ITA2009 Reference-Material-I
ITA2009 Reference-Material-I
Security
Triads
Integrity Availability
• Levels of impact on organization and individual
• Low
• Moderate and
• High
•
Low Moderate High
1. Cause a degradation in 1. Cause a significant 1. Cause a severe degradation
mission capability to degradation in mission in loss of mission capability.
an extent. capability to an extent. 2. Result in major damage to
2. Result in minor 2. Result in significant organizational assets.
damage to damage to organizational 3. Result in major financial
organizational assets assets. loss.
3. Result in minor 3. Result in significant 4. Result in severe (or)
financial loss financial loss. catastrophic harm to
4. Result in minor harm 4. Result in significant harm individuals involving loss of
to individuals. to individuals that does life.
not involve loss of life
(or) serious life-
threatening injuries.
• Confidentiality (Student Grade Information)
• US, Family Educational Rights and Privacy Act (FERPA)
• Low confidential, Moderately Confidential and Highly Confidential
• Integrity
• Hospital (Patient’s Allergy Stored in a Database)
• Anonymous Online Poll.
• Availability
• Online Telephone Directory Lookup Application (Low Availability
Requirement)
• There are two ways to access the information such as,
• Hard Copy
• Operator
RFC 4949 Internet Security Glossary
• Threat
• A threat is a possible danger that might exploit a vulnerability.
• Attack
• An assault on system security that derives from an intelligent threat.
• Security Attacks
• Passive Attacks
• Active Attacks
• Passive Attacks
• Attempts to learn or make use of information from the system but
does not affect system resources.
• Active Attacks
• Attempts to alter system resources (or) affect their operation.
• Passive Attacks
• It’s a kind of eaves dropping on.
• Monitoring of transmissions.
• Active Attacks
• Involves some modification of the data stream or the creation of false
alarm.
• Easier to test and verify thoroughly. • In huge design, attackers can have
many more opportunities for an
adversary to discover subtle
• Simple mechanisms tend to have weakness.
fewer exploitable flaws and requires
less maintenance.
• The more likely the mechanism, the
• Configuration management issues are more likely it is to posses exploitable
simplified, updating (or) replacing a flaws.
simple mechanism becomes a less
intensive process.
Fail – Safe Defaults
Least Privilege
• Role-based access control.
– Student
– Staff
– Vice – Chancellor
– Director
Least Common Mechanism
Encapsulation
• Specific form of isolation based on object oriented functionality.
• Modularity
• Least Astonishment
Attack Surfaces and Attack Trees
• Attack Surface
• Examples
• Open Ports
• Services available inside the firewall
• Interfaces, SQL and Web forms
• Code that processes incoming data, email, XML documents
• An employee with access to sensitive information
• Attack surfaces can be categorized as follows :
• Included in this category are network protocol vulnerabilities, used for DoS
attacks, Disruption of Communication Links and various forms of intruder attacks.
SN4 SN5
• Leaf node initiates an attack.
• Each node other than leaf node is either represented by an AND node and
OR node.
A Model for Network Security
• Techniques for providing security have two components namely :
• A security-related transformation on the information to be sent.
• Some secret information shared by the two principles that is unknown
to the opponent.
•
Four Basic Tasks in Designing a Security Service
• Specify a protocol to be used by the two principles that makes use of the
security algorithm and the secret information to achieve a particular
security service.
• Programs can present two kinds of threats :
• Information access threats : Intercept (or) modify data on behalf of
users who should not have access to that data.
• Service threats : Exploit service flaws in computers to inhibit use by
legitimate users.
•
Standards
• National Institute of Standards and Technology (NIST)
• Despite its national scope, NIST Federal Information Processing Standards (FIPS)
and Special Publications (SP) have a world wide impact.
• Cryptography :
• The number of keys used (Symmetric (or) Single key (or) conventional
encryption) , Different key (or) two-key (or) public-key encryption.
• The way in which the plain text is processed. (Block cipher (or) Stream
Cipher).
Cryptanalysis and Brute Force Attack
• Cryptanalysis
• This type of attack exploits the characteristics of the algorithm to
attempt to deduce a specific plaintext or to deduce the key being used.
• Brute Force Attack
• The attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.
Substitution Techniques
• It is the one in which the letters of plaintext are replaced by other letters
(or) by numbers (or) by symbols.
• Caesar Cipher :
• The earliest known use of a substitution cipher was introduced by
Julius Caesar.
• Involves replacing each letter of the alphabet with the letter standing
three places further down the alphabet.
• (eg) : C = E(3,P) = (P+3) mod 26, P = D(3,C) = (C-3) mod
26(Formula)
•
• 3 important characteristics enabled us to use a brute force
attack : (Drawback of Caesar Cipher)
• The encryption and decryption algorithms are known.
• There are only 25 keys to try.
• The language of the plain text is known and easily recognizable.
• Key space is very low as there exists only 26 numbers of keys to
reveal the plain text using brute force method.
• Monoalphabetic Ciphers
• Key space is larger where it has 26! (or) 4 x 10^26 possible keys.
• Difficult to attempt brute force attacks.
• Possibility - 1 : (In case of original receiver)
• Sender should reveal the key to the receiver in the process of
decryption.
• Possibility – 2 : (In case of an attacker)
• Attacker should try with the most common english words by using
frequency of letters used.