Introduction
Introduction
Educational Qualification
B.E.[2005]: Rajiv Gandhi Proudyogiki Vishwavidyalaya, M.P.
M.Tech[2012]: Rajasthan Technical University, Rajasthan
PhD [2017]: Jaypee University of Information Technology, Himachal Pradesh
Exp.:
(i) Feb 2006-Jun 2013, Institute of Engineering & Technology, Rajasthan
(ii) July 2013 - Nov. 2016 Jaypee University [Research Scholar],
(iii) Nov. 2016 - Jan. 2018 Faculty of Science & Technology, Hyderabad,
(iv) Jan-2018 to Sep-2019, Narsimha Reddy Engg. College, Hyderabad
(v) Dec-2019 to till date, CMR Engineering College, Hyderabad
General Questions
Do you use credit or debit card?
Have you ever observed you were on the target?
Have you observed some of your confidential
information known by others?
Have you seen/read in the newspaper some frauds
happen?
What we can take as a precautionary measures?
Why Cyber Security as a course, is it required?
Discussions
• Where is Security (Free from danger or threat)
• Threats/Vulnerabilities
• Attacks
• Mechanisms (defense)
Background
Information Security requirements have
changed in recent times (OTP, Mail
Based, OTP & Mail)
traditionally provided by physical and
administrative mechanisms
computer use requires automated tools to
protect files and other stored information
use of networks and communications links
requires measures to protect data during
transmission
Terminology
Cryptography:
Cryptography is an art and science of achieving
security by encoding message to make them
non-readable.
Cryptanalysis:
Cryptanalysis is the technique of decoding
message from non-readable format back to
readable format without knowing how they
were initially converted from readable format
to non-readable format.
Application(s)-Securities
Whatsup Security
Mobile Security
Facebook Security
Mail Protection
Security Related to Personal Data such as,
Yours:
Results,
Aaadhar,
Bank Account details
ATM Transactions
Traffic Surveillances
Security Approaches
Security as Prevention:
This approach seeks to prevent threats from arising
by addressing the underlying causes that generate
them before they emerge.
Security as Control(Protection):
This approach seeks to control, defense against
emerged issues, or eliminate threats noticeable
Security as Resilience:
When threats can't be controlled or eliminated,
security as resilience focuses on the ability of
systems to bounce back, and recover from shocks.
It concerns the flexibility, adaptability, their rigidity,
and how they can reduce their vulnerability to
disruption and collapse.
Principles of Security
In addition to security approaches, the fundamental
security goals are followings:
Mechanisms
Services
Security Attack
Any action that compromises the security of
information owned by an organization
Attack
An assault on system security that derives from an
intelligent threat; that is, an intelligent act that is a
deliberate attempt (especially in the sense of a method
or technique) to evade security services and violate the
security policy of a system.
Types of Threats/Attack
have a wide range of attacks
can focus of generic types of attacks
passive
active
Passive Attacks
Digital Signature
Data appended to, or a cryptographic transformation of, a
data unit that allows a recipient of the data unit to prove
the source and integrity of the data unit and protect
against forgery (e.g., by the recipient).
Authentication Exchange
A mechanism intended to ensure the identity of an entity by
means of information exchange.
SPECIFIC SECURITY MECHANISMS
Access Control
A variety of mechanisms that enforce
access rights to resources.
Data Integrity
A variety of mechanisms used to assure the
integrity of a data unit or stream of data
units.
Security Specific Mechanism
Traffic Padding
The insertion of bits into gaps in a data stream to
frustrate traffic analysis attempts.
Routing Control
Enables selection of particular physically secure
routes for certain data and allows routing changes,
especially when a breach of security is suspected.
Notarization
The use of a trusted third party to assure certain
properties of a data exchange.
PERVASIVE SECURITY MECHANISMS
Trusted Functionality
Perception to be correct with respect to some
criteria (e.g., as established by a security policy).
Security Label
The marking bound that designates the security
attributes of that resource.
Event Detection
Detection of security-relevant events.
PERVASIVE SECURITY MECHANISMS
Security Audit Trail
Security Recovery
Nonrepudiation, Origin
Proof that the message was sent by the
specified party.
Nonrepudiation, Destination
Proof that the message was received by the
specified party.
Model of Security
Model for Network Security
using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service
Summary
have considered:
definitions for:
• computer, network, internet security
X.800 standard
security attacks, services, mechanisms
models for network (access) security