Information Security
Information Security
Notes outlines
No#1
Topic:Security Foundation
on security has started to cover emerging topics such as
cloud
computing security, smart cities’ security and privacy,
healthcare and telemedicine,
the Internet-of-Things (IoT) security [1], the Internet-of-
Vehicles security, and several types of wireless
sensInformation security has extended to include several
research directions like user authentication and
authorization, network security, hardware security, software
security, and data cryptography. Information security has
become a crucial need for
protecting almost all information transaction applications.
Security is considered as
an important science discipline whose many multifaceted
complexities deserve the
synergy of the computer science and engineering
communities.
Recently, due to the proliferation of Information and
Communication Technologies, informatior networks security
[2,3]. In addition, information security
has extended further to cover not only technical security
problems but also social and
organizational security challenges [4,5].
Traditional systems’ development approaches were focusing
on the system’s
usability where security was left to the last stage with less
priority. However, the
new design approaches consider security-in-design process
where security is considered at the early phase of the
design process. The new designed systems should be
well protected against the available security attacks. Having
new systems such as IoT
or healthcare without enough security may lead to a leakage
of sensitive data and, in
some cases, life threatening situations.
Taking the social aspect into account, security education is a
vital need for both
practitioners and system users [6]. Users’ misbehaviour due
to a lack of security
knowledge is the weakest point in the system security chain.
The users’ misbehaviour
is considered as a security vulnerability that may be
exploited for launching security
attacks. A successful security attack such as distributed
denial-of-service attack will
impose incident recovery cost in addition to the downtime
cost.
NO#2
Topic:Security Mechanism
Deffination:A security mechanism is a process or device that
detects, prevents, or recovers from a security attack. Some
notes on security mechanisms include:
Security mechanism types
Security mechanisms can be specific to a protocol layer,
such as TCP, or they can be pervasive and not specific to a
particular protocol layer or security service
Various mechanisms are designed to recover from these
specific attacks at various protocol layers.
Security Mechanism:
Encipherment
Access Control
Notarization
Data Integrity
Authenticaion Exchange
Bit stuffing
Digital signature
Conclusion
Security methods are critical for protecting data and network infrastructure from
unauthorized access, attacks, and other threats. They protect data integrity,
secrecy, and availability, hence preserving trust in digital transactions. Organizations
can protect sensitive information and maintain secure network communication by
using techniques such as encipherment, access control, notarization, and digital
signatures.
No# 3
Symitric Cryptography
Symmetric cryptography is also known as a private-key cryptography. It is called
symmetric because, it makes use of the same key for both encryption of plain text
(sending message) and decryption of cipher text (received message).
Types:
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
IDEA (International Data Encryption Algorithm)
Blowfish (Drop-in replacement for DES or IDEA)
one key:
Symmetric encryption uses one key to encrypt and decrypt. If you encrypt a zip file
and then decrypt with the same key, you are using symmetric encryption. Symmetric
encryption is also called “secret key” encryption: the key must be kept secret from
third parties.
Asymitric Cryptography
Asymmetric cryptography is defined as a cryptographic method where each user
possesses a pair of mathematically related keys - a public key and a private key.
The public key is shared openly, while the private key is kept confidential, enabling
secure data exchange and digital signatures.
Key Components
Plaintext: This refers to the original, readable message or data that is inputted
into the encryption algorithm.
Encryption algorithm: This algorithm transforms the plaintext in various ways.
Public and private keys: A pair of keys chosen so that if one is used for
encryption, the other is used for decryption. The specific transformations
performed depend on whether the public or private key is provided as input.
Ciphertext: The encrypted, scrambled message produced as output. It can be
find using both the plaintext and the key, but uf there are different keys then it
will give different ciphertexts for the same message or plaintext.
Decryption algorithm: This algorithm takes the ciphertext and the
corresponding key and retrieves the original plaintext.
No# 4
Topic:Encryption
What is encryption?
Encryption is the method by which information is converted into secret code that
hides the information's true meaning. The science of encrypting and decrypting
information is called cryptography.
Encryption has long been used to protect sensitive information. Historically, it was
used by militaries and governments. In modern times, encryption is used to protect
data both at rest and in motion. At-rest data is the type stored on computers and
storage devices. In-motion data refers to data in transit between devices and over
networks.