IS Def
IS Def
The principles and practices aimed at protecting computer systems, networks, and data
from unauthorized access, threats, damage, or disruption.
Security Attacks
Security Services
Security Mechanisms
-------------------------------UNIT 2-------------------------------
• Data Encryption Standard (DES): A symmetric-key block cipher that encrypts data
in 64-bit blocks.
• Triple DES (3DES): A more secure variant of DES that applies the DES algorithm
three times.
• Advanced Encryption Standard (AES): A symmetric-key block cipher that encrypts
data in 128-, 192-, or 256-bit blocks. It is widely considered to be very secure.
-------------------------------UNIT 3-------------------------------
-------------------------------UNIT 4-------------------------------
3. Cryptographic Hash Functions: Algorithms that take an input and produce a fixed-
size string of bytes, typically unique to the original data, used for verifying data
integrity.
4. Applications of Cryptographic Hash Functions: Used in data integrity checks,
digital signatures, password hashing, and message authentication.
5. Two Simple Hash Functions: Basic examples like addition or bitwise operations,
though insecure for practical cryptographic purposes.
6. Requirements and Security: Effective hash functions must be collision-resistant,
preimage-resistant, and efficient to compute.
7. Hash Functions Based on Cipher Block Chaining: A method using block cipher
encryption to construct hash functions, providing added security.
8. Secure Hash Algorithm (SHA): A family of cryptographic hash functions, including
SHA-1, SHA-2, and SHA-3, widely used for secure data validation.
9. SHA-3: The latest member of the SHA family, based on the Keccak algorithm,
designed to provide enhanced security against potential attacks.
10. MD4, MD5: Older hash functions once widely used but now considered insecure
due to vulnerability to collision attacks.
11. Message Authentication Codes (MACs): Short pieces of information that verify the
authenticity and integrity of a message, generated with a secret key.
12. Message Authentication Requirements: Ensure that messages are authentic and
haven't been altered in transit.
13. Message Authentication Functions: Algorithms that produce a MAC by combining
a message with a secret key.
14. Requirements for MAC Security: MACs must be resistant to forgery, meaning
attackers should not be able to generate valid MACs without the key.
15. Security of MACs: Strong MAC algorithms prevent unauthorized message
modification by requiring knowledge of a secret key.
Digital Signatures
16. Digital Signatures: Cryptographic methods for verifying the authenticity and
integrity of digital messages or documents, using a public-private key pair.
17. Digital Signature Schemes: Protocols like RSA and DSA that implement digital
signatures.
18. Digital Signature Standard (DSS): A federal standard for digital signatures,
specifying approved algorithms like DSA.
19. PKI (Public Key Infrastructure): A framework for managing digital certificates and
public-key encryption to secure communications.
20. X.509 Certificate: A standard for digital certificates that authenticate users and
devices within PKI.
Web Security
21. Web Security Issues: Threats including cross-site scripting (XSS), SQL injection,
and man-in-the-middle attacks that target web applications.
22. HTTPS: An encrypted version of HTTP using SSL/TLS to secure data in transit
between web browsers and servers.
23. SSH (Secure Shell): A protocol for secure remote login and file transfer by
encrypting communication between devices.
24. Email Security: Techniques for protecting email communications from
unauthorized access and threats.
25. PGP (Pretty Good Privacy): An encryption program that provides cryptographic
privacy and authentication for email.
26. S/MIME (Secure/Multipurpose Internet Mail Extensions): A standard for
encrypting and signing MIME data, providing email confidentiality and integrity.
IP Security
-------------------------------UNIT 5-------------------------------
System Security
Classification of Cybercrimes
Legal Perspectives
• Indian Perspective: The Indian IT Act 2000 and its amendments provide a legal
framework to address cybercrimes.
• Global Perspective: International cooperation is essential to combat cybercrime,
with treaties and conventions like the Budapest Convention on Cybercrime.
Categories of Cybercrime
Proxy Servers and Anonymizers: Technologies that can be used to mask the identity of
users online.
Keyloggers and Spyware: Software that records user keystrokes or monitors system
activity.
• Challenges:
o Evolving nature of cybercrime
o Difficulty in enforcing international laws
o Lack of awareness among users
• Amendments:
o The IT Act has been amended several times to address emerging cyber
threats.
• Challenges to Indian Law and Cybercrime Scenario in India:
o Cross-border nature of cybercrime
o Lack of skilled cybersecurity professionals
o Inadequate infrastructure for digital forensics.
The Indian IT Act provides a legal framework to address cybercrime in India, but it faces
challenges in keeping up with the rapid evolution of cyber threats.