CSS notes 2
CSS notes 2
Ans. The Internet has transformed our lives in many good ways. Unfortunately, this vast
network and its associated technologies also have brought in their wake, the increasing number
of security threats.
Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system.
There are various types of computer security which is widely used to protect the valuable
information of an organization.
Types
It‘s important to understand the distinction between these words, though there isn‘t necessarily a
clear consensus on the meanings and the degree to which they overlap or are interchangeable.
So, Computer security can be defined as controls that are put in place to provide confidentiality,
integrity, and availability for all components of computer systems
o, Computer security can be defined as controls that are put in place to provide confidentiality,
integrity, and availability for all components of computer systems. Let‘s elaborate the definition.
Hardware, the physical part of the computer, like the system memory and disk drive
Firmware, permanent software that is etched into a hardware device‘s nonvolatile
memory and is mostly invisible to the user
Software, the programming that offers services, like operating system, word processor,
internet browser to the user
The CIA Triad
Computer security is mainly concerned with three main areas
Computer security threats are possible dangers that can possibly hamper the normal functioning
of your computer. In the present age, cyber threats are constantly increasing as the world is going
digital. The most harmful types of computer security are:
Viruses
A computer worm is a software program that can copy itself from one
computer to another, without human interaction. The potential risk here is that it will use up your
computer hard disk space because a worm can replicate in greate volume and with great speed.
Phishing
Botnet
Keylogger
Also known as a keystroke logger, keyloggers can track the real-time activity
of a user on his computer. It keeps a record of all the keystrokes made by user keyboard.
Keylogger is also a very powerful threat to steal people‘s login credential such as username and
password.
These are perhaps the most common security threats that you‘ll come across. Apart from these,
there are others like spyware, wabbits, scareware, bluesnarfing and many more. Fortunately,
there are ways to protect yourself against these attacks.
In this digital era, we all want to keep our computers and our personal information secure and
hence computer security is important to keep our personal information protected. It is also
important to maintain our computer security and its overall health by preventing viruses and
malware which would impact on the system performance.
Computer security threats are becoming relentlessly inventive these days. There is much need for
one to arm oneself with information and resources to safeguard against these complex and
growing computer security threats and stay safe online. Some preventive steps you can take
include:
Apart from these, there are many ways you can protect your computer system. Aspects such as
encryption and computer cleaners can assist in protecting your computers and its files.
Unfortunately, the number of cyber threats are increasing at a rapid pace and more sophisticated
attacks are emerging. So, having a good foundation in cybersecurity concepts will allow you to
protect your computer against ever-evolving cyber threats.
Encryption is the process of translating plain text data (plaintext) into something that appears to
be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back
to plaintext.
The goal of every encryption algorithm is to make it as difficult as possible to decrypt the
generated ciphertext without using the key. If a really good encryption algorithm is used, there is
no technique significantly better than methodically trying every possible key. For such an
algorithm, the longer the key, the more difficult it is to decrypt a piece of ciphertext without
possessing the key.
In the above given example Plain Text is ― Meet me at the park‖ is ecrypted as the
MMTAEEHREAEKTTP (cipher Text)
Helps you to protect your confidential data such as passwords and login id
Provides confidentiality of private information
Helps you to ensure that that the document or file has not been altered
Encryption process also prevents plagiarism and protects IP
Helpful for network communication (like the internet) and where a hacker can easily
access unencrypted data.
It is an essential method as it helps you to securely protect data that you don't want
anyone else to have access.
Types of Keys
Symmetric Key:
Symmetric-key encryption are algorithms which use the same cryptographic keys for both
encryption of plaintext and decryption of ciphertext.
Asymmetric Key:
Asymmetric encryption uses 2 pairs of key for encryption. Public key is available to anyone
while the secret key is only made available to the receiver of the message. This boots security.
Public Key:
Public key cryptography is an encryption system which is based on two pairs of keys. Public
keys are used to encrypt messages for a receiver.
Private Key:
Private key may be part of a public/ private asymmetric key pair. It can be used in asymmetric
encryption as you can use the same key to encrypt and decrypt data.
Whenever the data is sent between two The receiver of the data automatically allows
Process separate machines, it is encrypted you to convert the data from the codes into its
automatically using a secret key. original form.
The security design principles are considered while designing any security mechanism for a
system. These principles are review to develop a secure system which prevents the security flaws
and also prevents unwanted access to the system.
The security design principles are considered while designing any security mechanism for a
system. These principles are review to develop a secure system which prevents the security flaws
and also prevents unwanted access to the system.
The security design principles are considered while designing any security mechanism for a
system. These principles are review to develop a secure system which prevents the security flaws
and also prevents unwanted access to the system.
Below is the list of fundamental security design principles provided by the National Centres of
Academic Excellence in Information Assurance/Cyber Defence, along with the U.S. National
Security Agency and the U.S. Department of Homeland Security.
1. Economy of Mechanism
2. Fail-safe Defaults
3. Complete Mediation
4. Open Design
5. Separation of Privilege
6. Least Privilege
7. Least Common Mechanism
8. Psychological Acceptability
9. Isolation
10. Encapsulation
11. Modularity
12. Layering
13. Least Astonishment
1. Economy of Mechanism
This fundamental security principle defines that the security measures implemented in the
software and the hardware must be simple and small. This would ease the testers to test the
security measures thoroughly.
If the designed security mechanism is complex then it is likely that the tester would get a chance
to exploit the weakness in the design.
So more the design is simple less are the opportunities for the tester to discover the flaws and
more the complex is the design more are the chances to exploit flaws in the design.
When the security design is simple, it easy to update or modify the design. But when it comes to
practice, we cannot consider the economy of a mechanism as the best security design principle.
Because there is a continuous demand for adding the security features in both hardware, as well
as software.
Adding security features constantly makes the security design complex. What we can do to obey
this principle while designing security mechanism is to eliminate the less important complex
feature.
2. Fail-safe Defaults
This principle says that if any user wants access to any mechanism then whether the access is
permitted or denied should be based on authorization rather than elimination.
By default, all the mechanism should have a lack of access and the function of a security
mechanism is to identify the condition where the access to the security mechanism should be
permitted. This means by default access to all mechanism should be denied, unless any privilege
attribute is provided.
This principle denies unauthorized access. If there occurs any mistake while designing the
security mechanism which grants access based on permission or authorization. That mechanism
fails by simply denying access, which is the safest condition.
If there occurs any mistake while designing the security mechanism which grants access based
on exclusion. That mechanism fails by simply granting access which can not be considered as the
safest situation.
3. Complete Mediation
Some systems are designed to operate continuously such systems remember access decision. So,
there must be an access control mechanism which would check every access occurring on the
system.
This principle says that the system should not trust the access decisions it recovers from the
system cache. This particular security design principle says that there must be a mechanism in
the system that checks each access through the access control mechanism.
However, this is an exhaustive approach and is rarely considered while designing a security
mechanism.
4. Open Design
This security principle suggests that the security mechanism design should be open to the public.
Like in the cryptographic algorithm, the encryption key is kept secret while the encryption
algorithm is opened for a public investigation.
This principle is followed by the NIST (National Institute of Standards and Technology) to
standardize the algorithms because it helps in worldwide adoption of NIST approved algorithms.
5. Separation of Privilege
This security principle states that whenever a user tries to gain access to a system, the access
should not be granted based on a single attribute or condition.
Instead, there must be multiple situations or conditions or attribute which should be verified to
grant access to the system. We also term this as a multifactor user authentication as this principle
says that multiple techniques must be implemented to authenticate a user.
For example, while conducting online money transfer we require user-id, password, transaction
password along with OTP.
6. Least Privilege
The least privilege security design principle states that each user should be able to access the
system with the least privilege. Only those limited privileges should be assigned to the user
which are essential to perform the desired task.
An example of considering and implementing this principle is role-based access control. The
role-based designed security mechanism should discover and describe various roles of the users
or processes.
Now, the least set of privileges should be assigned to each role which is essential to perform its
functions. So, the access control mechanism enables each role only those privileges for which it
is authorized. The least set of privileges assigned to each role describes the resources available
each role can access.
In this way, unauthentic roles are unable to access the protected resources. Like, the users
accessing database has privilege only to retrieve the data they are not authorized to modify the
data.
Following the least common mechanism, a security design principle there should be minimum
common functions to share between the different user. This principle reduces the count of
communication paths and therefore further reduces the hardware and software implementation.
Ultimately this principle reduces the threat of unwanted access to the system as it becomes easy
to verify if there are some unwanted access to the shared function.
8. Psychological Acceptability
This security design principle says that the security mechanisms design to protect the system
should not interfere with the working of the user every now and then.
As this would irritate the user ad user may disable this security mechanism on the system.
Therefore, it is suggested that the security mechanism should introduce minimum hurdles to the
user of the system.
The security mechanism should not be designed such that it becomes difficult for the user to
access the resources in the system.
9. Isolation
This security design principle is considered in three circumstances. The first condition, the
system that has critical data, processes or resources must be isolated such that it restricts public
access. It can be done in two ways.
The system with critical resources can be isolated in two ways physical and logical isolation. The
physical isolation is one where the system with critical information is isolated from the system
with public access information.
In logical isolation, the security services layers are established between the public system and the
critical systems.
The second isolation condition is that the files or data of one user must be kept isolated with the
files or data of another user. Nowadays the new operating system has this functionality.
Each user operating the system have an isolated memory space, process space, file space along
with the mechanism to prevent unwanted access.
And the third isolation condition is where the security mechanism must be isolated from such
that they are prevented from unwanted access.
10. Encapsulation
This security design principle is a form of isolation which is designed on the principle of object-
oriented principles. Here the processes of the protected system can only access the data object of
the system and these processes can only be invoked from a domain entry point.
11. Modularity
This security designing principle says that the security mechanism must be generated as separate
and protected modules and the security mechanism must be generated using the modular
architecture.
This principle helps in updating the security mechanism independently without modifying the
entire system.
12. Layering
Multiple security layers must be used in order to protect the opponent from accessing crucial
information. Applying multiple security layers provides multiple barriers to the adversary if he
tries to access the protected system.
This security design principle states that the user interface of the system must not amaze the user
while accessing the secure system. He should be able to understand how the security mechanism
is essential to protect the system.
So, this is all about the security design principles which should be considered while designing
the security mechanism for a system.
1. Economy of Mechanism
This fundamental security principle defines that the security measures implemented in the
software and the hardware must be simple and small. This would ease the testers to test the
security measures thoroughly.
If the designed security mechanism is complex then it is likely that the tester would get a chance
to exploit the weakness in the design.
So more the design is simple less are the opportunities for the tester to discover the flaws and
more the complex is the design more are the chances to exploit flaws in the design.
When the security design is simple, it easy to update or modify the design. But when it comes to
practice, we cannot consider the economy of a mechanism as the best security design principle.
Because there is a continuous demand for adding the security features in both hardware, as well
as software.
Adding security features constantly makes the security design complex. What we can do to obey
this principle while designing security mechanism is to eliminate the less important complex
feature.
2. Fail-safe Defaults
This principle says that if any user wants access to any mechanism then whether the access is
permitted or denied should be based on authorization rather than elimination.
By default, all the mechanism should have a lack of access and the function of a security
mechanism is to identify the condition where the access to the security mechanism should be
permitted. This means by default access to all mechanism should be denied, unless any privilege
attribute is provided.
This principle denies unauthorized access. If there occurs any mistake while designing the
security mechanism which grants access based on permission or authorization. That mechanism
fails by simply denying access, which is the safest condition.
If there occurs any mistake while designing the security mechanism which grants access based
on exclusion. That mechanism fails by simply granting access which can not be considered as the
safest situation.
3. Complete Mediation
Some systems are designed to operate continuously such systems remember access decision. So,
there must be an access control mechanism which would check every access occurring on the
system.
This principle says that the system should not trust the access decisions it recovers from the
system cache. This particular security design principle says that there must be a mechanism in
the system that checks each access through the access control mechanism.
However, this is an exhaustive approach and is rarely considered while designing a security
mechanism.
4. Open Design
This security principle suggests that the security mechanism design should be open to the public.
Like in the cryptographic algorithm, the encryption key is kept secret while the encryption
algorithm is opened for a public investigation.
This principle is followed by the NIST (National Institute of Standards and Technology) to
standardize the algorithms because it helps in worldwide adoption of NIST approved algorithms.
5. Separation of Privilege
This security principle states that whenever a user tries to gain access to a system, the access
should not be granted based on a single attribute or condition.
Instead, there must be multiple situations or conditions or attribute which should be verified to
grant access to the system. We also term this as a multifactor user authentication as this principle
says that multiple techniques must be implemented to authenticate a user.
For example, while conducting online money transfer we require user-id, password, transaction
password along with OTP.
6. Least Privilege
The least privilege security design principle states that each user should be able to access the
system with the least privilege. Only those limited privileges should be assigned to the user
which are essential to perform the desired task.
An example of considering and implementing this principle is role-based access control. The
role-based designed security mechanism should discover and describe various roles of the users
or processes.
Now, the least set of privileges should be assigned to each role which is essential to perform its
functions. So, the access control mechanism enables each role only those privileges for which it
is authorized. The least set of privileges assigned to each role describes the resources available
each role can access.
In this way, unauthentic roles are unable to access the protected resources. Like, the users
accessing database has privilege only to retrieve the data they are not authorized to modify the
data.
Following the least common mechanism, a security design principle there should be minimum
common functions to share between the different user. This principle reduces the count of
communication paths and therefore further reduces the hardware and software implementation.
Ultimately this principle reduces the threat of unwanted access to the system as it becomes easy
to verify if there are some unwanted access to the shared function.
8. Psychological Acceptability
This security design principle says that the security mechanisms design to protect the system
should not interfere with the working of the user every now and then.
As this would irritate the user ad user may disable this security mechanism on the system.
Therefore, it is suggested that the security mechanism should introduce minimum hurdles to the
user of the system.
The security mechanism should not be designed such that it becomes difficult for the user to
access the resources in the system.
9. Isolation
This security design principle is considered in three circumstances. The first condition, the
system that has critical data, processes or resources must be isolated such that it restricts public
access. It can be done in two ways.
The system with critical resources can be isolated in two ways physical and logical isolation. The
physical isolation is one where the system with critical information is isolated from the system
with public access information.
In logical isolation, the security services layers are established between the public system and the
critical systems.
The second isolation condition is that the files or data of one user must be kept isolated with the
files or data of another user. Nowadays the new operating system has this functionality.
Each user operating the system have an isolated memory space, process space, file space along
with the mechanism to prevent unwanted access.
And the third isolation condition is where the security mechanism must be isolated from such
that they are prevented from unwanted access.
10. Encapsulation
This security design principle is a form of isolation which is designed on the principle of object-
oriented principles. Here the processes of the protected system can only access the data object of
the system and these processes can only be invoked from a domain entry point.
11. Modularity
This security designing principle says that the security mechanism must be generated as separate
and protected modules and the security mechanism must be generated using the modular
architecture.
This principle helps in updating the security mechanism independently without modifying the
entire system.
12. Layering
Multiple security layers must be used in order to protect the opponent from accessing crucial
information. Applying multiple security layers provides multiple barriers to the adversary if he
tries to access the protected system.
This security design principle states that the user interface of the system must not amaze the user
while accessing the secure system. He should be able to understand how the security mechanism
is essential to protect the system.
So, this is all about the security design principles which should be considered while designing
the security mechanism for a system.
What's HTTPS?
When that exchange of data is encrypted with SSL/TLS, then we call it HTTPS. The 'S' stands
for Secure.
SSL was designed to thwart any unauthorized third party from intercepting and tampering with
sensitive data while it‘s in transit. SSL was developed and released by Netscape, and it was the
first of such cryptographic protocols. Its first version, SSL 1.0, never got released. SSL 2.0, the
second version, was released in 1995.
The second version contained some security deficiencies, and as a result, SSL 3.0 was created.
Later, this, too, was found to have security flaws. This led to the creation of another acronym
that you need to know about: TLS, or what‘s known as transport layer security. Before moving
on to what TLS entails, it‘s worth noting that SSL 2.0 & SSL 3.0 both have been deprecated and
are no longer supported by web browsers due to the flaws in their security.
Due to the recognized security flaws in SSL, security experts realized that a better and more
secure protocol needed to be developed. TLS 1.0 was a successor to SSL 3.0 and was first
defined in 1999. Since then, three more versions of TLS have been released, with TLS 1.3
(which was released in 2018) being the most current.
TLS 1.0 and 1.1 are to be deprecated by Apple Safari, Google Chrome, Microsoft Edge and
Internet Explorer, and Mozilla Firefox in early 2020.
As we saw earlier, SSL/TLS are protocols through which communication takes place between
two endpoints. Basically, they‘re a set of rules that govern the data transmission between server
and client.
SSL/TLS certificates are X.509 digital files that are installed on a web server. It‘s called a
―certificate‖ because it‘s issued by an independent third party that conducts verification of your
website and organization.
SSL/TLS certificates work as part of a framework known as public key infrastructure (PKI). This
involves the use of two keys — public and private keys. A public key, as the name suggests, is
known to everyone. A private key, on the other hand, is kept by the server receiving the message.
Both the keys come are distinct, yet they‘re mathematically related to each other. Information
encrypted by a public key can only be decrypted by private key related to it. The entire
communication happens under the rules decided by the protocol — SSL or TLS.
Now you might be wondering why, if SSL is no longer being used, it‘s still referred to an SSL
certificate and not a TLS certificate. Honestly, it‘s just because industry language tends to be
slow to change. (Or the people in it are slow to change.) Either way, SSL is more commonly
used than TLS, so people tend to stick with using that terminology.
. HTTPS is a secure version of HTTP because it uses SSL/TLS as a sublayer. When a website
uses HTTPS in its web address, it indicates that any communication taking place between a
browser and server is secure. In other words, if your website is using HTTPS, all the information
will be encrypted by SSL/TLS certificates.
What It The first cryptographic The successor of SSL that‘s The secure version of
Is protocol developed in 1995. more secure. HTTP.
Use No longer in use. Currently used, but TLS 1.0 & Browsers mark sites that
1.1 to be deprecated in early don‘t use HTTPS as ―not
2020. secure.‖
System call interposition is a powerful method for regulating and monitoring program behavior.
A wide variety of security tools have been developed which use this technique. However,
traditional system call interposition techniques are vulnerable to kernel attacks and have some
limitations on effectiveness and transparency
Sandboxing techniques based on system call interposition have been developed in the past...
... System calls allow virtually all of a program's interactions with the network, filesystem, and
other sensitive system resources. System call interposition is a powerful approach to restrict the
power of a program ..
... There exists a significant body of related work in the domain of system call interposition.
Implementing system call interposition tools securely can be quite subtle Garfinkel studies the
common mistakes and pitfalls, and uses the system call interposition technique to enforce
security policies in the Ostia tool .
What are difference between Discretionary Access Control and Mandatory Access Control?
Mandatory Access Control begins with security labels assigned to all resource objects on the
system. These security labels contain two pieces of information - a classification (top secret,
confidential etc) and a category (which is essentially an indication of the management level,
department or project to which the object is available).
Similarly, each user account on the system also has classification and category properties from
the same set of properties applied to the resource objects. When a user attempts to access a
resource under Mandatory Access Control the operating system checks the user's classification
and categories and compares them to the properties of the object's security label. If the user's
credentials match the MAC security label properties of the object access is allowed. It is
important to note that both the classification and categories must match. A user with top secret
classification, for example, cannot access a resource if they are not also a member of one of the
required categories for that object.
Mandatory Access Control is by far the most secure access control environment but does not
come without a price. Firstly, MAC requires a considerable amount of planning before it can be
effectively implemented. Once implemented it also imposes a high system management
overhead due to the need to constantly update object and account labels to accommodate new
data, new users and changes in the categorization and classification of existing users.
Available Technology
There are different types of technologies available for maintaining the best security standards.
Some popular technical solutions for testing, building, and preventing threats include:
Likelihood of Threat
Your website or web application‘s security depends on the level of protection tools that have
been equipped and tested on it. There are a few major threats to security which are the most
common ways in which a website or web application becomes hacked. Some of the top
vulnerabilities for all web-based services include:
SQL injection
Password breach
Cross-site scripting
Data breach
Remote file inclusion
Code injection
Preventing these common threats is the key to making sure that your web-based service is
practicing the best methods of security.
The Best Strategies
There are two big defense strategies that a developer can use to protect their website or web
application. The two main methods are as follows:
Resource assignment – By assigning all necessary resources to causes that are dedicated
to alerting the developer about new web security issues and threats, the developer can
receive a constant and updated alert system that will help them detect and eradicate any
threats before security is officially breached.
Web scanning – There are several web scanning solutions already in existence that are
available for purchase or download. These solutions, however, are only good for known
vulnerability threats – seeking unknown threats can be much more complicated. This
method can protect against many breaches, however, and is proven to keep websites safe
in the long run.
Web Security also protects the visitors from the below-mentioned points –
Stolen Data: Cyber-criminals frequently hacks visitor‘s data that is stored on a website
like email addresses, payment information, and a few other details.
Phishing schemes: This is not just related to email, but through phishing, hackers design a
layout that looks exactly like the website to trick the user by compelling them to give
their sensitive details.
Session hijacking: Certain cyber attackers can take over a user‘s session and compel them
to take undesired actions on a site.
Malicious redirects. Sometimes the attacks can redirect visitors from the site they visited
to a malicious website.
SEO Spam. Unusual links, pages, and comments can be displayed on a site by the
hackers to distract your visitors and drive traffic to malicious websites.
Thus, web security is easy to install and it also helps the business people to make their website
safe and secure. A web application firewall prevents automated attacks that usually target small
or lesser-known websites. These attacks are born out by malicious bots or malware that
automatically scan for vulnerabilities they can misuse, or cause DDoS attacks that slow down or
crash your website.
Thus, Web security is extremely important, especially for websites or web applications that deal
with confidential, private, or protected information. Security methods are evolving to match the
different types of vulnerabilities that come into existence.
Give three benefits of IPsec?
Internet Protocol Security - Applications and Benefits
IPsec delivers the following benefits:
Reduced key negotiation overhead and simplified maintenance by supporting the IKE
protocol. IKE provides automatic key negotiation and automatic IPsec security association
(SA) setup and maintenance.
Good compatibility. You can apply IPsec to all IP-based application systems and services
without modifying them.
Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for
flexibility and greatly enhances IP security.
Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure
communications over Internet Protocol (IP) networks, through the use of cryptographic
security services. IPSec is a suite of cryptography-based protection services and security
protocols. Because it requires no changes to programs or protocols, you can easily deploy IPSec
for existing networks.
The driving force for the acceptance and deployment of secure IP is the need for business and
government users to connect their private WAN/ LAN infrastructure to the Internet for providing
access to Internet services and use of the Internet as a component of the WAN transport system.
As we all know, users need to isolate their networks and at the same time send and receive traffic
over the Internet. The authentication and privacy mechanisms of secure IP provide the basis for a
security strategy for us.
IPsec protects one or more paths between a pair of hosts, a pair of security gateways, or a
security gateway and a host. A security gateway is an intermediate device, such as a switch or
firewall, that implements IPsec. Devices that use IPsec to protect a path between them are called
peers.
IPsec requires a PCI Accelerator Card (PAC) to provide hardware data compression and
encryption. A PAC is a hardware processing unit the switch‘s CPU controls.
IPsec provides the following security services for traffic at the IP layer:
Data origin authentication—identifying who sent the data.
Confidentiality (encryption)—ensuring that the data has not been read en route.
Replay protection—detecting packets received more than once to help protect against denial
of service attacks.
Applications of IPSec
As we all know to help in the security of a network the Internet community has done lot of work
and developed application-specific security mechanisms in numerous application areas,
including electronic mail (Privacy Enhanced Mail, Pretty Good Privacy [PGP]), network
management (Simple Network Management Protocol Version 3[SNMPv3]), Web access (Secure
HTTP, Secure Sockets Layer [SSL]), and others. However, users have some security concerns
that cut across protocol layers. For example, an enterprise can run a secure, private TCP/IP
network by disallowing links to untrusted sites, encrypting packets that leave the premises, and
authenticating packets that enter the premises. By implementing security at the IP level, an
organization can ensure secure networking not only for applications that have security
mechanisms but also for the many security-ignorant applications.
Benefits of IPSec
When IPSec is implemented in a firewall or router, it provides strong security whose application
is to all traffic crossing this perimeter. Traffic within a company or workgroup does not incur the
overhead of security-related processing.
IPSec is below the transport layer (TCP, UDP), and is thus transparent to applications. There is
no need to change software on a user or server system when IPSec is implemented in the firewall
or router.
Even if IPSec is implemented in end systems, upper layer software, including applications is not
affected. IPSec can be transparent to end users.
There is no need to train users on security mechanisms, issue keying material on a per-user basis,
or revoke keying material when users leave the organization. IPSec can provide security for
individual users if needed. This feature is useful for offsite workers and also for setting up a
secure virtual subnetwork within an organization for sensitive applications.
What is SQL injection?
SQL Injection
SQL injection is a code injection technique that might destroy your database.
SQL injection is the placement of malicious code in SQL statements, via web page input.
SQL injection usually occurs when you ask a user for input, like their username/userid, and
instead of a name/id, the user gives you an SQL statement that you will unknowingly run on your
database.
Look at the following example which creates a SELECT statement by adding a variable
(txtUserId) to a select string. The variable is fetched from user input (getRequestString):
Example
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;
The rest of this chapter describes the potential dangers of using user input in SQL statements.
Look at the example above again. The original purpose of the code was to create an SQL
statement to select a user, with a given user id.
If there is nothing to prevent a user from entering "wrong" input, the user can enter some "smart"
input like this:
105 OR 1=1
UserId:
The SQL above is valid and will return ALL rows from the "Users" table, since OR 1=1 is
always TRUE.
Does the example above look dangerous? What if the "Users" table contains names and
passwords?
SELECT UserId, Name, Password FROM Users WHERE UserId = 105 or 1=1;
A hacker might get access to all the user names and passwords in a database, by simply inserting
105 OR 1=1 into the input field.
What is an Intrusion Detection System? What are the difficulties in Anomaly detection?
An intrusion detection system (IDS) is a device or software application that monitors a network
for malicious activity or policy violations. Any malicious activity or violation is typically
reported or collected centrally using a security information and event management system. Some
IDS‘s are capable of responding to detected intrusion upon discovery. These are classified as
intrusion prevention systems (IPS).
There is a wide array of IDS, ranging from antivirus software to tiered monitoring systems that
follow the traffic of an entire network. The most common classifications are:
Network intrusion detection systems (NIDS): A system that analyzes incoming network
traffic.
Host-based intrusion detection systems (HIDS): A system that monitors important
operating system files.
There is also subset of IDS types. The most common variants are based on signature detection
and anomaly detection.
When placed at a strategic point or points within a network to monitor traffic to and from all
devices on the network, an IDS will perform an analysis of passing traffic, and match the traffic
that is passed on the subnets to the library of known attacks. Once an attack is identified, or
abnormal behavior is sensed, the alert can be sent to the administrator.
Evasion Techniques
Being aware of the techniques available to cyber criminals who are trying to breach a secure
network can help IT departments understand how IDS systems can be tricked into not missing
actionable threats:
Fragmentation: Sending fragmented packets allow the attacker to stay under the radar,
bypassing the detection system's ability to detect the attack signature.
Avoiding defaults: A port utilized by a protocol does not always provide an indication to
the protocol that‘s being transported. If an attacker had reconfigured it to use a different
port, the IDS may not be able to detect the presence of a trojan.
Coordinated, low-bandwidth attacks: coordinating a scan among numerous attackers, or
even allocating various ports or hosts to different attackers. This makes it difficult for the
IDS to correlate the captured packets and deduce that a network scan is in progress.
Address spoofing/proxying: attackers can obscure the source of the attack by using
poorly secured or incorrectly configured proxy servers to bounce an attack. If the source
is spoofed and bounced by a server, it makes it very difficult to detect.
Pattern change evasion: IDS rely on pattern matching to detect attacks. By making slight
adjust to the attack architecture, detection can be avoided.
Modern networked business environments require a high level of security to ensure safe and
trusted communication of information between various organizations. An intrusion detection
system acts as an adaptable safeguard technology for system security after traditional
technologies fail. Cyber attacks will only become more sophisticated, so it is important that
protection technologies adapt along with their threats.
Anomaly detection is a technique for finding an unusual point or pattern in a given set. The term
anomaly is also referred to as outlier. Earlier, the data mining researchers were focused on other
techniques like classification and clustering. Outlier are found as a part of data cleansing process.
However, view underwent a change in 2000 when researchers found detection of abnormal
things can help solving the real world problems seen in damage detection, fraud detection,
detection of abnormal health condition and intrusion detection. There are three kinds of
anomalies which are referred to viz., point anomaly, contextual anomaly, and collective
anomalies. If a single instance in a given dataset is different from others with respect to its
attributes, it is called a point anomaly. If the data is anomalous in some context, it is called
contextual anomaly. In the absence of a context, all the data points look normal.
Security is all about ensuring that bad things never happen. In security, not only do you have
to find ―bugs‖ that make the system behave differently than expected, you have to identify
any features of the system that are susceptible to misuse and abuse, even if your programs
behave exactly as you expect them to.
Networking
System Administration
Digital Security
Forensics
Command Line
Reverse Engineering
each with their own unique stack of skills. Every component within each skill stack could be a
concept tool or even an entirely new field.
Lets take networking there are many more. So we can be good in network but may not as much
good in Forensics. So it is very hard .And now days equipment are more complex than the
earlier. Lets take a example of mobile before we did only for calling now smart phone do many
things like calling,netbanking,video calling and many more things.So we have to do security for
all these.
Hiring company for security is very expensive rather than hacker do work in less amount. So we
can say that security is very hard.We have done all aspects for security just one thing miss and
hacker break the security.
What is Access Control list (ACL) and also defined what are the technologies used in access
control?
In the computer networking world, an ACL is one of the most fundamental components of
security.
An Access Control Lists ―ACL‖ is a function that watches incoming and outgoing traffic and
compares it with a set of defined statements.
ACLs work on a set of rules that define how to forward or block a packet at the router‘s
interface.
An ACL is the same as a Stateless Firewall, which only restricts, blocks, or allows the packets
that are flowing from source to destination.
When you define an ACL on a routing device for a specific interface, all the traffic flowing
through will be compared with the ACL statement which will either block it or allow it.
The criteria for defining the ACL rules could be the source, the destination, a specific protocol,
or more information.
ACLs are common in routers or firewalls, but they can also configure them in any device that
runs in the network, from hosts, network devices, servers, etc.
The main idea of using an ACL is to provide security to your network. Without it, any traffic is
either allowed to enter or exit, making it more vulnerable to unwanted and dangerous traffic.
To improve security with an ACL you can, for example, deny specific routing updates or provide
traffic flow control.
The use of access control technologies has grown tremendously in recent years. However, they
have appeared on the market many solutions that do not meet the minimum requirements for
security, reliability and stability that these systems require.
Access control is a security technique that regulates who or what can view or use resources in a
computing environment. It is a fundamental concept in security that minimizes risk to the
business or organization.
There are two types of access control: physical and logical. Physical access control limits access
to campuses, buildings, rooms and physical IT assets. Logical access control limits connections
to computer networks, system files and data.
To secure a facility, organizations use electronic access control systems that rely on user
credentials, access card readers, auditing and reports to track employee access to restricted
business locations and proprietary areas, such as data centers. Some of these systems incorporate
access control panels to restrict entry to rooms and buildings, as well as alarms and lockdown
capabilities, to prevent unauthorized access or operations.
Access control systems perform identification authentication and authorization of users and
entities by evaluating required login credentials that can include passwords, personal
identification numbers (PINs), biometric scans, security tokens or other authentication factors.
Multifactor authentication (MFA), which requires two or more authentication factors, is often an
important part of a layered defense to protect access control systems.
Mandatory access control (MAC). This is a security model in which access rights are
regulated by a central authority based on multiple levels of security. Often used in
government and military environments, classifications are assigned to system
resources and the operating system (OS) or security kernel. It grants or denies access
to those resource objects based on the information security clearance of the user or
device. For example, Security Enhanced Linux (SELinux) is an implementation of MAC
on the Linux OS.
Role-based access control (RBAC). This is a widely used access control mechanism
that restricts access to computer resources based on individuals or groups with
defined business functions -- e.g., executive level, engineer level 1, etc. -- rather than
the identities of individual users. The role-based security model relies on a complex
structure of role assignments, role authorizations and role permissions developed
using role engineering to regulate employee access to systems. RBAC systems can be
used to enforce MAC and DAC frameworks.
The best practice of least privilege restricts access to only resources that employees
require to perform their immediate job functions.
Modern access control strategies need to be dynamic. Traditional access control strategies
are more static because most of a company's computing assets were held on premises.
Modern IT environments consist of many cloud-based and hybrid implementations,
which spreads assets out over physical locations and over a variety of unique devices. A
singular security fence that protects on-premises assets is becoming less useful because
assets are becoming more distributed.
To ensure data security, organizations must verify individuals' identities because the
assets they use are more transient and distributed. The asset itself says less about the
individual user than it used to.
The process that companies struggle with more is authorization, which is the act of giving
individuals the correct data access based on their authenticated identity. One example of
where this might fall short is if an individual leaves a job but still has access to that
company's assets. This can create security holes because the asset the individual uses for
work -- a smartphone with company software on it, for example -- is still connected to the
company's internal infrastructure but is no longer being monitored because the individual
is no longer with the company. Left unchecked, this can cause problems for an
organization.
If the ex-employee's device were to be hacked, the hacker could gain access to sensitive
company data unbeknownst to the company because the device is no longer visible to the
company in many ways but still connected to company infrastructure. The hacker may be
able to change passwords, view sensitive information or even sell employee credentials
or consumer data on the dark web for other hackers to use.
One solution to this problem is strict monitoring and reporting on who has access to
protected resources so that, when a change occurs, it can be immediately identified and
access control lists (ACLs) and permissions can be updated to reflect the change.
Another often overlooked challenge of access control is the user experience (UX) design
of access control technologies. If a particular access management technology is difficult
to use, an employee may use it incorrectly or circumvent it entirely, which creates
security holes and compliance gaps. If a reporting or monitoring application is difficult to
use, then the reports themselves may be compromised due to an employee mistake, which
then would result in a security gap because an important permissions change or security
vulnerability went unreported.
provisioning tools
identity repositories