Unit-II 7033 - Additional Notes
Unit-II 7033 - Additional Notes
Firewall History
Firewalls have existed since the late 1980’s and started out as packet filters, which were
networks set up to examine packets, or bytes, transferred between computers. Though
packet filtering firewalls are still in use today, firewalls have come a long way as
technology has developed throughout the decades.
Gen 1 Virus
Generation 1, Late 1980’s, virus attacks on stand-alone PC’s affected all
businesses and drove anti-virus products.
Gen 2 Networks
Generation 2, Mid 1990’s, attacks from the internet affected all business and drove
creation of the firewall.
Gen 3 Applications
Generation 3, Early 2000’s, exploiting vulnerabilities in applications which affected
most businesses and drove Intrusion Prevention Systems Products (IPS).
Gen 4 Payload
Generation 4, Approx. 2010, rise of targeted, unknown, evasive, polymorphic
attacks which affected most businesses and drove anti-bot and sandboxing products.
Gen 5 Mega
Generation 5, Approx. 2017, large scale, multi-vector, mega attacks using advance
attack tools and is driving advance threat prevention solutions.
Back in 1993, Check Point CEO Gil Shwed introduced the first stateful inspection firewall,
FireWall-1. Fast forward twenty-seven years, and a firewall is still an organization’s first
line of defense against cyber attacks. Today’s firewalls, including Next Generation
Firewalls and Network Firewalls support a wide variety of functions and capabilities with
built-in features, including:
Packet filtering
A small amount of data is analyzed and distributed according to the filter’s standards.
Proxy service
Network security system that protects while filtering messages at the application layer.
Stateful inspection
Dynamic packet filtering that monitors active connections to determine which network
packets to allow through the Firewall.
Types of Firewalls
1. Host-based Firewalls
A host-based firewall is installed on each network node, which controls each incoming and
outgoing packet. It is a software application or suite of applications that come as a part of
the operating system. Host firewall protects each host from attacks and unauthorized
access.
2. Network-based Firewalls
Network firewall functions on the network level by employing two or more network
interface cards (NICs). In other words, these firewalls filter all incoming and outgoing traffic
across the network by using firewall rules. A network-based firewall is typically a dedicated
system with proprietary software installed.
Firewall categories have evolved over the years. In addition to the above broad
classifications, here are the five distinct types of firewalls that continue to play a significant
role in network security.
Packet filtering firewalls operate in line at junction points where devices such as routers
and switches do their work. These firewalls don’t route packets but compare each packet
to a set of established criteria — such as the allowed IP addresses, packet type, port
number, and other aspects of the packet protocol headers. Packets that are flagged as
troublesome are dropped.
B) Circuit-level gateway
Circuit-level gateways monitor TCP handshakes and other network protocol session
initiation messages across the network as they are established between the local and
remote hosts to determine whether the session being initiated is legitimate, whether the
remote system is considered trusted. They don’t inspect the packets themselves.
However, they provide a quick way to identify malicious content.
State-aware devices examine each packet and keep track of whether that packet is part of
an established TCP or other network sessions. Such provision offers more security than
packet filtering or circuit monitoring alone but takes a greater toll on network performance.
Another variant of stateful inspection is the multilayer inspection firewall, which considers
the flow of transactions in process across multiple protocol layers of the seven-layer open
systems interconnection (OSI) model.
D) Application-level gateway
NGFW combines packet inspection with stateful inspection, including a variety of deep
packet inspection, along with other network security systems, such as intrusion
detection/prevention, malware filtering, and antivirus.
Packet inspection in conventional firewalls generally looks at the protocol header of the
packet. However, deep packet inspection looks at the actual data transported by the
packet. A deep packet inspection firewall tracks the progress of a web browsing session. It
is capable of noticing whether a packet payload, when assembled with other packets in an
HTTP server reply, constitutes a legitimate HTML formatted response.
Understanding the benefits of firewall security is the first step in helping businesses grow
safely in the ever-changing digital age. Firewalls serve as a first line of defense to external
threats, malware, and hackers trying to gain access to data and systems. Following are
some of the key benefits of deploying a firewall in a network:
1. Block spyware
In today’s data-driven world, stopping spyware from gaining access and getting into a
system is of paramount importance. As systems become more sophisticated and robust,
criminals trying to gain access to the systems also increase. One of the most common
ways unwanted people gain access is by employing spyware and malware. These are
software programs designed to infiltrate systems, control computers, and steal sensitive or
critical data. Firewalls serve as an important blockade against such malicious programs.
A virus attack can shut down any enterprise’s digital operations faster and harder than
expected. As the number of threats continues to evolve and grow in complexity, it is vital
that the defenses are put in place to keep the systems healthy and up-and-running all the
while. One of the most visible benefits of firewalls is controlling the system’s entry points
and stopping virus attacks. The cost of damage from a virus attack on any system could
be immeasurably high, depending on the type of virus.
3. Maintain privacy
All of the benefits of firewall security start with the ability to monitor network traffic. Data
coming in and out of your systems creates opportunities for threats to compromise your
operations. By monitoring and analyzing network traffic, firewalls leverage pre-established
rules and filters to keep the systems protected. With a well-trained IT team, an enterprise
can manage customized protection levels based on what is seen as coming in and out
through the firewall.
5. Prevent hacking
The trend followed by most businesses today is that of digital operations, which is inviting
more thieves and bad actors into the picture. With the rise of data theft and criminals
holding systems hostage, firewalls have become even more important, as they prevent
hackers from gaining unauthorized access to data, emails, systems, and more. A firewall
can stop a hacker completely or deter them from choosing an easier target.
Key Applications of Firewall
1. Software-based applications
Software-based applications involve securing data by using any type of firewall installed
on a local device rather than a separate piece of hardware (or a cloud server). The benefit
of such a software-based firewall is that it’s highly useful for creating defense in depth by
isolating individual network endpoints from one another.
However, maintaining individual software firewalls on different devices can be difficult and
time-consuming. Furthermore, not every device on a network may be compatible with a
single software firewall, which may mean having to use several different software firewalls
from different vendors to cover every node or device.
2. Hardware-based applications
Hardware firewalls use a physical appliance that acts as a traffic router to intercept data
packets and traffic requests before they’re connected to the network’s servers. Physical
appliance-based firewalls like this excel at perimeter security by making sure malicious
traffic from outside the network is intercepted before the company’s network endpoints are
exposed to risk.
The major weakness of a hardware-based firewall, however, is that it is often easy for
insider attacks to bypass them. Also, the actual capabilities of a hardware firewall may
vary depending on the vendor manufacturing it; some may have a more limited capacity to
handle simultaneous connections than others.
3. Cloud-based applications
Whenever a cloud solution is used to deliver a firewall, it can be called a cloud firewall or
firewall-as-a-service (FaaS). Cloud firewalls are analogous to proxy firewalls, where a
cloud server is often used in a proxy firewall setup.
The advantage of having cloud-based firewalls is that they are very easy to scale with any
organization. As the needs grow, one can add additional capacity to the cloud server to
filter larger traffic loads. Cloud firewalls provide perimeter security to network architecture.
Security:
Computer security also known as cyber security is the protection of information systems
from theft or damage to the hardware, the software and to the information on them, as
well as from disruption of the services they provide.
Good computing practices and tips that apply to most people who use a computer.
Use passwords that can't be easily guessed and protect your passwords.
Minimize storage of sensitive information.
Beware of scams.
Protect information when using the Internet and email.
Make sure your computer is protected with anti-virus and all necessary security
"patches" and updates.
Secure laptop computers and mobile devices at all times: Lock them up or carry
them with you.
Shut down, lock, log off, or put your computer and other devices to sleep before
leaving them unattended and make sure they require a secure password to start up
or wake-up.
Don't install or download unknown or unsolicited programs/apps.
Secure your area before leaving it unattended.
Make backup copies of files or data you are not willing to lose.
Computer Viruses:
A virus is a parasitic program that infects another legitimate program, which is sometimes
called the host. To infect the host program, the virus modifies the host so that it contains a
copy of the virus.
Boot sector viruses: A boot sector virus infects the boot record of a hard disk. The
virus allows the actual boot sector data to be read as through a normal start-up
were occurring.
Cluster viruses: If any program is run from the infected disk, the program causes
the virus also to run . This technique creates the illusion that the virus has infected
every program on the disk.
Worms: A worm is a program whose purpose is to duplicate itself.
Bombs: This type of virus hides on the user’s disk and waits for a specific event to
occur before running.
Trojan Horses: A Trojan Horses is a malicious program that appears to be friendly.
Because Trojan Horses do not make duplicates of themselves on the victim’s disk.
They are not technically viruses.
Stealth Viruses: These viruses take up residence in the computer’s memory,
making them hard to detect.
Micro Viruses: A macro virus is designed to infect a specific type of document file,
such as Microsoft Word or Microsoft Excel files. These types of documents can
include macros, which are small programs that execute commands.
CodeRed : It is a worm that infects a computer running Microsoft IIS server. This
virus launched DOS attack on White House’s website. It allows the hacker to
access the infected computer remotely.
Nimba : It is a worm that spreads itself using different methods. IT damages
computer in different ways. It modified files, alters security settings and degrades
performance.
SirCam : It is distributed as an email attachment. It may delete files, degrade
performance and send the files to anyone.
Melisa : It is a virus that is distributed as an email attachment. IT disables different
safeguards in MS Word. It sends itself to 50 people if Microsoft Outlook is installed..
Ripper :It corrupts data from the hard disk.
MDMA :It is transferred from one MS Word file to other if both files are in memory.
Concept :It is also transferred as an email attachment. It saves the file in template
directory instead of its original location.
One_Half :It encrypts hard disk so only the virus may read the data. It displays
One_Half on the screen when the encryption is half completed.
The latest and updated version of Anti-Virus and firewall should be installed on
the computer.
The Anti-Virus software must be upgraded regularly.
USB drives should be scanned for viruses, and should not be used on infected
computers.
Junk or unknown emails should not be opened and must be deleted straight away.
Unauthorized or pirated software should not be installed on the computer.
An important way of protection against virus is the use of back up of data. The
backup is used if the virus deletes data or modifies it. So back-up your data on
regular basis.
Freeware and shareware software from the internet normally contain viruses. It is
important to check the software before using them.
Your best protection is your common sense. Never click on suspicious links, never
download songs, videos or files from suspicious websites. Never share
your personal data with people you don’t know over the internet.
"Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence,
international engagement, incident response, resiliency, and recovery policies and
activities, including computer network operations, information assurance, law enforcement,
etc."
OR
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
The term cyber security refers to techniques and practices designed to protect
digital data.
The data that is stored, transmitted or used on an information system.
OR
Cyber security is the protection of Internet-connected systems, including hardware,
software, and data from cyber attacks.
It is made up of two words one is cyber and other is security.
Cyber is related to the technology which contains systems, network and programs
or data.
Whereas security related to the protection which includes systems security,
network security and application and information security.
Why is cyber security important?
Listed below are the reasons why cyber security is so important in what’s become a
predominant digital world:
Regulations such as GDPR are forcing organizations into taking better care of the
personal data they hold.
Because of the above reasons, cyber security has become an important part of the
business and the focus now is on developing appropriate response plans that minimize the
damage in the event of a cyber attack.
But, an organization or an individual can develop a proper response plan only when he
has a good grip on cyber security fundamentals.
Cyber security Fundamentals – Confidentiality:
It also means trying to keep the identity of authorized parties involved in sharing and
holding data private and anonymous.
Data encryption
Two-factor authentication
Biometric verification
Security tokens
Integrity
Availability
Availability is making sure that authorized parties are able to access the information when
needed.
1) Web-based attacks
2) System-based attacks Web-based attacks
These are the attacks which occur on a website or web applications. Some of the
important web-based attacks are as follows-
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the
application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a
DNS resolver's cache causing the name server to return an incorrect IP address, diverting
traffic to the attackers computer or any other computer. The DNS spoofing attacks can go
on for a long period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create
cookies to store the state and user sessions. By stealing the cookies, an attacker can have
access to all of the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a
trustworthy entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large
number of guesses and validates them to obtain actual data like user password and
personal identification number. This attack may be used by criminals to crack encrypted
data, or by security, analysts to test an organization's network security.
6. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users.
It accomplishes this by flooding the target with traffic or sending it information that triggers
a crash. It uses the single system and single internet connection to attack a server. It can
be classified into the following-
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in bit per second.
Application layer attacks- Its goal is to crash the web server and is measured in request
per second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a
web server to deliver web pages for which he is not authorized to browse.
It is a type of attack that allows an attacker to access unauthorized or essential files which
is available on the web server or to execute malicious files on the web server by making
use of the include functionality.
It is a type of attack that allows an attacker to intercepts the connection between client and
server and acts as a bridge between them. Due to this, an attacker will be able to read,
insert and modify the data in the intercepted connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer
network. Some of the important system-based attacks are as follows-
1. Virus
It is a type of malicious software program that spread throughout the computer files
without the knowledge of a user. It is a self-replicating malicious computer program that
replicates by inserting copies of itself into other computer programs when executed. It can
also execute instructions that cause harm to the system.
2. Worm
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some malicious code will
run in the background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting
or other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they
receive specific input. Common examples of bots program are the crawler, chatroom bots,
and malicious bots.
The 7 layers of cyber security should center on the mission critical assets you are seeking
to protect.
Cyber threats are security incidents or circumstances with the potential to have a
negative outcome for your network or other data management systems.
Examples of common types of security threats include phishing attacks that result in the
installation of malware that infects your data, failure of a staff member to follow data
protection protocols that cause a data breach, or even a tornado that takes down your
company’s data headquarters, disrupting access.
Vulnerabilities are the gaps or weaknesses in a system that make threats possible and
tempt threat actors to exploit them.
Types of vulnerabilities in network security include but are not limited to SQL injections,
server misconfigurations, cross-site scripting, and transmitting sensitive data in a non-
encrypted plain text format.
When threat probability is multiplied by the potential loss that may result, cyber security
experts, refer to this as a risk.
SECURITY VULNERABILITIES, THREATS AND ATTACKS –
Categories of vulnerabilities
Corrupted (Loss of integrity)
Leaky (Loss of confidentiality)
Unavailable or very slow (Loss of availability)
– Threats represent potential security harm to an asset when vulnerabilities are exploited
- Attacks are threats that have been carried out
Passive – Make use of information from the system without affecting system
resources
Active – Alter system resources or affect operation
Insider – Initiated by an entity inside the organization
Outsider – Initiated from outside the perimeter
Computer criminals
Computer criminals have access to enormous amounts of hardware, software, and data;
they have the potential to cripple much of effective business and government throughout
the world. In a sense, the purpose of computer security is to prevent these criminals from
doing damage.
We say computer crime is any crime involving a computer or aided by the use of one.
Although this definition is admittedly broad, it allows us to consider ways to protect
ourselves, our businesses, and our communities against those who use computers
maliciously.
One approach to prevention or moderation is to understand who commits these crimes
and why. Many studies have attempted to determine the characteristics of computer
criminals. By studying those who have already used computers to commit crimes, we may
be able in the future to spot likely criminals and prevent the crimes from occurring.
Motive of Attackers
Masquerade: in this attack, the intruder pretends to be a particular user of a system to gain
access or to gain greater privileges than they are authorized for. A masquerade may be
attempted through the use of stolen login IDs and passwords, through finding security
gaps in programs or through bypassing the authentication mechanism.
Session replay: In this type of attack, a hacker steals an authorized user’s log in
information by stealing the session ID. The intruder gains access and the ability to do
anything the authorized user can do on the website.
Message modification: In this attack, an intruder alters packet header addresses to direct
a message to a different destination or modify the data on a target machine.
In a denial of service (DoS) attack, users are deprived of access to a network or web
resource. This is generally accomplished by overwhelming the target with more traffic than
it can handle.
Traffic analysis: the attacker looks at the metadata transmitted in traffic in order to
deduce information relating to the exchange and the participating entities, e.g. the form of
the exchanged traffic (rate, duration, etc.). In the cases where encrypted data are used,
traffic analysis can also lead to attacks by cryptanalysis, whereby the attacker may obtain
information or succeed in unencrypting the traffic.
Security Policies:
Security policies are a formal set of rules which is issued by an organization to ensure that
the user who are authorized to access company technology and information assets
comply with rules and guidelines related to the security of information.
A security policy also considered to be a "living document" which means that the
document is never finished, but it is continuously updated as requirements of the
technology and employee changes.
We use security policies to manage our network security. Most types of security policies
are automatically created during the installation. We can also customize policies to suit our
specific environment.
1) It increases efficiency.
Firewall Policy:
It blocks the unauthorized users from accessing the systems and networks that
connect to the Internet.
It detects the attacks by cybercriminals and removes the unwanted sources of
network traffic.
This policy automatically detects and blocks the network attacks and browser
attacks.
It also protects applications from vulnerabilities and checks the contents of one
or more data packages and detects malware which is coming through legal
ways.
This policy protects a system's resources from applications and manages the
peripheral devices that can attach to a system.
The device control policy applies to both Windows and Mac computers whereas
application control policy can be applied only to Windows clients.
Cryptography
DATA ENCRYPTION:
Data Encryption is a method of preserving data confidentiality by transforming it into
ciphertext, which can only be decoded using a unique decryption key produced at the
time of the encryption or prior to it.
Data encryption converts data into a different form (code) that can only be accessed
by people who have a secret key (formally known as a decryption key) or password.
Data that has not been encrypted is referred to as plaintext, and data that has been
encrypted is referred to as ciphertext. Encryption is one of the most widely used and
successful data protection technologies in today’s corporate world.
Encryption is a critical tool for maintaining data integrity, and its importance cannot be
overstated. Almost everything on the internet has been encrypted at some point.
The significance of encryption cannot be overstated in any way. Even though your
data is stored in a standard infrastructure, it is still possible for it to be hacked. There’s
always the chance that data will be compromised, but with data encryption, your
information will be much more secure.
Consider it this way for a moment. If your data is stored in a secure system, encrypting
it before sending it out will keep it safe. Sanctioned systems do not provide the same
level of protection.
So, how do you think this would play out in real life? Consider the case of a user of a
company’s data who has access to sensitive information while at work. The user may
put the information on a portable disc and move it anywhere they choose without any
encryption. If the encryptions are set in place ahead of time, the user can still copy the
information, but the data will be unintelligible when they try to see it someplace else.
These are the benefits of data encryption that demonstrate its genuine value.
1. Symmetric Encryption
2. Asymmetric Encryption
Encryption is frequently used in one of two ways i.e. with a symmetric key or with an
asymmetric key.
Symmetric Key Encryption:
Symmetric Encryption
There are a few strategies used in cryptography algorithms. For encryption and
decryption processes, some algorithms employ a unique key. In such operations, the
unique key must be secured since the system or person who knows the key has
complete authentication to decode the message for reading. This approach is known
as “symmetric encryption” in the field of network encryption.
Asymmetric Key Encryption:
Asymmetric Encryption
Some cryptography methods employ one key for data encryption and another key for
data decryption. As a result, anyone who has access to such a public communication
will be unable to decode or read it. This type of cryptography, known as “public-key”
encryption, is used in the majority of internet security protocols. The term
“asymmetric encryption” is used to describe this type of encryption.
Data, whether it’s being transferred between users or stored on a server, is valuable
and must be protected at all times.
Data encryption in transit: Information that is actively traveling from one point to
another, such as via the internet or over a private network, is referred to as data in
transit. Data is deemed less safe when in transit due to the weaknesses of transfer
techniques. End-to-end encryption encrypts data throughout transmission,
guaranteeing that it remains private even if intercepted.
Encryption of data at rest: Data at rest refers to information that is not actively
moving from one device to another or from one network to another, such as
information stored on a hard drive, laptop, flash drive, or archived/stored in another
way. Due to device security features restricting access, data at rest is often less
vulnerable than data in transit, but it is still vulnerable. It also contains more valuable
information, making it a more appealing target for criminals.
Data encryption at rest reduces the risk of data theft caused by lost or stolen devices,
inadvertent password sharing, or accidental permission granting by increasing the
time it takes to access information and providing the time required to discover data
loss, ransomware attacks, remotely erased data, or changed credentials.
Encryption Process
The security of networks is intimately related to encryption. Encryption is useful for
concealing data, information, and things that are incomprehensible to a normal
human. Because both encryption and decryption are effective ways of cryptography,
which is a scientific procedure for performing secure communication, the encrypted
information may be transformed back to its original condition following the decryption
process. There are a variety of algorithms for data encryption and decryption.
However, “keys” can also be utilized to obtain high-level data security.
Using digital signatures, Encryption is used to prove the integrity and authenticity of
the information. Digital-rights management and copy protection both require
encryption.
Encryption can be used to erase data. But since data recovery tools can sometimes
recover deleted data, if you encrypt the data first and then throw away the key, the
only thing anyone can recover is the ciphertext, not the original data.
Data Migration is used when transferring data over a network to ensure that no one
else on the network can read it.
VPNs (Virtual Private Networks) uses encryption, and you should encrypt everything
you store in the cloud. This can encrypt the entire hard drive as well as voice calls.
Given the importance of data security, many organizations, governments, and
businesses require data to be encrypted in order to protect the company or user data.
Employees will not have unauthorized access to user data as a result of this.
1. If the password or key is lost, the user will be unable to open the encrypted file.
Using simpler keys in data encryption, on the other hand, makes the data insecure,
and anybody may access it at any time.
2. Data encryption is a valuable data security approach that necessitates a lot of
resources, such as data processing, time consumption, and the use of numerous
encryption and decryption algorithms. As a result, it is a somewhat costly
approach.
3. Data protection solutions might be difficult to utilize when the user layers them for
contemporary systems and applications. This might have a negative influence on
the device’s normal operations.
4. If a company fails to realize any of the restrictions imposed by encryption
techniques, it is possible to set arbitrary expectations and requirements that might
undermine data encryption protection.
Depending on the use case, there are a variety of data encryption algorithms to
choose from, but the following are the most commonly used:
DES (Data Encryption Standard) is an old symmetric encryption algorithm that is
no longer considered suitable for modern applications. As a result, DES has been
superseded by other encryption algorithms.
Triple DES (3DES or TDES): Encrypts, decrypts, and encrypts again to create a
longer key length by running the DES algorithm three times. It may be run with a
single key, two keys, or three separate keys to increase security. 3DES is
vulnerable to attacks such as block collisions since it uses a block cipher.
RSA is a one-way asymmetric encryption algorithm that was one of the first public-
key algorithms. Because of its long key length, RSA is popular and widely used on
the Internet. It is used by browsers to create secure connections over insecure
networks and is part of many security protocols such as SSH, OpenPGP, S/MIME,
and SSL/TLS.
Twofish is one of the fastest algorithms, with sizes of 128, 196, and 256 bits and a
complex key structure for added security. It is available for free and is included in
some of the best free software, including VeraCrypt, PeaZip, and KeePass, as well
as the OpenPGP standard.
Elliptic Curve Cryptography (ECC) was created as an upgrade to RSA and offers
better security with significantly shorter key lengths. In the SSL/TLS protocol, ECC
is an asymmetric method.
The Advanced Encryption Standard (AES) is the encryption standard used by
the US government. The AES algorithm is a symmetric-key algorithm that employs
block cipher methods. It comes in sizes of 128, 192, and 256 bits, with the number
of rounds of encryption increasing as the size increases. It was designed to be
simple to implement in both hardware and software.
RSA algorithm
Internet security refers to securing communication over the internet. It includes specific
security protocols such as:
Internet Security Protocol (IPSec)
Secure Socket Layer (SSL)
Internet Security Protocol (IPSec)
It consists of a set of protocols designed by Internet Engineering Task Force (IETF). It
provides security at network level and helps to create authenticated and confidential
packets for IP layer.
Secure Socket Layer (SSL)
It is a security protocol developed by Netscape Communications Corporation. ). It
provides security at transport layer. It addresses the following security issues:
Privacy
Integrity
Authentication
Threats
Internet security threats impact the network, data security and other internet connected
systems. Cyber criminals have evolved several techniques to threat privacy and
integrity of bank accounts, businesses, and organizations.
Following are some of the internet security threats:
Mobile worms
Malware
PC and Mobile ransomware
Large scale attacks like Stuxnet that attempts to destroy infrastructure.
Hacking as a Service
Spam
Phishing
Email Phishing
n today’s world, we transfer the data in bulk, and the security of this data is very
important, so Internet security provides that feature i.e., protection of data. There are
different types of protocol exist like routing, mail transfer, and remote communication
protocol. But the Internet security protocol helps in the security and integrity of data
over the internet. There are many protocols that exist that help in the security of data
over the internet such as Secure Socket Layer (SSL), Transport Layer Security
(TLS).
Now, let us look at the various types of Internet Security Protocols :
1. SSL Protocol :
SSL Protocol stands for Secure Sockets Layer protocol, which is an encryption-
based Internet security protocol that protects confidentiality and integrity of
data.
SSL is used to ensure the privacy and authenticity of data over the internet.
SSL is located between the application and transport layers.
At first, SSL contained security flaws and was quickly replaced by the first
version of TLS that’s why SSL is the predecessor of the modern TLS
encryption.
TLS/SSL website has “HTTPS” in its URL rather than “HTTP”.
SSL is divided into three sub-protocols: the Handshake Protocol, the Record
Protocol, and the Alert Protocol.
2. TLS Protocol :
Same as SSL, TLS which stands for Transport Layer Security is widely used for
the privacy and security of data over the internet.
TLS uses a pseudo-random algorithm to generate the master secret which is a
key used for the encryption between the protocol client and protocol server.
TLS is basically used for encrypting communication between online servers like
a web browser loading a web page in the online server.
TLS also has three sub-protocols the same as SSL protocol – Handshake
Protocol, Record Protocol, and Alert Protocol.
3. SHTTP :
SHTTP stands for Secure HyperText Transfer Protocol, which is a collection of
security measures like Establishing strong passwords, setting up a firewall,
thinking of antivirus protection, and so on designed to secure internet
communication.
SHTTP includes data entry forms that are used to input data, which has
previously been collected into a database. As well as internet-based
transactions.
SHTTP’s services are quite comparable to those of the SSL protocol.
Secure HyperText Transfer Protocol works at the application layer (that defines
the shared communications protocols and interface methods used by hosts in a
network) and is thus closely linked with HTTP.
SHTTP can authenticate and encrypt HTTP traffic between the client and the
server.
SHTTP operates on a message-by-message basis. It can encrypt and sign
individual messages.
4. Set Protocol :
Secure Electronic Transaction (SET) is a method that assures the security and
integrity of electronic transactions made using credit cards.
SET is not a payment system; rather, it is a secure transaction protocol that is
used via the internet.
The SET protocol provides the following services:
It establishes a safe channel of communication between all parties
engaged in an e-commerce transaction.
It provides confidentiality since the information is only available to the
parties engaged in a transaction when and when it is needed.
The SET protocol includes the following participants:
Cardholder
Merchant
Issuer
Acquire
Payment Gateway
Certification Authority
5. PEM Protocol :
PEM Protocol stands for privacy-enhanced mail and is used for email security
over the internet.
RFC 1421, RFC 1422, RFC 1423, and RFC 1424 are the four particular papers
that explain the Privacy Enhanced Mail protocol.
It is capable of performing cryptographic operations such as encryption,
nonrepudiation, and message integrity.
6. PGP Protocol :
PGP Protocol stands for Pretty Good Privacy, and it is simple to use and free,
including its source code documentation.
It also meets the fundamental criteria of cryptography.
When compared to the PEM protocol, the PGP protocol has grown in popularity
and use.
The PGP protocol includes cryptographic features such as encryption, non-
repudiation, and message integrity.