Network Security UNIT 4
Network Security UNIT 4
Operational description
The actual operation of PGP consists of five services:
1. Authentication
2. Confidentiality
3. Compression
4. E-mail compatibility
5. Segmentation.
1. Authentication
If multiple public/private key pair are used, then how does the recipient
know which of the public keys was used to encrypt the session key? One
simple solution would be to transmit the public key with the message
but, it is unnecessary wasteful of space. Another solution would be to
associate an identifier with each public key that is unique at least within
each user. The solution adopted by PGP is to assign a key ID to each
public key that is, with very high probability, unique within a user ID.
The key ID associated with each public key consists of its least
significant 64 bits. i.e., the key ID of public key KUa is (KUa mod
264).
A message consists of three components.
Message component – includes actual data to be transmitted, as well
as the filename and a timestamp that specifies the time of creation
Session key component – includes session key and the identifier of the
recipient public key.
Signature component – includes the following Timestamp – time at
which the signature was made. Message digest – hash code.
EkUb= encryption with user B‟s Public key EKRa= encryption with user
A‟s private key EKs = encryption with session key
ZIP = Zip compression function
R64 = Radix- 64 conversion function
Transmission and Reception of PGP message
PGP provides a pair of data structures at each node, one to store the
public/private key pair owned by that node and one to store the public
keys of the other users known at that node. These data structures are
referred to as private key ring and public key ring. The general
structures of the private and public key rings are shown below:
Timestamp - the date/time when this entry was made.
Key ID - the least significant bits of the public key.
Key legitimacy field – indicates the extent to which PGP will trust that
this is a valid public key for this user.
Signature trust field – indicates the degree to which this PGP user trusts the
signer to certify public key.
Owner trust field - indicates the degree to which this public key is trusted to
sign other public key certificates
1.Signing the message
PGP retrieves the sender‟s private key from the private key ring
using user ID as an index. If user ID was not provided, the first private
key from
the ring is
retrieved.
OVERVIEW
1. Five new message header fields are defined, which may be included
in an RFC 822 header. These fields provide information about the body
of the message.
2. A number of content formats are defined, thus standardizing
representations that support multimedia electronic mail.
3. Transfer encodings are defined that enable the conversion of any
content format into a form that is protected from alteration by the mail
system.
In this subsection, we introduce the five message header fields. The next
two subsections deal with content formats and transfer encodings.
There are seven different major types of content and a total of 15 subtypes
Multipurpose Internet Mail Extensions
Functions
E-MAIL THREATS:
Analysis of Threats Motivating DomainKeys Identified Mail describes
the threats being addressed by DKIM in terms of the characteristics,
capabilities, and location of potential attackers.
1. Characteristics:
Characterizes the range of attackers on a spectrum of three levels of
threat.
At the low end are attackers who simply want to send e-mail that a
recipient does not want to receive. The attacker can use one of a
number of commercially available tools that allow the sender to
falsify the origin address of messages. This makes it difficult for the
receiver to filter spam on the basis of originating address or domain.
At the next level are professional senders of bulk spam mail. These
attackers often operate as commercial enterprises and send messages
on behalf of third parties. They employ more comprehensive tools
for attack, including Mail Transfer Agents (MTAs) and registered
domains and networks of compromised computers (zombies) to send
messages and (in some cases) to harvest addresses to which to send.
The most sophisticated and financially motivated senders of
messages are those who stand to receive substantial financial benefit,
such as from an e-mail-based fraud scheme. These attackers can be
expected to employ all of the above mechanisms and additionally
may attack the Internet infrastructure itself, including DNS cache-
poisoning attacks and IP routing attacks.
2. Capabilities:
The following as capabilities that an attacker might have,
Submit messages to MTAs and Message Submission Agents (MSAs)
at multiple locations in the Internet.
Construct arbitrary Message Header fields, including those claiming
to be mailing lists, resenders, and other mail agents.
Sign messages on behalf of domains under their control.
Generate substantial numbers of either unsigned or apparently signed
messages that might be used to attempt a denial-of-service attack.
Resend messages that may have been previously signed by the
domain.
Transmit messages using any envelope information desired.
Act as an authorized submitter for messages from a compromised
computer.
Manipulation of IP routing. This could be used to submit messages
from specific IP addresses or difficult-to-trace addresses, or to cause
diversion of messages to a specific domain.
Limited influence over portions of DNS using mechanisms such as
cache poisoning. This might be used to influence message routing or
to falsify advertisements of DNS-based keys or signing practices.
Access to significant computing resources, for example, through the
conscription of worm-infected “zombie” computers. This could
allow the “bad actor” to perform various types of brute-force attacks.
Ability to eavesdrop on existing traffic, perhaps from a wireless
network.
3. Location:
DKIM focuses primarily on attackers located outside of the
administrative units of the claimed originator and the recipient.
These administrative units frequently correspond to the protected
portions of the network adjacent to the originator and recipient.
It is in this area that the trust relationships required for authenticated
message submission do not exist and do not scale adequately to be
practical.
Conversely, within these administrative units, there are other
mechanisms (such as authenticated message submission) that are easier
to deploy and more likely to be used than DKIM.
DKIM STRATEGY:
DKIM is designed to provide an e-mail authentication technique that is
transparent to the end user.
In essence, a user’s e-mail message is signed by a private key of the
administrative domain from which the e-mail originates.
The signature covers all of the content of the message and some of the
RFC 5322 message headers.
At the receiving end, the MDA can access the corresponding public key
via a DNS and verify the signature, thus authenticating that the message
comes from the claimed administrative domain.
Thus, mail that originates from somewhere else but claims to come from
a given domain will not pass the authentication test and can be rejected.
This approach differs from that of S/MIME and PGP, which use the
originator’s private key to sign the content of the message.
The motivation for DKIM is based on the following reasoning.
S/MIME depends on both the sending and receiving users
employing S/MIME. For almost all users, the bulk of incoming
mail does not use S/MIME, and the bulk of the mail the user
wants to send is to recipients not using S/MIME.
S/MIME signs only the message content. Thus, RFC 5322
header information concerning origin can be compromised.
DKIM is not implemented in client programs (MUAs) and is
therefore transparent to the user; the user need take no action.
DKIM applies to all mail from cooperating domains.
DKIM allows good senders to prove that they did send a
particular message and to prevent forgers from masquerading as
good senders.
A simple example of the operation of DKIM. We begin with a message
generated by a user and transmitted into the MHS to an MSA that is
within the user’s administrative domain.
An e-mail message is generated by an e-mail client program. The
content of the message, plus selected headers, is signed by the e-mail
provider using the provider’s private key.
The signer is associated with a domain, which could be a corporate local
network, an ISP, or a public e-mail facility such as gmail.
The signed message then passes through the Internet via a sequence of
MTAs. At the destination, the MDA retrieves the public key for the
incoming signature and verifies the signature before passing the message
on to the destination e-mail client.
The default signing algorithm is RSA with SHA-256. RSA with SHA-1
also may be used.
Wireless network security:
Wireless network security is the process of designing, implementing and
ensuring security on a wireless computer network.
It is a subset of network security that adds protection for a wireless
computer network.
Wireless network security primarily protects a wireless network from
unauthorized and malicious access attempts.
Typically, wireless network security is delivered through wireless devices
(usually a wireless router/switch) that encrypts and secures all wireless
communication by default.
Even if the wireless network security is compromised, the hacker is not
able to view the content of the traffic/packet in transit.
Moreover, wireless intrusion detection and prevention systems also
enable protection of a wireless network by alerting the wireless network
administrator in case of a security breach.
Some of the common algorithms and standards to ensure wireless
network security are Wired Equivalent Policy (WEP) and Wireless
Protected Access (WPA).
MOBILE DEVICE SECURITY:
Mobile security is the strategy, infrastructure, and software used to protect any
device that travels with users, including smartphones, tablets, and laptops.
Cybersecurity for mobile devices includes protecting data on the local device
and the device-connected endpoints and networking equipment. As mobile
devices continue to be a user preference over desktops, they will be bigger
targets for attackers.
some key aspects of mobile device security:
1. Device Locking:
Set up a strong PIN, password, or biometric authentication (fingerprint,
facial recognition) to lock your device.
Enable auto-lock to ensure the device locks automatically after a period
of inactivity.
2. Operating System Updates:
Regularly update your device's operating system to patch vulnerabilities
and ensure you have the latest security features.
3. App Security:
Download apps only from official app stores (Google Play for Android,
App Store for iOS).
Keep apps updated to benefit from security patches and bug fixes.
Be cautious about granting unnecessary permissions to apps.
4. Mobile Security Apps:
Install reputable mobile security apps that offer features like antivirus,
anti-malware, and remote tracking/locking/wiping in case of theft or loss.
5. Network Security:
Avoid connecting to unsecured Wi-Fi networks, especially for sensitive
transactions.
Use a Virtual Private Network (VPN) when connecting to public Wi-Fi to
encrypt data traffic.
6. Data Encryption:
Enable device encryption to protect your data in case the device falls into
the wrong hands.
Use secure protocols (HTTPS) when accessing websites to encrypt data
during transmission.
7. Backup and Recovery:
Regularly back up your data to the cloud or a secure external device.
Understand how to remotely wipe or track your device in case it is lost or
stolen.
8. Bluetooth and NFC Security:
Turn off Bluetooth and NFC when not in use to prevent unauthorized
access or data interception.
9. Secure Browsing Practices:
Be cautious when clicking on links, especially in emails or messages, to
avoid phishing attacks.
Use a secure and updated web browser.
10. Remote Management:
Enable remote tracking and management features offered by your
device's operating system.
Understand how to remotely wipe your device if it is lost or stolen.
11. User Education:
Educate yourself and other users about common security threats and best
practices.
Be wary of downloading attachments or clicking on links from unknown
sources.
12. Physical Security:
Keep your device physically secure, and do not leave it unattended in
public places.
Consider using physical security measures such as biometric locks or
secure cases.