05 Ad8602 Dis Unit 5
05 Ad8602 Dis Unit 5
05 Ad8602 Dis Unit 5
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
AD8602- DATA AND
INFORMATION
SECURITY
DEPT: AI-DS
BATCH / YEAR: 2020-24 / III
CREATED BY: Ms. MARY SELVAN
Table of Contents
2. Course Objectives 6
6. CO-PO/PSO Mapping 14
16
Lecture Plan (S.No., Topic, No. of Periods, Proposed date, Actual
7.
Lecture Date, pertaining CO, Taxonomy level, Mode of Delivery)
• To understand and evaluate the need for the different security aspects in real
time applications
K6 Evaluation
K5 Synthesis
K4 Analysis
K3 Application
K2 Comprehension
K1 Knowledge
CO – PO/PSO Mapping
CO – PO /PSO Mapping Matrix
CO1 3 3 3 1 - 2 - - - - - - 1 2 1
CO2 3 3 3 1 - 2 - - - - - - 1 2 1
CO3 3 2 3 1 - 2 - - - - - - 1 2 1
CO4 3 2 3 1 - 2 - - - - - - 1 2 1
CO5 3 2 3 1 - 2 - - - - - - 1 2 1
IoT Architecture:
IoT architecture refers to the tangle of components such as sensors,
actuators, cloud services, Protocols, and layers that make up IoT networking systems. In
general, it is divided into layers that allow administrators to evaluate, monitor, and
maintain the integrity of the system. The architecture of IoT is a four-step process
through which data flows from devices connected to sensors, through a network, and
then through the cloud for processing, analysis, and storage.
Different Layers of IoT Architecture:
A four-layer architecture is the standard and most widely accepted format.
There are four layers present i.e., the Perception Layer, Network Layer,
Processing Layer, and Application Layer.
Perception/Sensing Layer
The first layer of any IoT system involves “things” or endpoint devices that serve as a
conduit between the physical and the digital worlds. Perception refers to the physical
layer, which includes sensors and actuators that are capable of collecting, accepting, and
processing data over the network. Sensors and actuators can be connected either
wirelessly or via wired connections. The architecture does not limit the scope of its
components nor their location.
UNIT V – SECURITY APPLICATIONS
Network Layer
Network layers provide an overview of how data is moved throughout the
application. This layer contains Data Acquiring Systems (DAS) and Internet/Network
gateways. A DAS performs data aggregation and conversion functions (collecting and
aggregating data from sensors, then converting analog data to digital data, etc.). It is
necessary to transmit and process the data collected by the sensor devices. That’s what
the network layer does. It allows these devices to connect and communicate with other
servers, smart devices, and network devices. As well, it handles all data transmissions for
the devices.
Processing Layer
The processing layer is the brain of the IoT ecosystem. Typically, data is
analyzed, pre-processed, and stored here before being sent to the data center, where it is
accessed by software applications that both monitor and manage the data as well as
prepare further actions. This is where Edge IT or edge analytics enters the picture.
Application Layer
User interaction takes place at the application layer, which delivers application-
specific services to the user. An example might be a smart home application where users
can turn on a coffee maker by tapping a button in an app or a dashboard that shows the
status of the devices in a system. There are many ways in which the Internet of Things can
be deployed such as smart cities, smart homes, and smart health.
In IoT, each connected device could be a potential doorway into the IoT
infrastructure or personal data.
Security concern would elevate once IoT reaches next level of interoperability
and autonomous decision making and higher order security loopholes.
UNIT V – SECURITY APPLICATIONS
The IoT key security requirements can be presented as shown in below Fig. The
main security requirements are categorized into six domains.
The need for privacy is the core property of self-actualization in IoT. There are
several applications working in many different grounds like patient monitoring system,
traffic control, energy consumption inventory management, smart parking, civil protection
any many others. Privacy should be guaranteed to the end user.
After security, the main aspect occurs is the privacy and with privacy, there is trust (see
Fig. 2), according to the internet of things, trust is also an important aspect or factor which
is developed by the end user when there is an element of security and privacy in the
device
UNIT V – SECURITY APPLICATIONS
The current issue in IoT security concerns the access IoT has to sensitive data and the
movement of sensitive data overall. With enough time, hackers could theoretically use a
connected kettle to gain your business’ WIFI password.
Therefore, IoT security depends on intra-network data loss prevention. This tool helps
ensure that IoT devices can’t simply access data to which they aren’t entitled. Further, it
prevents malicious actors from moving data through network nodes or out of the network;
instead, it keeps all the data stored securely until an authorized user decides to move it.
This can apply to devices as much as people.
Integration with Backup
When we discuss IoT security, the conversation usually hinges on endpoint security.
Certainly, this stems from accurate beliefs. After all, IoT devices represent one more aspect
of the hardware-based digital perimeter; each device opens another potential attack vector
for external threat actors. Without visibility into every device brought by endpoint security,
hackers could find a solid foothold for infections.
Unnecessary Capabilities
Of course, the future of IoT security depends largely on your own commitment to
cybersecurity and the steps you take to ensure it. For example, many IoT devices come
with default administrator passwords which are easily guessed or cracked. Your security
team needs to take the time to reset these passwords wherever possible. Further, you
need to turn off unnecessary capabilities on each device which could hamper cybersecurity
efforts and protections.
Updates and Patches
Security depends on making sure that IoT devices receive regular updates to their security
firmware and software. Like all devices, the updates these devices receive contain vital
security patches and threat intelligence. Unfortunately, many IoT developers fail to make
patching these devices a priority.
(i) Next Generation IoT Security: Data Confidentiality
Homomorphic Encryption - Homomorphic encryption schemes make it
possible to perform mathematical operations on ciphertexts. Ex: Private healthcare
Searchable Encryption - Searchable encryption schemes allow a storage
provider to search for keywords or patterns in encrypted data.
So it is not possible to gain any knowledge of the underlying plaintext.
UNIT V – SECURITY APPLICATIONS
(ii) Next Generation IoT Security: Trust
Trust Establishment - mainly focus on establishing trust in public keys and
their assignment to users, s mainly focus on establishing trust in public keys and their
assignment to user
Blockchain and IoT: Trust in Transactions
Trust in Platforms – Hardware and software
Identity Management -
Each security control should be clearly defined using the following attributes:
• Service function—what is the service’s role? For example, encryption, authorization,
event data collection.
UNIT V – SECURITY APPLICATIONS
• Logical location—public cloud service, third party service, or on-premises. Location
affects performance, availability, firewall policies, and service management.
• Protocol—what protocol is used to access the service? For example, REST, HTTPS, SSH.
• Input/Output – what does the service receive and what is it expected to deliver? For
example, input is a JSON feed and output is the same feed with encrypted payload data.
• Control mechanisms—what types of control does the service achieve? For example,
data at rest protection, user authentication, application authentication.
• Users and operators—who operates or benefits from the service? For example,
endpoint devices, end users, business managers, security analysts.
• Difficulties in tracking data use.This is especially true since cloud services provided
by a third-party vendor lie outside your corporate network. Be prepared to ask your
vendor for audit trail logs when necessary.
• Security risks inherent in multi-tenant environments. Multi-tenant environments
may expose your network to malicious attacks. Even if someone else’s network is
targeted, your network may still end up as collateral damage. The risk may be lower
when you have a reputable vendor host your cloud environment.
UNIT V – SECURITY APPLICATIONS
• Access restriction management. Ensuring access restrictions in your on-premises
infrastructure are carried over to your cloud environment. When applicable, your IT
team must ensure that you have BYOD policies for your end -users, and that only
authorized devices and locations are allowed access to your cloud services.
• Meeting compliance requirements. Ensure that your cloud services pass compliance
requirements. You may assume that the vendor will take care of compliance. This is a
mistake that can lead to heavy fines from regulators. Since compliance is always your
responsibility, you should have a team ready to handle this for your organization.
• Asset misconfiguration potential. A misconfiguration can leave your network open
to attack. To prevent this from happening, assign a team to review configuration settings
and changes. Have a team ready to plug potential holes when needed.
ACCESS CONTROL :
Access requirements must be aware to the client users and system
administrators (privileged users) who access network, system, and application resources.
The functionalities of access control management include defining who should
have access to what resources (Assignment of entitlements to users, and also to audit and
report to verify entitlement assignments), why should the users have access to the
resource they hold (Assignment of entitlements based on the user’s job functions and
responsibilities), how can the user access the resources which will state the authentication
methods and strength check before granting access to the resources.
In a cloud computing model, network based access control plays a diminishing
role. User access control should be strongly emphasized in the cloud, since it can strongly
bind a user’s identity to the resources in the cloud and will help with fine granular access
control, user accounting, support for compliance, and data protection. User access
management controls, including strong authentication, single sign-on (SSO), privilege
management, and logging and monitoring of cloud resources, play a significant role in
protecting the confidentiality and integrity of your information in the cloud.
UNIT V – SECURITY APPLICATIONS
The following are the six control statements:
• Control access to information.
• Manage user access rights.
• Encourage good access practices.
• Control access to network services.
• Control access to operating systems.
• Control access to applications and systems.
Access Control: SaaS
In the SaaS delivery model, the CSP is responsible for managing all aspects of the network,
server, and application infrastructure. In that model, since the application is delivered as a
service to end users, usually via a web browser, network-based controls are becoming less
relevant and are augmented or superseded by user access controls, e.g., authentication
using a one-time password. Hence, customers should focus on user access controls
(authentication, federation, privilege management, deprovisioning, etc.) to protect the
information hosted by SaaS. Some SaaS services, such as Salesforce.com, augment
network access control (e.g., source IP address/network-based control) to user access
control in which case customers have the option to enforce access based on network and
user policy parameters.
Note: The scope of the VPC management program should include browser security,
systems, and applications (on both trusted and untrusted zones) located at a
customer’s premises interfacing with SaaS services.
UNIT V – SECURITY APPLICATIONS
(ii)PaaS VPC Management
PaaS VPC management focuses on VPC management in the CSP-managed infrastructure,
as well as the customer infrastructure interfacing with the PaaS service. Since applications
deployed on a PaaS platform are accessed from a web browser running on an endpoint
device (personal computer, virtual desktop, or mobile device), the program should include
endpoint VPC management scope.
PaaS provider responsibilities
Similar to a SaaS model, the PaaS CSP is responsible for VPC management of the
infrastructure that is operated by the CSP, as well as third-party services that they may rely
on.
PaaS customer responsibilities
PaaS customers are responsible for VPC management of the applications implemented and
deployed on the PaaS platform. Vulnerabilities or the configuration weakness of
applications deployed on a PaaS platform should be treated similarly to a standard
application operating in your data center (e.g., private cloud). Software vulnerabilities are
introduced by design flaws or coding errors. Configuration weakness can be introduced by
improper configuration of an application in the area of authentication and privilege
management. In addition, PaaS applications that rely on third-party web services may
simply become weak and vulnerable by way of vulnerabilities in the third-party service, and
that is out of your control.
PaaS customers should follow standard practices embedded in the Software Development
Life Cycle (SDLC), which helps to reduce software application vulnerabilities. Following are
some of the standard practices:
• Application white-box testing
• Application black-box testing
• Application penetration testing
• Vulnerability alerts
PaaS customers are also responsible for VPC management of their systems that interface
with the PaaS service. These systems include:
• Personal computers of a PaaS user
• Browsers used for accessing the PaaS service
• Applications located at the customer’s premises that interface with the PaaS service
UNIT V – SECURITY APPLICATIONS
(iii)IaaS VPC Management
IaaS VPC management focuses on the CSP-managed infrastructure, as well as the
customer infrastructure interfacing with the IaaS service. IaaS VPC management diverges
from SaaS and PaaS in that the infrastructure delineation, network boundary between
customers, and CSP infrastructure are blurred. For each layer of infrastructure (network,
host, storage), the customer and CSP have responsibilities in managing VPC in the
respective layers from their perspective (i.e., the CSP is responsible for the common CSP
infrastructure available to all customers, and the customer is responsible for the virtual
infrastructure available to the customer for the duration of use). Hence, a VPC
management program should address both the common and shared infrastructures.
IaaS provider responsibilities
In general, an IaaS CSP is responsible for VPC management of the infrastructure that is
owned and operated by the CSP, as well as the third-party infrastructure and services they
may rely on. The VPC management scope should include:
• Systems, networks, hosts (hypervisors), storage, and applications that are CSP-owned
and operated
• Systems, networks, hosts, storage, and applications that are managed by third parties
• The web console or management station used by customers to manage their virtual
infrastructure
• Personal computers owned by the IaaS employees and contractors
IaaS customer responsibilities
IaaS customers are responsible for VPC management of the virtual infrastructure allocated
by an IaaS CSP for customer use.
IaaS administrators are also responsible for VPC management of their systems that
interface with an IaaS service. These systems include:
• Cloud management station, which is the host that the customer manages for managing
the virtual infrastructure in an IaaS cloud
• Personal computers of IaaS administrators
• Browsers used for accessing the IaaS service
UNIT V – SECURITY APPLICATIONS
Summary:
Activities IaaS PaaS SaaS
11. What are the ways of security privacy and trust in IoT?
Most commonly observed requirements for IoT security are namely authentication,
confidentiality and access control. There are several available ways in which security,
privacy, and trust of IoT can be managed in which NFC, RFID, and WSN are commonly
used. Content may be subject to copyright.
23. What is the difference between cloud security and cloud security
architecture?
The difference between "cloud security" and "cloud security architecture" is that the former
is built from problem-specific measures while the latter is built from threats. A cloud
security architecture can reduce or eliminate the holes in Security that point-of-solution
approaches are almost certainly about to leave.
Q. Questions CO K Level
No. Level
1 Explain about the IOT Security Architecture and its CO4 K3
applications
2 Describe about Security requirement and Challenges CO4 K3
3 Explain about Cloud Security Architecture and CO4 K3
Management.
4 Briefly explain the different types SaaS and PaaS CO4 K3
Availability Management
5 Describe about Access Control and Security CO4 K3
Vulnerability
6 Explain the stages of Patch and Configuration CO4 K3
Management in detail.
Supportive online
Certification courses
(NPTEL, Swayam, Coursera,
Udemy, etc.,)
Supportive Online Certification
Courses
The SSL Handshake Protocol authenticates each end of the connection (server
and client), with the second or client authentication being optional. In phase 1,
the client requests the server's certificate and its cipher preferences. When the
client receives this information, it generates a master key and encrypts it with
the server's public key, then sends the encrypted master key to the server. The
server decrypts the master key with its private key, then authenticates itself to
the client by returning a message encrypted with the master key. Following
data is encrypted with keys derived from the master key. Phase 2, client
authentication, is optional. The server challenges the client, and the client
responds by returning the client's digital signature on the challenge with its
public-key certificate.
SSL uses the RSA public-key cryptosystem for the authentication steps. After the
exchange of keys, a number of different cryptosystems are used, including RC2,
RC4, IDEA, DES and triple-DES.
Content Beyond
Syllabus
Contents beyond the Syllabus
Assessment II
Model
Prescribed Text Books
& Reference
Prescribed Text & Reference
Books
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.