CNS Basic
CNS Basic
CNS Basic
Network Security
Network security is the field of cybersecurity focused on protecting
computer networks and systems from internal and external cyberthreats and
cyberattacks.
Cryptographic algorithms and protocols can be grouped into four main areas:
• Symmetric encryption: Used to conceal (hide) the contents of blocks or streams
of data of any size, including messages, files, encryption keys, and passwords.
• Asymmetric encryption: Used to conceal small blocks of data, such as encryption
keys and hash function values, which are used in digital signatures.
• Data integrity algorithms: Used to protect blocks of data, such as messages, from
alteration.
• Authentication protocols: These are schemes based on the use of cryptographic
algorithms designed to authenticate the identity of entities.
Computer Security
This definition introduces three key objectives that are at the heart of
computer security:
• Confidentiality
• Integrity
• Availability
• Confidentiality: This term covers two related concepts:
Data confidentiality: Assures that private or confidential information is
not made available or disclosed to unauthorized individuals.
Privacy: Assures that individuals control or influence what information
related to them may be collected and stored and by whom and to whom that
information may be disclosed.
• Availability: Assures that systems work promptly and service is not denied to
authorized users
CIA Triad
3 levels of impact from a security breach
Low
Moderate
High
Low:
The loss could be expected to have a limited adverse effect on
organizational operations, organizational assets, or individuals
1) The effectiveness of the functions is noticeably reduced
2) Results in minor damage to organizational assets
3) Results in minor financial loss
4) Results in minor harm to individuals
Moderate:
The loss could be expected to have a serious adverse effect on organizational operations,
organizational assets, or individuals
1) Effectiveness of the functions is significantly reduced
2) Results in significant damage to organizational assets
3) Results in significant financial loss
4) Results in significant harm to individuals that does not involve loss of life or serious
life threatening injuries
High:
The loss could be expected to have a severe or catastrophic adverse effect on
organizational operations, organizational assets, or individuals.
1) Results in major damage to organizational assets
2) Results in major financial loss
3) Results in severe harm to individuals involving loss of life or serious life threatening
injuries
Challenges of Computer Security
Attack - An assault on system security that derives from an intelligent threat; that is,
an intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system.
Aspects of Security
The OSI security architecture focuses on security attacks, mechanisms, and
services. These can be defined briefly as follows
consider 3 aspects of information security:
Security attack: Any action that compromises the security of
X.800 divides these services into five categories and fourteen specific services
1. Authentication
2. Access Control
3. Data Confidentiality
4. Data Integrity
5. Nonrepudiation
1.Authentication :
The authentication service is concerned with assuring that a communication is
authentic.
The assurance that the communicating entity is the one that it claims to be.
3. Data Confidentiality:
The protection of data from unauthorized disclosure.
Mechanisms that are not specific to any particular OSI security service or protocol
layer.
• Trusted Functionality: That which is perceived to be correct with respect to some
criteria (e.g., as established by a security policy).
• Security Label: The means used to associate a set of security attributes with a
specific information object as part of the data structure for that object.
• Event Detection: Detection of security-relevant events.
• Security Audit Trail: Data collected and potentially used to facilitate a security
audit, which is an independent review and examination of system records and
activities. (Audits ensure that appropriate policies and procedures have been
implemented and are working effectively)
• Security Recovery: Deals with requests from mechanisms, such as event handling
and management functions, and takes recovery actions
A Model for Network Security
Message transferred between two parties – principals (sender and receiver).
Exchange takes place in defined route using protocols by principals.
Some Techniques that need to protect information from threats, to maintain
confidentiality and authenticity.
1.Encryption-scrambels message
2.Secret information
3.Trusted third party
One of the two most publicized threats to security is the intruder (the other is
viruses), often referred to as a hacker or cracker.
Intrusion is any set of actions that attempt to compromise the confidentiality,
integrity, or availability of a computer resource.
Hackers:
Traditionally those who hack into computers. The hacking community is a strong in which
status is determined by level of competence. Thus, attackers often look for targets of
opportunity and then share the information with others.
Criminals:
Criminal hackers usually have specific targets, or at least classes of targets in mind.
Once a site is penetrated, the attacker acts quickly, scooping up as much valuable
information as possible and exiting. IDSs and IPSs can also be used for these types of
attackers but may be less effective because of the quick in-and-out nature of the attack.
For e-commerce sites, database encryption should be used for sensitive customer
information, especially credit cards. For hosted e-commerce sites (provided by an
outsider service), the e-commerce organization should make use of a dedicated server
(not used to support multiple customers) and closely monitor the provider’s security
services.
Insider Attacks:
Insider attacks are among the most difficult to detect and prevent. Employees already
have access and knowledge about the structure and content of corporate databases.
Insider attacks can be motivated by revenge or simply a feeling of entitlement.
Intrusion Techniques:
Access control:
Access to the password file is limited to one or a very few accounts. If one or both of
these countermeasures are in place, some effort is needed for a potential intruder to
learn passwords
Intrusion
Any unauthorized access, not permitted attempt to access/damage or
malicious use of information resources
Intrusion Detection
Detection of break-ins and break-in attempts via automated software
systems
Involves the collection of data relating to the behavior of legitimate users over a period of
time. Then statistical tests are applied to observed behavior to determine whether that
behavior is not legitimate user behavior.
Threshold detection: This approach involves defining thresholds for the frequency of
occurrence of various events. It involves counting the number of occurrences of a specific
event type over an interval of time. If the count surpasses the threshold, then intrusion is
assumed.
Profile-based anomaly detection: A profile of the activity of each user is developed and
used to detect changes in the behavior of individual accounts.
Rule-based intrusion detection
A fundamental tool for intrusion detection is the audit record. Some record of
ongoing activity by users must be maintained as input to an intrusion detection
system.
Basically, two plans are used:
• Native audit records: Virtually all multiuser operating systems include
accounting software that collects information on user activity. no additional
collection software is needed. The disadvantage is that the native audit records
may not contain the needed information or may not contain it in a convenient
form.
• Detection-specific audit records: A collection facility can be implemented that
generates audit records containing only that information required by the intrusion
detection system.
A good example of detection-specific audit records is one developed by Dorothy
Denning
Subject: Initiators of actions. All activity arises through commands issued by
subjects.
Action: Operation performed by the subject on or with an object , for example, login,
read, perform I/O, execute.
Object: Receptors of actions. Examples include files, programs, messages, records,
terminals, printers etc.
Exception-Condition: Denotes which, if any, exception condition is raised on return.
Resource-Usage: gives the list of amount used of some resource.
Time-Stamp: Unique time-and-date stamp identifying when the action took place.
Rule-based anomaly detection
The rule-based approach, historical audit records are analyzed to identify usage
patterns and to generate automatically rules that describe those patterns. Rules may
represent past behavior patterns of users, programs, privileges, time slots, terminals,
and so on.
Rule-based anomaly detection does not require knowledge of security vulnerabilities
within the system. Rather, the scheme is based on observing past behavior and, in
effect, assuming that the future will be like the past.
Rule-based penetration
identification
• Penetration identification: An expert system approach that searches for
suspicious behavior.
• The key feature of such systems is the use of rules for identifying known
penetrations or penetrations that would exploit known weaknesses.
• Rules can also be defined that identify suspicious behavior, even when the
behavior is within the bounds of established patterns of usage.
The Base-Rate Fallacy
• An intrusion detection system should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.
• If the system frequently triggers an alert when there is no intrusion (a false
alarm), then either system managers will begin to ignore the alarms, or much
time will be wasted analyzing the false alarms.
• It is very difficult to meet the standard of high rate of detections with a low rate
of false alarms.
• If the actual numbers of intrusions is low compared to the number of legitimate
uses of a system, then the false alarm rate will be high
• A study of existing intrusion detection systems, indicated that current systems
have not overcome the problem of the base-rate fallacy.
Distributed Intrusion Detection
A distributed intrusion detection system may need to deal with different audit
record formats. In a heterogeneous environment, different systems will employ
different native audit collection systems and, if using intrusion detection, may
employ different formats for security-related audit records.
One or more nodes in the network will serve as collection and analysis points
for the data from the systems on the network. Thus, either raw audit data or
summary data must be transmitted across the network. Therefore, there is a
requirement to assure the integrity and confidentiality of these data
Backdoor
• A backdoor, also known as a trapdoor, is a secret entry point into a program that allows
someone who is aware of the backdoor to gain access without going through the usual
security access procedures.
• Programmers have used backdoors legitimately for many years to debug and test
programs; such a backdoor is called a maintenance hook.
• The backdoor is code that recognizes some special sequence of input or is triggered by
being run from a certain user ID or by an unlikely sequence of events.
• Backdoors become threats when unscrupulous programmers use them to gain
unauthorized access
Logic bomb
• The logic bomb is code embedded in some legitimate program that is set to
“explode” when certain conditions are met.
• Examples of conditions that can be used as triggers for a logic bomb are the
presence or absence of certain files, a particular day of the week or date, or a
particular user running the application.
• Once triggered, a bomb may alter or delete data or entire files, cause a machine
halt, or do some other damage
Trojan Horses
• A Trojan horse is a useful program containing hidden code that, when invoked, performs
some unwanted or harmful function.
• Trojan horse programs can be used to accomplish functions indirectly that an
unauthorized user could not accomplish directly.
• For example, to gain access to the files of another user on a shared system, a user could
create a Trojan horse program that, when executed, changes the invoking user’s file
permissions so that the files are readable by any user.
• Placing it in a common directory and naming it such that it appears to be a useful utility
program or application
• Another common motivation for the Trojan horse is data destruction but it may also be
quietly deleting the user’s files
Trojan horses fit into one of three models:
• Mobile code is transmitted from a remote system to a local system and then executed
on the local system without the user’s explicit instruction.
• Often acts as a mechanism for a virus, worm, or Trojan horse to be transmitted to the
user’s workstation.
• Popular vehicles for mobile code include Java applets, ActiveX, JavaScript, and
VBScript
• Unauthorized data access or root compromised
Multiple Threat Malware