IP Security-Module 3
IP Security-Module 3
Module 3
IP Security
Integrity: IPSec provides integrity by ensuring that IP packets have not been
modified or corrupted during transmission.
Features
Key management: IPSec provides key management services, including key exchange and
key revocation, to ensure that cryptographic keys are securely managed.
Flexibility: IPSec can be configured to provide security for a wide range of network
topologies, including point-to-point, site-to-site, and remote access connections.
IPSec majorly operates in two ways i.e. Transport Mode and Tunnel Mode.
Working
To provide security, IPSec uses two main protocols: AH (Authentication
Header) and ESP (Encapsulating Security Payload).
Both protocols are very useful as Authentication Header verifies the data that
whether it comes from a trusted source and hasn’t been changed, and ESP
has the work of performing authentication and also encrypts the data so that
it becomes difficult to read.
For Encryption, IPSec uses cryptographic keys. It can be created and shared
using a process called IKE (Internet Key Exchange), that ensures that both
devices have the correct keys to establish a secure connection.
Steps
When two devices communicate using IPSec, the devices first initiate the
connection by sending a request to each other.
After that, they mutually decide on protection of data using passwords or
digital certificates.
Now, they establish the secure tunnel for communication. Once the tunnel is
set up, data can be transmitted safely, as IPSec is encrypting the data and also
checking the integrity of the data to ensure that data has not been altered.
After the communication is finished, the devices can close the secure
connection. In this way, the IPSec works.
Transport:
IPSec transport mode encrypts only the data packet’s payload while leaving
the IP header unchanged.
The computer encrypts all data, including the payload and header, and adds a
new header to it.
Protocols Used in IPSec
Encapsulating Security Payload (ESP)
Authentication Header (AH)
Internet Key Exchange (IKE)
Encapsulating Security Payload (ESP): It provides data integrity, encryption,
authentication, and anti-replay. It also provides authentication for payload.
For example- when you are transferring data between client and server and
you have to protect that data that security of data is your web security.
Security Threat?
A threat is nothing but a possible event that can damage and harm an
information system.
A security Threat is defined as a risk that, can potentially harm Computer
systems & organizations.
Whenever an individual or an organization creates a website, they are
vulnerable to security attacks.
Security attacks are mainly aimed at stealing altering or destroying a piece of
personal and confidential information, stealing the hard drive space, and illegally
accessing passwords.
Web Security Threats
Cross-site scripting (XSS)
SQL Injection
Phishing
Ransomware
Code Injection
Viruses and worms
Spyware
Denial of Service
Web Security Threats
Cross Site Scripting (XSS) is a vulnerability in a web application that allows a
third party to execute a script in the user’s browser on behalf of the web
application.
The exploitation of XSS against a user can lead to various consequences such
as account compromise, account deletion, privilege escalation, malware
infection and many more.
SQL Injection is a security flaw in web applications where attackers insert
harmful SQL code through user inputs.
This can allow them to access sensitive data, change database contents or
even take control of the system.
It’s important to know about SQL Injection to keep web applications secure.
Phishing is a form of online fraud in which hackers attempt to get your
private information such as passwords, credit cards, or bank account data.
This is usually done by sending false emails or messages that appear to be
from trusted sources like banks or well-known websites.
Scareware is a form of malware that is malicious software that poses as
legitimate computer security software and claims to detect a variety of threats
on the affected computer that do not actually exist. The users are then
informed that they have to purchase the scareware in order to repair their
computers and are barraged with aggressive and pop up notifications until
they supply their credit card number and pay up the desired amount for the
worthless scareware product.
Ransomware is a type of malware that is designed to block user access from
own system until a ransom fee is paid to ransomware creator. Ransomware is
a lot dangerous than a regular malware and spread through phishing emails
having infected attachments. Ransomware has emerged over the last few
years and can attack individuals or organizations.
Denial of Service (DoS) is a cyber-attack on an individual Computer or
Website with the intent to deny services to intended users. Their purpose is to
disrupt an organization’s network operations by denying access to its users.
Data Validation: Proper testing of any input supplied by the user or application.
Password
Secure Electronic Transaction,
SET is a security protocol designed to ensure the security and integrity of
electronic transactions conducted using credit cards.
SET operates as a security protocol applied to those payments.
It uses different encryption and hashing techniques to secure payments over
the internet done through credit cards.
The SET protocol was supported in development by major organizations like
Visa, Mastercard, and Microsoft which provided its Secure Transaction
Technology (STT), and Netscape which provided the technology of Secure
Socket Layer (SSL).
SET
SET protocol includes Certification Authorities for making use of standard
Digital Certificates like X.509 Certificate.
Requirements in SET
● It has to provide mutual authentication i.e., customer (or cardholder)
authentication by confirming if the customer is an intended user or
not, and merchant authentication.
● It has to keep the PI (Payment Information) and OI (Order
Information) confidential by appropriate encryptions.
● It has to be resistive against message modifications i.e., no changes
should be allowed in the content being transmitted.
● SET also needs to provide interoperability and make use of the best
security mechanisms.
Participants in SET
Cardholder – customer
Merchant
Provide Message Integrity: SET doesn’t allow message modification with the
help of signatures. Messages are protected against unauthorized modification
using RSA digital signatures with SHA-1 and some using HMAC with SHA-1,
Dual Signature: The dual signature is a concept introduced with SET, which
aims at connecting two information pieces meant for two different receivers :
Dual Signature
Email security refers to the steps where we protect the email messages and
the information that they contain from unauthorized access, and damage.
These measures ensure that data and programs are used only by authorized
users and only in a desired manner, and that they are neither modified nor
denied to authorized users.
Browsing
Trap doors
Invalid Parameters
Line Tapping
Lost Line
Waste Recovery
Rogue Software
Goal of Security System
Integrity: Users with insufficient privileges should not alter the system’s vital
files and resources, and unauthorized users should not be permitted to access
the system’s objects.
Secrecy: Only authorized users must be able to access the objects of the
system. Not everyone should have access to the system files.
Availability: No single user or process should be able to eat up all of the
system resources; instead, all authorized users must have access to them. A
situation like this could lead to service denial.
Threats to Operating System
Malware- Malicious software and refers to any software that is designed to
cause harm to computer systems, networks, or users.
It has been used to a devastating effect in mail servers and other Web
servers.
Network Security
Any action intended to safeguard the integrity and usefulness of your data
and network is known as network security.
Misfeasor: Misfeasors are insiders and they have direct access to the system,
which they aim to attack unethically for stealing data/ information.
An IDS is crucial for maintaining network security and protecting sensitive data
from cyber-attacks.
Working of Intrusion Detection System(IDS)
● An IDS (Intrusion Detection System) monitors the traffic on a computer
network to detect any suspicious activity.
● It analyzes the data flowing through the network to look for patterns and
signs of abnormal behavior.
● The IDS compares the network activity to a set of predefined rules and
patterns to identify any activity that might indicate an attack or intrusion.
● If the IDS detects something that matches one of these rules or patterns,
it sends an alert to the system administrator.
● The system administrator can then investigate the alert and take action to
prevent any damage or further intrusion.