Cybersecurity 4
Cybersecurity 4
By
Dr. Ahmed Mahfouz
AOU, Oman
Block 2: Systems security
• Part 1: An overview of systems security
1. What is a system?
2. Information systems
3. Attack vectors
4. What makes a system secure?
5. The ISO 27000 information security standards
• Part 2 Principles of cryptography: fundamentals and symmetric systems
1. Evolution of cryptography
2. Fundamentals of cryptography
3. Modern symmetric systems and standards
4. Initialization Vector
5. Substitution–permutation network
6. Applications of symmetric systems
7. Limitations of symmetric systems
8. Steganography
Learning outcomes
• Demonstrate an understanding of the theory and practice of systems
security that includes identifying associated threats, controls and
policies.
• Recognize threats, vulnerabilities and attack methods, and propose
appropriate mitigation and security controls towards the design and
implementation of secure systems and infrastructure.
• Communicate and analyze problems effectively within a computing
environment using appropriate personal and technical skills.
• Demonstrate the ability to undertake ongoing learning to keep up to
date with cyber security developments within digital systems.
Working with NetLabs
• NetLabs is an online laboratory environment that will help you
develop practical skills relating to different aspects of systems
security.
• At different points during your study of the module, you will be asked
to complete activities in NetLabs. These activities are prefixed
‘NetLabs Activity’ to differentiate them from the activities embedded
in the module materials.
1. What is a system?
2. Information systems
3. Attack vectors
• Network security and application security are also addressed separately, in ISO/IEC 27033 and 27034, respectively.
ISO/IEC 27035 addresses what happens when a security incident occurs and how to respond, with guidelines on
information security incident management and response management.
5.3 Benefits of ISO 27001 certification
• Implementing ISO 27001 helps businesses to:
• improve risk management
• provide a normalized interoperability between organizations, or groups within
organizations
• demonstrate good security practices resulting in a competitive advantage
• win business with companies in regulated sectors
• fulfil regulatory compliance (GDPR) and pre-requisites for large contracts
• establish market reputation for secure practices
• avoid financial losses and regulatory penalties arising from security breaches.
Summary
• In the first part of Block 2, you have explored what is meant by an information system and looked at how the different security
concepts you learned about in Block 1 can be applied to such systems. The Khan Kreatives example illustrated the different
elements that make up an information system and how systems security concepts apply in practice.
• You were also introduced to the NetLabs environment, which you will continue to use during the module to practice and develop
hands-on cyber security skills.
• The material covered this week also highlighted how cryptography is an important foundation of many systems security solutions.
The next three parts of this block will focus on the core principles of cryptography, its applications in different contexts and ways in
which it can be attacked.
• Block 2 will end with an exploration of operating systems security, including how authentication, authorization and accounting
capabilities are integrated into systems. In combination with the content on cryptography, this will give you a clear foundation on
which to build your understanding of network, host and application security, which will be covered in Block 3.
• The content of Block 2 is designed to provide you with well-rounded exposure to the foundational principles of systems security.
You will gain an understanding of the elements of systems security and how they come together to make a system secure.
• As you progress through the material, you will be required to access and digest different types of information relating to systems
security. The activities will further engage you by illustrating the core knowledge areas with examples, programming exercises,
short articles and industry opinions for your critical analysis and review. These should help prepare you for presenting your
arguments in your assignments as part of this module.
• Don’t forget to make use of your learning journal throughout this module. Recording your reflections, learning and discussions
with peers on the forums should help you to develop your understanding of key concepts and skills, and help you prepare for your
assessment.
Part 2 Principles of cryptography:
fundamentals and symmetric systems
1. Evolution of cryptography
2. Fundamentals of cryptography
3. Modern symmetric systems and standards
4. Initialization Vector
5. Substitution–permutation network
6. Applications of symmetric systems
7. Limitations of symmetric systems
8. Steganography
1 Evolution of cryptography
• The origins of cryptography date back to the ancient Egyptians and Romans.
• Substitution ciphers, where each character in a message is substituted by another, were prevalent during the Roman era
and evolved to include use of the Caesar cipher around 50 BC.
• Edward Hebern invented an electromechanical machine in which the encryption ‘key’ was embedded in a rotating disc
(1914).
• Arthur Scherbius, a German electrical engineer, invented the Enigma machine, which used multiple rotors (1918).
• Alan Turing was able to crack the Enigma (1940).
• Claude Shannon at AT&T provided the basis for modern cryptography with his work titled ‘The Mathematical theory of
cryptography’ (1940).
• Public key cryptography was developed in 1975, followed by a key exchange algorithm called Diffie-Hellman (DH) in 1976.
• The Data Encryption Standard (DES) protocol was formally used in banking in the USA in 1977, which also saw the
publication of the Rivest–Shamir–Adleman (RSA) algorithm.
• Code breaking and new, improved encryption standards continued apace and in 2001.
• The DES was replaced by the AES. Meanwhile, the Secure Hash Algorithm (SHA-1) was declared deprecated in 2011.
• The mathematical techniques of cryptography have also influenced cryptocurrencies such as ‘Bitcoin’.
• Quantum computing, while still in early stages of development, is seen as a major force of change in encryption
techniques.
1.1 Uses and vulnerabilities
• Cryptography is widely used in network communications including ordinary telephone,
mobile and satellite communications and, of course, on the internet itself.
• Cryptography is used in social media, cloud services, email and online streaming of video
and audio. It is also used to secure confidential data held in numerous government and
private databases.
• Cryptanalysis is used to detect vulnerabilities in established and proposed cryptographic
techniques.
• Vulnerabilities can range from something simple, such as a password that can be easily
guessed, to complex new mathematical techniques that make a previously safe method
vulnerable.
• Kerckhoff's principle is the concept that a Cryptographic system should be designed to
be secure, even if all its details, except for the key, are publicly known.
• Reverse engineering is a process in which software are deconstructed to extract design
information from them.
1.2 Principles of cryptography and the CIA
triangle, non-repudiation and authentication
1. Non-repudiation
2. Confidentiality
3. Integrity
4. Availability
• A binary vector used as the input to initialize the algorithm for the
encryption of a plaintext block sequence to increase security by
introducing additional cryptographic variance and to synchronize
cryptographic equipment. (NIST)
4.1 Random number generation
• Computers can generate numbers that appear to be random quite easily.
These numbers can be used in simulations and for some games and are
known as pseudo-random numbers.
• They usually rely on a number, called the ‘seed’, to start them and then
produce a string of numbers that eventually repeat. If the seed and the
algorithm are known, the numbers can be predicted.
• Pseudo-random number algorithms can be seeded by some environmental
input, such as the last digits of an internal clock or even a capture of some
aspect of the user’s mouse movements.
• A truly random number relies on an external random event. Hardware
random number generators generate values using random natural
phenomena such as electronic noise in circuits or the random radio noise
generated in the Earth’s upper atmosphere.
5 Substitution–permutation network
6 Applications of symmetric systems
• WPA2 (Wi-Fi)