0% found this document useful (0 votes)
24 views36 pages

Introduction

CYBER SECURIYY

Uploaded by

Navyaa Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views36 pages

Introduction

CYBER SECURIYY

Uploaded by

Navyaa Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 36

Fundamentals Behind Cyber Security:

Cryptography and Network Security


Gautam Kumar, PhD
Dept. of Computer Science & Engineering
CMR Engineering College
Hyderabad (INDIA)-501401
Contact: [email protected] ,+91-
8262001726

Educational Qualification
B.E.[2005]: Rajiv Gandhi Proudyogiki Vishwavidyalaya, M.P.
M.Tech[2012]: Rajasthan Technical University, Rajasthan
PhD [2017]: Jaypee University of Information Technology, Himachal Pradesh

Exp.:
(i) Feb 2006-Jun 2013, Institute of Engineering & Technology, Rajasthan
(ii) July 2013 - Nov. 2016 Jaypee University [Research Scholar],
(iii) Nov. 2016 - Jan. 2018 Faculty of Science & Technology, Hyderabad,
(iv) Jan-2018 to Sep-2019, Narsimha Reddy Engg. College, Hyderabad
(v) Dec-2019 to till date, CMR Engineering College, Hyderabad
General Questions
 Do you use credit or debit card?
 Have you ever observed you were on the target?
 Have you observed some of your confidential
information known by others?
 Have you seen/read in the newspaper some frauds
happen?
 What we can take as a precautionary measures?
 Why Cyber Security as a course, is it required?
Discussions
• Where is Security (Free from danger or threat)

• Where is Privacy (Personal information use


and its control)? State is not observed or
disturbed by other(s).

• Threats/Vulnerabilities

• Attacks

• Mechanisms (defense)
Background
 Information Security requirements have
changed in recent times (OTP, Mail
Based, OTP & Mail)
 traditionally provided by physical and
administrative mechanisms
 computer use requires automated tools to
protect files and other stored information
 use of networks and communications links
requires measures to protect data during
transmission
Terminology
 Cryptography:
Cryptography is an art and science of achieving
security by encoding message to make them
non-readable.

 Cryptanalysis:
Cryptanalysis is the technique of decoding
message from non-readable format back to
readable format without knowing how they
were initially converted from readable format
to non-readable format.
Application(s)-Securities
 Whatsup Security
 Mobile Security
 Facebook Security
 Mail Protection
 Security Related to Personal Data such as,
Yours:
 Results,
 Aaadhar,
 Bank Account details
 ATM Transactions
 Traffic Surveillances
Security Approaches
 Security as Prevention:
This approach seeks to prevent threats from arising
by addressing the underlying causes that generate
them before they emerge.

 Security as Control(Protection):
This approach seeks to control, defense against
emerged issues, or eliminate threats noticeable

 Security as Resilience:
When threats can't be controlled or eliminated,
security as resilience focuses on the ability of
systems to bounce back, and recover from shocks.
It concerns the flexibility, adaptability, their rigidity,
and how they can reduce their vulnerability to
disruption and collapse.
Principles of Security
In addition to security approaches, the fundamental
security goals are followings:

 Determining the confidentiality of Information

 How the data integrity can be maintain, and

 In what manner its availability is governed


Aspects of Security
 consider 3 aspects of information security:

Security Attack:
Any action that compromises the security of
information owned by an organization.

Security Mechanism:
A process that is designed to detect, prevent,
or recover from a security attack.

Security Service:

Processing or communication service that
enhances the security of the data processing
systems and the information transfers of an
organization.

The services are intended to counter security
attacks, and they make use of one or more
Aim of Course
 our focus is on Internet Security
 which consists of measures to deter
(discourage fear of consequences),
prevent, detect, and correct security
violations that involve the transmission &
storage of information
OSI Security Architecture
 ITU-T X.800 “Security Architecture for OSI”
 defines a systematic way of defining and
providing security requirements
 for us it provides a useful, if abstract,
overview of concepts we will study
Major Things for Cyber Security
 Attacks

 Mechanisms

 Services
Security Attack
 Any action that compromises the security of
information owned by an organization

 Information security is about how to prevent


attacks, to detect attacks on information-based
systems

 Often threat & attack used to mean same thing


Threats and Attacks
 Threat
A potential for violation of security, which exists when
there is a circumstance, capability, action, or event that
could breach security and cause harm. That is, a threat
is a possible danger that might exploit a susceptibility.

 Attack
An assault on system security that derives from an
intelligent threat; that is, an intelligent act that is a
deliberate attempt (especially in the sense of a method
or technique) to evade security services and violate the
security policy of a system.
Types of Threats/Attack
 have a wide range of attacks
 can focus of generic types of attacks

passive

active
Passive Attacks

Passive attacks which attempt to learn or make use of


information but does not affect system resources.
(Interception)
By eavesdropping on, or monitoring of, transmissions to:
+ obtain message contents , or
+ monitor traffic flows

Difficult to detect because they do not involve any alteration of the


data. But, this can be take as prevention, rather to
Active Attacks

Active attacks which attempt to alter system resources or


affect their operation.
By modification of data stream to:
+ masquerade of one entity as some other
(Interruption)
+ replay previous messages (Modification)
+ modify messages in transit (Modification)
+ denial of service (make the target of the user or
network resourses inaccessible to its intended users)
(Fabrication: Creation of counterfeiting of computing system by
unauthorized party)
Security Mechanism
 feature designed to detect, prevent, or
recover from a security attack
 no single mechanism that will support all
services required
 however one particular element underlies
many of the security mechanisms in use:

cryptographic techniques
Security Mechanisms
 specific security mechanisms:

encipherment, digital signatures, access
controls, data integrity, authentication
exchange, traffic padding, routing control,
notarization

 pervasive security mechanisms:



trusted functionality, security labels, event
detection, security audit trails, security
recovery
SPECIFIC SECURITY MECHANISMS
Encipherment
The use of mathematical algorithms to transform data into
a form that is not readable form. The transformation and
subsequent recovery of the data depend on an algorithm
and zero or more encryption keys.

Digital Signature
Data appended to, or a cryptographic transformation of, a
data unit that allows a recipient of the data unit to prove
the source and integrity of the data unit and protect
against forgery (e.g., by the recipient).

Authentication Exchange
A mechanism intended to ensure the identity of an entity by
means of information exchange.
SPECIFIC SECURITY MECHANISMS

Access Control
A variety of mechanisms that enforce
access rights to resources.

Data Integrity
A variety of mechanisms used to assure the
integrity of a data unit or stream of data
units.
Security Specific Mechanism
Traffic Padding
The insertion of bits into gaps in a data stream to
frustrate traffic analysis attempts.

Routing Control
Enables selection of particular physically secure
routes for certain data and allows routing changes,
especially when a breach of security is suspected.

Notarization
The use of a trusted third party to assure certain
properties of a data exchange.
PERVASIVE SECURITY MECHANISMS
 Trusted Functionality
Perception to be correct with respect to some
criteria (e.g., as established by a security policy).

 Security Label
The marking bound that designates the security
attributes of that resource.

 Event Detection
 Detection of security-relevant events.
PERVASIVE SECURITY MECHANISMS
 Security Audit Trail

Data collected and potentially used to facilitate a


security audit, which is an independent review
and examination of system records and
activities.

 Security Recovery

Deals with requests from mechanisms, such as


event handling and management functions, and
takes recovery actions.
Security Service

enhance security of data processing systems
and information transfers of an organization

intended to counter security attacks

using one or more security mechanisms

often replicates functions normally associated
with physical documents
• which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; be notarized or witnessed; be
recorded or licensed
Security Services
 Authentication – Verification of user identity
before sending data both for sender & receiver

 Data Confidentiality – protection of data sent


through network

 Data Integrity – After sending & before receiving,


during transmission, no modification on data sent

 Non-Repudiation - protection against denial by


one of the parties in a communication

 Access Control - Prevent unauthorized access to


resource
AUTHENTICATION
The assurance that the communicating entity is
the one that it claims to be

 Peer Entity Authentication


Used in association with a logical connection to
provide confidence in the identity of the entities
connected.

 Data Origin Authentication


In a connectionless transfer, provides assurance
that the source of received data is as claimed.
Difference in Authorization
and Authentication

Example: ATM card, E-mail Based System,


etc…
ACCESS CONTROL
The prevention of unauthorized use of a
resource, i.e., this service controls:
(i) who can have access to a resource,
(ii) under what conditions access can occur,
(iii) and what resource are allowed to
access.
DATA CONFIDENTIALITY
(Protection of data sent through network)
 Connection Confidentiality
The protection of all user data on a connection.
 Connectionless Confidentiality
The protection of all user data in a single data
block
 Selective-Field Confidentiality
The confidentiality of selected fields within the user
data on a connection or in a single data block.
 Traffic Flow Confidentiality
The protection of the information that might be
derived from observation of traffic flows.
Data Integrity
 Connection Integrity with Recovery
Provides for the integrity of all user data on a connection
and detects any modification, insertion, deletion, or replay of
any data within an entire data sequence, with recovery
attempted.

 Connection Integrity without Recovery


As above, but provides only detection without recovery.

 Selective-Field Connection Integrity


Integrity of selected fields within the user data of a data
block transferred over a connection and takes the form of
determination of whether the selected fields have been
modified, inserted, deleted, or replayed.
Data Integrity
 Connectionless Integrity
Provides for the integrity of a single connectionless data
block and may take the form of detection of data
modification.

 Selective-Field Connectionless Integrity


Provides for the integrity of selected fields within a single
connectionless data block; takes the form of
determination of whether the selected fields have been
modified.
NONREPUDIATION
Provides protection against denial by one of the
entities involved in a communication of
having participated in all or part of the communication.

 Nonrepudiation, Origin
Proof that the message was sent by the
specified party.

 Nonrepudiation, Destination
Proof that the message was received by the
specified party.
Model of Security
Model for Network Security
 using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service
Summary
 have considered:

definitions for:
• computer, network, internet security
 X.800 standard
 security attacks, services, mechanisms
 models for network (access) security

You might also like