Module1 MB - Lecture1 - Introduction To Security
Module1 MB - Lecture1 - Introduction To Security
(CSS)
Module 1
Introduction and Number Theory
Information Security
2
Cybersecurity
3
Network Security
5
System Security
6
ICT Security
7
Computer Security
Security Objectives
9
Key Security Concepts
10
Key Security Concepts
11
Key Security Concepts
12
Key Security Concepts
• Although the use of the CIA triad to define security objectives is well
established, some in the security field feel that additional concepts are
needed to present a complete picture.
Two of the most commonly mentioned are:
• Authenticity: The property of being genuine and being able to be
verified and trusted; confidence in the validity of a transmission, a
message, or message originator.
• Accountability: The security goal that generates the requirement for
actions of an entity to be traced uniquely to that entity.
Systems must keep records of their activities to permit later
forensic analysis to trace security breaches or to aid in
transaction disputes.
13
Levels of Impact
• Confidentiality
• Student grade information –high
• Student enrollment information –moderate
• Student and faculty list – low
• Integrity
• Patient allergy information – high
• Forum website for registered users –moderate
• Anonymous online poll --low
Levels of Impact Examples
• Availability
• A system that provides authentication services for
critical systems, applications, and devices – high
• A public Web site for a university –moderate
• An online telephone directory lookup application --low
The OSI Security Architecture
• Security attack
• Any action that compromises the security of information
owned by an organization
• Security mechanism (control)
• A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security
attack
• Security service
• A processing or communication service that enhances the
security of the data processing systems and the information
transfers of an organization. The services are intended to
counter security attacks, and they make use of one or more
security mechanisms to provide the service.
Important Terms
• Passive Attacks
• A passive attack attempts to learn or make use of information from the
system but does not affect system resources.
• This means that the attacker or attack doesn’t modify data or harm
the system.
Active Attacks
• An active attack attempts to alter system resources or affect their
operation. Active attacks threaten the integrity and availability.
Passive Attacks
Passive Attack
Threat to Confidentiality
27
Active Attacks
Masquerade Replay
30
Active Attacks
1. Modification/Fabrication
Fabricated message
31
Threat to Integrity
32
3. Replay: A replay attack is a type of
network attack in which an attacker
captures a valid network transmission and
then retransmit it later. The main objective
is to trick the system into accepting the
retransmission of the data as a legitimate
one.
Active Attacks
3. Replay
34
Replay
36
Threat to Availability
• Authentication
• The authentication service is concerned with assuring
that a communication is authentic.
• Access Control
• In the context of network security, access control is
the ability to limit and control the access to host
systems and applications via communications links.
Security Services
• Data Confidentiality
• Confidentiality is the protection of transmitted data
from passive attacks .
• It is a security service that keeps the information from an
u n a u t h o ri z e d p e rs o n . I t i s s o m e t i m e s r e f e r r e d t o
as privacy or secrecy. It prevents snooping and traffic
analysis attack.
Security Services
• Data Integrity
• The assurance that data received are exactly as sent by an
authorized entity (contain no modification, insertion, deletion or
replay).
Security Services
• Nonrepudiation
It is a security service that ensures that an entity cannot refuse the
ownership of a previous commitment or an action. It is an assurance
that the original creator of the data cannot deny the creation or
transmission of the said data to a recipient or third party.
Non-repudiation is a property that is most desirable in situations where
there are chances of a dispute over the exchange of data.
• When a message is sent, the receiver can prove that the
alleged sender in fact sent the message.
• When a message is received, the sender can prove that the
alleged receiver in fact received the message.
Security Mechanisms
Security Mechanisms
Encipherment
Encipherment deals with hiding and covering of data which helps data to
become confidential.
It is achieved by applying mathematical calculations or algorithms which
reconstruct information into not readable form.
It is achieved by two famous techniques named Cryptography and
Encipherment.
Level of data encryption is dependent on the algorithm used for
encipherment.
Security Mechanisms
Data Integrity
In data integrity, it is a connection-oriented integrity service, it
can handle with a flow of messages, and assure that messages
are received as sent with no duplication, insertion, modification,
reordering, or replays.
It is similar to sending packet of information known to both
sending and receiving parties and checked before and after data
is received.
Security Mechanisms
Digital Signature
A digital signature is a means by which the sender can
electronically sign the data and the receiver can electronically
verify the signature.
The sender uses a process that involves showing that she owns
a private key related to the public key that she has announced
publicly.
The receiver uses the sender’s public key to prove that the
message is indeed signed by the sender who claims to be have
sent the message.
Security Mechanisms
Mechanisms that are not specific to any particular OSI security service or
protocol layer.
1. Trusted Functionality: That which is perceived to be correct with
respect to some criteria (e.g., as established by a security policy).
2. Security Label: The marking bound to a resource (which may be a data
unit) that names or designates the security attributes of that resource
4. Event Detection: Detection of security-relevant events.
5. Security Audit Trail: Data collected and potentially used to facilitate a
security audit, which is an independent review and examination of
system records and activities.
6. Security Recovery: Deals with requests from mechanisms, such as event
handling and management functions, and takes recovery actions.
50
Security Techniques
Cryptography
Cryptography is technique of securing information and
communications through use of codes so that only those
person for whom the information is intended can
understand it and process it. Thus preventing
unauthorized access to information.
The prefix “crypt” means “hidden” and suffix graphy
means “writing”.
Cryptography mechanisms:
ü 1. Symmetric Key Encipherment
ü 2. Asymmetric Key Encipherment
ü 3. Hashing
Symmetric Key Encipherment
It is an encryption system where the sender and receiver of
message use a single common key to encrypt and decrypt
messages.
Symmetric Key encipherment uses a single secret key for both
encryption and decryption.
Encryption/decryption can be thought of as an electronic locking.
Symmetric Key Systems are faster and simpler but the problem is
that sender and receiver have to somehow exchange key in a
secure manner.
The most popular symmetric key cryptography system is Data
Encryption System(DES).
Asymmetric Key Encipherment
Under this system a pair of keys is used to encrypt and decrypt
information. A public key is used for encryption and a private key is
used for decryption. Public key and Private Key are different.
Even if the public key is known by everyone the intended receiver
can only decode it because he alone knows the private key.
Hashing
There is no usage of any key in this algorithm. A hash value with
fixed length is calculated as per the plain text which makes it
impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt passwords.
Steganography
• The word steganography, with origin in Greek, means
“covered writing”. Cryptography means concealing the
contents of a message by enciphering; steganography
means concealing the message itself by covering it
with something else.
Model for Network Security
• This general model shows that there are four basic tasks
in designing a particular security service:
• Design an algorithm for performing the security-related
transformation. The algorithm should be such that an
opponent cannot defeat its purpose.
• Generate the secret information to be used with the
algorithm.
• Develop methods for the distribution and sharing of the
secret information.
• Specify a protocol to be used by the two principals that
makes use of the security algorithm and the secret
information to achieve a particular security service.
Network Access Security Model