0% found this document useful (0 votes)
27 views7 pages

IS Def

Uploaded by

Anushka kolte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views7 pages

IS Def

Uploaded by

Anushka kolte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

-------------------------------UNIT 1-------------------------------

Computer Security Concepts

The principles and practices aimed at protecting computer systems, networks, and data
from unauthorized access, threats, damage, or disruption.

• Confidentiality: Protecting information from unauthorized disclosure.


• Integrity: Ensuring information is accurate and complete.
• Availability: Guaranteeing timely and reliable access to information.

OSI Security Architecture

• A framework for understanding and implementing security measures across the


seven layers of the OSI model.
• It addresses how security is integrated into network communications, from physical
transmission (Layer 1) to application-level (Layer 7).

Security Attacks

• Any attempt to compromise the confidentiality, integrity, or availability of


information or systems.
• Types include:
o Passive attacks (eavesdropping)
o Active attacks (modification, disruption, fabrication)

Security Services

• Mechanisms that enhance the security of data communication. Functionalities


provided to enhance the security of systems and communications.
Types include: Confidentiality, Integrity, Availability, Authentication, Non-
repudiation

Security Mechanisms

• Specific techniques and algorithms used to implement security services.


Examples: Encryption, Digital signatures, Access control

A Model for Network Security

• A conceptual framework for understanding and designing secure network systems.


• Typically includes:
o Security policy: Defines the security goals and constraints.
o Security services: Mechanisms to achieve security goals.
o Security mechanisms: Techniques to implement security services.

-------------------------------UNIT 2-------------------------------

Classical Encryption Techniques: Traditional methods of encrypting messages, often


using simple algorithms based on key manipulation to secure data.

Classical Encryption Techniques


• Stream Ciphers: Encrypt plaintext one bit at a time, often using a keystream
generator.
• Substitution Techniques: Replace plaintext characters with ciphertext characters.
o Caesar Cipher: Shifts each letter of the plaintext by a fixed number of
positions in the alphabet.
o Monoalphabetic Ciphers: Substitutes each plaintext letter with a unique
ciphertext letter.
o Playfair Cipher: Encrypts pairs of letters using a 5x5 matrix.
o Hill Cipher: Encrypts multiple letters at a time using linear algebra.
o Polyalphabetic Ciphers: Use multiple substitution alphabets, making
cryptanalysis more difficult.
• Transposition Techniques: Rearrange the order of plaintext characters.

Modern Encryption Standards

• Data Encryption Standard (DES): A symmetric-key block cipher that encrypts data
in 64-bit blocks.
• Triple DES (3DES): A more secure variant of DES that applies the DES algorithm
three times.
• Advanced Encryption Standard (AES): A symmetric-key block cipher that encrypts
data in 128-, 192-, or 256-bit blocks. It is widely considered to be very secure.

-------------------------------UNIT 3-------------------------------

• Asymmetric Key Cryptography: A cryptographic system using a pair of keys—one


public and one private—where the public key encrypts data and the private key
decrypts it. This system is widely used in secure data transmission.
• Number Theory: A branch of pure mathematics focused on the properties and
relationships of integers.
• Number Theory
• Prime Number: A natural number greater than 1 that has no positive divisors other
than 1 and itself.
• Fermat and Euler Theorems: Theorems used to prove the correctness of various
cryptographic algorithms.
• Testing for Primality: Algorithms to determine if a given number is prime.
• Chinese Remainder Theorem: A method to solve systems of linear congruences.
• Discrete Logarithm: The inverse operation of modular exponentiation.
• Public Key Cryptography
• RSA: A widely used public-key cryptosystem based on the difficulty of factoring
large integers.
• Key Management: The process of managing the creation, distribution, use, storage,
and destruction of cryptographic keys.
• Key Exchange Protocols
• Diffie-Hellman Key Exchange: A method for two parties to establish a shared
secret key over an insecure channel.
• El Gamal Algorithm: A public-key cryptosystem based on the difficulty of the
discrete logarithm problem.
• Elliptic Curve Cryptography (ECC): A public-key cryptosystem that uses elliptic
curves over finite fields. It offers similar security levels to other public-key
cryptosystems but with smaller key sizes.

-------------------------------UNIT 4-------------------------------

1. Data Integrity Algorithms: Techniques used to ensure data accuracy and


consistency over its lifecycle by detecting unauthorized changes.
2. Web Security: Measures and protocols designed to protect web applications, data,
and services from cyber threats, such as attacks and unauthorized access.

Cryptographic Hash Functions

3. Cryptographic Hash Functions: Algorithms that take an input and produce a fixed-
size string of bytes, typically unique to the original data, used for verifying data
integrity.
4. Applications of Cryptographic Hash Functions: Used in data integrity checks,
digital signatures, password hashing, and message authentication.
5. Two Simple Hash Functions: Basic examples like addition or bitwise operations,
though insecure for practical cryptographic purposes.
6. Requirements and Security: Effective hash functions must be collision-resistant,
preimage-resistant, and efficient to compute.
7. Hash Functions Based on Cipher Block Chaining: A method using block cipher
encryption to construct hash functions, providing added security.
8. Secure Hash Algorithm (SHA): A family of cryptographic hash functions, including
SHA-1, SHA-2, and SHA-3, widely used for secure data validation.
9. SHA-3: The latest member of the SHA family, based on the Keccak algorithm,
designed to provide enhanced security against potential attacks.
10. MD4, MD5: Older hash functions once widely used but now considered insecure
due to vulnerability to collision attacks.

Message Authentication Codes (MACs)

11. Message Authentication Codes (MACs): Short pieces of information that verify the
authenticity and integrity of a message, generated with a secret key.
12. Message Authentication Requirements: Ensure that messages are authentic and
haven't been altered in transit.
13. Message Authentication Functions: Algorithms that produce a MAC by combining
a message with a secret key.
14. Requirements for MAC Security: MACs must be resistant to forgery, meaning
attackers should not be able to generate valid MACs without the key.
15. Security of MACs: Strong MAC algorithms prevent unauthorized message
modification by requiring knowledge of a secret key.
Digital Signatures

16. Digital Signatures: Cryptographic methods for verifying the authenticity and
integrity of digital messages or documents, using a public-private key pair.
17. Digital Signature Schemes: Protocols like RSA and DSA that implement digital
signatures.
18. Digital Signature Standard (DSS): A federal standard for digital signatures,
specifying approved algorithms like DSA.
19. PKI (Public Key Infrastructure): A framework for managing digital certificates and
public-key encryption to secure communications.
20. X.509 Certificate: A standard for digital certificates that authenticate users and
devices within PKI.

Web Security

21. Web Security Issues: Threats including cross-site scripting (XSS), SQL injection,
and man-in-the-middle attacks that target web applications.
22. HTTPS: An encrypted version of HTTP using SSL/TLS to secure data in transit
between web browsers and servers.
23. SSH (Secure Shell): A protocol for secure remote login and file transfer by
encrypting communication between devices.
24. Email Security: Techniques for protecting email communications from
unauthorized access and threats.
25. PGP (Pretty Good Privacy): An encryption program that provides cryptographic
privacy and authentication for email.
26. S/MIME (Secure/Multipurpose Internet Mail Extensions): A standard for
encrypting and signing MIME data, providing email confidentiality and integrity.

IP Security

27. IPSec (Internet Protocol Security): A suite of protocols that secure IP


communications by authenticating and encrypting data packets at the network
layer.

-------------------------------UNIT 5-------------------------------

Network and System Security

1. OSI Security Architecture: A framework defining security services and


mechanisms applicable across the seven OSI layers to ensure secure data
transmission.
2. Access Control: Security mechanisms that restrict unauthorized access to
systems, networks, and data based on user identity and privileges.
3. Flooding Attacks: Malicious attempts to overwhelm a network or service by
sending an excessive volume of requests, leading to service disruption.
4. DoS (Denial of Service): An attack aimed at making a service unavailable to users
by overwhelming it with traffic or triggering resource exhaustion.
5. Distributed DoS (DDoS) Attacks: Similar to DoS attacks, but conducted from
multiple systems, often through a botnet, to intensify the attack's impact.
6. Intrusion Detection: Monitoring network or system activities to identify suspicious
patterns indicative of security breaches.
7. Host-Based and Network-Based Intrusion Detection:
a. Host-Based: Monitors individual hosts or devices for signs of intrusions.
b. Network-Based: Monitors network traffic for suspicious activities across the
network.
8. Honeypot: A security mechanism involving decoy systems or services intended to
attract and analyze malicious activity without endangering real systems.
9. Firewall: A network security device or software that controls incoming and outgoing
network traffic based on predefined security rules.
10. Intrusion Prevention System (IPS): A security tool that monitors network or system
activities for malicious behavior and takes action to prevent attacks.
11. Need for Firewall: Firewalls help secure a network by blocking unauthorized
access and filtering harmful traffic.
12. Firewall Characteristics and Access Policy: Firewalls enforce security rules
through access policies that dictate which traffic is allowed or denied based on
criteria like IP address, port, or protocol.
13. Types of Firewall:
a. Packet-Filtering: Filters packets based on headers.
b. Stateful Inspection: Monitors active connections and decisions based on
the state of traffic.
c. Proxy Firewall: Acts as an intermediary between users and networks.
d. Next-Generation Firewall (NGFW): Includes advanced features like deep
packet inspection and intrusion prevention.
14. DMZ (Demilitarized Zone) Networks: A subnetwork that acts as a buffer zone
between an internal network and the public internet, adding an extra layer of
security.
15. Intrusion Prevention System (IPS) Types:
a. Host-Based IPS: Monitors and protects individual devices from threats.
b. Network-Based IPS: Monitors network traffic to prevent malicious activities.
c. Hybrid IPS: Combines both host-based and network-based approaches for
comprehensive protection.

System Security

16. Operating System Security: Measures implemented to protect the OS from


threats, including authentication, authorization, and system integrity checks.
17. Application Security: Protecting applications by identifying and mitigating security
vulnerabilities within their code and environment.
18. Security Maintenance: Ongoing processes like patch management, vulnerability
assessments, and system updates to ensure security posture.
19. Multilevel Security (MLS): A security model that enables data classification and
access control based on multiple clearance levels.
20. Multilevel Security for Role-Based Access Control (RBAC): Applying MLS
principles to RBAC by assigning roles different clearance levels to restrict data
access.
21. Concepts of Trusted System: A system designed with built-in mechanisms to
enforce a security policy, ensuring data confidentiality and integrity.
22. Trusted Computing: Technology and standards for building secure computing
systems that can protect data and execute trusted applications in a secure
environment.
-------------------------------UNIT 6-------------------------------

Cybercrime and Information Security

• Cybercrime: Illegal activities committed using digital technologies.


• Information Security: Protecting information and systems from unauthorized
access, use, disclosure, disruption, modification, or destruction.

Classification of Cybercrimes

• Cybercrimes against persons: Cyber stalking, cyber bullying, online harassment.


• Cybercrimes against property: Hacking, data theft, intellectual property theft.
• Cybercrimes against government: Cyber terrorism, cyber warfare.

Legal Perspectives

• Indian Perspective: The Indian IT Act 2000 and its amendments provide a legal
framework to address cybercrimes.
• Global Perspective: International cooperation is essential to combat cybercrime,
with treaties and conventions like the Budapest Convention on Cybercrime.

Categories of Cybercrime

• Hacking: Unauthorized access to computer systems.


• Phishing: Deceiving users into revealing sensitive information.
• Malware: Malicious software that harms computer systems.
• Cyberterrorism: Using cyberattacks to intimidate or coerce governments or
individuals.

Social Engineering: Manipulating people to gain access to sensitive information or


systems.

Cyber Stalking: Using electronic communication to harass or threaten individuals.

Proxy Servers and Anonymizers: Technologies that can be used to mask the identity of
users online.

Password Cracking: Methods used to guess or brute force passwords.

Keyloggers and Spyware: Software that records user keystrokes or monitors system
activity.

The Indian IT Act

• Challenges:
o Evolving nature of cybercrime
o Difficulty in enforcing international laws
o Lack of awareness among users
• Amendments:
o The IT Act has been amended several times to address emerging cyber
threats.
• Challenges to Indian Law and Cybercrime Scenario in India:
o Cross-border nature of cybercrime
o Lack of skilled cybersecurity professionals
o Inadequate infrastructure for digital forensics.

The Indian IT Act provides a legal framework to address cybercrime in India, but it faces
challenges in keeping up with the rapid evolution of cyber threats.

You might also like