
ciphertext letter
hence key is 26 letters long
For example, if ‘A’ is encrypted as ‘D’, for any number of
occurrence in that plaintext, ‘A’ will always get
encrypted to ‘D’.
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Monoalphabetic Cipher Security
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Encrypting and Decrypting
Plaintext is encrypted two letters at a time
1. if a pair is a repeated letter, insert filler like 'X’
2. if both letters fall in the same row, replace each
with letter to right (wrapping back to start from
end)
3. if both letters fall in the same column, replace each
with the letter below it (again wrapping to top from
bottom)
4. otherwise each letter is replaced by the letter in the
same row and in the column of the other letter of
the pair
Security of Playfair Cipher
Security much improved over monoalphabetic
Since have 26 x 26 = 676 digrams
Would need a 676 entry frequency table to analyse
(verses 26 for a monoalphabetic) and
correspondingly more ciphertext
Widely used for many years
eg. by US & British military in WW1
It can be broken, given a few hundred letters
since still has much of plaintext structure
Polyalphabetic Ciphers
It is an unbreakable cipher.
The key is exactly same as the length of message
which is encrypted.
The key is made up of random symbols.
As the name suggests, key is used one time only and
never used again for any other message to be
encrypted.
Due to this, encrypted message will be vulnerable to
attack for a cryptanalyst. The key used for a one-
time pad cipher is called pad, as it is printed on pads
of paper.
Why One-Time Pad is Unbreakable?
Substitution Cipher’s forms are: Mono Transposition Cipher’s forms are: Key-less
2. alphabetic substitution cipher and poly transposition cipher and keyed
alphabetic substitution cipher. transposition cipher.
Block Cipher Converts the plain text into Stream Cipher Converts the plaint text
1. cipher text by taking plain text’s block into cipher text by taking 1 byte of
at a time. plain text at a time.
3. The complexity of block cipher is simple. While stream cipher is more complex.
Block cipher Uses confusion as well as While stream cipher uses only
4.
diffusion. confusion.
In block cipher, reverse encrypted text is While in stream cipher, reverse
5.
hard. encrypted text is easy.
The algorithm modes which are used in The algorithm modes which are used in
6. block cipher are: ECB (Electronic Code stream cipher are: CFB (Cipher
Book) and CBC (Cipher Block Chaining). Feedback) and OFB (Output Feedback).
THANKS