0% found this document useful (0 votes)
10 views46 pages

Lecture-2 - Overview - of - Cyber Security - (Revised)

The document provides an overview of key concepts in cyber security, including definitions of cyber space, cyber incidents, and the importance of securing information systems, applications, and networks. It discusses software security, network security, and the various phases of security engineering, highlighting the need for security to be integrated throughout the development process. Additionally, it covers the significance of communication protocols, web security, mobile application security, and the role of laws and public policy in combating cybercrime.

Uploaded by

Amina 200041155
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views46 pages

Lecture-2 - Overview - of - Cyber Security - (Revised)

The document provides an overview of key concepts in cyber security, including definitions of cyber space, cyber incidents, and the importance of securing information systems, applications, and networks. It discusses software security, network security, and the various phases of security engineering, highlighting the need for security to be integrated throughout the development process. Additionally, it covers the significance of communication protocols, web security, mobile application security, and the role of laws and public policy in combating cybercrime.

Uploaded by

Amina 200041155
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Cyber Security

Concepts
Lecture-2

Department of CSE, IUT


Cyber Security: Terminology

• Cyber Space- interconnected digital environment of networks,


services, systems, and processes

• Cyber incident- cyber event that involves a loss of information security


or impacts business operations

• Cyber-Physical Systems (CPS): are systems composed of physical


systems (hardware), software systems and potentially other types of
systems (e.g., human systems). These are closely integrated and
networked to deliver some global behaviour.
Cyber Security: Concept

3
Cyber Security: Concept

4
Cyber Security: Concept
What is Cyber Security?

Cybersecurity = security of information systems,


applications and networks in the face of
attacks, accidents and failures with the goal of
protecting operations and assets

availability, integrity and secrecy

• Protection of internet-connected systems such


as hardware, software and data from
cyberthreats
Software Security: ?

7
What is Software Security?
Software security is a kind of computer security that focuses
on the secure design and implementation of software.
• Using the best language, tools, methods

• Focus of study:
The Code
Software : Concepts
Software : Concepts
Software Security: Concepts
Making Secure Software
• Flawed approach: Design and build software, and
ignore security at first
• Add security once the functional requirements are
satisfied

• Better approach: Build security in from the start


• Incorporate security-minded thinking into all phases of
the development process
Development Process
Many development processes; four common phases:
•Requirements
•Design
•Implementation
•Testing/assurance

Where does security engineering fit in?


All phases!
Security Engineering

Phases
Security Requirements
• Requirements Abuse Cases
Architectural Risk Analysis
• Design
Security-oriented Design
• Implementation
Code Review (with tools)
• Testing/assurance Risk-based Security Tests
Penetration Testing
Note that different SD processes have
different phases and artifacts, but all
involve the basics above. We’ll keep it
simple and refer to these.
Activities
Network Security: ?

15
What is Network Security?

• Network security:
• Protection of the underlying networking infrastructure from unauthorized
access and misuse.

• The web and the use of DNS services specifically are part of 91% of all malware attacks
• Email and web together are a key part for 99% of successful breaches
Network Security:
Commonly used placeholders in Security
• Alice and Bob: Alice wants to send a message to Bob
Alice Bob

• Eve: an eavesdropper, is usually a passive attacker


• Mallory: a malicious attacker; unlike Eve, Mallory can modify messages,
substitute her own messages, replay old messages, and so on

17
Network Security: Issues
• A sends a file to B: E intercepts it and reads it
• How to send a file that looks gibberish to all but the intended receiver?
• A send a file to B: M intercepts it, modifies it, and then forwards it to B
• How to make sure that the document has been received in exactly the form it has been
sent
• M sends a file to B pretending it is from A
• How to make sure your communication partner is really who (s)he claims to be
• A sends a message to B: M is able to delay the message for a while
• How to detect old messages
• A sends a message to B. Later A (or B) denies having sent (received) the message
• How to deal with electronic contracts
• E learns which user accesses which information although the information itself remains
secure

• M prevents communication between A and B: B will reject any message from A because they
look unauthentic
18
Securing
Communication Protocol &
Communication Channel
Understanding Communication Protocols
Understanding Communication Protocols
Network Security: Overview
in Network Protocol layers

22
Securing Communication Protocols
• Transport Layer Security (TLS)
• Establishes secure, negotiated client–server session
• Transport Layer Security (TLS), the successor of the now-
deprecated Secure Sockets Layer (SSL)
• What does TLS do?
• Encryption: hides the data being transferred from third parties.
• Authentication: ensures that the parties exchanging information are
who they claim to be.
• Integrity: verifies that the data has not been forged or tampered
with.
Transport Layer Security (TLS) /SSL
Secure Negotiated Sessions Using SSL/TLS
Securing Channels of Communication

• Virtual Private Network (VPN)


• Allows remote users to securely access internal network via the Internet
• establish a protected network connection when using public networks.
• encrypt internet traffic and disguise your online identity.
• makes it more difficult for third parties to track your activities online and
steal data.
Virtual Private Network (VPN)
Protecting Networks

• Firewall
• Hardware or software
• Uses security policy to filter packets
• Two main methods:
• Packet filters
• Application gateways
• Proxy servers (proxies)
• Software servers that handle all
communications from or sent to
the Internet

• Intrusion detection systems


• Intrusion prevention systems
Firewalls and Proxy Servers
Network Attacks: ?

SEED Project (seedsecuritylabs.org) 30


Web Security: ?

31
What is Web Security?
• Process, technology or method for protecting
• Web servers, web applications, and web services against different security
threats that exploit vulnerabilities in an application’s code.
• Critical to the business continuity

The web and the use of DNS services specifically are part of 91% of all malware
attacks
Email and web together are a key part for 99% of successful breaches.
• Commonly, prime target by the threat actors
• Ease of execution
Web Attacks: ?

33
SEED Project (seedsecuritylabs.org)
Mobile Security: ?

34
What is Mobile Application Security?

• Mobile app security is the practice of safeguarding


high-value mobile applications and your digital
identity from fraudulent attack in all its forms.
Mobile Security Attack: ?

SEED Project (seedsecuritylabs.org)

36
System Security: ?

37
What is Operating System Security?
• Interface between hardware and user applications,
• OS security is critical to protecting the overall system and ensuring that applications and
users can interact with it safely.
Protecting Servers and Clients
• Operating system security enhancements
• Upgrades, patches

• Anti-virus software
• Easiest and least expensive way to prevent
threats to system integrity
• Requires daily updates
Operating System Security : ?

40
What is Application Security?
• Application security
• aims to protect Software code, Software and hardware
system, Data against cyber threats.
• introduce a secure software development life cycle to
development teams.
Application Security: Concept
Application Security: Concept

43
What is Information Security?
• Information security
• Protecting information and information systems from unauthorized use, assess,
modification or removal.
• Two sub-categories
• Physical environment by ensuring the premises is secure
• No one can access information electronically
• Concerned with making sure data in any form is kept secure and is a bit more broad
than cybersecurity
What is Hardware Security?
• protection of physical devices and the embedded systems within them from
vulnerabilities, attacks, and unauthorized access.
• various techniques to secure hardware components,
• Microprocessors
• Memory
• Sensors
• Other physical parts of electronic devices
The Role of Laws and Public Policy

• Laws that give authorities tools for identifying, tracing, prosecuting


cybercriminals:
• National Information Infrastructure Protection Act of 1996
• USA Patriot Act
• Homeland Security Act
• Private and private-public cooperation
• CERT Coordination Center
• US-CERT
• Government policies and controls on encryption software
• OECD, G7/G8, Council of Europe, Wassener Arrangement

You might also like