0% found this document useful (0 votes)
3 views9 pages

Is Overview

The document provides an overview of information security, focusing on network security, its objectives, essential requirements, challenges, and mechanisms. It distinguishes between threats and attacks, detailing various types of attacks and encryption methods. Additionally, it explains the difference between security services and mechanisms, emphasizing their roles in protecting network resources.

Uploaded by

maown7742
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views9 pages

Is Overview

The document provides an overview of information security, focusing on network security, its objectives, essential requirements, challenges, and mechanisms. It distinguishes between threats and attacks, detailing various types of attacks and encryption methods. Additionally, it explains the difference between security services and mechanisms, emphasizing their roles in protecting network resources.

Uploaded by

maown7742
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Information Security – Mid Term Overview

Information Security:
The tools and processes that organizations use to protect the information.

This includes policy settings that prevent unauthorized people from accessing business and personal
information.

Network Security:
Network security refers to any technologies, policies, people, and procedures that defend any
communication infrastructure from cyberattacks, unauthorized access and data loss.

 Protect network infrastructure


 Data
 Devices

1- Network Security Objectives


 Confidentiality, (Preserving authorized restrictions on information access and disclosure)
 Integrity (guarding against improper information modification or destruction) and
 Availability (the ability to make information and related resources accessible as needed,
when they are needed, where they are needed) also known as (CIA)
 Authentication (the process that companies use to confirm that only the right people,
services, and apps with the right permissions can get organizational resources)
 Authorization (a process by which a server determines if the client has permission to
use a resource or access a file)

2- Essential Security Requirements


 Accountability:
An organization must first work to prevent, that is, to do everything reasonably
possible to lower the risk of allowing a cybersecurity incident to occur.
 Authenticity:
Validates the source or origin of data and other file transfers through proof of identity.
(Data should be Authentic)

3- Network security challenges


 Increased Use of AI and Machine Learning in Cybersecurity
 Ignoring Potential Attacks while updating the system

4- Security mechanisms
A mechanism that is designed to detect, prevent or recover from a security attack.

Using algorithms and protocols to secure the data to prevent further attacks.
5- Network Security Model
The structured defensive mechanisms and protocols implemented to protect the integrity,
confidentiality and availability of data transmitted between devices over an interconnected
system of networks.

6- Network Security Access Model


The network security model is the structure and layers of defense used to protect network and
data confidentiality, integrity and availability.

Defender baba is important in network security access model.


Threats and Attacks
A threat is a potential security risk that could take advantage of a system or asset’s weakness.

An attack is a deliberate unauthorized action on a system or asset.

Key Aspects Threats (khatra) Attacks (Hamla)


Definition A threat is malicious act, that An attack is an intentional act
has the potential to damage the that causes damage to a system
system or asset or asset.
Purpose / objective Circumstances that can cause The objective is to cause
damage. damage.
Effects Information may or may not be The chance for information
altered or damaged. alteration and damage is very
high.
Detection The threat is comparatively hard Comparatively easy to detect.
to detect.
Initiation Can be initiated by the system An attack is always initiated by
itself as well as by outsiders. an outsider (system or user).
Control Can be blocked by control of Cannot be blocked by just
vulnerabilities. (weaknesses) controlling the vulnerabilities.
Classifications Can be classified into These can be classified into
Physical, Viruses, Spyware, Phishing,
internal, Worms, Spam, etc.
external,
human, and
non-physical threats.

Types of Attacks

Passive Active
Attack Aim to extract sensitive
Attack
Aim to manipulate system
information from a system
resources or impact their
without affecting its
operation.
resources.

active attacks include denial-


of-service (DoS) attacks,
Example: Traffic analysis,
malware infections, and
and monitoring network
phishing attacks, which
traffic to obtain sensitive
involve actively
information.
manipulating or modifying
data or systems.
An attack is a deliberate unauthorized action on a system or asset. Attacks can be classified as active and
passive attacks. An attack will have a motive and will follow a method when the opportunity arises.

Brute force attack: A brute force attack is a hacking method that uses trial and error to crack passwords,
login credentials, and encryption keys.

Example: Taking advantage of weak passwords and users implementing the same password across other
accounts

Network Security Services:


Network security services use advanced algorithms to detect potential threats and alert network
administrators about suspicious activities.

This includes

 Monitoring network traffic for malicious activity,


 Identifying unauthorized access attempts, and
 Analyzing data logs for abnormalities that may suggest an attack.

Example:

 Firewalls
 Access Control
 VPN
 Data loss Prevention
 Email Security
 Data encryption
 Wireless security

Basic Terms used in Network Security:


 Plain text: Any readable data in a form that can be seen or utilized without the need for a
decryption key or decryption device
 Cipher text: Ciphertext is encrypted text transformed from plaintext using an encryption
algorithm. Ciphertext can't be read
 Key: A network security key is a form of a physical, digital, signature, or biometric data used to
authorize a user to connect with the private network.
 Encipher/ Encryption: Converts information into an unreadable format. Encryption allows
information owners to keep data confidential and secure.
 Decipher/ Decryption: Convert enciphered text to plain text by means of a cryptographic
system.
 Cryptography: A technique of securing communication by converting plain text into ciphertext.
 Cryptanalysis: The study of the cryptographic algorithm and the breaking of the secret codes.
 Cryptology: Cryptology is the study of both cryptography (conversion of data from plain text to
cipher text) and cryptanalysis (the determination of how to access the data without the
necessary cryptographic key).

Symmetric Encryption and Asymmetric Encryption

Key Aspects Symmetric Encryption Asymmetric Encryption


Key used Single key is used for both One key is used to encrypt the
encryption and decryption data other private key used to
decrypt the data.
Security Less Secure More Secure
Key distribution Both sender and receiver must Sender must have the public key
have public/single while the receiver have the
key/Conventional key/ private key that is highly
symmetric key secured key.
Size of cipher text Same or smaller compared to Same or larger compared to
plain text plain text
Encryption Process Fast Relatively Slow
Usage In transferring large amount of Used for smaller data transfer
data
Mathematical representation P = D (K, E (K, P)) P = D (Kd, E (Ke, P))
where K –> encryption and where Ke –> encryption key
decryption key Kd –> decryption key
P –> plain text D –> Decryption
D –> Decryption E (Ke, P) –> Encryption of plain
E (K, P) –> Encryption of plain text using encryption key Ke. P –
text using K > plain text

Methods of mapping:
 One to many
 Many to many
 One to one
Classical Cipher Methods
1- Substitution method:
Substitute the alphabet by skipping 2 letters and writing 3rd letter as cipher letter.

A B C D E F G H I J K L

M N O P Q R S T U V W X

Y Z

Message: A Quick brown fox jumps over a lazy dog.

Encryption: D TXLFN EURZQ IRA MXPSV RYHU D ODCB GRJ

2- Ceaser Cipher
The Caesar Cipher is one of the simplest and oldest methods of encrypting messages, named
after Julius Caesar, who reportedly used it to protect his military communications.

This technique involves shifting the letters of the alphabet by a fixed number of places.

Message: A Quick brown fox jumps over a lazy dog.

Encryption: X NRFZH YOLTK CLU GRJMP LSBO X IXWY ALD.

Disadvantages:

 Too simple and easy to decrypt by an unauthorized user.


 Provides a minimum layer of security
 The pattern of letters provides a clue to the hacker about the possible cipher shift.

3- Playfair Cipher
 The first practical digraph substitution cipher.
 The scheme was invented in 1854 by Charles Wheatstone but was named after Lord
Playfair who promoted the use of the cipher.
 we encrypt a pair of alphabets(digraphs) instead of a single alphabet.

a) The Playfair cipher encryption algorithm steps:


1) Generate the key square (5 x 5)
2) Use a keywork (e.g. Monarchy)
3) Write remaining alphabets in order not to repeat a single letter
4) Write I and J in the same block.

M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
b) Encryption Rules:
1. Make pair/diagram of each letter.
2. For Repeating or single letters use fillers (in this case we use x)
3. Same Column
a. Write immediate |↓| alphabet
b. wrap around (if line is finished)
4. Same Row
a. Write immediate |→| alphabet
b. wrap around (if line is finished)
5. Different Column and Row
a. Create a rectangle around both letters
b. Swap |↔| with the last value of column or row.

c) Example:
Message: A quick brown fox jumps over a lazy dog.

Step 1: Make pairs

Aq ui ck br ow nf ox ju mp so ve ra la zy do g

Step 2: Use fillers

Aq ui ck br ow nf ox ju mp so ve ra la zy do gx

Step 3 Encrypt according to rules:

Diagrams (Pairs) Encryption


AQ NS (rule 5)
UI XE (rule 5)
CK DE (rule 5)
BR DA (rule 5)
OW VN (rule 5)
NF OG (rule 5)
OX VA (rule 5)
JU EX (rule 5)
MP OL (rule 5)
SO PA (rule 5)
VE UF (rule 5)
RA MR (rule 4)
LA SM (rule 5)
ZY WD (rule 5)
DO HR (rule 5)
GX IW (rule 5)

Encrypted message: N SXEDE DAVNO GVA EXOLP AUFM R SMWD HRIW

d) Advantages:
 Brute force attacks do not affect it.
 Cryptanalysis is not possible (decode a cipher without knowing the key)

e) Disadvantages:
o The original Playfair comprises of 5*5 grid in which 25 letters can be placed that to of
uppercase so it cannot encrypt lowercase letters, whitespaces, different printable
characters.
o Moreover one letter will be discarded due to 25 squares.

Q: Difference between Security services and mechanisms:

Network Security Services → Implemented by → Network Security Mechanisms.

Key Security Services Security mechanisms


Aspects
Definition The set of functions that ensures the Specific techniques or technologies
confidentiality, integrity and availability of used to implement network security
network resources. services.
Example  Authentication  SSL/TLS (Security Sockets
 Authorization Layer/Transport Layer Security)
 Encryption  IPsec (IP security)
 Firewalls  AES (Advanced Encryption
 Secure Emails Standard)
 Digital Signatures
Focus Services focus on what needs to be secured. Mechanisms focus on how security is
implemented.
Scope Broad Specific
Diagram

Baki videos dekh lo… thk gi hon myn!

You might also like