1 - Module 1-InformationSecurity 2023
1 - Module 1-InformationSecurity 2023
ICT 3172:
References:
1. William Stallings, Cryptography and Network Security: Principles and Practice (7e), Pearson
Publications, 2016.
2. Charles P. Pfleeger, Shari Lawrence Pfleeger , Jonathan Margulies, Security in Computing
(5e), Prentice Hall, 2015.
3. Michael E. Whitman and Herbert J. Mattord, Principles of Information Security (5e), Cengage
Learning, 2015.
4. Mark Stamp, Information Security: Principles and Practice (2e), John Wiley & Sons, 2011.
5. Behrouz A. Forouzan, Debdeep Mukhopadhyay, Cryptography and Network Security (2e),
(Revised), Tata McGraw-Hill Education India, 2010.
.
Information is an asset that has a value
like any other asset.
.
.
Information needs to be hidden from unauthorized
access (confidentiality),
.
Few decades ago,
.
With the advent of computers, information storage
became electronic.
.
Discuss
.
1.1 SECURITY GOALS
.
Confidential
ity
protect our confidential information.
.
1.2 ATTACKS
.
1.2 ATTACKS
.
Snooping
Example:
• File transferred through the Internet may contain
confidential information.
.
Traffic Analysis
Example:
.
Attacks Threatening Integrity
.
Modification
Example,
Customer sends a message to a bank to do some
transaction.
.
Masquerading
Example:
• Attacker might steal the bank card,PIN and pretend that he
is that customer.
.
Replaying
Example:
• Person sends a request to her bank to ask for payment to
the attacker, who has done a job for her.
.
Repudiation
Example:
• Bank customer asking her bank to send some money to a
third party but later denying that she has made such a
request.
• When a person buys a product from a manufacturer and pays
for it, but the manufacturer later denies having received the
payment.
.
Attacks Threatening Availability
Denial of Service
It may slow down or totally interrupt the service of a
system.
.
Passive Versus Active Attacks
.
Passive Attacks
.
Active Attacks
.
1.2 ATTACKS
.
1.3 SERVICES AND MECHANISMS
.
Security Services
Data Integrity
• Data integrity is designed to protect data from
modification, insertion, deletion, and replaying by an
adversary.
• It may protect the whole message or part of the
message.
.
Authentication
• Provides the authentication of the party at the other
end of the line.
• Provides authentication of the sender or receiver during the
connection establishment.
Nonrepudiation
• Protects against repudiation by either the sender or the
receiver of the data.
• In nonrepudiation :
with proof of the origin, the receiver of the data can later
prove the identity of the sender if denied.
with proof of delivery, the sender of data can later prove
that data were delivered to the intended recipient.
.
Access Control
.
Security Mechanisms
ITU-T also recommends some security mechanisms to
provide the security services.
.
Encipherment
• Encipherment, hiding or covering data, can provide
confidentiality.
.
Data Integrity
• Data integrity mechanism appends to the data a short
checkvalue that has been created by a specific process
from the data itself.
.
Digital Signature
• Sender can electronically sign the data and the receiver
can electronically verify the signature.
• Using public key , private key
Authentication Exchange
• In authentication exchange, two entities exchange
some messages to prove their identity to each other.
• For example, one entity can prove that she knows a
secret that only she is supposed to know.
.
Traffic Padding
Traffic padding means inserting some bogus data into
the data traffic to thwart the adversary’s attempt to
use the traffic analysis.
Routing Control
Routing control means selecting and continuously
changing different available routes between the
sender and the receiver to prevent the opponent
from eavesdropping on a particular route.
.
Notarization
• Selecting a third trusted party to control the
communication between two entities.
• To prevent repudiation.
• Receiver can involve a trusted party to store the sender
request in order to prevent the sender from later denying
that she has made such a request.
Access Control
• Access control uses methods to prove that a user has
access right to the data or resources owned by a
system.
• Examples: passwords and PINs.
.
Relation between Services and Mechanisms
.
1.4 TECHNIQUES
• Mechanisms are only theoretical recipes to implement
security.
.
Cryptography
• Some security mechanisms can be implemented using
cryptography.
symmetric-key encipherment,
asymmetric-key encipherment,
hashing.
.
Symmetric-Key Encipherment
• In symmetric-key encipherment (secret-key encipherment or
secretkey cryptography), an entity, say Alice, can send a
message to another entity, say Bob, over an insecure channel
with the assumption that an adversary, say Eve, cannot
understand the contents of the message by simply
eavesdropping over the channel.
.
Asymmetric-Key Encipherment
.
Hashing
.
Steganography
.
Historical Use
• In China : war messages were written on thin pieces of silk and
rolled into a small ball and swallowed by the messenger.
• Invisible inks were also used. The secret message was exposed
when the paper was heated.
.
Modern Use
Today, any form of data, such as text, image, audio, or
video, can be digitized, and it is possible to insert secret
binary information into the data during digitization process.
.
Text Cover
innocuous :
harmless
.
Text Cover
.
Text Cover
.
Image Cover
• Secret data can also be covered under a color image.
• Digitized images are made of pixels (picture elements), in
which normally each pixel uses 24 bits (three bytes).
• Each byte represents one of the primary colors (red,
green, or blue).
.
Image Cover
.
Other Covers
.
End