Key Objectives of Network Security: Confidentiality Integrity Availability
Key Objectives of Network Security: Confidentiality Integrity Availability
ATTACK
In network security, an attack is any unauthorized attempt to access,
manipulate, disrupt, or damage a network, its data, or its resources. These
attacks can be carried out by individuals (hackers), groups (cybercriminal
organizations), or even nation-states.
1. Passive Attacks
Goal: To gather information without altering the data.
Examples:
Eavesdropping: Monitoring unencrypted network traffic.
Traffic Analysis: Analyzing traffic patterns to infer sensitive
information.
2. Active Attacks
Goal: To alter or disrupt data or system operations.
Examples:
Man-in-the-Middle (MitM): Intercepting and altering communication
between two parties.
Denial of Service (DoS): Overloading a network or system to make it
unavailable.
Security Services
Security services are the goals or functionalities that ensure network
security. They are typically defined by the ITU-T X.800 and ISO 7498-2
standards.
Security Mechanisms
Security mechanisms are the tools and techniques used to implement
security services. Think of them as the "how" behind achieving those
services.
CRYPTOGRAPHY
Cryptography is the science of securing information. It transforms data
into a form that is unreadable to unauthorized users and ensures
confidentiality, integrity, and authentication in communication.
A. Plain Text
The original, readable message or data that needs to be protected.
Example: "Hello, Alice!" is plaintext if sent as-is in an email.
Vulnerability: If intercepted in plain form, it can be read by anyone.
B. Encryption
The process of converting plaintext into ciphertext using a
cryptographic algorithm and a key.
Purpose: To protect data from unauthorized access.
Types of Encryption
a) Symmetric Encryption
Symmetric encryption is a type of cryptography where the same
key is used for both encryption and decryption.
Both sender and receiver must share the same secret key.
Faster and more efficient for large data volumes.
Requires secure key distribution (major challenge).
• Common Algorithms:
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
3DES (Triple DES)
b) Asymmetric Encryption
Asymmetric encryption uses two different but mathematically
related keys: a public key and a private key.
The public key is used to encrypt data.
The private key is used to decrypt it.
Solves the key distribution problem in symmetric encryption.
Slower than symmetric encryption.
• Common Algorithms:
RSA (Rivest–Shamir–Adleman)
ECC (Elliptic Curve Cryptography)
C. Key
A value used by a cryptographic algorithm to perform encryption
and decryption.
Importance: Security depends on the key, not the algorithm.
Types of Keys
• Symmetric Key
Uses one single key for both encryption and decryption.
Same key is shared between sender and receiver.
• Asymmetric Key
Uses a pair of keys: one public key for encryption and one private
key for decryption.
Different keys for sender and receiver.
D. Cipher Text
The encrypted form of plaintext. It is unreadable without the correct
key.
Example: "Zk4@#R2!" is ciphertext for "Hello" after encryption.
Use: Sent over networks to prevent data leaks.
E. Decryption
The process of converting ciphertext back to plaintext using a key.
Purpose: To retrieve the original message.
Note: Decryption is the reverse of encryption.
F. Cryptanalysis
The art/science of breaking cryptographic systems.
Helps improve cryptographic systems by identifying weaknesses.
Goal: To decrypt information without knowing the key.
Techniques:
Brute-force attack
Frequency analysis
Chosen plaintext/ciphertext attack
H. Digital Signatures
A cryptographic technique used to verify the authenticity and
integrity of a message.
How It Works:
1. The sender generates a hash of the message.
2. Encrypts the hash using their private key.
3. Sends the original message + digital signature.
4. Receiver uses sender’s public key to verify the signature.
Uses:
Proves the message was sent by the claimed sender.
Detects any alteration of the message.
I. Authentication
The process of verifying the identity of a user or device.
In Cryptography:
Ensures the message comes from a trusted source.
Often uses digital certificates, passwords, or biometric data.
Techniques:
Password-based
Two-Factor Authentication (2FA)
Public Key Infrastructure (PKI)
Authentication Applications in
Network Security
Authentication applications ensure that the identity of users, systems, or
entities is verified before granting access to resources. Below are key
authentication mechanisms used in secure communication.
a. Kerberos
Kerberos is a network authentication protocol designed to provide
strong authentication for client-server applications using secret-key
cryptography.
Key Features
Uses symmetric encryption (usually AES or DES).
Based on trusted third-party authentication.
Eliminates the need to send passwords over the network.
Protects against replay attacks using timestamps and session keys.
Components:
Client: Requests services.
Server: Offers services.
Key Distribution Center (KDC): Consists of:
Authentication Server (AS): Authenticates users and issues Ticket
Granting Tickets (TGT).
Ticket Granting Server (TGS): Issues service tickets.
How it works:
1. Login: The client sends a request to AS.
2. AS Response: Returns TGT encrypted with the user’s key.
3. Service Request: Client uses TGT to request a service ticket
from TGS.
4. Access: The client uses the service ticket to access the desired
server.
Advantages:
Centralized authentication.
Single Sign-On (SSO).
No transmission of plain-text passwords.
Limitations:
Requires synchronized clocks.
Single point of failure (KDC).
Certificate Structure:
Version
Serial Number
Signature Algorithm
Issuer
Validity Period (Not Before – Not After)
Subject
Subject Public Key Info
Issuer Signature
Authentication Process:
1. Client receives the server’s certificate.
2. Verifies certificate using CA’s public key.
3. Extracts the public key to encrypt a session key or validate
signatures.
Advantages:
Based on public key cryptography.
Trust can be established hierarchically (chain of trust).
Widely used in SSL/TLS, email, VPNs.
Limitations:
Requires robust CA infrastructure.
Certificate revocation and management overhead.
Usage:
Centralized user authentication and authorization.
Integrates with services like Active Directory, OpenLDAP.
Key Features:
Hierarchical structure (tree-like).
Stores credentials, certificates, roles, groups.
Supports binding for authentication:
Simple Bind: Username and password.
SASL Bind: Supports Kerberos or external authentication
mechanisms.
Authentication Process:
1. Client connects and binds to the directory.
2. Credentials are validated against stored information.
3. Access is granted based on identity and group memberships.
Advantages:
Centralized user management.
Scalable and efficient for large organizations.
Supports multiple authentication methods.
Limitations:
Simple bind can expose passwords if not encrypted.
May require additional services for security (e.g., TLS/SSL for LDAP).
Key Features:
Combines symmetric and asymmetric encryption.
Uses a web of trust instead of a CA.
Encrypts both the message and digital signature.
How it works:
1. Message is compressed.
2. A session key is generated (symmetric).
3. The message is encrypted using the session key.
4. The session key is encrypted using the recipient’s public key.
5. Digital signature is created using sender’s private key.
Authentication:
Recipients verify the sender’s identity using the sender’s public key.
Trust is based on manual key verification and trust relationships.
Advantages:
High level of security.
Provides confidentiality, integrity, and authenticity.
No need for centralized authority.
Limitations:
Complex key management.
Web of trust is less scalable than PKI.
Key Features:
Uses X.509 certificates for identity verification.
Provides confidentiality, message integrity, and non-repudiation.
How it works:
1. Sender signs the email using their private key.
2. Encrypts the message with a symmetric key.
3. The symmetric key is encrypted using the recipient’s public key.
4. Recipient decrypts the symmetric key using their private key, then
decrypts the message.
Authentication:
Uses digital signatures to verify sender’s identity.
Verifies signature using the sender’s public certificate.
Advantages:
End-to-end email security.
Based on standard X.509 certificates and PKI.
Transparent to users (if client supports it).
Limitations:
Requires a trusted CA infrastructure.
Certificate management can be complex.
IP Security Architecture
IPSec is a framework of open standards for ensuring private, secure
communications over IP networks, using cryptographic security services.
It’s defined by a series of protocols developed by the Internet Engineering
Task Force (IETF).
IPSec operates at the Network Layer (Layer 3), unlike SSL/TLS which
operates at the Application Layer.
Purpose:
Provides connectionless integrity, data origin authentication, and
optional anti-replay protection for IP packets.
How AH Works:
It adds a new header (AH) to the IP packet.
AH protects most parts of the IP packet, including the IP header
fields that don’t change in transit.
Format of AH:
Next Header: Specifies the protocol (e.g., TCP, UDP) of the payload.
Payload Length: Length of AH.
Security Parameters Index (SPI): Identifies the security association.
Sequence Number: Provides anti-replay protection.
Authentication Data: Integrity check value (e.g., HMAC).
➢ Encapsulating Security Payload (ESP)
Encapsulating Security Payload (ESP) is the second major protocol
used in IPSec.
Purpose:
Provides Confidentiality (via encryption) ,Integrity, Authentication,
and Anti-replay protection.
Format of ESP:
SPI
Sequence Number
Payload Data (Encrypted)
Padding
Authentication Data (Optional)
Each SA includes:
Encryption algorithm and key
Authentication method and key
SPI (Security Parameter Index)
Lifetime of the key
Mode (Transport or Tunnel)
Combining SAs:
When both authentication and encryption are needed, multiple SAs
may be used together.
Methods:
1. Transport adjacency – Applying AH and ESP in succession to the
same IP packet.
2. Iterated tunneling – Multiple tunnel SAs are used (packet
encapsulated multiple times).
3. Bundle – Applying both AH and ESP together in a predefined
order.
➢ Key Management
IPSec requires secure key exchange mechanisms to function properly.
Keys must be agreed upon without being intercepted.
WEB SECURITY
SSL Architecture
SSL sits between the Application Layer (e.g., HTTP) and the
Transport Layer (e.g., TCP).
Features of SSL:
Authentication using certificates (typically server-side).
Data confidentiality through symmetric encryption (e.g., AES, 3DES).
Data integrity using MAC (Message Authentication Code).
Session keys negotiated using public-key cryptography (RSA, DH).
SSL Handshake Process:
1. Client Hello: Client sends supported SSL versions, cipher suites,
and a random value.
2. Server Hello: Server responds with chosen cipher suite, certificate,
and its random value.
3. Key Exchange: Client and server use public-key cryptography to
exchange a session key.
4. Session Established: Both sides use the session key for encrypted
communication.
TLS Versions:
TLS 1.0 – Deprecated.
TLS 1.1 – Deprecated.
TLS 1.2 – Widely used.
TLS 1.3 – Latest, faster and more secure (removes obsolete
algorithms).
TLS Handshake Process (TLS 1.3 – simplified):
1. Client sends ClientHello with supported algorithms.
2. Server responds with ServerHello, key, and certificate.
3. Client and server derive the same session key.
4. Both confirm the handshake and begin encrypted communication.
Advantages of TLS:
End-to-end encryption.
Server and optional client authentication.
Used in HTTPS, email (SMTP/IMAP/POP over TLS), VoIP, etc.
SET Architecture:
Involves four parties:
Cardholder (Customer)
Merchant
Payment Gateway
Certificate Authority (CA)
NETWORK SECURITY
MANAGEMENT
SNMP Components
1. Managed Devices: Network nodes with SNMP agents.
2. Agents: Software that resides on managed devices and
collects/manage data.
3. Network Management Station (NMS): Central system that
communicates with agents to manage the network.
SNMP Architecture
Communication Model:
SNMP operates over UDP (port 161 for queries, 162 for traps).
The manager (NMS) sends requests (GET, SET) to the agent.
The agent replies with responses, or sends traps (unsolicited alerts)
to the manager.
Features:
Simple and lightweight
Operates using a community string for access control
Common operations:
GET: Retrieve value of an object
SET: Modify object
GET-NEXT: Get next OID
TRAP: Send alert to manager
Security in SNMPv1:
Very weak: Uses clear-text community strings as "passwords"
Example: public (read-only), private (read-write)
No encryption or authentication
Vulnerable to:
Packet sniffing
Spoofing
Unauthorized access
SNMPv1 is not secure and is considered obsolete for modern
networks.
SNMPv3 Architecture:
SNMPv3 introduces a modular architecture with three main
components:
1. User-based Security Model (USM):
Provides authentication, encryption, and privacy
2. View-based Access Control Model (VACM):
Fine-grained access control to MIB objects
3. Security Subsystem:
Manages keys, users, and access rights
SYSTEM SECURITY
System Security – Overview
System Security encompasses all the methods and tools used to protect
computers, networks, and information systems from unauthorized access,
cyber threats, and operational failures. It involves policies, technologies,
and practices designed to detect, prevent, and recover from security
breaches.
1. Intruders
An intruder is an individual or software that attempts to gain
unauthorized access to a system. The goal may be to steal data,
disrupt services, or compromise system integrity.
Types of Intruders:
• Masqueraders:
External attackers who don’t have authorized access.
Gain access using stolen credentials, brute force attacks, or
phishing scams.
• Misfeasors:
Internal users who have legitimate access but misuse it.
For example, an employee accessing customer data without
permission.
• Clandestine Users:
Usually gain root or administrative privileges.
Try to hide their actions from logging or monitoring systems.
May install rootkits or backdoors for long-term access.
Intruder Motivations:
Financial gain (e.g., ransomware, data theft)
Espionage (corporate or state-sponsored)
Political/ideological reasons (hacktivism)
Revenge or sabotage (disgruntled insiders)
Curiosity or challenge (often in the case of script kiddies)
• Virus
Needs a host file to replicate.
Often spreads via email attachments, USB drives, or pirated
software.
• Worm
Standalone malware.
Exploits network vulnerabilities to spread autonomously (e.g.,
WannaCry).
• Trojan Horse:
Appears legitimate (e.g., fake antivirus or games).
Often used to open backdoors into systems.
• Ransomware:
Encrypts files and demands payment in cryptocurrencies.
Common in healthcare, education, and government sectors.
• Rootkits:
Hide their presence and that of other malware.
Modify system components like kernel modules or bootloaders.
Intrusion Detection/Prevention:
Snort: Open-source IDS with rule-based detection.
Suricata: Advanced multi-threaded IDS/IPS.
Zeek (formerly Bro): Network monitoring and analysis platform.
Firewalls:
pfSense: Open-source firewall and router software.
Cisco ASA and FortiGate: Enterprise-grade firewalls.
Cloud firewalls: AWS Security Groups, Azure NSGs.
Tools:
Ansible – Simple automation using YAML playbooks.
Puppet – Uses a declarative language to enforce states.
Chef – Manages configurations using Ruby.
SaltStack – Suitable for real-time configuration management.
INDEX
S.no. TOPICS
1 Introduction to Computer Network Security
1.1 Attacks
1.2 Security Services
1.3 Security Mechanisms
2 Cryptography
2.1 Plain Text and Cipher Text
2.2 Encryption and Decryption
2.3 Cryptographic Keys
2.4 Cryptanalysis
2.5 Public key Encryption
2.6 Digital Signatures
2.7 Authentication in Cryptography
3 Network Security
3.1 Authentication Applications
3.1.1 Kerberos
3.1.2 X.509 Authentication Service
3.1.3 Directory Authentication Service
3.2 Email Security
3.2.1 Pretty Good Privacy (PGP)
3.2.2 Secure/Multipurpose Internet Mail Extensions
4 IP Security Architecture
4.1 Overview of IP Security
4.2 Authentication Header (AH)
4.3 Encapsulating Security Payload (ESP)
4.4 Combining Security Associations
4.5 Key Management in IPSec
5 Web Security
5.1 Web Security Requirements
5.2 Secure Socket Layer (SSL)
5.3 Transport Layer Security (TLS)
5.4 Secure Electronic Transactions (SET)
6 Network Management Security
6.1 Overview of SNMP Architecture
6.2 SNMPv1 Communication Facility
6.3 SNMPv3 Security Enhancements
7 System Security
7.1 Intruders and Attack Methods
7.2 Viruses and Related Threats
7.3 Firewalls Design Principles
Examples Using Available Software Platforms /
7.4
Case Tools
7.5 Configuration Management in System Security
A PROJECT REPORT ON
“COMPUTER NETWORK SECURITY”
Submitted to Maa Shakumbhari University , Saharanpur
Submitted To Submitted By
Prof. ………………… Name – Abhay Sharma
………………………… Course – BCA 6th Semester
Doon College of Education RollNo - 222801410002
Saharanpur
Department of Education
DOON COLLAGE OFEDUCATION, SAHARANPUR (U.P.)
Certificate
This is to certify that the project entitled “Computer Network Security “ is
the Bona fide record project report work done by Abhay Sharma under the
guidance of Prof. …………….. and during the year 2024 – 2025 submitted to
Doon College of Education , Saharanpur affiliated to Maa Shakumbhari
University in the partial fulfilment for the award of the Degree of Bachelor
Of Computer Application.
Acknowledgement
I would like to express my special thanks to my parents for giving me this
opportunity to study in the college. I would also like to thanks my elder
brother for her support.
I, Abhay Sharma , hereby declare that the presented in this project report
titled "Computer Network Security" is an original and independent work
carried out by me under the guidance of Prof. ………………….. at DOON
COLLAGE OF EDUCATION, SAHARANPUR.
I confirm that the project report is based on a thorough study and analysis
of various number systems and their applications. The content of this
report, including data, findings, and conclusions, is the result of my
project efforts and is not copied from any other sources. All sources of
information and references used in this study have been duly cited and
acknowledged. I also declare that this project report has not been
submitted, either in full or in part, for any other degree or diploma at this
or any other institution.