0% found this document useful (0 votes)
29 views54 pages

Chapter One

Introduction to Computer Security Definition and Importance: Understanding what computer security entails and why it is essential. Security Goals: The CIA Triad – Confidentiality, Integrity, and Availability. Threats and Vulnerabilities: Overview of common threats (e.g., malware, phishing) and system vulnerabilities. Security Measures: Types of security controls (preventive, detective, corrective). Risk Management: Basic concepts of assessing and mitigating risks.

Uploaded by

mintesinottolosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views54 pages

Chapter One

Introduction to Computer Security Definition and Importance: Understanding what computer security entails and why it is essential. Security Goals: The CIA Triad – Confidentiality, Integrity, and Availability. Threats and Vulnerabilities: Overview of common threats (e.g., malware, phishing) and system vulnerabilities. Security Measures: Types of security controls (preventive, detective, corrective). Risk Management: Basic concepts of assessing and mitigating risks.

Uploaded by

mintesinottolosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Dilla University

College of Engineering and Technology


School of Electrical and Computer
Engineering (Computer Stream)
Computer Network Security

Dilla University
CHAPTER ONE
Basic concepts in computer Network
security

By:Shewangizaw Liulseged
WHAT IS COMPUTER SECURITY ?
• Computer security is refers to techniques for ensuring that
data stored in a computer cannot be read or compromised
by any individuals without authorization.
• Most computer security measures involve data encryption
and passwords.
• The purpose of computer security is to device ways to
prevent the weaknesses from being exploited.
WHAT IS COMPUTER SECURITY ?
• We are addressing three important aspects of any
computer-related system such as confidentiality, integrity,
and availability.
WHAT IS COMPUTER SECURITY ?
• These are the three goals in
computing Security.
1. Confidentiality
2. Integrity
3. Availability
THREE GOALS IN COMPUTING SECURITY

• Confidentiality: ensures that computer-related assets are


accessed only by authorized parties. Confidentiality is
sometimes called secrecy or privacy.
• Integrity: it means that assets can be modified only by
authorized parties or only in authorized ways.
• Availability: it means that assets are accessible to
authorized parties at appropriate times.
THREE GOALS IN COMPUTING SECURITY

• One of the challenges in building a secure system is


finding the right balance among the goals, which often
conflict.
VULNERABILITY
• Vulnerability is a weakness in the security system.
• Weaknesses can appear in any element of a computer,
both in the hardware, operating system, and the
software.
The types of vulnerabilities we might find as they apply to
the assets of hardware, software, and data.
• These three assets and the connections among them are all
potential security weak points.
HARDWARE VULNERABILITY

• Hardware is more visible than software, largely because it


is composed of physical objects.
• it is rather simple to attack by adding devices, changing
them, removing them, intercepting the traffic to them, or
flooding them with traffic until they can no longer function.
HARDWARE VULNERABILITY

• other ways that computer hardware can be attacked


physically.
• Computers have been drenched with water, burned, frozen,
gassed, and electrocuted with power surges.
SOFTWARE VULNERABILITIES

• Software can be replaced, changed, or destroyed


maliciously, or it can be modified, deleted, or misplaced
accidentally. Whether intentional or not, these attacks
exploit the software’s vulnerabilities.
SOFTWARE VULNERABILITIES

• Sometimes, the attacks are obvious, as when the software


no longer runs. More subtle are attacks in which the
software has been altered but seems to run normally.
DATA VULNERABILITY

• a data attack is a more widespread and serious problem


than either a hardware or software attack.
• data items have greater public value than hardware and
software because more people know how to use or
interpret data.
THREATS

• A threat to a computing system is a set of circumstances


that has the potential to cause loss or harm.
• There are many threats to a computer system, including
human-initiated and computer-initiated ones.
• A threat is blocked by control of a vulnerability.
• We can view any threat as being one of four kinds such as
interception, interruption, modification, and fabrication.
THREATS

• An interception means that some


unauthorized party has gained
access to an asset. The outside
party can be a person, a program,
or a computing system.
THREATS

• In an interruption is an asset of the system becomes lost,


unavailable, or unusable.
THREATS

• If an unauthorized party not only accesses but tampers


with an asset, is called as a modification.
THREATS

• An unauthorized party might create a fabrication of


counterfeit objects on a computing system.
• The intruder may insert spurious transactions to a network
communication system or add records to an existing
database.
ATTACKS

• A human who exploits a vulnerability perpetrates an


attack on the system. An attack can also be launched by
another system, as when one
• system sends an overwhelming set of messages to another,
virtually shutting down the second system's ability to
function.
ATTACKS

• Unfortunately, we have seen this type of attack frequently,


as denial-of-service attacks flood servers with more
messages than they can handle.
CONTROL

• The control is an action, device, procedure or technique


that removes or reduces a vulnerability.
• We use a control as a protective measure.
• There are so many ways to control.
HOW TO SECURE THE COMPUTER

• There are two ways


1. Physical secure
2. Other security methods
PHYSICALLY SECURE COMPUTERS

• Obtain physical computer


locks for all your computers
PHYSICALLY SECURE COMPUTERS

• Attach mobile proximity


alarms to your
computers.
PHYSICALLY SECURE COMPUTERS

• Store computers in an area


with secure access.
• Or place the computers in a
locked room
PHYSICALLY SECURE COMPUTERS

• Station security guards at


entry points to the college
building.
SECURE THE COMPUTER

• Choose a good secured


operating system
SECURE THE COMPUTER

• Choose a web browser based


on its security and vulnerabilities
because most malware will come
through via your web browser
SECURE THE COMPUTER

• When setting up, use strong


passwords in your user account,
router account etc. Hackers may
use dictionary attacks and brute
force attacks.
SECURE THE COMPUTER

• When downloading software


(including antivirus software), get
it from a trusted source
SECURE THE COMPUTER

• Install good antivirus software


because Antivirus software is
designed to deal with modern
malware including viruses,
Trojans, key loggers, rootkits, and
worms.
SECURE THE COMPUTER

• Download and install a


firewall
SECURE THE COMPUTER

• Close all ports. Hackers use


port scanning (Ubuntu Linux
has all ports closed by
default)
BASICS OF CRYPTOGRAPHY
BASICS OF CRYPTOGRAPHY
Name from Greek word called
‘ kryptos’ which means ‘Hidden secrets’.
Cryptography is the science and art of
transforming messages to make them
secure and immune to attack.
It is also the science of
using mathematics to encrypt and
decrypt data.
BASICS OF CRYPTOGRAPHY

Cryptography enables you to store sensitive information


or transmit it across insecure networks so that it cannot
be read by anyone except the intended recipient.
study of techniques for secure communication in the
presence of third parties
BASIC TERMS
PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION & DECRYPTION
KEYS
BASIC TERMS
Plain text
A message in its natural format readable by attacker.
Cipher text
Message altered to be unreadable by anyone except the
intended recipients.
Key
Sequence that control the operation and behaviour of the
cryptographic algorithm.
BASIC TERMS
Encryption
The process of converting plain text into cipher text.
Decryption
The process of converting cipher text into plain text.
cipher
Algorithm for transforming plaintext to ciphertext
cryptanalysis (codebreaking)
Study of principles/ methods of deciphering ciphertext
without knowing key
Cryptology
Field of both cryptography and cryptanalysis
TYPES OF CRYPTOGRAPHY
Cryptography

Symmetric key Asymmetric key


cryptography cryptography
(Public key cryptography)

Classical cryptography Modern cryptography

Transposition cipher Substitution cipher Stream cipher Block cipher


SYMMETRIC KEY CRYPTOGRAPHY
It is also known as secret key.
Sender & receiver uses same key & an encryption or
decryption algorithm to encrypt/decrypt data. i.e. the key is
shared.
same key for encryption and decryption .
Key distribution problem may happen.
It is Simpler and Faster
But it is Less secured
SYMMETRIC KEY CRYPTOGRAPHY
D_K(E_K(P)) = P
Where D_K is Decryption key, E_K is Encryption key, P is
plain text and K is key

E D
E_K(X)
X Enciphering Deciphering D_K(E_K(X)) = X

K
SYMMETRIC KEY CRYPTOGRAPHY
Example
Let k = 4
Turn plaintext SECRET into cipher text
S+4=W, E+4=I, C+4=G, R+4=V, E+4=I, T+4=X
Some algorithms used are the following:
Data Encryption Standard (DES): 56 bits key
Advance Encryption Standard (AES): 128, 192 or 256 bits
key
International Data Encryption Algorithm(IDEA): 128 bits
key
TRANSPOSITION CIPHER
In classical cryptography, a transposition cipher changes one
character from the plaintext to another i.e. the order of the
characters is changed.
1.Rail Fence Cipher
2.Columnar Transposition
Simple Columnar Transposition
Double Columnar Transposition
1. RAIL FENCE & SIMPLE COLUMNAR CIPHER
In this method plain text is written downwards on “rails of fence
“ , starting a new column when bottom is reached.
Algorithm:
1. First write down plain text message as a sequence of diagonals.
2. Read the plain text written in first step as a sequence of rows.
1. RAIL FENCE CIPHER
Example:
Plain text: come home tomorrow

Cipher text: cmhmtmrooeoeoorw


Plain text: Welcome to home where key is 2
Cipher text=_________________
TRANSPOSITION CIPHER
In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with one
another.
1 2 3 4 5 6 4 2 1 6 3 5
M E E T M E T E M E E M
A F T E R P E F A P T R
A R T Y Y R A T

Plain text: MEET ME AFTER PARTY


Cipher text: TEMEEMEFAPTRYRAT
KEY USED: 421635
SUBSTITUTION CIPHER
Substitution cipher is a method of encryption by which
units of plaintext are substituted with cipher text
according to a regular system.
EXAMPLE 1. CAESAR CIPHER
earliest known substitution cipher
by Julius Caesar
first attested use in military affairs
replaces each letter by a letter three places down the alphabet
example:
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
CAESAR CIPHER
can define transformation as:
abcdefghijklmnopqrstuvwxyz
DEF GHIJKLMNO PQRSTUVWXYZABC
mathematically give each letter a number
abcd efgh i j k l m
0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
Where C is cipher text, E(p) is encryption key, p is plain text, k is the
key D(c) is dycryption key
Plain text=MEET ME what is the Cipher text=PHHWPH
ASYMMETRIC CRYPTOGRAPHY
It is also known as public key
Two keys: public k, private k’ used.
• Private key not required for both parties
More computationally intensive
Mathematically related key pairs for encryption/decryption
more secured Authentication
Relatively Complex
Diffie-Hellman is one of the first public key cryptographic
systems used.
COMPARISION

You might also like