Is - Unit 1
Is - Unit 1
1. Identify computer and network security threats, classify the threats and develop a security
model to prevent, detect and recover from the attacks.
2. Propose the security Services and Mechanisms for preventing the different security attacks.
3. Use Symmetric key Cryptographic Techniques to encrypt and decrypt the messages.
4. Use Asymmetric key Cryptographic Techniques to encrypt and decrypt the messages.
5. Use different Hash Techniques to provide Authentication and to check the Integrity of
messages in transit.
• [email protected]
• 8600218534
• 9003LA
Unit 1- Security Basics
What is Security?
• Security means “safety”
Providing Security
• Protecting Assets ISO 27001-ISMS (Anything that has some value – financial, logical,
intangible) from threats
• Primary Assets – Business Process and Data
• Secondary Assets – Hardware, Software, Network, Personnel, Site,
Organizational Structure
Elements of Information
Security
• Triad
• Confidentiality
• Integrity
• Availability
• In addition to that
• Authenticity
• Accountability
• Non-repudiation
Confidentiality
• Assurance that information is shared only among authorized persons
or organizations.
Example: Alice and Bob want their communications to be secret from
Eve
Integrity
• Assurance that the information is authentic and complete.
• Maintaining and assuring the accuracy and consistency of data over
its entire life-cycle.
• Changes need to be done only by authorized entities and through
authorized mechanisms
Availability
• Assurance that the systems responsible for delivering, storing, and
processing information are accessible when needed, by those who
need them.
• Authenticity
• The property of being genuine and being able to be verified and trusted
• Accountability
• Non-repudiation
• Assurance that the sender of information is provided with proof of delivery and the
recipient is provided with proof of the sender's identity, so neither can later deny having
processed the information.
Security, Functionality and Usability
• Security goes up
• Functionality and Usability?
Key Terminologies
• Security attack
• Any action that compromises the security (CIA) of any assets
• Vulnerability
• Inherent weakness in the security system
• Default password, open ports, untrained employees
• Threat
• A probable action having potential to cause loss or harm
• Malicious program
• Control
• Countermeasure / protective measure to maintain the security
Types of malware
• Viruses
A Virus is a malicious executable code attached to another executable file.
• Spyware
Its purpose is to steal private information from a computer system for a third party.
Spyware collects information and sends it to the hacker.
• Trojan horse
A Trojan horse is malware that carries out malicious operations under the appearance of
a desired operation such as playing an online game.
• Logic Bombs
A logic bomb is a malicious program that uses a trigger to activate the malicious code.
The logic bomb remains non-functioning until that trigger event happens.
• Ransomware
Ransomware grasps a computer system or the data it contains until the victim makes a
payment.
• Backdoors
A backdoor bypasses the usual authentication used to access a system.
• Rootkits
A rootkit modifies the OS to make a backdoor.
• Keyloggers
Keylogger records everything the user types on his/her computer system to
obtain passwords and other sensitive information and send them to the
source of the keylogging program.
Different Attacks
• Social engineering is the act of manipulating others to divulge
confidential information.
• Elaborate lying—a type of con game that influences a person to
take an action that may not be in his or her best interest
• Social engineering
• An attack that relies on human communication and often involves tricking people into breaking their
normal security procedures
• The ultimate risk is to an individual’s or a business’s information security.
Phishing attacks can take many forms:
Common Spear
Phishing Phishing Smishing Vishing Whaling
Fraudulent Fraudulent Fraudulent Telephone Phishing
emails with a emails that text messages. calls where emails that
general appear to be the caller is target high
message. from someone attempting to profile victims
you know. steal your (celebrities,
personal politicians or
information. executives.)
• Website forgery is phishing that sends victims to a website that looks exactly like
• Pretexting is creating a strong yet fabricated story that seems real to the victim,
• The sender uses a process that involves showing that she owns a private
key related to the public key that she has announced publicly.
• The receiver uses the sender’s public key to prove that the message
is indeed signed by the sender who claims to have sent the message.
Authentication Exchange
• In authentication exchange, two entities exchange some
messages to prove their identity to each other. For example,
one entity can prove that she knows a secret that only she is
supposed to know.
Traffic Padding
• Traffic padding means inserting some bogus data into the data
traffic to thwart the adversary’s attempt to use the traffic
analysis.
Routing Control
• Routing control means selecting and continuously changing different
available routes between the sender and the receiver to prevent the
sender from later denying that she has made such a request.
Access Control
• Access control uses methods to prove that a user has access right to the
data or
resources owned by a system. Examples of proofs are passwords and
PINs
•DAC
•MAC
•RBAC
Models of Network Security
Model for Network Security
• using this model requires us to:
• design a suitable algorithm for the security transformation
• generate the secret information (keys) used by the algorithm
• develop methods to distribute and share the secret information
• specify a protocol enabling the principals to use the transformation
and secret information for a security service