0% found this document useful (0 votes)
23 views

Lecture 2 Applied Cryptography

The document is an outline for a course on Honours in Cyber Security & Forensics. It discusses the objectives of covering security needs, threats, goals, and cryptography. It will cover topics like symmetric and asymmetric cryptography, message authentication, digital signatures, and advances in cryptography. It also discusses vulnerabilities, threats, security services, attacks, and methods of defense like encryption, hardware/software controls, policies and procedures.

Uploaded by

Bro nio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Lecture 2 Applied Cryptography

The document is an outline for a course on Honours in Cyber Security & Forensics. It discusses the objectives of covering security needs, threats, goals, and cryptography. It will cover topics like symmetric and asymmetric cryptography, message authentication, digital signatures, and advances in cryptography. It also discusses vulnerabilities, threats, security services, attacks, and methods of defense like encryption, hardware/software controls, policies and procedures.

Uploaded by

Bro nio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

Honours in Cyber Security & Forensics

Applied Cryptography

Ms. Swati Mali


B-215
[email protected]
Assistant Professor, Department of Computer Engineering
K. J. Somaiya College of Engineering
Somaiya Vidyavihar University

09/02/2023 1
09/02/2023 2
What is this course about?

• Objectives
o Security needs / threats
o Security Goals
o Cryptography

09/02/2023 3
What we will cover?

• –Vulnerabilities, threats, security Goals, and methods


of defense
• –Cryptography
• –Symmetric
• –Asymmetric
• –Message authentication and digital signature
• –Advances in Cryptography

09/02/2023 4
Vulnerability, Threat and Control

• A vulnerability is a weakness in the security system,


in procedure, design, or implementation that might be
exploited to cause loss or harm
• A threat to a computer system is a set of
circumstances that has the potential to cause loss or
harm
• Control is an action, device, procedure, or technique
that removes or reduces a vulnerability
• A threat is blocked by control of a vulnerability

09/02/2023 5
Threats, Controls, and Vulnerabilities

09/02/2023 6
Attacks, Services and Mechanisms

• Security Attack: Any action that compromises the


security of information.
• Security Mechanism: A mechanism that is designed to
detect, prevent, or recover from a security attack.
• Security Service: A service that enhances the security
of data processing systems and information transfers.
A security service makes use of one or more security
mechanisms.

09/02/2023 7
Books

09/02/2023 8
Relationship Between Confidentiality,
Integrity, and Availability

09/02/2023 9
Confidentiality

• It ensures that computer-related assets are accessed


only by authorized parties
• Access means reading, viewing, printing, or simply
knowing that a particular asset exists
• It is sometimes also called secrecy or privacy

09/02/2023 10
Integrity

• It means that assets can be modified only by


authorized parties only in authorized ways.
• The integrity of an item is preserved if it is:
o Precise, accurate, unmodified, modified only in acceptable
ways, modified by authorized people, modified by
authorized processes, consistent, meaningful and usable.

09/02/2023 11
Availability

• It applies to both data and data processing


• A data item, service or system is available if
o There is a timely response to our request
o Fair to all i.e. some requesters are not favored over others
o Fault tolerant
o There is controlled concurrency, deadlock management,
and exclusive access as required

09/02/2023 12
Security Attacks

09/02/2023 13
09/02/2023 14
Security Attacks

• Interruption: This is an attack on availability


• Interception: This is an attack on confidentiality
• Modification: This is an attack on integrity
• Fabrication: This is an attack on authenticity

09/02/2023 15
09/02/2023 16
Method, Opportunity and Motive

• Method : the skills, knowledge, tools and other things


with which to be able to pull off the attack
• Opportunity : the time and access to accomplish the
attack
• Motive : a reason to want to perform this attack
against this system
DENY ANY OF THESE THREE THINGS AND
ATTACKS WILL NOT OCCUR

09/02/2023 17
Attacks

• Cryptanalytic Attacks
o Exploit mathematical weakness of cryptographic algorithm
• Non-cryptanalytic Attacks
o Threats to goal of security

09/02/2023 18
09/02/2023 19
Security Services

• Confidentiality (privacy)
• Authentication (who created or sent the data)
• Integrity (has not been altered)
• Non-repudiation (the order is final)
• Access control (prevent misuse of resources)
• Availability (permanence, non-erasure)
o Denial of Service Attacks
o Virus that deletes files

09/02/2023 20
09/02/2023 21
09/02/2023 22
Vulnerabilities

• Hardware vulnerabilities
• Software vulnerabilities
o Software deletion
o Software modification
− Viruses etc.
o Software theft
• Unauthorized copying etc.
• Data vulnerabilities

09/02/2023 23
Data Security

09/02/2023 24
Computing system vulnerabilities

09/02/2023 25
Computer Criminals

• Amateurs
o Personal works
• Crackers
o Trying to access computing facilities for which they are not
authorized
o The perception that nobody is hurt or even endangered by a
little stolen machine time
o Others attack for curiosity, personal gain, or self-
satisfaction
• Career Criminals

09/02/2023 26
Methods of Defense

• Prevent it, by blocking the attack or closing the


vulnerability
• Deter it, by making attack harder if not impossible
• Deflect it, by making another target more attractive
• Mitigate it, by making its impact less severe
• Detect it, either as it happens or some time after the
fact
• Recover from its effects

09/02/2023 27
09/02/2023 28
Methods of Defense

• Controls
o Encryption
o Hardware Controls
− Hardware/smart card implementations of encryption
− Locks or cables limiting access
− Devices to verify users’ identity
− Firewalls
− Intrusion detection systems
o Software Controls
− Internal program controls,
− OS and Network system controls
− Independent control program (anti virus, passwords etc.)
− Development control
o Policies and Procedures
o Physical Controls

09/02/2023 29
Effectiveness of Controls

• Awareness of Problem
o Highlighting Need of security
• Likelihood of Use
o They must be efficient, easy to use, and appropriate
• Overlapping Controls
o Use several different controls, layered defense
• Periodic reviews
o Judging the effectiveness of control is an ongoing task

09/02/2023 30
Others Exposed Assets

• Networks
o Network’s lack of physical proximity
o Use of insecure, shared media
o Inability to identify remote users positively
• Access
o Computer time
o Malicious access
o Denial of service to legitimate user
• Key People

09/02/2023 31
09/02/2023 32
What’s Next?

• Encryption overview
• Cryptography in detail

09/02/2023 33
Questions?

09/02/2023 34

You might also like