Security
Security
Security
6.1. Security Goals
Measures to prevent a person from illegally using resources in a computer system, or interfering with
them in any manner. These measures ensure that data and programs are used only by authorized users
and only in a desired manner, and that they are neither modified nor denied to authorized users.
Security measures deal with threats to resources that come from outside a computer system, while
protection measures deal with internal threats. Passwords are the principal security tool.
1. Active Attacks
An active assault tries to change system resources or interfere with their functionality. Active attacks
entail some form of data stream manipulation or false statement generation. Active attacks can take the
following forms:
Masquerade
When one entity impersonates another, it commits a masquerade attack. One of the other active attack
types is included in a masquerade attack. An authorisation process can become extremely vulnerable to
a disguised attack if it isn’t always completely safeguarded. Masquerade attacks can be carried out via
stolen logins and passwords, by spotting holes in programmes, or by figuring out a way to get around
the authentication procedure.
Repudiation
This attack happens when the login control gets tampered with or the network is not totally secure.
With this attack, the author’s information can be altered by malicious user actions in order to save fake
data in log files, up to the broad alteration of data on behalf of others, comparable to the spoofing of
email messages.
Replay
When the network is not completely secure or the login control is tampered with, an attack occurs.
With this attack, the information of the author can be changed by malicious user actions to save
suspicious data in log files, up to the widespread alteration of data on behalf of others, similar to the
spoofing of email messages.
Denial of Service
Denial of service hinders the regular use of communication infrastructure. There may be a specified
target for this attack. An entity might, for instance, suppress all messages sent to a specific location.
Another example of service denial is when an entire network is disrupted, either by network
disablement or message overload that lowers performance.
2. Passive Attacks
A passive attack does not eat up system resources and instead makes an effort to gather or use
information from the system. Attacks that are passive in nature spy on or keep track of transmission.
Traffic Analysis
Imagine that we had a method of hiding (encrypting) data, preventing the attacker from extracting any
data from the communication even if it was intercepted.
The adversary was able to ascertain the communication host’s location and identity as well as its
frequency and message length. It could be possible to infer the nature of the message from this
information.
SIP traffic encryption is the most practical defence against traffic analysis. An attacker would need
access to the SIP proxy or call log in order to find out who made the call to accomplish this.
6.4. Cryptography Basics
Cryptography is a technique of securing information and communications through the use of codes so
that only those persons for whom the information is intended can understand and process it. Thus,
preventing unauthorized access to information. The prefix “crypt” means “hidden” and the suffix
“graphy” means “writing”.
In Cryptography, the techniques that are used to protect information are obtained from mathematical
concepts and a set of rule-based calculations known as algorithms to convert messages in ways that
make it hard to decode them. These algorithms are used for cryptographic key generation, digital
signing, and verification to protect data privacy, web browsing on the internet and to protect
confidential transactions such as credit card and debit card transactions.
Features Of Cryptography
Confidentiality: Information can only be accessed by the person for whom it is intended and no other
person except him can access it.
Integrity: Information cannot be modified in storage or transition between sender and intended
receiver without any addition to information being detected.
Non-repudiation: The creator/sender of information cannot deny his intention to send information at a
later stage.
Authentication: The identities of the sender and receiver are confirmed. As well destination/origin of
the information is confirmed.