Cryptography and Security in DS-1
Cryptography and Security in DS-1
• Cryptography Basic:
• Definition and importance
• Overview of Distributed Systems
• Advantages and disadvantages
Cryptography offers confidentiality ; Cryptography ensures that only authorized parties can
access and understand the encrypted information, preventing unauthorized access. This is
achieved through symmetric encryption (e.g., AES), which uses the same key for both
encryption and decryption.
Cryptography offers authentication ; Cryptography verifies the sender's identity using digital
signatures (e.g., RSA) and certificates, ensuring messages are from trusted sources and
have not been tampered with. Digital signatures are created using the sender's private key
and verified using the sender's public key.
Cont.....
Advantages:
Disadvantages:
Asymmetric
encryption uses
two keys - one
public and one
private - to encrypt
and decrypt data.
Cont...
Digital Signatures:
Digital Signatures provide data integrity and authentication by
signing data with a private key. This technique ensures that the
data has not been altered and confirms the identity of the
sender.
• How It Works: The sender generates a hash of the data and
encrypts it with their private key to create a digital signature.
The recipient decrypts the signature with the sender's public
key and compares the hash to verify integrity and authenticity.
• Use Cases: Commonly used in software distribution, financial
transactions, and secure email communications to ensure the
authenticity and integrity of the data.
Cont...
Access Controls:
Access Controls implement user authentication and
authorization to restrict access to data. This ensures that only
authorized users can access sensitive information.
• Authentication: Verifies the identity of users before
granting access. Techniques include password-based
authentication, multi-factor authentication (MFA), and
biometric authentication.
• Authorization: Defines what authenticated users are
allowed to do. Techniques include Role-Based Access
Control (RBAC), Attribute-Based Access Control (ABAC), and
Access Control Lists (ACLs).
Cont...
Firewalls
Firewalls monitor and control incoming and outgoing network traffic
based on predefined security rules. They act as a barrier between a
trusted internal network and untrusted external networks.
• Packet-Filtering Firewalls: Examine packets and allow or block
them based on source/destination addresses, ports, and protocols.
• Stateful Inspection Firewalls: Track the state of active connections
and make decisions based on the context of the traffic.
• Next-Generation Firewalls (NGFW): Combine traditional firewall
functions with additional features like application awareness and
intrusion prevention.
Cont...
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) monitor network traffic for
suspicious activity and potential threats. They alert administrators
to possible security incidents.
• Network-based IDS (NIDS): Monitors network traffic to detect
signs of intrusion.
• Host-based IDS (HIDS): Monitors the activities and state of
individual systems or hosts.
• Detection Techniques:
• Signature-Based Detection: Compares network traffic against a database
of known attack patterns.
• Anomaly-Based Detection: Detects deviations from normal network
behavior.
Cont...
Security Policies
Security Policies establish rules and guidelines for maintaining
security within the system. They ensure that all users follow
best practices and security protocols.
• Acceptable Use Policy: Defines acceptable and unacceptable
use of organizational resources.
• Access Control Policy: Specifies how access to information
and systems is managed and who is authorized to access
them.
• Incident Response Policy: Provides guidelines for
responding to security incidents and mitigating their impact.
Implementing Cryptography in
Distributed Systems Steps
• Step 1: Identify Data to Protect: Determine which data is
sensitive and requires encryption.
• Step 2: Choose Cryptographic Algorithms: Select appropriate
algorithms (symmetric or asymmetric) based on security
requirements. Symmetric algorithms use the same key for
encryption and decryption, while asymmetric algorithms use a
pair of keys (public and private).
• Step 3: Generate and Manage Keys: Create cryptographic keys
and establish secure key management practices. Ensure keys are
stored securely and rotated regularly.
• Step 4: Encrypt Data: Apply encryption to the identified sensitive
data to protect it from unauthorized access.
• Step 5: Decrypt Data: Implement decryption processes to allow
authorized users to access the encrypted data.
Implementing Other Security
Techniques in Distributed Systems
• User Authentication: Implement strong authentication
mechanisms, such as multi-factor authentication (MFA), to
verify user identities.
• Network Security: Configure firewalls and intrusion detection
systems (IDS) to monitor and protect the network from
potential threats.
• Regular Audits: Conduct regular security audits to identify
vulnerabilities, ensure compliance with security policies, and
improve overall security posture.
• Incident Response: Establish an incident response plan to
handle security breaches and mitigate their impact. Ensure
that the plan includes steps for detection, containment,
eradication, recovery, and post-incident analysis.
Case Study: Securing a Distributed System
Scenario: An e-commerce company implementing security
measures to protect customer data and transaction
information.
Steps Taken:
• Encryption of customer data stored in databases and
transmitted over the network.
• Use of digital signatures to verify the authenticity of
transactions.
• Implementation of access controls to restrict data access to
authorized employees.
• Configuration of firewalls and intrusion detection systems to
monitor and protect the network.
• Regular security audits to identify and address vulnerabilities.
Cont...
Results:
• Enhanced security of customer data and transaction
s.
• Reduced risk of data breaches and unauthorized acc
ess.
• Increased trust and confidence from customers in th
e company's security measures.
Group 07 Members:
NO STUDENT’S NAME REGISTRATION NUMBER