Network and Information Securtiy
Network and Information Securtiy
SECURITY*
1.DEFINITION OF SECURITY
2.NEED OF SECURITY
3.ASSSETS
1
- All function of system can be known as an asymmetric threat
environment. Condition are likely to be different for every situation
and every organization. How the security challenges evolve is
directly related to the organization’s infrastructure, reality and
settings. Preparing for unexpected risk is the key of security
assurance.
4.VIRUSES
2
Dormant Propagation Triggering Execution
Phase of virus
5.WORMS
-A worm is a special type of virus that can replicate and use memory,
but cannot attach itself to other program.
Virus worm
A virus is a piece of code that A worm is a malicious program
attach itself to legitimate that spread automatically.
program.
Virus modifies the code. Worm does not modify the code.
It dose not replicate itself. It replicate itself.
Virus is a destructive in nature. Worm is non destructive in nature.
Virus may need a trigger for Worm does not need any trigger.
execution.
6.ATTACKS
TYPES OF ATTACKS
1. Active attack
2. Passive attack
1. ACTIVE ATTACKS
1. Interruption
2. Modification
3. Fabrication
3
2. PASSIVE ATTACKS
- The aim of this attacks can be simply prevent access to the target
system, or the attack can be used in combination with other actions in
order to a computer or network.
8. SNIFFING
*Password
*Email text
*File in transfer
4
9. OPERATING SYSTEM UPDATES
HOTFIX
PATCH
SERVICE PACK
5
11. BASICS PRINCIPAL OF INFORMATION SECURITY
- Many system count the fail login attempt and prevent or deny next
attempt when threshold has been reached.
*PIGGYBACKING
6
- Piggybacking is the simple approach of following closely behind a
person who has just used own access card or pin to gain physical
access to a room or building.
- In this way an attacker can gain access to the facility without knowing
the access card. E.g. access of wireless internet connection by
bringing one’s own computer within range of another’s wireless
connection and using that without subscriber’s explicit permission.
*SHOULDER SURFING
• Fingerprint
• Hand print
• Retina
• Voice/speech patterns
• Signature and writing patterns
• Keystrokes
*FINGERPRINT
7
- This is the best option for most used of biometric verification and it is a
specially attached to specific computer and network assets.
*VOICE/SPEECH PATTERNS
15.DEFINITION
16.AUTHENTICATION MECHANISM
• Something-you-know
• Something-you-have
• Something-about-you
- The control are discretionary in the sense that a subject with certain
access permission is capable of passing that permission indirectly on
the any other subject.
19. PLAINTEXT
- The plaintext is also known as clear text mean anyone who knows the
language can easily read the message.
9
20. CIPHERTEXT
When the plaintext is codified with the help of any suitable scheme,
then the resultant message is known as ciphertext
21.CRYPTOGRAPHY
Cryptography, not only protects date from alteration, but it can also be
used for authentication of user.
1. Caesar’s cipher
Example:
10
(1)Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
Example:
Columnar technique
A L L I S W
E L L F O R
Y O U R E X
A M
Reading pattern(4,6,1,2,5,3)
Cipher text- IFRWRXAEYALLOMSOELLU
11
plaintext are replaced with ciphertext held by units of plaintext.
according to a regular system.
Method of substitution is used. Method of transposition is used.
Plaintext : Plaintext:
ABCDFGHIJK WE ARE DISCOVERED. FLEE AT ONCE.
Ciphertext : Ciphertext:
FGHIJKLMNOP WECLR TEERD SOEEF EAOCA IVDEN
Where, n=5
Easy to understand. Difficult to understand.
12
Steps
13
Black diagram of digital signature
1. PACKET FILTER
2. STATEFUL PACKET FILTER
3. APPLICATION GATEWAY
4. CIRCUIT GATEWAYS
1. PACKET FILTER
14
o Source IP address
o Destination IP address
o Source and destination transport-level address
o IP protocol field
o Interface
Advantages
- Simplicity
- Transparency to the users
- High speed
Disadvantages
2. APPLICATION GATEWAYS
Advantages
Disadvantages
15
The additional overhead for each connection because there are
two separate connection between the end user and with the
gateway. The gateway should examine and forward all traffic in
both direction.
3. CIRCUIT GATEWAYS
- Firewall policies allow all type of traffic but block some service like
telnet/SNMP, and port numbers those are used by an attacker.
- Restrictive policies block all traffic passing through firewall and
allow only traffic which are useful such as HTTP, POP3, SMTP, or
SSH.
- If network administrator forget to block something then it might
be exploited after some time without your knowledge.
33. CONFIGURATION
16
- Here, the packets filter connects only to the application
gateway, which in turn has a separated connection with
the internal hosts.
3. Screened subnet firewall
- This type of configuration offers highest security among the
possible configuration.
- In this type, two packet filters are used, one between the
internet and application gateway and other in between
application gateway and the internal network.
4. It may not be able to protect against viruses and infected file since it
may not be possible to scan all incoming traffic.
17
- Intrusion detection is the process of monitoring the events
happening in a computer system or network. Intrusion detection
process analyses them for possible incidents, which are threats of
violation of computer security policies, standard security
practices or acceptable use policies.
- An intrusion
- An intrusion detection system (IDS) is same like burglar alarm
system installed in a house. In case of an intrusion, the IDS system
will provide some type of warning or alert.
- Then an operator will tag events of interest for next investigation
by the incident handing team.
IDS TYPES
Advantages
Disadvantages
18
- High cost of ownership and maintenance.
- Uses local system resources.
- Very focused view and cannot relate to activity around
it.
- If logged locally, could be compromised or disable.
36. HONEYPOTS
37. KERBEROS
19
I. User : The client workstation.
II. AS: Authentication server (AS) is used to verify the user while login
process, i.e. Authentication. It shared the unique secret password
with every user.
III. TGS: Ticket Granting Server (TGS) is responsible to certify the proof
of identity after authentication.
IV. SS: Service Server (SS) who is providing services to clients like
network printer, file sharing or application program.
- In this mode, IPSec takes the transport layer payload, adds IPSec
header and trailer encrypts the whole thing and then adds the IP
header. Thus, the IP header is not encrypted.
Transport layer
Transport layer
payload
Network layer
IPH IP Payload
Transport layer
payload
Network layer
IP H IP payload
IPH IP Payload
IP tunnel mode
21
of the protected data into an unreadable encrypted from.
Under normal circumstances, the ESP will be inside AH i.e.
encryption happens first and then authentication.
46. HACKING
24
generally accepted information technology control objective for
day to day use by business managers, IT professionals and
assurance.
Which respond to
Drive the Business
requireme
Investments in nts
Enterprise COBI IT
T Resourc
Informatio
es
n
IT That
are used Processe
s
To deliver
by
25