0% found this document useful (0 votes)
18 views36 pages

Chapter 1

The document outlines the objectives and foundational concepts of information and network security, including the three main security goals: confidentiality, integrity, and availability. It discusses various security threats, attacks, services, and mechanisms, emphasizing the importance of cryptography and steganography as techniques to ensure data protection. Additionally, it highlights the need for security measures in both data transmission and access control to safeguard information systems from unauthorized access and attacks.

Uploaded by

laptop8975
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views36 pages

Chapter 1

The document outlines the objectives and foundational concepts of information and network security, including the three main security goals: confidentiality, integrity, and availability. It discusses various security threats, attacks, services, and mechanisms, emphasizing the importance of cryptography and steganography as techniques to ensure data protection. Additionally, it highlights the need for security measures in both data transmission and access control to safeguard information systems from unauthorized access and attacks.

Uploaded by

laptop8975
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Information and Network Security

Introduction
Objectives
 To define three security goals
 To define security attacks that threaten security
goals
 To define security services and how they are
related to the three security goals
 To define security mechanisms to provide security
services
 To introduce two techniques, cryptography and
steganography, to implement security mechanisms.
Backgrounds
Information Security requirements have
changed in recent times
Traditionally provided by physical and
administrative mechanisms
Computer use requires automated tools to
protect files and other stored information
The use of networks and communications
links requires measures to protect data
during transmission
Definitions

Computer Security - generic name for the


collection of tools designed to protect data
and to thwart hackers
Network Security - measures to protect
data during their transmission over a
computer network
Internet Security - measures to protect
data during their transmission over a
collection of interconnected networks
• A security vulnerability is a flaw or
weakness in a system’s design,
implementation, or operation that could be
exploited to violate the system’s security
(RFC 2828). A security vulnerability is not a
risk, a threat, or an attack

• Security threat: a potential violation of


security, which can be active (when the
state of a system can be changed) or passive
(unauthorized disclosure of information
without changing the state of the system).
• A security risk originates when a security
vulnerability is combined with a security
threat.
• For example, an overflow bug in an
operating system application (i.e., a
vulnerability) associated with a hacker’s
knowledge, appropriate tools, and access
(i.e., a threat) can develop the risk of a
web server attack. Consequences of
security risks are data loss, data
corruption, privacy loss, fraud, downtime,
and loss of public confidence.

• Security attack: Any action that


compromises the security of information
Integrity

Confidentiality Availability
1-1 SECURITY GOALS

Confidentiality– Can you keep a secret? Specifies that only


the sender and the intended recipients should be able to access
the content of a message. Confidentiality gets compromised if
an unauthorized person can access a message. This type of
attack is called an interception.
Integrity – Did you get the message I sent? When the
message's contents are changed after the sender sends it but
before it reaches the intended recipient, we say the Integrity of
the message is lost. This type of attack is called modification.
Availability – Are you there when needed?
The principle of availability states that resources
(i.e) information should be available to authorized
parties at all times.
For example, due to the intentional actions of
another unauthorized user, C , an authorized user
A may not be able to contact server computer B.
This would defeat the principle of availability; such
an attack is called an interruption.
1.2 Security Attacks
1. Passive Attacks: this is like eavesdropping on or
monitoring transmissions. The goal of the opponent
is to obtain information that is being transmitted.
2. Active attacks: involve some modification of the
data stream or the creation of a false stream.
• Active attacks present the opposite characteristics of
passive attacks. Whereas passive attacks are difficult to
detect, measures are available to prevent their success.
• On the other hand, it is difficult to prevent active attacks
because of the wide variety of potential physical,
software, and network vulnerabilities.
• Instead, the goal is to detect active attacks and to
recover from any disruption or delays caused by them.
The three goals of security- confidentiality, integrity, and
availability- can be threatened by security attacks.
Snooping
Fig.2 Replay
1.2.3 Attacks Threatening Availability
Denial of service (DoS) is a very common attack. It may
slow down or totally interrupt the service of a system.
The International Telecommunication Union
(ITU) is a specialized agency of the United
Nations (UN) that is responsible for issues that
concern information and communication
technologies (ICTs).

Security services refer to a broad range of measures, protocols, and
mechanisms designed to ensure the confidentiality, integrity, availability,
and resilience of information systems and data.

These services protect information assets from threats, such as
unauthorized access, theft, damage, and disruption.

Security services can be classified into various categories, each addressing
specific security needs and objectives, such as:

Authentication, authorization, confidentiality, integrity, availability, non-
repudiation, and privacy.

Enhance security of data processing systems and information transfers of
an organization

Intended to counter security attacks

Using one or more security mechanisms

Often replicates functions normally associated with physical documents
 X.800:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data
transfers”

 RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
1.3.2 Security Services X.800

 Authentication - assurance that the communicating entity is


the one claimed
 Access Control - prevention of the unauthorized use of a
resource
 Data Confidentiality –protection of data from unauthorized
disclosure
 Data Integrity - assurance that data received is as sent by an
authorized entity
 Non-Repudiation - protection against denial by one of the
parties in a communication
1.3.2 Security Services X.800

• Access control: rules and policies that limit access to confidential


information to those people and/or systems with a “need to
know.”
– This need to know may be determined by identity, such as a
person’s name or a computer’s serial number, or by a role that
a person has, such as being a manager or a computer security
specialist.
• Authentication: the determination of the identity or role that someone
has. This determination can be done in a number of different ways, but
it is usually based on a combination of
– something the person has (like a smart card or a radio key fob storing secret
keys),
– something the person knows (like a password),
– something the person is (like a human with a fingerprint).

password=ucIb()w1V
mother=Jones
human with fingers pet=Caesar
and eyes

Something you are

Something you know

radio token with


secret keys

Something you have


• Authorization: determining whether a person or system is
allowed access to resources based on an access control policy.
– Such authorizations should prevent an attacker from tricking the
system into letting him have access to protected resources.

• Physical security: establishing physical barriers to limit


access to protected computational resources.
– Such barriers include locks on cabinets and doors, the placement of
computers in windowless rooms, the use of sound-dampening
materials, and even the construction of buildings or rooms with
walls incorporating copper meshes (called Faraday cages) so that
electromagnetic signals cannot enter or exit the enclosure.
1.3.3 Security Mechanism
• Encipherment: hiding or covering data can prove confidentiality
using two techniques: cryptography and steganography.
• Data integrity: appends to the data a short check value created by
a specific process from the data itself.
• Digital signature: the sender can electronically sign the data, and
the receiver can verify the signature,
• Authentication exchange: two entities exchange some message to
prove their identity to each other.
• Traffic Padding: inserting some bogus data into the traffic to thwart
the adversary’s attempt to use traffic analysis.
• Routing control: selecting and continuously changing different
routes between the sender and the receiver.
• Notarization: selecting a third trusted party to control the
communication between two entities (to prevent repudiation)
• Access control: uses a method to prove that the user has access
right to the data or resources owned by the system (PINs or
password)
1.3.3 Relation between Services and Mechanisms

The term "encipherment" refers to the process of converting


plaintext into ciphertext using an algorithm and a key. This
process is a fundamental aspect of cryptography, aimed at
ensuring the confidentiality of information
1.4 TECHNIQUES
Mechanisms discussed in the previous sections are only
theoretical recipes to implement security. The actual
implementation of security goals needs some
techniques. Two techniques are prevalent today:
cryptography and steganography.
1.4.1 Cryptography
Cryptography, a word with Greek origins, means “secret
writing.” However, we use the term to refer to the science
and art of transforming messages to make them secure and
immune to attacks.
• Encryption: the transformation of information using a secret, called an
encryption key, so that the transformed information can only be read using
another secret, called the decryption key (which may, in some cases, be the
same as the encryption key).
• Usually used to provide Confidentiality .

Communication
Sender Recipient
channel

encrypt decrypt

ciphertext plaintext

plaintext

shared shared
secret secret
key key
Attacker
(eavesdropping)
1.4.2 Steganography
• The word steganography, with origin in Greek, means “covered writing,” in contrast
with cryptography, which means “secret writing.”
• It involves embedding data within other, non-secret, files or media
in such a way that no one apart from the intended recipient knows
of the existence of the hidden information.

Example: covering data with text


1.4.2 Steganography
• Least Significant Bit (LSB) Insertion: In the context of digital images, this
technique involves modifying the least significant bits of the pixel values to
embed secret information without significantly altering the image's
appearance to the human eye.
• Masking and Filtering: These methods are typically used in more robust
forms of steganography, like hiding information within images by using
specific areas that can be more significantly altered without drawing
attention.
• Other options: audio, video and protocol
Hide data
Extract data
1.5.1 Data Transfer
Model for Network Security
 using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service
1.5.2 Model for Network Access
Security

 using this model requires us to:


1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information
or resources

You might also like