CSS Unit-1
CSS Unit-1
Introduction:
This is the age of universal electronic connectivity, where the activities like
hacking, viruses, electronic fraud are very common. Unless security measures are
taken, a network conversation or a distributed application can be compromised
easily.
Network Security has been affected by two major developments over the last
several decades. First one is introduction of computers into organizations and the
second one being introduction of distributed systems and the use of networks and
communication facilities for carrying data between users & computers. These two
developments lead to ‘computer security’ and ‘network security’, where the
computer security deals with collection of tools designed to protect data and to
thwart hackers. Network security measures are needed to protect data during
transmission. But keep in mind that, it is the information and our ability to access
that information that we are really trying to protect and not the computers and
networks.
Threats
A threat is an object, person, or other entity that represents a constant danger to an
asset The 2007 CSI survey
Threat Categories
• Acts of human error or failure.
• Compromises to intellectual property.
• Deliberate acts of espionage or trespass
• Deliberate acts of information extortion
• Deliberate acts of sabotage or vandalism
• Deliberate acts of theft
• Deliberate software attack
• Forces of nature
• Deviations in quality of service
• Technical hardware failures or errors
• Technical software failures or errors
• Technological obsolesce
Computer Security - generic name for the collection of tools designed to protect
data and to thwart hackers.
ASPECTS OF SECURITY
SECURITY ATTACK
Any action that compromises the security of information owned by an organization
Information security is about how to prevent attacks, or failing that, to detect
attacks on information-based systems often threat & attack used to mean same
thing have a wide range of attacks can focus of generic types of attacks.
• Passive
• Active
INTERRUPTION
An asset of the system is destroyed or becomes unavailable or unusable. It is an
attack on availability.
Examples:
Destruction of some hardware
Jamming wireless signals
Disabling file management systems
INTERCEPTION
An unauthorized party gains access to an asset.
Attack on confidentiality.
Examples:
• Wire tapping to capture data in a network.
• Illicitly copying data or programs.
• Eavesdropping.
•
MODIFICATION
When an unauthorized party gains access and tampers an asset. Attack is on
Integrity.
Examples:
• Changing data file
• Altering a program and the contents of a message
FABRICATION- An unauthorized party inserts a counterfeit object into the
system. Attack on Authenticity. Also called impersonation.
Examples:
Hackers gaining access to a personal email and sending message
Insertion of records in data files
Insertion of spurious messages in a network
SECURITY SERVICES
It is a processing or communication service that is provided by a system to give a
specific kind of production to system resources. Security services implement
security policies and are implemented by security mechanisms.
Confidentiality
Confidentiality is the protection of transmitted data from passive attacks. It is used
to prevent the disclosure of information to unauthorized individuals or systems. It
has been defined as “ensuring that information is accessible only to those
authorized to have access”. The other aspect of confidentiality is the protection of
traffic flow from analysis. Ex: A credit card number has to be secured during
online transaction.
Authentication
This service assures that a communication is authentic. For a single message
transmission, its function is to assure the recipient that the message is from
intended source. For an ongoing interaction two aspects are involved. First, during
connection initiation the service assures the authenticity of both parties. Second,
the connection between the two hosts is not interfered allowing a third party to
masquerade as one of the two parties. Two specific authentication services defines
in X.800 are
Peer entity authentication: Verifies the identities of the peer entities involved in
communication. Provides use at time of connection establishment and during data
transmission. Provides confidence against a masquerade or a replay attack.
Data origin authentication: Assumes the authenticity of source of data unit, but
does not provide protection against duplication or modification of data units.
Supports Applications like electronic mail, where no prior interactions take place
between communicating entities.
Integrity
Integrity means that data cannot be modified without authorization. Like
confidentiality, it can be applied to a stream of messages, a single message or
selected fields within a message. Two types of integrity services are available.
They are
Connection-Oriented Integrity Service: This service deals with a stream of
messages, assures that messages are received as sent, with no duplication,
insertion, modification, reordering or replays. Destruction of data is also covered
here. Hence, it attends to both message stream modification and denial of service.
Non-repudiation
Non-repudiation prevents either sender or receiver from denying a transmitted
message. This capability is crucial to e-commerce. Without it an individual or
entity can deny that he, she or it is responsible for a transaction, therefore not
financially liable.
Access Control
This refers to the ability to control the level of access that individuals or entities
have to a network or system and how much information they can receive. It is the
ability to limit and control the access to host systems and applications via
communication links. For this, each entity trying to gain access must first be
identified or authenticated, so that access rights can be tailored to the individuals.
Availability
It is defined to be the property of a system or a system resource being accessible
and usable upon demand by an authorized system entity. The availability can
significantly be affected by a variety of attacks, some amenable to automated
counter measures i.e authentication and encryption and others need some sort of
physical action to prevent or recover from loss of availability of elements of a
distributed system.
SECURITY MECHANISMS
According to X.800, the security mechanisms are divided into those implemented
in a specific protocol layer and those that are not specific to any particular protocol
layer or security service. X.800 also differentiates reversible & irreversible
encipherment mechanisms. A reversible encipherment mechanism is simply an
encryption algorithm that allows data to be encrypted and subsequently decrypted,
whereas irreversible encipherment include hash algorithms and message
authentication codes used in digital signature and message authentication
applications.
Data Integrity: A variety of mechanisms used to assure the integrity of a data unit
or stream of data units.
Traffic Padding: The insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts.
Notarization: The use of a trusted third party to assure certain properties of a data
exchange.
Pervasive Security Mechanisms
These are not specific to any particular OSI security service or protocol layer.
Event Detection: It is the process of detecting all the events related to network
security. Security Audit Trail: Data collected and potentially used to facilitate a
security audit, which is an independent review and examination of system records
and activities.
When a "visitor" comes to your site, he or she requests a web page that is specified
to belong to your host. If the named page doesn't exist on your site, then your
server typically responds with a 404 Page.
A 404 error page is a web page on a website which primarily shows visitors a
warning message and explains that visitors just try to access web.
Hijacking & Defense
Example- The definition of hijack is to take over something that doesn't belong to
you such as a plane, ship, bus or other vehicle, to commandeer or to take over by
force. When you take control of a conversation others were having and make it all
about you, this is an example of a time when you hijack the conversation.
The Format Function is an ANSI C conversion function, like printf, fprintf, which
converts a primitive variable of the programming language into a human-readable
human
string representation.
•The Format String is the argument of the Format Function and is an ASCII Z
string which contains text and format parameters, like
like:: printf (“The magic number
is: %d\n”, 1911);
•The Format String Parameter, like %x %s defines the type of conversion of the
format function.
The attack could be executed when the application doesn’t properly validate the
submitted input. In this case, if a Format String parameter, like %x, is inserted into
the posted data, the string is parsed by the Format Function, and the conversion
specified in the parameters is executed. However, the Format Function is expecting
more arguments as input, and if these arguments are not supplied, the function
could read or write the stack.
printf (userName);
Defense against control hijacking
hijacking- Complete memory safety, code pointer
integrity, and control flow integrity are some of these defenses. Complete
memory safety can defend against all control hijacking attacks by protecting all
pointers.
With so many vulnerable apps running in the enterprise, the challenge for network
defenders is how to protect those apps from attack. One way is to have the
applications protect themselves by identifying and blocking attacks in real time.
That's what technology called Runtime Application Self-Protection (RASP) does.
RASP is a technology that runs on a server and kicks in when an application runs.
It's designed to detect attacks on an application in real time. When an application
begins to run, RASP can protect it from malicious input or behavior by analyzing
both the app's behavior and the context of that behavior. By using the app to
continuously monitor its own behavior, attacks can be identified and mitigated
immediately without human intervention.