Lecture 1
Lecture 1
DR MARWA AL ENANY
THE CONCEPT OF SECURITY
• In other words, protection against adversaries from those who would do harm,
intentionally or otherwise is the objective.
It is based on the three characteristics of information(security goals) that give it value to organizations:
• confidentiality .
An organization needs to guard against those malicious actions that endanger the confidentiality of its
information. When we send a piece of information to be stored in a remote computer or when we retrieve a
piece of information from a remote computer, we need to conceal it during transmission.
• Integrity.
Information needs to be changed constantly. In a bank, when a customer deposits or with draws money, the
balance of her account needs to be changed. Integrity means that changes need to be done only by
authorized entities and through authorized mechanisms.
• Availability.
The information created and stored by an organization needs to be available to authorized entities.
Information needs to be constantly changed.
KEY INFORMATION SECURITY CONCEPTS
• Threat agent: The specific instance or a component of a threat. For example, all
hackers in the world present a collective threat.
• The unauthorized or illegal actions that are taken against the government, corporate, or
private IT assets in order to: destroy, modify, or steal the sensitive data.
• They are further classified into active and passive attacks, in which the
attacker gets unlawful access to the system's resources.
• Masquerade
• when one entity pretends to be a different entity. A Masquerade attack
involves one of the other forms of active attacks . Masquerade assaults may be
performed using the stolen passwords and logins, with the aid of using finding
gaps in programs.
ACTIVE ATTACKS
• Modification of messages
• It means that some portion of a message is altered or that message is delayed or reordered
to produce an unauthorized effect. Modification is an attack on the integrity of the original
data. It basically means that unauthorized parties not only gain access to data but also spoof
the data by triggering denial-of-service attacks, such as altering transmitted data packets or
flooding the network with fake data.
ACTIVE ATTACKS
• Repudiation
• This attack occurs when the network is not completely secured or the login
control has been tampered with. With this attack, the author’s information can
be changed by actions of a malicious user in order to save false data in log
files, up to the general manipulation of data on behalf of others, similar to the
spoofing of e-mail messages.
ACTIVE ATTACKS
• Replay
• It involves the passive capture of a message and its subsequent transmission to
produce an authorized effect. the basic aim of the attacker is to save a copy of
the data originally present on that particular network and later on use this data
for personal uses. Once the data is corrupted or leaked it is insecure and unsafe
for the users.
ACTIVE ATTACKS
• Denial of Service
• It prevents the normal use of communication facilities. This attack may have a
specific target. For example, an entity may suppress all messages directed to a
particular destination. Another form of service denial is the disruption of an
entire network either by disabling the network or by overloading it with
messages so as to degrade performance.
PASSIVE ATTACK
• Types of Passive attacks are as follows:
•
BASIC TERMINOLOGY
• Cryptographic system or
• Plaintext cipher
• The original message • Schemes used for
• Ciphertext encryption
• The coded message • Cryptanalysis
• Enciphering or encryption • Techniques used for
deciphering a message
• Process of converting from plaintext
to ciphertext without any knowledge of
the enciphering details
• Deciphering or decryption
• Cryptology
• Restoring the plaintext from the
ciphertext • Areas of cryptography and
• Cryptography cryptanalysis together
• Study of encryption
Overview on the Field of Cryptology
the study of
cryptosystems
Cryptology
The original message is called the plaintext message, while the encrypted
message is called the ciphertext message.
Symmetric, single-
key, secret-key,
Substitution Block cipher
conventional
encryption
Asymmetric, two-
Transposition key, or public-key Stream cipher
encryption
• In symmetric encryption, there is only one key, and all
communicating parties use the same (secret) key for both
encryption and decryption.
• In asymmetric, or public key, encryption, there are two keys:
one key is used for encryption, and a different key is used for
decryption. The decryption key is kept private (hence the
"private key" name), while the encryption key is shared
publicly, for anyone to use (hence the "public key" name).