Computer security Last
Computer security Last
Threats
• Most organizations take action against credible threats before they happen.
• Natural threats can be planned for by understanding what has happened before.
An example would be floods, tornados, or earthquakes.
• Threat actors, on the other hand, aiming to destroy data and disrupt operations are
two of the leading fears that organizations try to defend against first.
• Security programs are purpose-built to address security threats by defending
against “what if” scenarios.
A good example of potential threats involves malware, ransomware, and
viruses.
• Attackers often focus on the total destruction of an asset, Distributed Denial of
Services (DDoS), or social engineering to accomplish their goals.
Threats, vulnerabilities, controls, risks…….
Vulnerabilities
• Vulnerabilities exist in systems, regardless of make, model, or
version.
• The term vulnerability exposes potential weak points in hardware
and software.
• In applications, the vulnerability can often be fixed by the
manufacturer to harden and prevent exploitation of the weakness.
• Unauthorized access can be an example of someone taking
advantage of a vulnerability.
• The system should only allow authorized access and if someone
unauthorized is granted access, it violates IT security and bypasses
access control.
Threats, vulnerabilities, controls,
risks…….
Risk
• When it comes to risks, organizations are looking at what may cause
potential harm to systems and the overall business.
• Several examples of systems susceptible to IT risk include operating
systems, and sensitive data.
• Organizations go to great lengths to mitigate, transfer, accept, and avoid
risks.
• A risk assessment is often the first line of defense to reduce security risk.
• In order to better prepare for the predictability of risks, assessments are
necessary to baseline an attack surface.
• Organizations should invest in a risk management program to better
understand how to measure risk
Threats, vulnerabilities, controls,
risks…….
Controls
• Information security controls are measures taken to reduce information
security risks such as information systems breaches, data theft, and
unauthorized changes to digital information or systems.
These security controls are intended to help protect the availability, confidentiality, and
integrity of data and networks, and are typically implemented after an information
security risk assessment.
• Security controls come in the form of:
• Access controls including restrictions on physical access such as security guards at
building entrances, locks, and perimeter fences.
• Procedural controls such as security awareness education, security framework
compliance training, and incident response plans and actions.
• Technical controls such as multi-factor user authentication at login (login) and logical
access controls, antivirus software, firewalls.
• Compliance controls such as privacy laws and cyber security frameworks and standards
Goals of computer Security(Security
Services)
Every security system must provide a bundle of security functions/services
that can assure the secrecy of the system.
These functions are usually referred to as the goals of the security system.
These goals can be listed under the following five main categories:
1. Authentication
2. Secrecy or Confidentiality
3. Integrity
4. Non-Repudiation
5. Service Reliability and Availability:
Goals of computer security…..
1. Authentication: Authentication means before sending and receiving data using the
system, the receiver and sender identity should be verified.
2. • Secrecy or Confidentiality: This function is how most people find a secure system. It
means only the authenticated people are able to interpret the message or content
and no one else.
• Data confidentiality prevents unauthorized entities from accessing confidential
information.
• Data confidentiality assures that confidential data/information is not made
available to unauthorized entities in the system
3. Integrity: Integrity means that the content of the transferred data is assured to be
free from any type of modification between the end points (sender and receiver).
Generally, integrity assures the accuracy and consistency of data and systems, which
means guarding against improper modification or destruction of data and systems in an
unauthorized or undetected manner.
• A loss of integrity is the unauthorized change or destruction of data or systems
Goals of computer security……
4. Non-Repudiation: In this function implies that neither the sender nor the
receiver can falsely deny that they have sent a certain message.
5. Service Reliability and Availability: Since secure systems usually get attacked
by intruders, which may affect their availability and type of service to their
users.
• The availability ensures that computer networks and systems work properly and
services are accessible and are not denied for authorized users.
• Specifically, availability ensures timely and reliable access to information and
services on computer networks and systems.
• A loss of availability leads to the disruption of access to the information and
services on the systems.
• Availability is the most important security service for some services on
computer networks and systems.
• Highly available systems or services remain available at all timely.
Summary
Security attack……
• A security attack is an unauthorized attempt to steal, damage, or expose
data from an information system such as your website.
• We can classify security attacks as passive and active attacks.
• Passive attacks
• A passive attack attempts to learn or make use of information from the
system but does not affect the system resources.
• The passive attackers are in the nature of eavesdropping on, or
monitoring of transmissions with a goal of obtaining information being
transmitted.
• The passive attacks are very difficult to detect because they do not
involve any alteration of data.
• Measures are available to prevent their success.
• Two types of passive attacks are: release of message content & traffic
analysis.
Security attack……
Release of message content:
- Outsider learns content of transmission
Traffic analysis:
- By monitoring frequency and length of messages, even encrypted, nature of
communication may be guessed.
• Active attack
• Alter system resources or affects their operation.
• Difficult to prevent active attacks absolutely.
• Classification of active attacks/threats:
Interruption
Interception
Modification
Fabrication
Active attack……
Examples of interruption are destruction of a piece of hardware, the cutting of cable and
disabling of a file management system
Active attack……
Active attack……
Active attack……
Security policies and mechanisms
Security policy
is a statement of what is, and what is not, allowed.
Policies may be presented mathematically, as a list of allowed (secure) and disallowed (non-
secure) states.
For our purposes, we will assume that any given policy provides an accepted description of
secure states and non-secure states.
Security mechanism:
• is a method, tool, or procedure for enforcing a security policy.
• A mechanism that is designed to detect, prevent or recover the system from the security
attacks.
• The security mechanisms are :
Encipherment: The use of mathematical algorithms to transfer the data into a form that is
not readily understandable.
Digital signatures: Used to protect the data against forgery. It is appended to the data unit
that allows a recipient of the data unit to prove the source and integrity of the data unit.
Access Control: These mechanisms enforce access rights to resources.
Security mechanism……..
Prevention
Security measures must be taken to protect information from unauthorized modification,
destruction, or disclosure whether accidental or intentional.
During the prevention phase, security policies, controls and processes should be designed
and implemented.
Security policies, security awareness programs and access control procedures, are all
interrelated and should be developed early on.
The information security policy is the basis from which all else is built.
Detection:
Detection of a system compromise is extremely critical. With the ever-increasing threat
environment, no matter what level of protection a system may have, it will get
compromised given a greater level of motivation and skill.
There is no full proof “silver bullet” security solution.
A defense in layers strategy should be deployed so when each layer fails, it fails safely to a
known state and sounds an alarm. The most important element of this strategy is timely
detection and notification of a compromise.
Intrusion detection systems (IDS) are utilized for this purpose.
Prevention, detection, and deterrence…….
• IDS have the capability of monitoring system activity and notifies responsible
persons when activities warrant investigation.
• The systems can detect attack signatures and also changes in files,
configurations and activity.
• To be protected, the entire system should be monitored. Intrusion detection
tools should be strategically placed at the network and application levels.
• However, monitoring a busy network or host is not a simple task.
• Intrusion detection tools must have the ability to distinguish normal system
activity from malicious activity. This is more of an art than a science.
• The IDS must be fine-tuned or ‘tweaked” in order for the IDS to work in
accord with a particular network or host. This tuning process must take into
account known threats, as well as intruder.
Thank you !!!
Chapter Two
Computer Threat
A computer system threat in general can include anything
deliberate, unintended, or caused by natural disaster that effects in
data loss/manipulation or physical destruction of hardware.
Categorized as physical threats and non-physical threats.
Physical threats cause damage to hardware or theft to system or
hard disk that holds critical data.
Non-physical threats target the data and the software on the
computer systems by corrupting the data or by exploiting the errors
in the software.
Malicious code
Malicious code
• is harmful computer programming scripts designed to create
or exploit system vulnerabilities.
• designed by a threat actor to cause unwanted changes,
damage, or ongoing access to computer systems.
• It may result in back doors, security breaches/break,
information and data theft, and other potential damages to
files and computing systems.
• Many malicious code types can harm your computer by
finding entry points that lead to your precious data.
Malicious code
Following are a couple of characteristics of any virus that infects your computers.
Virus replicates itself. Worms are also replicates itself. But Trojan horse does not replicate
itself.
Virus can’t be controlled by remote. Worms can be controlled by remote. Like worms, Trojan horse can also be
controlled by remote.
Spreading rate of viruses are While spreading rate of worms are And spreading rate of Trojan horse is
moderate. faster than virus and Trojan horse. slow in comparison of both virus and
worms.
The main objective of virus to modify The main objective of worms to eat The main objective of Trojan horse to
the information. the system resources. steal the information.
Viruses are executed via executable Worms are executed via weaknesses Trojan horse executes through a
files. in system. program and interprets as utility
software.
Class of Attacks ….
• There are three classes of attack that are commonly found in today's network environment:
Reconnaissance attacks
Access attacks and
Denial of service (DoS)
Reconnaissance attacks
• When I hear the word reconnaissance, I think of a military reconnaissance mission. The
soldier is sent out to gather important information about an area of interest. The same
holds true for a reconnaissance attack on a computer network.
• The hacker surveys a network and collects data for a future attack. Important information
that can be compiled during a reconnaissance attack includes the following:
Ports open on a server
Ports open on a firewall
IP addresses on the host network
Hostnames associated with the IP addresses
Class of Attacks (Reconnaissance
Attacks……)
• As with access attacks, there are four main subcategories or
methods for gathering network data:
• Packet sniffers (also known as network monitors)
• Ping sweeps/ ICMP
• Port scans
• Information queries
• These attacks can happen in both logical and physical
approaches.
• Whether the information is gathered via searching the network
or through social engineering and physical surveillance, these
attacks can be preventable as well.
Class of Attacks ….
Historical background
• Encryption or cryptography which means secret writing, is probably the
strongest defense in the arsenal of computer security protection.
• Well disguised data cannot easily be read, modified, or fabricated.
• Simply put, encryption is like a machine: you put data into one end,
gears spin and lights flash, you receive modified data out in the other
end.
• In fact, some encryption devices used during the World War II operated
with actual gears and rotors and these devices were effective in
deterring the opposite side from reading the protected messages.
• Now the machinery has been replaced by computer algorithms but, the
principle is the same. A transformation makes data difficult for an
outsider to interrupt
Cipher Techniques
What is Cipher?
Transposition Cipher
Example:
Exercise
• Given the plain text , P = “meet me near the clock tower at twelve
midnight tonite”
• create a table and give its cipher text. [use 5 column]
Cipher Techniques….
Substitution cipher
• In a Substitution cipher, any character of plain text from the given fixed set of
characters is replaced by some other character from the same set depending
on a key. For example with a shift of 1, A would be replaced by B, B would
become C, and so on.
• Note: Special case of Substitution cipher is known as Caesar cipher where the
key is taken as 3.
• Caesar cipher (or) shift cipher
• The Caesar cipher is a simple encryption technique that was used by Julius Caesar
to send secret messages to his allies. It works by shifting the letters in the
plaintext message by a certain number of positions, known as the “shift” or “key”
• The Caesar cipher involves replacing each letter of the alphabet with the letter
standing 3 places further down the alphabet.
Example
• The key size used for an AES cipher specifies the number of repetitions of
transformation rounds that convert the input, called the plaintext, into the
final output, called the cipher text. The numbers of cycles of repetition are
as follows:
→ø(N)=(p-1)(q-1)
hence :
Cd=(Me)d = M1+k.ø(N)=M1.(Mø(N))q = M1.(1)q = M1=M mod N
RSA Example
1. Select primes: p=17 & q=11
2. Compute n = pq =17×11=187
3. Compute ø(n)=(p–1)(q-1)=16×10=160
4. Select e : gcd(e,160)=1; choose e=7
5. Determine d: de=1 mod 160 and d < 160 Value is
d=23 since 23×7=161.
6. Publish public key KU={7,187}
7. Keep secret private key KR={23,17,11}
RSA Example cont
sample RSA encryption/decryption is:
given message M=88 (nb. 88<187)
encryption:
C=887 mod 187=11
decryption:
M=1123 mod 187=88
RSA Key Generation
1. Unstructured threats
2. Structured threats
3. External threats
4. Internal threats
Threat…
Threat…
Threat…
Threat…
Internal threats
Attack
Attacks
Network security protocols
• In today’s world, we transfer the data in bulk, and
the security of this data is very important, so Internet
security provides that feature i.e., protection of data.
• There are different types of protocol exist like
routing, mail transfer, and remote communication
protocol. But the Internet security protocol helps in
the security and integrity of data over the internet.
• There are many protocols that exist that help in the
security of data over the internet such as
Internet Protocol Security (IPsec) Protocol
Secure Socket Layer (SSL):
Transport Layer Security (TLS).
Internet Protocol Security (IPsec)
Protocol
• IPsec is a protocol and algorithm suite that secures data transferred
over public networks like the Internet. The Internet Engineering Task
Force (IETF) released the IPsec protocols in the 1990s. They encrypt
and authenticate network packets to provide IP layer security.
• IPsec originally contained the ESP and AH protocols. Encapsulating
Security Payload (ESP) encrypts data and provides authentication,
while Authentication Header (AH) offers anti-replay capabilities and
protects data integrity. The suite has since expanded to include the
Internet Key Exchange (IKE) protocol, which provides shared keys
establishing security associations (SAs). These enable encryption
and decryption via a firewall or router.
• IPsec can protect sensitive data and VPNs, providing tunneling to
encrypt data transfers. It can encrypt data at the application layer
and enables authentication without encryption.
Internet Security Protocols……
Kerberos
Kerberos is a network authentication protocol that is designed to
provide strong authentication for client/server applications using
secret-key cryptography. The Kerberos network authentication
protocol assumes that services and workstations communicate
over an insecure network. It allows clients and servers to do
either one way, or two-way (mutual) authentication. It allows for
data encryption and prevents passwords from having to be
retyped to access networked services and also prevents their
transmission in plain text over the network. This feature can help
reduce the need to manage multiple password
Internet Security Protocols……
Wireless Security
• Wireless security is the prevention of unauthorized access or damage to
computers or data using wireless networks, which include Wi-Fi networks.
• The term may also refer to the protection of the wireless network itself from
adversaries seeking to damage the confidentiality, integrity, or availability of
the network.
• The most common type is Wi-Fi security, which includes Wired Equivalent
Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11
standard from 1997.
• It is a notoriously weak security standard: the password it uses can often be
cracked in a few minutes with a basic laptop computer and widely available
software tools.
Wireless Security…..
• Firewall
• Proxy server
• Intrusion Detection system /Intrusion prevention System
• Virtual Private network
Security Mechanisms…..
1. Forward Proxies
In this the client requests its
internal network server to forward
to the internet.
2. Open Proxy
Open Proxies helps the clients to
conceal their IP address while
browsing the web
3. Reverse proxies
In this the requests are forwarded to
one or more proxy servers and the
response from the proxy server is
retrieved as if it came directly from the
original Server.
Intrusion Detection system(IDS)