Cyber Security
Cyber Security
Cyber Security
Unit -1
Cyber Crime
Cybercrime refers to criminal activities that are committed using computer systems or the
internet. These crimes target individuals, organizations, and even governments, and can have
serious consequences for victims. Understanding the fundamentals of cybercrime is essential
for individuals and organizations to protect themselves from online threats. Here are some key
concepts related to cybercrime:
5. Identity Theft: Identity theft occurs when someone steals another person's personal
information, such as social security numbers, credit card details, or login credentials, to carry
out fraudulent activities. This information can be used to open fraudulent accounts, make
unauthorized transactions, or commit other crimes.
7. Online Fraud: Online fraud refers to various fraudulent schemes conducted on the internet,
such as advance-fee fraud, lottery scams, investment scams, or fake online auctions. These
schemes aim to deceive victims into providing money or sensitive information under false
pretenses.
attacks typically use a network of compromised computers (botnets) to flood the target with
traffic.
10. Data Breaches: A data breach occurs when unauthorized individuals gain access to
sensitive or confidential data. This can happen due to hacking, malware infections, insider
threats, or accidental exposure of data. Breached data can be exploited for financial gain or
used for further cybercrimes.
Preventing and combating cybercrime requires individuals and organizations to employ robust
security measures such as using strong passwords, regularly updating software, employing
firewalls and antivirus software, being cautious of suspicious emails or links, and educating
themselves about the latest threats. Additionally, collaboration between law enforcement
agencies, governments, and cybersecurity professionals is crucial to investigate and prosecute
cybercriminals.
The nature and scope of cybercrime are constantly evolving as technology advances and
criminals adapt their methods. Cybercrime encompasses a wide range of illegal activities that
are committed using computers, networks, and the internet. Here are some key aspects that
highlight the nature and scope of cybercrime:
1. Global Reach: One of the significant characteristics of cybercrime is its borderless nature.
Criminals can operate from anywhere in the world, targeting victims and organizations across
national boundaries. This makes it challenging for law enforcement agencies to investigate and
prosecute cybercriminals effectively.
2. Anonymity and Pseudonymity: The digital environment provides a level of anonymity and
pseudonymity to cybercriminals, allowing them to conceal their identities and operate under
false personas. This anonymity makes it difficult to identify and apprehend offenders,
increasing the complexity of investigations.
- Malware Attacks: Creation and distribution of malicious software such as viruses, worms,
trojans, ransomware, and spyware.
- Online Scams: Various fraudulent schemes conducted online, such as advance fee fraud,
lottery scams, romance scams, and online auction fraud.
- Cyberstalking and Harassment: Using digital platforms to stalk, harass, or intimidate
individuals.
- Data Breaches: Unauthorized access to and theft of sensitive information from databases
and systems.
- Cyber Espionage: Targeted attacks on government agencies, corporations, or individuals to
steal classified or proprietary information.
- Cyberterrorism: Using technology to carry out terrorist activities, disrupt critical
infrastructure, or spread fear and panic.
8. Emerging Threats: As technology evolves, new threats emerge. This includes the rise of
Internet of Things (IoT) devices, which can be compromised and used in botnets for large-scale
attacks. Additionally, emerging technologies such as artificial intelligence and blockchain
present both opportunities and challenges in the context of cybercrime.
Addressing the nature and scope of cybercrime requires international cooperation, robust
legislation, and continuous advancements in cybersecurity measures. It also emphasizes the
importance of public awareness, education, and proactive defense mechanisms to protect
individuals and organizations from cyber threats.
In the context of cybercrime, crimes against individuals refer to illegal activities conducted
online that specifically target individuals, causing harm, exploiting vulnerabilities, or violating
their privacy and rights. Here are some common examples of crimes against individuals in the
realm of cybercrime:
1. Identity Theft: The unauthorized acquisition and use of someone's personal information,
such as social security numbers, bank account details, or login credentials, with the intention
of assuming their identity for fraudulent purposes. This can lead to financial loss, reputation
damage, and other negative consequences for the victim.
sensitive information, such as passwords, credit card numbers, or personal details. Phishing
attacks aim to steal personal and financial information for fraudulent purposes.
3. Online Harassment and Cyberbullying: Using digital platforms, including social media,
emails, or online forums, to harass, intimidate, or threaten individuals. Cyberbullying can cause
significant emotional distress, psychological harm, and negatively impact an individual's
mental well-being.
4. Online Scams and Fraud: Various fraudulent schemes carried out online, such as romance
scams, advance fee fraud (e.g., "419 scams"), fake online auctions, or investment fraud. These
scams aim to deceive individuals into providing money, personal information, or other valuable
assets under false pretenses.
Crimes against individuals in the realm of cybercrime can have far-reaching consequences,
including financial loss, emotional distress, reputational damage, and violation of personal
rights. It is crucial for individuals to be vigilant, practice good cybersecurity hygiene, and report
any suspicious or illegal activities to the appropriate authorities.
2. Malware Attacks: Creating and distributing malicious software, such as viruses, worms,
trojans, ransomware, or spyware, to compromise computer systems or networks. Malware can
lead to data breaches, system failures, financial loss, or unauthorized access to sensitive
information.
5. Data Breaches: Unauthorized access to and extraction of sensitive or confidential data from
databases, systems, or online platforms. Data breaches can result in financial losses, identity
theft, reputational damage, and violations of privacy.
6. Online Fraud: Engaging in fraudulent activities, such as online auctions scams, counterfeit
goods sales, or online payment fraud. Cybercriminals use the internet to deceive individuals or
businesses, resulting in financial loss or obtaining property under false pretenses.
These crimes against property in cybercrime can have significant financial, operational, and
reputational consequences for individuals, businesses, and organizations. Implementing robust
cybersecurity measures, regular system updates, and adopting best practices can help mitigate
the risks and protect against these types of cyber threats.
Cyber Extortion
Cyber extortion is a form of cybercrime where perpetrators use digital means to threaten
individuals or organizations and demand payment or other concessions under the threat of
harm, damage, or exposure of sensitive information. Here's an explanation of cyber extortion:
5. Sextortion: This form of cyber extortion involves threatening victims with the exposure or
distribution of intimate or explicit images or videos unless they pay a ransom or provide
additional explicit content. It preys on the fear of embarrassment or harm to reputation.
7. Email Spoofing: The use of fake or fraudulent email addresses to impersonate a legitimate
sender and demand payment or sensitive information from the victim.
Cyber extortion is a serious crime that can cause significant financial and emotional harm to
individuals and organizations. It is essential to take proactive measures to protect against cyber
extortion, such as implementing robust security protocols, regularly backing up data, and
educating employees and partners about the risks of cyber extortion and how to prevent it. If
you are a victim of cyber extortion, it is crucial to report the incident to the appropriate
authorities and seek professional assistance to mitigate the damage.
Drug Trafficking
Drug trafficking itself is not typically considered a cybercrime, as it primarily involves the
illegal distribution, sale, and transportation of illicit drugs. However, the use of technology and
the internet can be involved in facilitating or aiding drug trafficking activities. Here are some
ways in which cybercrime can intersect with drug trafficking:
2. Online Drug Dealing: The internet and various online platforms play a role in connecting
drug dealers with potential buyers. Social media platforms, messaging apps, and dedicated
websites can be utilized to advertise, negotiate, and arrange drug transactions. Through these
channels, drug traffickers can expand their networks, communicate with buyers, and arrange
the logistics of drug delivery. They may use coded language or discreet communication
methods to avoid detection by law enforcement.
It is important to note that drug trafficking is primarily addressed as a criminal activity under
traditional law enforcement and legal frameworks, focusing on the illicit drug trade and
associated criminal organizations. However, the involvement of technology and cyber-related
activities can complicate the investigation and enforcement efforts related to drug trafficking.
Law enforcement agencies and international organizations continuously work to combat the
use of technology for illicit purposes, including drug trafficking facilitated by cybercrime.
Cyberterrorism
Cyberterrorism refers to the use of computer networks and technology to carry out politically
or ideologically motivated attacks that aim to disrupt or cause harm to individuals,
organizations, or governments. It involves the exploitation of vulnerabilities in computer
systems and networks to commit acts of terrorism, such as stealing sensitive information,
disrupting critical infrastructure, or spreading fear and panic.
3. Methods: Cyberterrorists employ a range of techniques to carry out their attacks. These can
include hacking, malware distribution, denial-of-service (DoS) attacks, information warfare,
social engineering, and phishing, among others. They exploit vulnerabilities in computer
systems and networks to gain unauthorized access or disrupt their functioning.
It's important to note that the field of cyberterrorism is constantly evolving as new technologies
and attack vectors emerge. Efforts to combat cyberterrorism require ongoing vigilance and
adaptation to address the evolving threat landscape.
Cryptanalysis-steganography
Cryptanalysis and steganography are two distinct fields within the broader realm of
information security. Let's explore each of them separately:
1. Cryptanalysis:
Cryptanalysis, also known as codebreaking or cryptographic analysis, is the field of study
focused on analyzing cryptographic systems, such as encryption algorithms, protocols, or
implementations, with the aim of uncovering weaknesses, vulnerabilities, or obtaining
unauthorized access to encrypted information. It involves the systematic examination and
application of various techniques, methods, and algorithms to break or compromise the
security of cryptographic systems.
2. Key recovery: Cryptanalysts aim to determine or retrieve the secret key used for
encryption. This can involve analyzing the encrypted data or ciphertext to deduce information
about the key.
Cryptanalysis techniques can vary depending on the specific encryption algorithm, available
information, computational resources, and attack goals. Some common cryptanalytic
techniques include:
1. Brute-force attacks: Trying all possible keys or combinations systematically until the correct
one is found. This method requires significant computational power and time, especially for
longer keys.
9
Cryptanalysis plays a crucial role in the development and evaluation of cryptographic systems.
By uncovering weaknesses and vulnerabilities, cryptanalysts contribute to improving the
security of encryption algorithms, ensuring the confidentiality, integrity, and authenticity of
sensitive information in various domains, such as communication, e-commerce, finance, and
national security.
2. Steganography:
Steganography is the practice of concealing secret or sensitive information within an
innocuous-looking carrier medium, such as an image, audio file, video, or text, without
arousing suspicion. Unlike cryptography, which focuses on making messages unreadable,
steganography aims to hide the existence of the message itself.
1. Concealment: Steganography techniques are employed to embed secret data within the
carrier medium, making it imperceptible or difficult to detect for an observer who is not aware
of the hidden information.
Steganography techniques vary depending on the type of carrier medium used. Some
common methods include:
In a cryptanalysis context, the relationship can arise when a cryptanalyst suspects the use of
steganography to hide cryptographic keys, plaintexts, or other critical information. In such
cases, the cryptanalyst may employ steganalysis techniques, which involve analyzing the
carrier medium to detect the presence of hidden information and potentially recover the
concealed data.
Stream Ciphers
Stream ciphers are a type of symmetric encryption algorithm that encrypts data on a bit-by-
bit or byte-by-byte basis, producing a stream of ciphertext. They operate by combining the
plaintext with a keystream, which is generated by a key. Initially, a key(k) will be supplied as
input to pseudorandom bit generator and then it produces a random 8-bit output which is
treated as keystream.. Each bit or byte of the plaintext is typically encrypted using an
exclusive OR (XOR) operation with the corresponding bit or byte of the keystream.
1. Key and Keystream Generation: Stream ciphers require a secret encryption key to generate
the keystream. The keystream generator algorithm takes the key as input and produces a
sequence of pseudo-random bits or bytes that are used for encryption.
2. Encryption Process: To encrypt the plaintext, each bit or byte is combined with the
corresponding bit or byte of the keystream using XOR. The result is the corresponding bit or
byte of the ciphertext. The same process is repeated for the entire plaintext to generate the
entire stream of ciphertext.
3. Synchronization: Both the sender and the receiver need to be synchronized with the
keystream generation process. They should use the same key and start generating the
keystream from the same initial state. This ensures that the encryption and decryption
processes are aligned and produce the correct plaintext.
4. Efficiency: Stream ciphers are generally efficient and suitable for real-time applications
because they process data on a bit or byte level. They are often used in scenarios where data
is continuously transmitted, such as wireless communication or streaming media.
5. Security Considerations: Stream ciphers can be vulnerable to certain types of attacks, such
as known-plaintext attacks or key recovery attacks, if the keystream generator is weak or if
the same keystream is reused. Proper implementation and management of the key and the
keystream generation process are crucial for maintaining security.
6. Examples: Some well-known stream ciphers include RC4, Salsa20, ChaCha20, and A5/1
(used in GSM mobile networks).
Encryption:
For Encryption,
• Plain Text and Keystream produces Cipher Text (Same keystream will be used
for decryption.).
• The Plaintext will undergo XOR operation with keystream bit-by-bit and produces
the Cipher Text.
Example –
Plain Text : 10011001
Keystream : 11000011
`````````````````````
Cipher Text : 01011010
Decryption:
For Decryption,
• Cipher Text and Keystream gives the original Plain Text (Same keystream will be
used for encryption.).
• The Ciphertext will undergo XOR operation with keystream bit-by-bit and
produces the actual Plain Text.
Example –
12
Block Ciphers
Block ciphers are a type of symmetric encryption algorithm that encrypts data in fixed-size
blocks. Unlike stream ciphers that encrypt data on a bit-by-bit or byte-by-byte basis, block
ciphers process data in fixed-size chunks, typically blocks of 64 or 128 bits.
1. Block Size: Block ciphers operate on fixed-size blocks of data, usually consisting of a specific
number of bits, such as 64 bits (as in DES) or 128 bits (as in AES). The input plaintext is divided
into these fixed-size blocks, and encryption is performed independently on each block.
2. Key-Dependent Encryption: Block ciphers utilize a secret encryption key to determine the
transformation applied to each block of plaintext. The same key is used for both encryption
and decryption. The key size can vary depending on the specific block cipher algorithm.
3. Encryption Process: A block cipher employs a round-based encryption process. Each round
consists of a series of transformations, such as substitution, permutation, and key mixing. The
number of rounds varies depending on the cipher's design, with more rounds generally
providing stronger security.
4. Modes of Operation: Block ciphers are commonly used in combination with different
modes of operation to handle data larger than a single block. These modes define how
13
multiple blocks are processed and how they interact with each other. Popular modes include
Electronic Codebook (ECB), Cipher Block Chaining (CBC), Counter (CTR), and Galois/Counter
Mode (GCM).
5. Padding: Block ciphers usually require padding to handle plaintext that is not a perfect
multiple of the block size. Padding ensures that the plaintext can be divided into complete
blocks before encryption.
6. Security Considerations: Block ciphers aim to provide confidentiality and data integrity. The
security of block ciphers relies on the strength of the encryption algorithm, the size and
randomness of the encryption key, and the proper implementation and management of the
cryptographic system.
7. Examples: Well-known block ciphers include Advanced Encryption Standard (AES), Data
Encryption Standard (DES), Triple DES (3DES), Blowfish, and Twofish.
Block ciphers offer robust security and are widely used for encrypting large files, messages,
or data at rest. They provide a high level of security when properly implemented and
managed. The choice of block cipher and mode of operation depends on factors such as the
desired level of security, performance requirements, and compatibility with existing systems.
The basic scheme of a block cipher is depicted as follows −
Modern block ciphers are cryptographic algorithms designed to provide secure and efficient
encryption of data in fixed-size blocks. They are built upon fundamental principles that ensure
their security and strength against various attacks. Here are some key principles and features
of modern block ciphers:
1. Confusion and Diffusion: Modern block ciphers employ confusion and diffusion techniques
to provide security. Confusion refers to making the relationship between the plaintext and the
ciphertext as complex as possible, making it difficult to deduce the key. Diffusion refers to
spreading the influence of one plaintext bit or block over many ciphertext bits or blocks,
ensuring that small changes in the plaintext result in significant changes in the ciphertext.
2. Key Expansion: A modern block cipher generates a set of round keys from the original
encryption key. The round keys are derived using a key schedule algorithm, which produces a
14
unique subkey for each round of encryption. Key expansion adds complexity and ensures that
a small change in the original key leads to significant changes in the derived round keys.
4. Feistel Network Structure: Some modern block ciphers, such as the Data Encryption
Standard (DES) and Triple DES (3DES), use a Feistel network structure. In this structure, the
input block is divided into two halves, and a series of rounds are performed, swapping the
halves and applying different functions based on the key.
5. Multiple Rounds: Modern block ciphers typically use multiple rounds of encryption to
enhance security. Each round involves a combination of substitution, permutation, and key
mixing operations. The number of rounds varies depending on the specific cipher, with a higher
number of rounds generally providing increased security at the cost of increased computation
time.
6. Avalanche Effect: Modern block ciphers aim to achieve the avalanche effect, where a small
change in the input (plaintext or key) results in a significant change in the output (ciphertext).
This property ensures that even a slight modification in the input produces a completely
different encrypted output, increasing the security of the cipher.
7. Security Analysis: Modern block ciphers undergo extensive security analysis, including
evaluation against known cryptographic attacks. They are designed to resist various attacks,
such as differential cryptanalysis, linear cryptanalysis, and brute-force attacks. The design
principles and security properties of modern block ciphers are thoroughly studied and
scrutinized by the cryptographic community.
Examples of modern block ciphers include the Advanced Encryption Standard (AES), which
is widely adopted for secure communication and data protection, and the Serpent and Twofish
ciphers, which are also considered secure and robust.
These principles and features collectively contribute to the security, strength, and efficiency of
modern block ciphers, ensuring the confidentiality and integrity of sensitive data in a wide
range of applications.
The theory of confusion and diffusion aims to provide a mathematical framework for achieving
secure and robust encryption. It introduces two essential properties that a good encryption
algorithm should possess: confusion and diffusion.
15
1. Confusion:
Confusion aims to make the relationship between the ciphertext and the encryption key as
complex and obscured as possible. It ensures that even a slight change in the encryption key
causes a significant change in the resulting ciphertext. This property helps to hide any statistical
or structural patterns that may exist in the plaintext or the encryption process.
2. Diffusion:
Diffusion aims to spread the influence of individual elements of the plaintext throughout the
ciphertext, ensuring that any small changes in the plaintext have a wide-ranging impact on the
resulting ciphertext. It makes it difficult to discern any statistical patterns or relationships
between the plaintext and the ciphertext.
The combination of confusion and diffusion in an encryption algorithm helps to achieve several
important goals:
- Increased Security: Confusion and diffusion techniques increase the complexity of the
relationship between the plaintext, ciphertext, and encryption key. This makes it harder for an
attacker to exploit patterns or statistical properties of the data and the encryption algorithm.
- Avalanche Effect: The confusion and diffusion properties contribute to the avalanche effect,
where even a small change in the input (plaintext or key) produces a significant change in the
output (ciphertext). This effect ensures that any modification in the input propagates
unpredictably throughout the encryption process.
Shannon's theory of confusion and diffusion provided a theoretical foundation for the design
and evaluation of encryption algorithms, and it influenced the development of modern
symmetric encryption techniques, including block ciphers. It remains a fundamental principle
in modern cryptographic design, guiding the construction of secure and efficient encryption
algorithms.
Fiestal structure
Feistel Cipher is not a specific scheme of block cipher. It is a design model from which many
different block ciphers are derived. DES is just one example of a Feistel Cipher. The Feistel
structure is based on the concept of dividing the plaintext into two equal-sized parts and
performing a series of rounds of transformations on these parts. The structure provides a
balanced and iterative approach to encryption and decryption, offering security and flexibility
in the design of block ciphers.A cryptographic system based on Feistel cipher structure uses
the same algorithm for both encryption and decryption.
Encryption Process
The encryption process uses the Feistel structure consisting multiple rounds of processing of
the plaintext, each round consisting of a “substitution” step followed by a permutation step.
Feistel Structure is shown in the following illustration −
• The input block to each round is divided into two halves that can be denoted as
L and R for the left half and the right half.
• In each round, the right half of the block, R, goes through unchanged. But the
left half, L, goes through an operation that depends on R and the encryption key.
First, we apply an encrypting function ‘f’ that takes two input − the key K and
R. The function produces the output f(R,K). Then, we XOR the output of the
mathematical function with L.
• In real implementation of the Feistel Cipher, such as DES, instead of using the
whole encryption key during each round, a round-dependent key (a subkey) is
17
derived from the encryption key. This means that each round uses a different
key, although all these subkeys are related to the original key.
• The permutation step at the end of each round swaps the modified L and
unmodified R. Therefore, the L for the next round would be R of the current
round. And R for the next round be the output L of the current round.
• Above substitution and permutation steps form a ‘round’. The number of rounds
are specified by the algorithm design.
• Once the last round is completed then the two sub blocks, ‘R’ and ‘L’ are
concatenated in this order to form the ciphertext block.
The difficult part of designing a Feistel Cipher is selection of round function ‘f’. In order to be
unbreakable scheme, this function needs to have several important properties that are beyond
the scope of our discussion.
Decryption Process
The process of decryption in Feistel cipher is almost similar. Instead of starting with a block of
plaintext, the ciphertext block is fed into the start of the Feistel structure and then the process
thereafter is exactly the same as described in the given illustration.
The process is said to be almost similar and not exactly same. In the case of decryption, the
only difference is that the subkeys used in encryption are used in the reverse order.
The final swapping of ‘L’ and ‘R’ in last step of the Feistel Cipher is essential. If these are not
swapped then the resulting ciphertext could not be decrypted using the same algorithm.
Number of Rounds
The number of rounds used in a Feistel Cipher depends on desired security from the system.
More number of rounds provide more secure system. But at the same time, more rounds
mean the inefficient slow encryption and decryption processes. Number of rounds in the
systems thus depend upon efficiency–security tradeoff.
The Data Encryption Standard (DES) is a symmetric encryption algorithm that was developed
in the early 1970s by IBM in collaboration with the National Bureau of Standards (now known
as the National Institute of Standards and Technology, or NIST). DES became the most widely
used encryption algorithm for several decades and was adopted as a federal standard in the
United States.
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The block size
is 64-bit. Though, key length is 64-bit, DES has an effective key length of 56 bits, since 8 of
the 64 bits of the key are not used by the encryption algorithm (function as check bits only).
General Structure of DES is depicted in the following illustration −
18
Since DES is based on the Feistel Cipher, all that is required to specify DES is −
• Round function
• Key schedule
• Any additional processing − Initial and final permutation
The initial and final permutations are straight Permutation boxes (P-boxes) that are inverses of
each other. They have no cryptography significance in DES. The initial and final permutations
are shown as follows −
19
AD
Round Function
The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to the
rightmost 32 bits to produce a 32-bit output.
• Expansion Permutation Box − Since right input is 32-bit and round key is a 48-
bit, we first need to expand right input to 48 bits. Permutation logic is graphically
depicted in the following illustration −
• XOR (Whitener). − After the expansion permutation, DES does XOR operation
on the expanded right section and the round key. The round key is used only in
this operation.
20
• Substitution Boxes. − The S-boxes carry out the real mixing (confusion). DES
uses 8 S-boxes, each with a 6-bit input and a 4-bit output. Refer the following
illustration −
• There are a total of eight S-box tables. The output of all eight s-boxes is then
combined in to 32 bit section.
• Straight Permutation − The 32 bit output of S-boxes is then subjected to the
straight permutation with rule shown in the following illustration:
Key Generation
The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key. The process of
key generation is depicted in the following illustration −
21
The logic for Parity drop, shifting, and Compression P-box is given in the DES description.
DES Analysis
The DES satisfies both the desired properties of block cipher. These two properties make
cipher very strong.
• Avalanche effect − A small change in plaintext results in the very great change
in the ciphertext.
• Completeness − Each bit of ciphertext depends on many bits of plaintext.
During the last few years, cryptanalysis have found some weaknesses in DES when key
selected are weak keys. These keys shall be avoided.
DES has proved to be a very well designed block cipher. There have been no significant
cryptanalytic attacks on DES other than exhaustive key search.
Strength of Data encryption standard (DES)
Data encryption standard (DES) is a symmetric key block cipher algorithm. The algorithm is
based on Feistel network. The algorithm uses a 56-bit key to encrypt data in 64-bit blocks.
There are mainly two categories of concerns about the strength of Data encryption standard.
They are:
1. Concerns about the particular algorithm used.
2. Concerns about the usage of key of size 56-bit.
The first concern regarding the algorithm used addresses the possibility of cryptanalysis by
making use of the DES algorithm characteristics. A more severe concern is about the length
of secret key used. There can be (approximately 7.2 × keys) possible keys
with a key length of 56 bits. Thus, a brute force attack appears to be impractical.
22
Assuming that on an average one has to search half the key space, to break the cipher text, a
system performing one DES encryption per microsecond might require more than thousand
years. But, the assumption of one DES encryption per microsecond is too conservative. In
July 1998, DES was finally proved to be insecure when the Electronic Frontier Foundation
(EFF) had broken a DES encryption. The encryption was broken with the help of a special-
purpose “DES cracker” machine. It was reported that the attack took less than 3 days.
Simply running through all possible keys won’t result in cracking the DES encryption. Unless
known plain text is given, the attacker must be able to differentiate the plain text from other
data. Some degree of knowledge about the target plain text and some techniques for
automatically distinguishing plain text from garble are required to supplement the brute-
force approach. If brute force attack is the only means to crack the DES encryption
algorithm, then using longer keys will obviously help us to counter such attacks. An
algorithm is guaranteed unbreakable by brute force if a 128- bit key is used.
The differential cryptanalysis, linear cryptanalysis, are examples for statistical attacks on
DES algorithm. Few of the important alternatives for DES are AES (Advanced Encryption
Standard) and triple DES.
Block cipher modes of operation are techniques used to apply a block cipher, such as AES or
DES, to encrypt or decrypt data that is larger than the block size of the cipher. These modes
define how the cipher is applied to the input data and how it handles issues such as data
confidentiality, integrity, and padding. Here are some commonly used block cipher modes of
operation:
This mode is a most straightforward way of processing a series of sequentially listed message
blocks.
Operation
• The user takes the first block of plaintext and encrypts it with the key to
produce the first block of ciphertext.
• He then takes the second block of plaintext and follows the same process with
same key and so on so forth.
The ECB mode is deterministic, that is, if plaintext block P1, P2,…, Pm are encrypted twice
under the same key, the output ciphertext blocks will be the same.
In fact, for a given key technically we can create a codebook of ciphertexts for all possible
plaintext blocks. Encryption would then entail only looking up for required plaintext and select
the corresponding ciphertext. Thus, the operation is analogous to the assignment of code
words in a codebook, and hence gets an official name − Electronic Codebook mode of
operation (ECB). It is illustrated as follows −
23
CBC mode of operation provides message dependence for generating ciphertext and makes
the system non-deterministic.
Operation
The operation of CBC mode is depicted in the following illustration. The steps are as follows
−
• Load the n-bit Initialization Vector (IV) in the top register.
• XOR the n-bit plaintext block with data value in top register.
• Encrypt the result of XOR operation with underlying block cipher with key K.
• Feed ciphertext block into top register and continue the operation till all
plaintext blocks are processed.
• For decryption, IV data is XORed with first ciphertext block decrypted. The first
ciphertext block is also fed into to register replacing IV for decrypting next
ciphertext block.
Advantage of CBC over ECB is that changing IV results in different ciphertext for identical
message. On the drawback side, the error in transmission gets propagated to few further
block during decryption due to chaining effect.
It is worth mentioning that CBC mode forms the basis for a well-known data origin
authentication mechanism. Thus, it has an advantage for those applications that require both
symmetric encryption and data origin authentication.
In this mode, each ciphertext block gets ‘fed back’ into the encryption process in order to
encrypt the next plaintext block.
Operation
The operation of CFB mode is depicted in the following illustration. For example, in the
present system, a message block has a size ‘s’ bits where 1 < s < n. The CFB mode requires an
initialization vector (IV) as the initial random n-bit input block. The IV need not be secret.
Steps of operation are −
• Load the IV in the top register.
• Encrypt the data value in top register with underlying block cipher with key K.
• Take only ‘s’ number of most significant bits (left bits) of output of encryption
process and XOR them with ‘s’ bit plaintext message block to generate
ciphertext block.
• Feed ciphertext block into top register by shifting already present data to the
left and continue the operation till all plaintext blocks are processed.
• Essentially, the previous ciphertext block is encrypted with the key, and then
the result is XORed to the current plaintext block.
• Similar steps are followed for decryption. Pre-decided IV is initially loaded at
the start of decryption.
Apparently, CFB mode is converting a block cipher into a type of stream cipher. The
encryption algorithm is used as a key-stream generator to produce key-stream that is placed
in the bottom register. This key stream is then XORed with the plaintext as in case of stream
cipher.
By converting a block cipher into a stream cipher, CFB mode provides some of the
advantageous properties of a stream cipher while retaining the advantageous properties of a
block cipher.
On the flip side, the error of transmission gets propagated due to changing of blocks.
It involves feeding the successive output blocks from the underlying block cipher back to it.
These feedback blocks provide string of bits to feed the encryption algorithm which act as the
key-stream generator as in case of CFB mode.
The key stream generated is XOR-ed with the plaintext blocks. The OFB mode requires an IV
as the initial random n-bit input block. The IV need not be secret.
The operation is depicted in the following illustration −
It can be considered as a counter-based version of CFB mode without the feedback. In this
mode, both the sender and receiver need to access to a reliable counter, which computes a
new shared value each time a ciphertext block is exchanged. This shared counter is not
necessarily a secret value, but challenge is that both sides must keep the counter
synchronized.
Operation
Both encryption and decryption in CTR mode are depicted in the following illustration. Steps
in operation are −
• Load the initial counter value in the top register is the same for both the sender
and the receiver. It plays the same role as the IV in CFB (and CBC) mode.
26
• Encrypt the contents of the counter with the key and place the result in the
bottom register.
• Take the first plaintext block P1 and XOR this to the contents of the bottom
register. The result of this is C1. Send C1 to the receiver and update the counter.
The counter update replaces the ciphertext feedback in CFB mode.
• Continue in this manner until the last plaintext block has been encrypted.
• The decryption is the reverse process. The ciphertext block is XORed with the
output of encrypted contents of counter value. After decryption of each
ciphertext block counter is updated as in case of encryption.
Triple DES-AES, also known as TDEA-AES or TDEA/AES, is a hybrid encryption scheme that
combines Triple DES (3DES) and the Advanced Encryption Standard (AES) algorithms. It is
primarily used for compatibility purposes when transitioning from older systems that use
3DES to newer systems that employ AES.
In Triple DES (3DES), the DES encryption algorithm is applied three times in sequence, using
either two or three unique keys. The three keys are often referred to as Key1, Key2, and Key3.
The process involves encrypting the plaintext with Key1, decrypting the result with Key2, and
then encrypting the output again with Key3. This layered encryption provides a higher level
of security compared to single DES, as it effectively increases the key size to 168 bits.
27
AES, on the other hand, is a block cipher that uses a fixed block size of 128 bits and supports
key sizes of 128, 192, and 256 bits. It offers improved security and efficiency compared to DES
and 3DES.
The combination of Triple DES and AES in Triple DES-AES involves using 3DES to encrypt the
data, and then using AES to encrypt the 3DES key. This way, the 3DES key is protected by AES
encryption.
The typical process of using Triple DES-AES encryption involves the following steps:
Triple DES-AES provides a way to leverage the compatibility of 3DES while also incorporating
the enhanced security of AES. However, it's important to note that AES itself is considered
secure and provides sufficient security for most applications. As such, the need for Triple DES-
AES is typically limited to specific scenarios where compatibility with legacy systems is
required. In general, it is recommended to use AES alone for secure encryption purposes
whenever possible.
2. Differential Pairs: Differential cryptanalysis relies on pairs of plaintexts that exhibit specific
differences, called differential pairs. These pairs are selected based on the desired
characteristics identified in the previous step.
3. Encryption and Analysis: The selected differential pairs are then encrypted using the same
key. By comparing the resulting ciphertexts, statistical analysis is performed to observe any
correlations or biases that indicate the presence of the key.
4. Key Recovery: If enough differential pairs are collected and analyzed, it is possible to
deduce information about the key. Differential cryptanalysis involves building a differential
trail through the rounds of the DES algorithm and narrowing down the possible key
candidates based on the observed differentials.
It's important to note that differential cryptanalysis of DES requires a significant amount of
chosen plaintext-ciphertext pairs to be effective. The attack complexity increases
exponentially with the number of rounds in the DES algorithm, making it less practical for a
full-scale attack on the complete algorithm.
To mitigate the vulnerability to differential cryptanalysis, the Triple DES (3DES) algorithm was
developed. By applying multiple rounds of DES encryption, 3DES significantly reduces the
effectiveness of differential cryptanalysis, making it much more resistant to this attack.
Since DES is now considered relatively weak and outdated, modern cryptographic algorithms
such as the Advanced Encryption Standard (AES) have replaced it as the preferred choice for
secure symmetric encryption. AES offers higher security and resistance against differential
cryptanalysis compared to DES.
Linear cryptanalysis is another technique used to analyze and potentially break cryptographic
algorithms, including the Data Encryption Standard (DES). It is based on finding linear
approximations of the encryption process that exhibit a statistical bias, which can be used to
deduce information about the secret key.
1. Linear Approximations: The first step in linear cryptanalysis is to find linear approximations
of the DES encryption process. These linear approximations are mathematical expressions
that relate the input bits to the output bits of the encryption algorithm.
2. Linear Relations: Linear cryptanalysis aims to find linear approximations that hold with a
non-zero probability. By analyzing the statistical biases of these linear approximations, it is
possible to deduce information about the key bits.
29
4. Statistical Analysis: The chosen plaintext-ciphertext pairs are encrypted using the same key.
The statistical properties of the linear relations are then analyzed to detect any biases or
correlations between the plaintext and ciphertext bits.
5. Key Recovery: By examining the statistical biases observed in the encrypted data, it is
possible to deduce information about the key bits. With enough plaintext-ciphertext pairs and
accurate linear approximations, the key can be recovered using various techniques such as
statistical modeling or exhaustive search methods.
To enhance the security against linear cryptanalysis, the Triple DES (3DES) algorithm is often
used. The application of multiple rounds in 3DES helps to mitigate the effectiveness of linear
cryptanalysis and makes it more resistant to this attack.
However, it is important to note that DES is now considered relatively weak and outdated.
Modern cryptographic algorithms like the Advanced Encryption Standard (AES) provide
stronger security against linear cryptanalysis and other advanced cryptanalytic techniques.
Unit -2
MD5 Algorithm
MD5 is a cryptographic hash function algorithm that takes the message as input of any
length and changes it into a fixed-length message of 16 bytes. MD5 algorithm stands for
the message-digest algorithm. MD5 was developed as an improvement of MD4, with
advanced security purposes. The output of MD5 (Digest size) is always 128 bits.
MD5 was developed in 1991 by Ronald Rivest.
Use Of MD5 Algorithm:
30
MD5 Algorithm
1. Simplicity: MD5 is a relatively simple and straightforward algorithm to implement and use.
2. Fast Computation: MD5 can quickly calculate the hash value for a given input, making it
efficient for applications that require speedy processing.
3. Widely Supported: MD5 has been widely supported by various software and programming
languages, making it accessible and compatible across different platforms.
3. Limited Hash Length: The fixed 128-bit output of MD5 provides a relatively small hash
space, which increases the likelihood of collisions when compared to longer hash functions
like SHA-256 or SHA-3.
4. Security Weaknesses: MD5 lacks several security features that modern cryptographic hash
functions possess, such as resistance to length extension attacks and providing a variable-
length output.
5. Deprecated for Cryptographic Use: Due to the vulnerabilities and weaknesses, MD5 is
strongly discouraged for cryptographic applications, such as digital signatures, certificate
authorities, or password storage. Secure alternatives like SHA-256 or SHA-3 are
recommended instead.
The MD5 algorithm, which stands for Message Digest Algorithm 5, is a widely used
cryptographic hash function. While it is no longer considered secure for cryptographic
purposes, it can still find applications in non-cryptographic scenarios such as integrity checks
and basic authentication. This essay aims to provide a detailed explanation of how MD5 can
be applied in these contexts.
Integrity Checks:
Integrity checks involve verifying the integrity of data during transmission or storage. MD5
can be utilized as a checksum or hash function to accomplish this. The process typically
involves the following steps:
1. Calculation: The sender calculates the MD5 hash of the data before transmission. This is
achieved by applying the MD5 algorithm to the entire content of the file or message, resulting
in a 128-bit hash value.
2. Transmission: The data, along with the MD5 hash value, is sent to the recipient.
3. Verification: Upon receiving the data, the recipient applies the MD5 algorithm to the
received data and generates a new MD5 hash value. The recipient then compares this newly
calculated hash value with the one received along with the data. If the two hash values match,
it indicates that the data has not been altered during transmission.
Integrity checks using MD5 can be useful for detecting accidental changes or corruption in
data. However, it is important to note that MD5 is vulnerable to intentional tampering by
attackers who can generate collisions (different data producing the same MD5 hash).
Therefore, for security-critical applications, it is recommended to use more secure hash
functions like SHA-256 or SHA-3.
Basic Authentication:
33
MD5 can be employed for basic authentication purposes, although it is not secure for storing
passwords in its raw form. The process of basic authentication using MD5 typically involves
the following steps:
2. Authentication Process: When a user attempts to log in, the entered password is hashed
using MD5, and the resulting hash is compared with the stored hash value associated with
the user's account. If the two hash values match, the authentication is considered successful,
and the user is granted access.
However, it is crucial to note that using MD5 for password storage is highly discouraged due
to its vulnerability to various attacks, such as rainbow table attacks. Rainbow tables are
precomputed tables that map hash values to their corresponding input data, making it easier
for attackers to reverse-engineer passwords from MD5 hashes. For secure password storage,
it is recommended to use slow, adaptive hashing algorithms like bcrypt, scrypt, or Argon2,
which are specifically designed to resist attacks and provide better security guarantees.
In conclusion, while MD5 is no longer considered secure for cryptographic purposes, it still
finds application in non-cryptographic scenarios such as integrity checks and basic
authentication. However, it is important to be aware of the vulnerabilities and weaknesses of
MD5 and to choose more secure hashing algorithms for security-critical applications.
Digital signatures
Digital signatures are the public-key primitives of message authentication. In the physical
world, it is common to use handwritten signatures on handwritten or typed messages. They
are used to bind signatory to the message.
Similarly, a digital signature is a technique that binds a person/entity to the digital data. This
binding can be independently verified by receiver as well as any third party.
Digital signature is a cryptographic value that is calculated from the data and a secret key
known only by the signer.
In real world, the receiver of message needs assurance that the message belongs to the
sender and he should not be able to repudiate the origination of that message. This
requirement is very crucial in business applications, since likelihood of a dispute over
exchanged data is very high.
Model of Digital Signature
As mentioned earlier, the digital signature scheme is based on public key cryptography. The
model of digital signature scheme is depicted in the following illustration −
34
receiver can safely deny the message assuming that data integrity has been
breached.
• Non-repudiation − Since it is assumed that only the signer has the knowledge
of the signature key, he can only create unique signature on a given data. Thus
the receiver can present data and the digital signature to a third party as
evidence if any dispute arises in the future.
By adding public-key encryption to digital signature scheme, we can create a cryptosystem
that can provide the four essential elements of security namely − Privacy, Authentication,
Integrity, and Non-repudiation.
Encryption with Digital Signature
In many digital communications, it is desirable to exchange an encrypted messages than
plaintext to achieve confidentiality. In public key encryption scheme, a public (encryption) key
of sender is available in open domain, and hence anyone can spoof his identity and send any
encrypted message to the receiver.
This makes it essential for users employing PKC for encryption to seek digital signatures along
with encrypted data to be assured of message authentication and non-repudiation.
This can archived by combining digital signatures with encryption scheme. Let us briefly
discuss how to achieve this requirement. There are two possibilities, sign-then-
encrypt and encrypt-then-sign.
However, the crypto system based on sign-then-encrypt can be exploited by receiver to spoof
identity of sender and sent that data to third party. Hence, this method is not preferred. The
process of encrypt-then-sign is more reliable and widely adopted. This is depicted in the
following illustration −
The receiver after receiving the encrypted data and signature on it, first verifies the signature
using sender’s public key. After ensuring the validity of the signature, he then retrieves the
data through decryption using his private key.
Authentication Protocols
Authentication protocols are sets of rules and procedures used to verify the identities of
individuals, devices, or entities in a networked environment. These protocols ensure that only
authorized users or entities gain access to specific resources or services.
Types of Authentication
There are many different types of authentication protocols in use today, each with its own
strengths and weaknesses. Here are some common types of authentication −
• Password-based authentication − This is the most common form of
authentication, in which a user provides a username and password to log in to
a system or access a protected resource. Password-based authentication is
36
• Step-1:
User login and request services on the host. Thus user requests for ticket-granting
37
service.
• Step-2:
Authentication Server verifies user’s access right using database and then gives ticket-
granting-ticket and session key. Results are encrypted using the Password of the user.
• Step-3:
The decryption of the message is done using the password then send the ticket to Ticket
Granting Server. The Ticket contains authenticators like user names and network
addresses.
• Step-4:
Ticket Granting Server decrypts the ticket sent by User and authenticator verifies the
request then creates the ticket for requesting services from the Server.
• Step-5:
The user sends the Ticket and Authenticator to the Server.
• Step-6:
The server verifies the Ticket and authenticators then generate access to the service.
After this User can access the services.
Kerberos Limitations
• Each network service must be modified individually for use with Kerberos
• It doesn’t work well in a timeshare environment
• Secured Kerberos Server
• Requires an always-on Kerberos server
• Stores all passwords are encrypted with a single key
• Assumes workstations are secure
• May result in cascading loss of trust.
• Scalability
Is Kerberos Infallible?
No security measure is 100% impregnable, and Kerberos is no exception. Because it’s been
around for so long, hackers have had the ability over the years to find ways around it,
typically through forging tickets, repeated attempts at password guessing (brute
force/credential stuffing), and the use of malware, to downgrade the encryption.
Despite this, Kerberos remains the best access security protocol available today. The
protocol is flexible enough to employ stronger encryption algorithms to combat new
threats, and if users employ good password-choice guidelines, you shouldn’t have a
problem!
38
Although Kerberos can be found everywhere in the digital world, it is commonly used in
secure systems that rely on robust authentication and auditing capabilities. Kerberos is used
for Posix, Active Directory, NFS, and Samba authentication. It is also an alternative
authentication system to SSH, POP, and SMTP.
Applications
LDAP directory services are used to store and manage information about users, devices, and
other objects in an organization. This information is organized in a hierarchical structure, with
each object represented by an entry in the directory. LDAP enables users and applications to
access and manipulate this information over a network using standard commands and
protocols.
LDAP is typically used to authenticate users and devices, to look up information about users
and devices, and to manage access to network resources. It is often used in conjunction with
other protocols, such as Kerberos, to provide a complete solution for authentication and
access control.
3.OAuth2
OAuth2 (Open Authorization 2.0) is an open standard for authorization that enables users to
grant third-party applications access to their resources (such as data or services) without
sharing their passwords. OAuth2 is used to enable secure authorization from web, mobile,
and desktop applications.
The OAuth2 protocol works by allowing a user to grant a third-party application access to
their resources without sharing their password. Instead, the user is redirected to a login page,
where they can grant access to the third-party application by authenticating with their
username and password. The third-party application can then use an access token to access
the user's resources on their behalf.
40
4.SAML
SAML (Security Assertion Markup Language) is a standard protocol used to securely exchange
authentication and authorization data between organizations. It is commonly used to enable
single sign-on (SSO) and to provide secure access to web-based resources.
The SAML protocol works by allowing a user to authenticate with a SAML identity provider
(IdP), which is a system that verifies the user's identity and issues an assertion (a statement)
about the user's identity. The assertion is then provided to a SAML service provider (SP),
which is a system that provides access to a web-based resource. The SP uses the assertion to
grant the user access to the resource without requiring the user to authenticate again.
5.RADIUS
RADIUS (Remote Authentication Dial-In User Service) is a networking protocol used to
manage and authenticate users who connect to a network. It is commonly used to
authenticate users who connect to a network using a dial-up connection, but it can also be
used to authenticate users who connect to a network using other technologies, such as
wireless or VPN.
The RADIUS protocol works by allowing a user to authenticate with a RADIUS server, which
is a system that verifies the user's identity and authorizes their access to the network. When
a user attempts to connect to the network, the RADIUS server receives a request for access
and authenticates the user using the user's credentials (such as a username and password).
41
If the user is authenticated, the RADIUS server grants access to the network and assigns the
user a set of network parameters (such as an IP address and a subnet mask).
Sender Side : In DSS Approach, a hash code is generated out of the message and following
inputs are given to the signature function –
1. The hash code.
2. The random number ‘k’ generated for that particular signature.
3. The private key of the sender i.e., PR(a).
4. A global public key(which is a set of parameters for the communicating
principles) i.e., PU(g).
These input to the function will provide us with the output signature containing two
components – ‘s’ and ‘r’. Therefore, the original message concatenated with the signature
is sent to the receiver.
Receiver Side : At the receiver end, verification of the sender is done. The hash code of the
sent message is generated. There is a verification function which takes the following inputs
–
1. The hash code generated by the receiver.
2. Signature components ‘s’ and ‘r’.
3. Public key of the sender.
4. Global public key.
The output of the verification function is compared with the signature component ‘r’. Both
the values will match if the sent signature is valid because only the sender with the help of
it private key can generate a valid signature.
Benefits of advanced signature:
1.A computerized signature gives better security in the exchange. Any unapproved
42
X.509
X.509 is a digital certificate that is built on top of a widely trusted standard known as ITU or
International Telecommunication Union X.509 standard, in which the format of PKI
certificates is defined. X.509 digital certificate is a certificate-based authentication security
framework that can be used for providing secure transaction processing and private
information. These are primarily used for handling the security and identity in computer
networking and internet-based communications.
Working of X.509 Authentication Service Certificate:
The core of the X.509 authentication service is the public key certificate connected to each
user. These user certificates are assumed to be produced by some trusted certification
authority and positioned in the directory by the user or the certified authority. These
directory servers are only used for providing an effortless reachable location for all users so
that they can acquire certificates. X.509 standard is built on an IDL known as ASN.1. With
the help of Abstract Syntax Notation, the X.509 certificate format uses an associated public
and private key pair for encrypting and decrypting a message.
Once an X.509 certificate is provided to a user by the certified authority, that certificate is
attached to it like an identity card. The chances of someone stealing it or losing it are less,
unlike other unsecured passwords. With the help of this analogy, it is easier to imagine how
this authentication works: the certificate is basically presented like an identity at the
resource that requires authentication.
43
• Subject Name: Tells about the name of the user to whom this certificate has
been issued.
• Subject’s public key information: It defines the subject’s public key along with
an identifier of the algorithm for which this key is supposed to be used.
• Extension block: This field contains additional standard information.
• Signature: This field contains the hash code of all other fields which is
encrypted by the certified authority private key.
Key component and feature of x.509
1. Certification Authorities (CAs): X.509 certificates are issued by trusted entities known as
Certification Authorities (CAs). CAs are responsible for verifying the identity of certificate
applicants and signing their certificates using their private key. The CA's public key is pre-
installed or distributed through trusted means to enable the verification of the CA-signed
certificates.
2. Public Key Infrastructure (PKI): X.509 certificates are a key component of a PKI system.
PKI is a framework that facilitates the secure management of public key cryptography,
including key generation, distribution, revocation, and certificate validation. X.509
certificates enable the establishment of trust between entities in a PKI by verifying the
authenticity and integrity of digital identities.
3. Certificate Chains: X.509 allows for the creation of certificate chains or paths, where a
certificate is signed by another certificate. This chain of trust enables the validation of
certificates back to a trusted root CA. Certificate chains help establish trust in situations
where a single CA may not directly issue all certificates in a system.
X.509 is used in a wide range of applications that require secure authentication, data
integrity, and confidentiality. It provides a standardized and interoperable framework for
managing and validating digital certificates, enabling secure communication and trusted
interactions in various domains, including e-commerce, secure messaging, and network
security.
Kerberos X.509
1. Purpose and Kerberos is primarily designed for X.509, on the other hand, is a standard
Scope: network authentication in distributed for defining the format and content of
environments. It focuses on providing digital certificates. It is used for
secure authentication between authentication, encryption, and data
clients and servers, ensuring the integrity purposes in various
confidentiality and integrity of applications, including SSL/TLS, digital
communications within a network. signatures, and secure email.
2. Kerberos uses a trusted third-party X.509 relies on a public key
Authentication authentication server called the Key infrastructure (PKI) model. It uses
Model: Distribution Center (KDC). It employs asymmetric key cryptography, where
symmetric key cryptography and each entity possesses a public key and a
operates based on tickets to corresponding private key. X.509
authenticate clients and servers in a certificates bind a public key to an
network. Kerberos provides mutual identity, enabling the verification of the
authentication, ensuring that both authenticity and integrity of the
the client and the server verify each certificate holder. X.509 allows for
other's identities. certificate chains, establishing trust
through a hierarchical structure of
certification authorities (CAs).
3. Usage and Kerberos is commonly used in X.509 certificates have a wide range of
Applications: enterprise environments, such as applications. They are used in SSL/TLS
Microsoft Active Directory, for user for secure communication over the
authentication and secure access to internet, digital signatures for
network resources. It provides a document integrity and authenticity,
centralized authentication secure email (S/MIME), VPNs, code
mechanism and supports single sign- signing, and identity and access
on (SSO) capabilities management systems.
5. Trust Model: Kerberos operates within a trust X.509 relies on a hierarchical trust
model where all participating entities model through CAs. Trust is established
trust the KDC. As long as the KDC is by verifying the authenticity of the CA
trusted, the authentication process is that issued the X.509 certificate. The
considered secure. trustworthiness of the system depends
on the trustworthiness of the CAs within
the PKI.
46
Email Security
Email (short for electronic mail ) is a digital method by using it we exchange messages
between people over the internet or other computer networks. With the help of this, we
can send and receive text-based messages, often an attachment such as documents,
images, or videos, from one person or organization to another.
It was one of the first applications developed for the internet and has since become one of
the most widely used forms of digital communication. It has an essential part of personal
and professional communication, as well as in marketing, advertising, and customer
support.
In this article, we will understand the concept of email security, how we can protect our
email, email security policies, and email security best practices, and one of the features of
email is an email that we can use to protect the email from unauthorized access.
Email Security:
Basically, Email security refers to the steps where we protect the email messages and the
information that they contain from unauthorized access, and damage. It involves ensuring
the confidentiality, integrity, and availability of email messages, as well as safeguarding
against phishing attacks, spam, viruses, and another form of malware. It can be achieved
through a combination of technical and non-technical measures.
Some standard technical measures include the encryption of email messages to protect
their contents, the use of digital signatures to verify the authenticity of the sender, and
email filtering systems to block unwanted emails and malware, and the non-technical
measures may include training employees on how to recognize and respond to phishing
attacks and other email security threats, establishing policies and procedures for email use
and management, and conducting regular security audits to identify and address
vulnerabilities.
We can say that email security is important to protect sensitive information from
unauthorized access and ensure the reliability and confidentiality of electronic
communication.
private information or have suspicious links because these are the resources of
the phishing attack.
• Choose a trustworthy email service provider: Search for a service provider that
protects your data using encryption and other security measures.
• Use a VPN: Using a VPN can help protect our email by encrypting our internet
connection and disguising our IP address, making it more difficult for hackers to
intercept our emails.
• Upgrade Your Application Regularly: People now frequently access their email
accounts through apps, although these tools are not perfect and can be taken
advantage of by hackers. A cybercriminal might use a vulnerability, for example,
to hack accounts and steal data or send spam mail. Because of this, it’s important
to update your programs frequently.
Discuss in brief the various enhancement to electronic mail security. How PGP operations
are authenticated?
Enhancements to electronic mail security have been developed to address various
vulnerabilities and threats associated with email communication. Some notable
enhancements include:
1. End-to-End Encryption:
End-to-end encryption ensures that email messages are encrypted on the sender's device
and can only be decrypted by the intended recipient. This prevents unauthorized access to
the message content during transmission and storage. Encryption protocols like PGP and
S/MIME are commonly used for end-to-end encryption.
2. Digital Signatures:
Digital signatures provide authentication and integrity verification of email messages. A
digital signature is created using the sender's private key and can be verified using their
public key. It ensures that the message has not been tampered with and confirms the
identity of the sender. Digital signature protocols like PGP and S/MIME facilitate this
authentication process.
3. Authentication Mechanisms:
Authentication mechanisms, such as SPF, DKIM, and DMARC, help verify the identity of
email senders and protect against spoofing and phishing attacks. SPF allows the domain
owner to define authorized email servers for their domain, DKIM adds digital signatures to
messages, and DMARC combines SPF and DKIM to provide enhanced authentication and
reporting capabilities.
Regarding PGP (Pretty Good Privacy) operations authentication, PGP uses a hybrid
cryptographic approach combining symmetric and asymmetric encryption. When a sender
wants to send an encrypted message using PGP, the following steps are involved:
1. Generating a Session Key: PGP generates a random session key, also known as a one-time
session key or session key encryption key. This session key is used for encrypting the actual
message.
2. Encrypting the Session Key: The session key is then encrypted using the recipient's public
key. This ensures that only the recipient, who possesses the corresponding private key, can
decrypt the session key.
3. Encrypting the Message: The actual message is encrypted using the session key. This
ensures that the message content remains confidential and can only be decrypted by the
recipient using the session key.
4. Digital Signature: PGP also allows the sender to create a digital signature for the message.
The digital signature is generated by encrypting a hash value of the message using the
sender's private key. The recipient can verify the digital signature using the sender's public
key, ensuring the authenticity and integrity of the message.
In summary, PGP operations are authenticated through the use of asymmetric encryption
and digital signatures. The recipient's public key is used to encrypt the session key for
message decryption, and the sender's private key is used to create a digital signature for
message integrity and authentication.
PGP
o PGP stands for Pretty Good Privacy (PGP) which is invented by Phil Zimmermann.
o PGP was designed to provide all four aspects of security, i.e., privacy, integrity,
authentication, and non-repudiation in the sending of email.
o PGP uses a digital signature (a combination of hashing and public key encryption) to
provide integrity, authentication, and non-repudiation. PGP uses a combination of
secret key encryption and public key encryption to provide privacy. Therefore, we can
say that the digital signature uses one hash function, one secret key, and two private-
public key pairs.
o PGP is an open source and freely available software package for email security.
o PGP provides authentication through the use of Digital Signature.
o It provides confidentiality through the use of symmetric block encryption.
o It provides compression by using the ZIP algorithm, and EMAIL compatibility using the
radix-64 encoding scheme.
50
Following are the steps taken by PGP to create secure e-mail at the sender site:
o The e-mail message is hashed by using a hashing function to create a digest.
o The digest is then encrypted to form a signed digest by using the sender's private key,
and then signed digest is added to the original email message.
o The original message and signed digest are encrypted by using a one-time secret key
created by the sender.
o The secret key is encrypted by using a receiver's public key.
o Both the encrypted secret key and the encrypted combination of message and digest
are sent together.
Following are the steps taken to show how PGP uses hashing and a combination of three
keys to generate the original message:
o The receiver receives the combination of encrypted secret key and message digest is
received.
o The encrypted secret key is decrypted by using the receiver's private key to get the
one-time secret key.
o The secret key is then used to decrypt the combination of message and digest.
o The digest is decrypted by using the sender's public key, and the original message is
hashed by using a hash function to create a digest.
o Both the digests are compared if both of them are equal means that all the aspects of
security are preserved.
S/MIME
The S/MIME certificate's nitty-gritty will assist you in strengthening your critical security
concerns in the mail while also advancing your commercial goals. Continue reading to learn
more.
Over the last two decades, business and official interactions have shifted from phone
conversations to emails. Because email is the most used mode of communication, according
to Statista, 4.03 billion people will use email in 2021, and that number is expected to climb
to 4.48 billion by 2024.
52
Every day, emails are sent and received across devices, necessitating the need to secure
these interactions. Because of the amount and type of sensitive data in a commercial firm,
this criticality is increased. Assume you work in a field where sensitive data is handled.
An S/MIME certificate is an end-to-end encryption solution for MIME data, a.k.a. email
communications, as shown in the preceding sections. The use of asymmetric cryptography
by S/MIME certificates prevents the message's integrity from being compromised by a third
party. In basic English, a digital signature is used to hash the message. The mail is then
encrypted to protect the message's secrecy.
S/MIME employs public encryption to protect communications that can only be decoded
with the corresponding private key obtained by the authorized mail receiver, according to
GlobalSign, a company that provides specialized Public Key Infrastructure (PKI) solutions to
businesses.
Stepping back in time allows us to visualize the situation. Wax seals on letters served as a
unique identifying proof of the sender while also assisting the recipient in determining
whether the letters had been tampered with. S/MIME certificates work on a similar principle.
The sender can use a private key to digitally sign the letter he is sending. The email is then
accompanied by a public key while in transit. The recipient will use it to verify the sender's
digital signature and decode the message using his own private key. Using 'asymmetric
cryptography,' this system uses two separate but mathematically comparable cryptographic
keys to provide end-to-end encryption. The completely encrypted contents of the email will
be nearly hard to crack without both keys.
You receive a slew of cryptographic security features when you use an S/MIME certificate for
email apps.
• Authentication − It refers to the verification of a computer user's or a website's
identity.
• Message consistency − This is a guarantee that the message's contents and
data have not been tampered with. The message's secrecy is crucial. The
decryption procedure entails checking the message's original contents and
guaranteeing that they have not been altered.
• Use of digital signatures that invoke non-repudiation − This is a circumstance
in which the original sender's identity and digital signatures are validated so
that there is no doubt about it.
• Protection of personal information − A data breach cannot be caused by an
unintentional third party.
• Encryption is used to protect data − It relates to the procedures described
above, in which data security is ensured by a mix of public and private keys
representing asymmetric cryptography.
The MIME type is designated by a S/MIME certificate. The enclosed data is referred to by the
MIME type. The MIME entity is completely prepared, encrypted, and packaged inside a digital
envelope.
Some of the most popular email programs that support S/MIME are listed below.
• iPhone iOS Mail
• Apple Mail
• Gmail IBM Notes
• Mozilla Thunderbird MailMate Microsoft Outlook or Outlook on the Web
• CipherMail
Although an S/MIME certificate has been around for a long time and is supported by most
email clients, the disadvantages of using it include complicated implementation owing to the
public and private keys of the sender and receiver. As a result, it was restricted to highly
classified government communications and those started by techies.
The adoption trend has improved, thanks to the advent of automated solutions for deploying
and managing S/MIME certificates. The benefits of using S/MIME certificates to safeguard
data in transit and, at rest, have surpassed the disadvantages.
Secure email service providers are used by certain companies and individuals to send secure
emails. These services, such as ProtonMail, may allow you to send and receive private
messages for free, but the disadvantage is that both the sender and the recipient must have
the same account. This is a common disadvantage of endto-end encryption services.
Aside from this issue, there is a far more serious one that limits the usability of email services
for businesses. These ostensibly safe email service companies are nonetheless vulnerable to
54
cyber-attacks. VFEMail is a classic example of a secure email service provider that, after 20
years of operation, fell to a cyber-attack.
A method is to use a S/MIME certificate to digitally sign and send encrypted emails. This
technology is classified as secure public-key encryption by the Internet Engineering Task
Force (IETF), and it is also suggested by the National Institute of Standards and Technology
(NIST) as a "protocol for email end-to-end authentication and secrecy".
Unit-3
Introduction to Cyber Attacks
In our increasingly digital and interconnected world, cyber attacks have become a significant
concern for individuals, organizations, and governments. Cyber attacks refer to malicious
activities carried out in the digital realm with the intent to compromise computer systems,
networks, or data. These attacks can cause serious disruptions, financial losses, and
compromise the privacy and security of individuals and entities.
Cyber attackers, often referred to as hackers or threat actors, employ various techniques
and strategies to exploit vulnerabilities in computer systems, networks, and human
behavior. They leverage their technical skills, knowledge of security weaknesses, and social
engineering tactics to gain unauthorized access, steal sensitive information, disrupt
operations, or cause other forms of damage.
The motivations behind cyber attacks can vary. Some attackers are driven by financial gain,
seeking to steal valuable data such as credit card information, personal identities, or trade
secrets that they can sell or exploit for monetary gain. Others engage in cyber attacks for
ideological reasons, aiming to disrupt or damage specific organizations or governments.
Additionally, there are state-sponsored cyber attacks, where nations carry out offensive
operations to gather intelligence, conduct espionage, or sabotage critical infrastructure of
rival nations.
Cyber attacks can take many forms, and attackers continually evolve their methods to stay
ahead of security measures. Some common types of cyber attacks include:
Preventing and mitigating cyber attacks requires a multi-faceted approach that includes
implementing robust security measures, staying informed about the latest threats,
educating users about best practices, and maintaining a proactive and vigilant stance
towards cybersecurity.
Causes of Cyber Crime:
To earn a huge amount of money, Cyber-criminals always choose an easy way. Banks,
casinos, companies, and, financial firms are the prosperous organizations and their target
centers where an enormous amount of money runs daily and has diplomatic information.
It’s very difficult to catch those criminals. Hence, the number of cyber-crimes are increasing
day-by-day across the globe. We require so many laws to protect and safeguard them
against cyber-criminals since the devices we use everyday for businesses and
communication might have vulnerabilities that can be exploited. We have listed some of
the reasons :
1. Easy to access computers – Since technology is complex, it has become very
difficult to protect the computer from viruses and hackers. There are so many
possibilities of hacking when we safeguard a computer system from
unauthorized access. Hackers can steal access codes, retinal images, advanced
voice recorders, etc that can mislead the bio-metric systems easily and can be
utilized to get past many security systems by avoiding firewalls.
2. Size to store computer data in comparatively small space – The computer has
got a distinctive feature of storing data in a very small space. Due to this, the
people can steal data very easily from any other storage and are using this for
their purpose.
3. Complexity of Code – The computers can run on operating systems and these
operating systems are programmed with millions of codes. There might be
mistakes in the code. The human brain is defective so that they can commit
mistakes at any stage. The cyber-criminals take advantage of these loopholes.
4. Negligence of the user – Human beings always neglect things. So, if we make
any negligence in protecting our computer system which leads the cyber-criminal
to the access and control over the computer system.
5. Loss of evidence – Hackers always make sure to clear any evidence i.e log data
related to the attack. So, Loss of evidence has turned into an evident problem
that disables the law enforcement to go beyond the investigation of cyber-crime.
56
7. Call the right person for help: Try not to be nervous if you are a victim. If you
come across illegal online content such as child exploitation or if you think it’s a
cyber-crime or identity theft or a commercial scam, just like any other crime
report this to your local police. There are so many websites to get help on cyber-
crime.
8. Protect your computer with security software: There are many types of
security software that are necessary for basic online security. Security software
includes firewall and antivirus software. A firewall is normally your computer’s
first line of security. It controls that who, what and where is the communication
is going on the internet. So, it’s better to install security software which is from
trusted sources to protect your computer.
Active attacks
Active attacks are a type of cybersecurity attack in which an attacker attempts to alter,
destroy, or disrupt the normal operation of a system or network. Active attacks involve the
attacker taking direct action against the target system or network, and can be more
dangerous than passive attacks, which involve simply monitoring or eavesdropping on
a system or network.
Types of active attacks are as follows:
• Masquerade
• Modification of messages
• Repudiation
• Replay
• Denial of Service
• Passive Man-in-the-Middle (MitM)
Masquerade –
Masquerade is a type of cybersecurity attack in which an attacker pretends to be someone
else in order to gain access to systems or data. This can involve impersonating a legitimate
user or system to trick other users or systems into providing sensitive information or
granting access to restricted areas.
There are several types of masquerade attacks, including:
Username and password masquerade: In a username and password masquerade attack,
an attacker uses stolen or forged credentials to log into a system or application as a
legitimate user.
IP address masquerade: In an IP address masquerade attack, an attacker spoofs or forges
their IP address to make it appear as though they are accessing a system or application
from a trusted source.
Website masquerade: In a website masquerade attack, an attacker creates a fake website
that appears to be legitimate in order to trick users into providing sensitive information
or downloading malware.
Email masquerade: In an email masquerade attack, an attacker sends an email that
appears to be from a trusted source, such as a bank or government agency, in order
to trick the recipient into providing sensitive information or downloading malware.
58
Masquerade Attack
Modification of messages –
It means that some portion of a message is altered or that message is delayed or reordered
to produce an unauthorized effect. Modification is an attack on the integrity of the original
data. It basically means that unauthorized parties not only gain access to data but also spoof
the data by triggering denial-of-service attacks, such as altering transmitted data packets or
flooding the network with fake data. Manufacturing is an attack on authentication. For
example, a message meaning “Allow JOHN to read confidential file X” is modified as “Allow
Smith to read confidential file X”.
Modification of messages
Repudiation –
Repudiation attacks are a type of cybersecurity attack in which an attacker attempts to deny
or repudiate actions that they have taken, such as making a transaction or sending a
message. These attacks can be a serious problem because they can make it difficult to track
down the source of the attack or determine who is responsible for a particular action.
There are several types of repudiation attacks, including:
Message repudiation attacks: In a message repudiation attack, an attacker sends a message
and then later denies having sent it. This can be done by using spoofed or falsified
headers or by exploiting vulnerabilities in the messaging system.
Transaction repudiation attacks: In a transaction repudiation attack, an attacker makes a
transaction, such as a financial transaction, and then later denies having made it. This can
be done by exploiting vulnerabilities in the transaction processing system or by using stolen
or falsified credentials.
59
Data repudiation attacks: In a data repudiation attack, an attacker modifies or deletes data
and then later denies having done so. This can be done by exploiting vulnerabilities in
the data storage system or by using stolen or falsified credentials.
Replay –
It involves the passive capture of a message and its subsequent transmission to produce an
authorized effect. In this attack, the basic aim of the attacker is to save a copy of the data
originally present on that particular network and later on use this data for personal uses.
Once the data is corrupted or leaked it is insecure and unsafe for the users.
Replay
Denial of Service –
Denial of Service (DoS) is a type of cybersecurity attack that is designed to make a system
or network unavailable to its intended users by overwhelming it with traffic or requests. In
a DoS attack, an attacker floods a target system or network with traffic or requests in order
to consume its resources, such as bandwidth, CPU cycles, or memory, and prevent
legitimate users from accessing it.
There are several types of DoS attacks, including:
Flood attacks: In a flood attack, an attacker sends a large number of packets or requests
to a target system or network in order to overwhelm its resources.
Amplification attacks: In an amplification attack, an attacker uses a third-party system or
network to amplify their attack traffic and direct it towards the target system or network,
making the attack more effective.
To prevent DoS attacks, organizations can implement several measures, such as:
1.Using firewalls and intrusion detection systems to monitor network traffic and block
suspicious activity.
2.Limiting the number of requests or connections that can be made to a system or
network.
3.Using load balancers and distributed systems to distribute traffic across multiple servers
or networks.
4.Implementing network segmentation and access controls to limit the impact of a DoS
attack.
60
Denial of Service
Passive attacks
A Passive attack attempts to learn or make use of information from the system but does
not affect system resources. Passive Attacks are in the nature of eavesdropping on or
monitoring transmission. The goal of the opponent is to obtain information that is being
transmitted. Passive attacks involve an attacker passively monitoring or collecting data
without altering or destroying it. Examples of passive attacks include eavesdropping, where
an attacker listens in on network traffic to collect sensitive information, and sniffing, where
an attacker captures and analyzes data packets to steal sensitive information.
Types of Passive attacks are as follows:
• The release of message content
• Traffic analysis
61
Passive attack
Traffic analysis –
Suppose that we had a way of masking (encryption) information, so that the attacker even
if captured the message could not extract any information from the message.
The opponent could determine the location and identity of communicating host and could
observe the frequency and length of messages being exchanged. This information might be
useful in guessing the nature of the communication that was taking place.
The most useful protection against traffic analysis is encryption of SIP traffic. To do this, an
attacker would have to access the SIP proxy (or its call log) to determine who made the call.
Traffic analysis
Due to active attacks, the execution While due to passive attack, there is no harm to
system is always damaged. the system.
In an active attack, Victim gets While in a passive attack, Victim does not get
informed about the attack. informed about the attack.
In an active attack, System resources While in passive attack, System resources are not
can be changed. changing.
Active attack influences the services of While in a passive attack, information and
the system. messages in the system or network are acquired.
The purpose of an active attack is to The purpose of a passive attack is to learn about
harm the ecosystem. the ecosystem.
1. Database Security:
- Authentication and Access Control: Implement strong authentication mechanisms and
enforce access controls to ensure only authorized users can access the database. Use
unique usernames and strong passwords, and consider implementing multi-factor
authentication for administrative access.
- Encryption: Protect sensitive data by encrypting it both at rest and in transit. Use
encryption techniques like Transparent Data Encryption (TDE) or field-level encryption to
safeguard data.
- Database Auditing and Logging: Enable auditing and logging features to track database
activities, including user actions, privilege changes, and data modifications. Regularly review
and analyze audit logs for suspicious activities or unauthorized access attempts.
- Regular Patching and Updates: Keep the database software up to date by applying security
patches and updates provided by the vendor. This helps address known vulnerabilities and
protect against potential exploits.
- Secure Database Configuration: Configure the database with secure settings, disable
unnecessary services, and follow the principle of least privilege by granting minimal
privileges to database users.
- Backup and Recovery: Implement regular backup and recovery processes to ensure data
availability and protection against data loss. Securely store backups and periodically test the
restoration process.
- User Awareness and Training: Educate users about email security best practices, such as
avoiding clicking on suspicious links or downloading attachments from unknown sources,
reporting suspicious emails, and practicing good password hygiene.
It's crucial to remember that application security should be an ongoing process, with regular
assessments, updates, and user education to ensure the continued protection of databases,
email systems, and internet-based applications from evolving threats.
Data security is the protection of programs and data in computers and communication
systems against unauthorized access, modification, destruction, disclosure or transfer
whether accidental or intentional by building physical arrangements and software checks. It
refers to the right of individuals or organizations to deny or restrict the collection and use of
information about unauthorized access. Data security requires system managers to reduce
unauthorized access to the systems by building physical arrangements and software checks.
Data security uses various methods to make sure that the data is correct, original, kept
confidentially and is safe. It includes-
65
Data security consideration involves the protection of data against unauthorized access,
modification, destruction, loss, disclosure or transfer whether accidental or intentional. Some
of the important data security consideration are described below:
Backups
Data backup refers to save additional copies of our data in separate physical or cloud locations
from data files in storage. It is essential for us to keep secure, store, and backup our data on
a regular basis. Securing of the data will help us to prevent from-
To use the Backup 3-2-1 Rule is very popular. This rule includes:
6. University Archives
7. Cloud storage
Some of the top considerations for implementing secure backup and recovery are-
Archival Storage
Data archiving is the process of retaining or keeping of data at a secure place for long-term
storage. The data might be stored in safe locations so that it can be used whenever it is
required. The archive data is still essential to the organization and may be needed for future
reference. Also, data archives are indexed and have search capabilities so that the files and
parts of files can be easily located and retrieved. The Data archival serve as a way of reducing
primary storage consumption of data and its related costs.
Data archival is different from data backup in the sense that data backups created copies of
data and used as a data recovery mechanism to restore data in the event when it is corrupted
or destroyed. On the other hand, data archives protect the older information that is not
needed in day to day operations but may have to be accessed occasionally.
Data archives may have many different forms. It can be stored as Online, offline, or cloud
storage-
o Online data storage places archive data onto disk systems where it is readily
accessible.
o Offline data storage places archive data onto the tape or other removable media using
data archiving software. Because tape can be removed and consumes less power than
disk systems.
o Cloud storage is also another possible archive target. For example, Amazon Glacier is
designed for data archiving. Cloud storage is inexpensive, but its costs can grow over
time as more data is added to the cloud archive.
67
The following list of considerations will help us to improve the long-term usefulness of our
archives:
1. Storage medium
2. Storage device
3. Revisiting old archives
4. Data usability
5. Selective archiving
6. Space considerations
7. Online vs. offline storage
Storage medium
The first thing is to what storage medium we use for archives. The archived data will be stored
for long periods of time, so we must need to choose the type of media that will be lost as long
as our retention policy dictates.
Storage device
This consideration takes into account about the storage device we are using for our archives
which will be accessible in a few years. There is no way to predict which types of storage
devices will stand the best. So, it is essential to try to pick those devices that have the best
chance of being supported over the long term.
Since we know our archive policies and the storage mechanisms we use for archiving data
would change over time. So we have to review our archived data at least once a year to see
that if anything needs to be migrated into a different storage medium.
For example, about ten years ago, we used Zip drives for archival then we had transferred all
of my archives to CD. But in today?s, we store most of our archives on DVD. Since modern
DVD drives can also read CDs, so we haven't needed to move our extremely old archives off
CD onto DVD.
Data usability
In this consideration, we have seen one major problem in the real world is archived data
which is in an obsolete format.
For example, a few years ago, document files that had been archived in the early 1990s were
created by an application known as PFS Write. The PFS Write file format was supported in the
late 80s and early 90s, but today, there are not any applications that can read that files. To
68
avoid this situation, it might be helpful to archive not only the data but also copies the
installation media for the applications that created the data.
Selective archiving
In this consideration, we have to sure about what should be archived. That means we will
archive only a selective part of data because not all data is equally important.
Space considerations
If our archives become huge, we must plan for the long-term retention of all our data. If we
are archiving our data to removable media, capacity planning might be simple which makes
sure that there is a free space in the vault to hold all of those tapes, and it makes sure that
there is a room in our IT budget to continue purchasing tapes.
In this consideration, we have to decide whether to store our archives online (on a dedicated
archive server) or offline (on removable media). Both methods of archival contain advantages
and disadvantages. Storing of data online keeps the data easily accessible. But keeping data
online may be vulnerable to theft, tampering, corruption, etc. Offline storage enables us to
store an unlimited amount of data, but it is not readily accessible.
Disposal of Data
Data destruction or disposal of data is the method of destroying data which is stored on tapes,
hard disks and other electronic media so that it is completely unreadable, unusable and
inaccessible for unauthorized purposes. It also ensures that the organization retains records
of data for as long as they are needed. When it is no longer required, appropriately destroys
them or disposes of that data in some other way, for example, by transfer to an archives
service.
o It avoids the unnecessary storage costs incurred by using office or server space in
maintaining records which is no longer needed by the organization.
o Finding and retrieving information is easier and quicker because there is less to search.
The disposal of data usually takes place as part of the normal records management process.
There are two essential circumstances in which the destruction of data need to be handled as
an addition to this process-
o The functions are being transferred to another authority and disposal of data records
becomes part of the change process.
The following list of considerations will help us for the secure disposal of data-
1. Eliminate access
2. Destroy the data
3. Destroy the device
4. Keep the record of which systems have been decommissioned
5. Keep careful records
6. Eliminate potential clues
7. Keep systems secure until disposal
Eliminate access
In this consideration, we have to ensure that eliminating access account does not have any
rights to re access the disposed of data again.
In this consideration, there is not necessary to remove data from storage media will be safe.
Even these days reformatting or repartitioning a drive to "erase" the data that it stores is not
good enough. Today's many tools available which can help us to delete files more securely.
To encrypt the data on the drive before performing any deletion can help us to make data
more difficult to recover later.
In the most cases, storage media need to be physically destroyed to ensure that our sensitive
data is not leaked to whoever gets the drives next. In such cases, we should not destroy them
itself. To do this, there should be experts who can make probably a lot better at safely and
effectively rendering any data on our drives unrecoverable. If we can't trust this to an outsider
agency that specializes in the secure destruction of storage devices, we should have a
specialized team within our organization who has the same equipment and skills as outside
contractors.
In this, we have to make sure that the storage media has been fully decommissioned securely
and they do not consist of something easily misplaced or overlooked. It is best if storage
media that have not been fully decommissioned are kept in a specific location, while
decommissioned equipment placed somewhere else so that it will help us to avoid making
mistakes.
70
In this consideration, we have to clear the configuration settings from networking equipment.
We do this because it can provide crucial clues to a security cracker to break into our network
and the systems that reside on it.
In this consideration, we should have to make clear guidelines for who should have access to
the equipment in need of secure disposal. It will be better to ensure that nobody should have
access authentication to it before disposal of data won't get his or her hands on it.
1. Firewalls:
A firewall is a network security device or software that acts as a barrier between a trusted
internal network and an untrusted external network (typically the internet). Its primary
purpose is to monitor and control incoming and outgoing network traffic based on
predefined security rules. Firewalls help prevent unauthorized access, protect against
network-based attacks, and ensure the security and integrity of the network.
Firewall Technology:
Firewalls use various techniques and technologies to inspect network traffic and enforce
security policies. Here are some common firewall technologies:
1. Packet Filtering Firewalls: These firewalls examine individual packets of data based on
predefined rules. They filter traffic based on criteria such as source/destination IP
addresses, ports, and protocols. Packet filtering firewalls are typically implemented at the
network or transport layer of the OSI model and are efficient for basic traffic filtering.
In addition to packet filtering, they keep track of connection states, ensuring that only
legitimate traffic matching an existing connection is allowed. Stateful inspection firewalls
provide improved security and performance compared to packet filtering firewalls.
4. Proxy Firewalls: Proxy firewalls act as intermediaries between client devices and external
servers. They receive and forward network traffic on behalf of the clients, inspecting the
traffic at the application layer. By acting as proxies, these firewalls provide an additional
layer of security, as they can apply additional security measures and perform content
filtering. However, they may introduce additional latency due to the extra processing
involved.
5. Network Address Translation (NAT) Firewalls: NAT firewalls allow multiple devices on a
private network to share a single public IP address. They translate private IP addresses into
public IP addresses and vice versa, providing a level of network security by hiding internal
IP addresses from external networks.
4. Cloud Firewalls: Cloud service providers often offer firewall services as part of their
infrastructure. These cloud firewalls protect cloud-based resources and networks, allowing
administrators to define rules and policies to secure their cloud deployments.
5. Software Firewalls: Software firewalls are software applications installed on individual
devices, such as personal computers or laptops. They provide protection for the specific
device they are installed on, often allowing users to define their own rules and policies.
Firewalls are an essential component of network security, and the choice of firewall
technology and implementation approach depends on the specific network environment.
- Packet Filtering: Firewalls inspect packets of data and filter them based on criteria such as
source/destination IP addresses, ports, and protocols. They allow or deny traffic based on
predefined rules.
- Network Address Translation (NAT): Firewalls with NAT capability can hide internal IP
addresses, making it more difficult for attackers to identify and target specific devices on
the network.
- Stateful Inspection: Firewalls maintain state information about active network
connections, allowing them to identify and block unauthorized or suspicious traffic.
- Application Awareness: Next-generation firewalls (NGFWs) have advanced capabilities to
inspect traffic at the application layer, allowing granular control and detection of
application-specific threats.
- Intrusion Prevention: Some firewalls have intrusion prevention system (IPS) functionality,
which can detect and block network-based attacks by analyzing traffic patterns and known
attack signatures.
- VPN Support: Firewalls often support VPN functionality, allowing secure remote access
and encrypted communication between networks or remote users.
Limitations of Firewall
When it comes to network security, firewalls are considered the first line of defense. But the
question is whether these firewalls are strong enough to make our devices safe from cyber-
attacks. The answer may be "no". The best practice is to use a firewall system when using the
Internet. However, it is important to use other defense systems to help protect the network
and data stored on the computer. Because cyber threats are continually evolving, a firewall
should not be the only consideration for protecting the home network.
The importance of using firewalls as a security system is obvious; however, firewalls have
some limitations:
o Firewalls cannot stop users from accessing malicious websites, making it vulnerable to
internal threats or attacks.
73
VPN Technology:
VPNs use various technologies and protocols to establish secure connections and encrypt
data. Here are some common VPN technologies:
1. IPsec (Internet Protocol Security): IPsec is a widely used protocol suite that provides a
secure communication channel by encrypting IP packets. It ensures the confidentiality and
integrity of data transmitted over the internet. IPsec VPNs require client software or
compatible hardware to establish a secure tunnel between the client device and the VPN
gateway.
74
2. SSL/TLS (Secure Sockets Layer/Transport Layer Security): SSL/TLS protocols are commonly
used to secure web communications. SSL/TLS VPNs create an encrypted tunnel between the
client device and the VPN server using SSL/TLS encryption. These VPNs often utilize web
browsers as the client interface, requiring no additional software installation.
3. OpenVPN: OpenVPN is an open-source VPN protocol that uses SSL/TLS encryption for
secure communication. It provides a flexible and customizable solution for creating secure
VPN connections. OpenVPN supports various authentication methods and can be used on
multiple operating systems.
5. PPTP (Point-to-Point Tunneling Protocol): PPTP is an older VPN protocol that provides a
relatively simple and easy-to-configure VPN solution. It offers encryption for secure
communication, although it is considered less secure than other protocols like IPsec or
SSL/TLS.
1. Remote Access VPN: This type of VPN allows individual users to securely connect to a
private network from remote locations. Remote access VPNs are commonly used by
employees working remotely or accessing company resources while traveling. They provide
secure access to internal resources and often require client software or built-in VPN clients
in operating systems.
3. Client-to-Site VPN: Also known as a "road warrior" VPN, this approach allows individual
users to securely connect to a specific site or network. Client-to-Site VPNs are often used to
provide secure remote access to specific applications or services hosted on a private
75
network. Users connect using VPN client software, which establishes a secure connection
to the site's VPN gateway.
4. Cloud VPN: Many cloud service providers offer VPN services as part of their offerings.
Cloud VPNs allow secure connections between on-premises networks and cloud resources.
They enable organizations to extend their network securely into the cloud and provide
secure access to cloud-based resources.
When implementing a VPN, it's important to consider factors such as security requirements,
scalability, compatibility with existing infrastructure, and ease of management. The choice
of VPN technology and implementation approach should align with the specific needs of the
organization or users requiring secure connectivity.
Intrusion Detection
A system called an intrusion detection system (IDS) observes network traffic for malicious
transactions and sends immediate alerts when it is observed. It is software that checks a
network or system for malicious activities or policy violations. Each illegal activity or
violation is often recorded either centrally using a SIEM system or notified to an
administration. IDS monitors a network or system for malicious activity and protects a
computer network from unauthorized access from users, including perhaps insiders. The
intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of
distinguishing between ‘bad connections’ (intrusion/attacks) and ‘good (normal)
connections’.
76
Benefits of IDS
• Detects malicious activity: IDS can detect any suspicious activities and alert the
system administrator before any significant damage is done.
• Improves network performance: IDS can identify any performance issues on
the network, which can be addressed to improve network performance.
• Compliance requirements: IDS can help in meeting compliance requirements
by monitoring network activity and generating reports.
• Provides insights: IDS generates valuable insights into network traffic, which
can be used to identify any weaknesses and improve network security.
78
Access Control
Access control in cybersecurity refers to the measures and techniques implemented to
ensure that only authorized individuals or entities are granted access to resources, systems,
or data within a computer network or information system. It is a fundamental principle of
information security and helps protect against unauthorized access, data breaches, and
malicious activities.
1. Trusted Platform Module (TPM): TPM is a hardware chip or module that provides secure
storage and management of cryptographic keys, passwords, and other sensitive data. It
offers hardware-based encryption, authentication, and secure boot capabilities, ensuring
the integrity and confidentiality of critical system components.
3. Hardware Security Modules (HSM): HSMs are specialized hardware devices that securely
store and manage cryptographic keys and perform cryptographic operations. They provide
strong security for cryptographic functions and are used in various applications such as
secure key management, digital signatures, and secure transactions.
4. Secure Boot: Secure Boot is a hardware-based mechanism that ensures the integrity and
authenticity of system boot processes. It verifies the digital signatures of firmware,
bootloader, and operating system components during the boot process, preventing the
execution of unauthorized or malicious code.
Every computer system and software design must handle all security risks and implement the
necessary measures to enforce security policies. At the same time, it's critical to strike a
balance because strong security measures might increase costs while also limiting the
system's usability, utility, and smooth operation. As a result, system designers must assure
efficient performance without compromising security.
In this article, you will learn about operating system security with its issues and other features.
Security refers to providing safety for computer system resources like software, CPU,
memory, disks, etc. It can protect against all threats, including viruses and unauthorized
access. It can be enforced by assuring the operating system's integrity, confidentiality,
and availability. If an illegal user runs a computer application, the computer or data stored
may be seriously damaged.
System security may be threatened through two violations, and these are as follows:
1. Threat
82
2. Attack
There are two types of security breaches that can harm the system: malicious and accidental.
Malicious threats are a type of destructive computer code or web script that is designed to
cause system vulnerabilities that lead to back doors and security breaches. On the other hand,
Accidental Threats are comparatively easier to protect against.
Security may be compromised through the breaches. Some of the breaches are as follows:
1. Breach of integrity
2. Theft of service
3. Breach of confidentiality
AD
4. Breach of availability
5. Denial of service
It includes preventing legitimate use of the system. Some attacks may be accidental.
There are several goals of system security. Some of them are as follows:
AD
1. Integrity
Unauthorized users must not be allowed to access the system's objects, and users with
insufficient rights should not modify the system's critical files and resources.
2. Secrecy
83
The system's objects must only be available to a small number of authorized users. The system
files should not be accessible to everyone.
3. Availability
All system resources must be accessible to all authorized users, i.e., no single user/process
should be able to consume all system resources. If such a situation arises, service denial may
occur. In this case, malware may restrict system resources and preventing legitimate
processes from accessing them.
Types of Threats
There are mainly two types of threats that occur. These are as follows:
Program threats
The operating system's processes and kernel carry out the specified task as directed. Program
Threats occur when a user program causes these processes to do malicious operations. The
common example of a program threat is that when a program is installed on a computer, it
could store and transfer user credentials to a hacker. There are various program threats.
Some of them are as follows:
1.Virus
A virus may replicate itself on the system. Viruses are extremely dangerous and can
modify/delete user files as well as crash computers. A virus is a little piece of code that is
implemented on the system program. As the user interacts with the program, the virus
becomes embedded in other files and programs, potentially rendering the system inoperable.
2. Trojan Horse
This type of application captures user login credentials. It stores them to transfer them to a
malicious user who can then log in to the computer and access system resources.
3. Logic Bomb
A logic bomb is a situation in which software only misbehaves when particular criteria are
met; otherwise, it functions normally.
4. Trap Door
A trap door is when a program that is supposed to work as expected has a security weakness
in its code that allows it to do illegal actions without the user's knowledge.
System Threats
System threats are described as the misuse of system services and network connections to
cause user problems. These threats may be used to trigger the program threats over an entire
network, known as program attacks. System threats make an environment in which OS
84
resources and user files may be misused. There are various system threats. Some of them are
as follows:
1. Port Scanning
It is a method by which the cracker determines the system's vulnerabilities for an attack. It is
a fully automated process that includes connecting to a specific port via TCP/IP. To protect
the attacker's identity, port scanning attacks are launched through Zombie Systems, which
previously independent systems now serve their owners while being utilized for such terrible
purposes.
2. Worm
The worm is a process that can choke a system's performance by exhausting all system
resources. A Worm process makes several clones, each consuming system resources and
preventing all other processes from getting essential resources. Worm processes can even
bring a network to a halt.
3. Denial of Service
Denial of service attacks usually prevents users from legitimately using the system. For
example, if a denial-of-service attack is executed against the browser's content settings, a
user may be unable to access the internet.
There are various threats to the operating system. Some of them are as follows:
Malware
It contains viruses, worms, trojan horses, and other dangerous software. These are generally
short code snippets that may corrupt files, delete the data, replicate to propagate further,
and even crash a system. The malware frequently goes unnoticed by the victim user while
criminals silently extract important data.
Network Intrusion
Network intruders are classified as masqueraders, misfeasors, and unauthorized users. A
masquerader is an unauthorized person who gains access to a system and uses an authorized
person's account. A misfeasor is a legitimate user who gains unauthorized access to and
misuses programs, data, or resources. A rogue user takes supervisory authority and tries to
evade access constraints and audit collection.
Buffer Overflow
It is also known as buffer overrun. It is the most common and dangerous security issue of the
operating system. It is defined as a condition at an interface under which more input may be
placed into a buffer and a data holding area than the allotted capacity, and it may overwrite
85
other information. Attackers use such a situation to crash a system or insert specially created
malware that allows them to take control of the system.
There are various ways to ensure operating system security. These are as follows:
Authentication
The process of identifying every system user and associating the programs executing with
those users is known as authentication. The operating system is responsible for implementing
a security system that ensures the authenticity of a user who is executing a specific program.
In general, operating systems identify and authenticate users in three ways.
1. Username/Password
Every user contains a unique username and password that should be input correctly before
accessing a system.
2. User Attribution
These techniques usually include biometric verification, such as fingerprints, retina scans, etc.
This authentication is based on user uniqueness and is compared to database samples already
in the system. Users can only allow access if there is a match.
To login into the system, the user must punch a card into a card slot or enter a key produced
by a key generator into an option provided by the operating system.
1. Secret Key
The user is given a hardware device that can generate a secret id that is linked to the user's
id. The system prompts for such a secret id, which must be generated each time you log in.
2. Random numbers
Users are given cards that have alphabets and numbers printed on them. The system requests
numbers that correspond to a few alphabets chosen at random.
3. Network password
86
Firewalls
Firewalls are essential for monitoring all incoming and outgoing traffic. It imposes local
security, defining the traffic that may travel through it. Firewalls are an efficient way of
protecting network systems or local systems from any network-based security threat.
Physical Security
The most important method of maintaining operating system security is physical security. An
attacker with physical access to a system may edit, remove, or steal important files since
operating system code and configuration files are stored on the hard drive.
Various operating system security policies may be implemented based on the organization
that you are working in. In general, an OS security policy is a document that specifies the
procedures for ensuring that the operating system maintains a specific level of integrity,
confidentiality, and availability.
OS Security protects systems and data from worms, malware, threats, ransomware, backdoor
intrusions, viruses, etc. Security policies handle all preventative activities and procedures to
ensure an operating system's protection, including steal, edited, and deleted data.
As OS security policies and procedures cover a large area, there are various techniques to
addressing them. Some of them are as follows:
OS security policies and procedures are developed and implemented to ensure that you must
first determine which assets, systems, hardware, and date are the most vital to your
organization. Once that is completed, a policy can be developed to secure and safeguard them
properly.
Secure Socket Layer (SSL) provides security to the data that is transferred between web
browser and server. SSL encrypts the link between a web server and a browser which
ensures that all data passed between them remain private and free from attack.
87
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the client and server
to authenticate each other by sending a series of messages to each other. Handshake
protocol uses four phases to complete its cycle.
• Phase-1: In Phase-1 both Client and Server send hello-packets to each other. In
this IP session, cipher suite and protocol version are exchanged for security
purposes.
• Phase-2: Server sends his certificate and Server-key-exchange. The server end
phase-2 by sending the Server-hello-end packet.
• Phase-3: In this phase, Client replies to the server by sending his certificate and
Client-exchange-key.
• Phase-4: In Phase-4 Change-cipher suite occurs and after this the Handshake
Protocol ends.
88
Change-cipher Protocol:
This protocol uses the SSL record protocol. Unless Handshake Protocol is completed, the
SSL record Output will be in a pending state. After the handshake protocol, the Pending
state is converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in length and can have
only one value. This protocol’s purpose is to cause the pending state to be copied into the
current state.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each message in this
protocol contains 2 bytes.
This Alert breaks the connection between sender and receiver. The connection will be
stopped, cannot be resumed but can be restarted. Some of them are :
Handshake failure: When the sender is unable to negotiate an acceptable set of security
parameters given the options available.
Decompression failure: When the decompression function receives improper input.
Illegal parameters: When a field is out of range or inconsistent with other fields.
Bad record MAC: When an incorrect MAC was received.
Unexpected message: When an inappropriate message is received.
The second byte in the Alert protocol describes the error.
Salient Features of Secure Socket Layer:
• The advantage of this approach is that the service can be tailored to the specific
needs of the given application.
• Secure Socket Layer was originated by Netscape.
• SSL is designed to make use of TCP to provide reliable end-to-end secure service.
• This is a two-layered protocol.
SSL (Secure Sockets Layer) certificate is a digital certificate used to secure and verify the
identity of a website or an online service. The certificate is issued by a trusted third-party
called a Certificate Authority (CA), who verifies the identity of the website or service before
issuing the certificate.
The SSL certificate has several important characteristics that make it a reliable solution for
securing online transactions:
1. Encryption: The SSL certificate uses encryption algorithms to secure the
communication between the website or service and its users. This ensures that
the sensitive information, such as login credentials and credit card information,
is protected from being intercepted and read by unauthorized parties.
2. Authentication: The SSL certificate verifies the identity of the website or
service, ensuring that users are communicating with the intended party and not
with an impostor. This provides assurance to users that their information is being
transmitted to a trusted entity.
3. Integrity: The SSL certificate uses message authentication codes (MACs) to
detect any tampering with the data during transmission. This ensures that the
data being transmitted is not modified in any way, preserving its integrity.
4. Non-repudiation: SSL certificates provide non-repudiation of data, meaning
that the recipient of the data cannot deny having received it. This is important in
situations where the authenticity of the information needs to be established,
such as in e-commerce transactions.
5. Public-key cryptography: SSL certificates use public-key cryptography for
secure key exchange between the client and server. This allows the client and
server to securely exchange encryption keys, ensuring that the encrypted
information can only be decrypted by the intended recipient.
6. Session management: SSL certificates allow for the management of secure
sessions, allowing for the resumption of secure sessions after interruption. This
helps to reduce the overhead of establishing a new secure connection each time
a user accesses a website or service.
90
7. Certificates issued by trusted CAs: SSL certificates are issued by trusted CAs, who
are responsible for verifying the identity of the website or service before issuing the
certificate. This provides a high level of trust and assurance to users that the website
or service they are communicating with is authentic and trustworthy.
Transport Layer Securities (TLS) are designed to provide security at the transport layer. TLS
was derived from a security protocol called Secure Socket Layer (SSL). TLS ensures that no
third party may eavesdrop or tampers with any message.
There are several benefits of TLS:
• Encryption:
TLS/SSL can help to secure transmitted data using encryption.
• Interoperability:
TLS/SSL works with most web browsers, including Microsoft Internet Explorer
and on most operating systems and web servers.
• Algorithm flexibility:
TLS/SSL provides operations for authentication mechanism, encryption
algorithms and hashing algorithm that are used during the secure session.
• Ease of Deployment:
Many applications TLS/SSL temporarily on a windows server 2003 operating
systems.
• Ease of Use:
Because we implement TLS/SSL beneath the application layer, most of its
operations are completely invisible to client.
Working of TLS:
The client connect to server (using TCP), the client will be something. The client sends
number of specification:
1. Version of SSL/TLS.
2. which cipher suites, compression method it wants to use.
The server checks what the highest SSL/TLS version is that is supported by them both, picks
a cipher suite from one of the clients option (if it supports one) and optionally picks a
compression method. After this the basic setup is done, the server provides its certificate.
This certificate must be trusted either by the client itself or a party that the client trusts.
Having verified the certificate and being certain this server really is who he claims to be (and
not a man in the middle), a key is exchanged. This can be a public key, “PreMasterSecret”
or simply nothing depending upon cipher suite.
Both the server and client can now compute the key for symmetric encryption. The
handshake is finished and the two hosts can communicate securely. To close a connection
by finishing. TCP connection both sides will know the connection was improperly
terminated. The connection cannot be compromised by this through, merely interrupted.
Secure Electronic Transaction
91
Secure Electronic Transaction or SET is a system that ensures the security and integrity of
electronic transactions done using credit cards in a scenario. SET is not some system that
enables payment but it is a security protocol applied to those payments. It uses different
encryption and hashing techniques to secure payments over the internet done through
credit cards. The SET protocol was supported in development by major organizations like
Visa, Mastercard, and Microsoft which provided its Secure Transaction Technology (STT),
and Netscape which provided the technology of Secure Socket Layer (SSL).
SET protocol restricts the revealing of credit card details to merchants thus keeping hackers
and thieves at bay. The SET protocol includes Certification Authorities for making use of
standard Digital Certificates like X.509 Certificate.
Before discussing SET further, let’s see a general scenario of electronic transactions, which
includes client, payment gateway, client financial institution, merchant, and merchant
financial institution.
Requirements in SET: The SET protocol has some requirements to meet, some of the
important requirements are:
• It has to provide mutual authentication i.e., customer (or cardholder)
authentication by confirming if the customer is an intended user or not, and
merchant authentication.
• It has to keep the PI (Payment Information) and OI (Order Information)
confidential by appropriate encryptions.
• It has to be resistive against message modifications i.e., no changes should be
allowed in the content being transmitted.
• SET also needs to provide interoperability and make use of the best security
mechanisms.
Participants in SET: In the general scenario of online transactions, SET includes similar
participants:
1. Cardholder – customer
2. Issuer – customer financial institution
3. Merchant
4. Acquirer – Merchant financial
5. Certificate authority – Authority that follows certain standards and issues
certificates(like X.509V3) to all other participants.
SET functionalities:
• Provide Authentication
• Merchant Authentication – To prevent theft, SET allows customers
to check previous relationships between merchants and financial
92
Where,
Purchase Request Generation: The process of purchase request generation requires three
inputs:
• Payment Information (PI)
• Dual Signature
• Order Information Message Digest (OIMD)
The purchase request is generated as follows:
Here,
PI, OIMD, OI all have the same meanings as before.
The new things are :
EP which is symmetric key encryption
Ks is a temporary symmetric key
KUbank is public key of bank
CA is Cardholder or customer Certificate
Digital Envelope = E(KUbank, Ks)
Purchase Request Validation on Merchant Side: The Merchant verifies by comparing
POMD generated through PIMD hashing with POMD generated through decryption of Dual
Signature as follows:
94
Since we used Customer’s private key in encryption here we use KUC which is the public key
of the customer or cardholder for decryption ‘D’.
Payment Authorization and Payment Capture: Payment authorization as the name
suggests is the authorization of payment information by the merchant which ensures
payment will be received by the merchant. Payment capture is the process by which a
merchant receives payment which includes again generating some request blocks to
gateway and payment gateway in turn issues payment to the merchant.
The disadvantages of Secure Electronic Exchange: At the point when SET was first
presented in 1996 by the SET consortium (Visa, Mastercard, Microsoft, Verisign, and so
forth), being generally taken on inside the following couple of years was normal. Industry
specialists additionally anticipated that it would immediately turn into the key empowering
influence of worldwide internet business. Notwithstanding, this didn’t exactly occur
because of a few serious weaknesses in the convention.
The security properties of SET are better than SSL and the more current TLS, especially in
their capacity to forestall web based business extortion. Be that as it may, the greatest
downside of SET is its intricacy. SET requires the two clients and traders to introduce
extraordinary programming – – card perusers and advanced wallets – – implying that
exchange members needed to finish more jobs to carry out SET. This intricacy likewise
dialed back the speed of web based business exchanges. SSL and TLS don’t have such issues.
The above associated with PKI and the instatement and enlistment processes additionally
slowed down the far reaching reception of SET. Interoperability among SET items – – e.g.,
declaration interpretations and translations among entrusted outsiders with various
endorsement strategies – – was likewise a huge issue with SET, which likewise was tested
by unfortunate convenience and the weakness of PKI.
Difference between Secure Socket Layer (SSL) and Secure Electronic Transaction (SET):
S.
No. Secure Socket Layer Secure Electronic Transaction
Basics-
Basics-
SSL is an encryption mechanism for order
SET is a very comprehensive protocol. It
taking, queries, and other applications and is
provides privacy, integration, and
available on the customer’s browser. It does
authenticity. It is not used frequently due to
not protect against all security hazards and is
its complexity and the need for a special card
naturally simple and widely used. SSL is a
reader by the user. It may be abandoned if it
protocol for general-purpose secure
1. is not simplified. SET is tailored to the credit
message exchange. SSL protocol may use a
card payment to the merchant. SET
certificate, but the payment gateway is not
protocols hide the customer’s credit card
available. So, the merchant needs to receive
information from merchant and also hides
both the ordering information and credit
the order information from banks to protect
card information because the capturing
privacy called a dual signature. The SET
process should be generated by the
protocol is complex and more secure.
merchant. SSL protocol has been the industry
95
S.
No. Secure Socket Layer Secure Electronic Transaction
Developed by-
Developed by-
The SET protocol was jointly developed by
2. SSL protocol was developed by Netscape for
MasterCard and visa to secure web
the secure online transaction.
browsers for a bank card transaction.
Working-
Working-
SSL uses a combination of public-key and
The dual signature mechanism is deployed
symmetric-key encryption to safeguard data
by SET to safeguard a transaction. To use an
transactions. The handshake technique is
3. e-commerce site, SET requires the purchase
used by the SSL protocol, which permits the
of software. The design of the protocol
server to verify its identity to the client. In
necessitates the client’s installation of an e-
case of unsuccessful authentication, the
wallet.
connection will not be formed.
Integrity- Integrity-
4. The technique of Hash functions is used for The technique of digital signatures is used
this purpose. for this purpose.
Acceptability-
Acceptability-
5. SET acceptability is less because it’s
Its acceptability is more as compared to SET.
necessary to build an open PKI.
Functionality-
Functionality-
The Secure Sockets Layer (SSL) is not a
SET was created with the sole purpose of
payment protocol. SSL encrypts the
securing and ultimately guaranteeing a
communication channel between the
6. payment transaction. For example, increase
cardholder and the merchant website and is
in the possibilities for online retail growth
not backed by any financial institution. As a
only when consumer confidence grows in
result, SSL is unable to ensure the security of
online shopping.
a transaction.
Encryption- Encryption-
7. The purpose of SSL lies in prevention of data SET, which was created expressly to address
tampering in client/server applications and the security of all parties involved in an
96
S.
No. Secure Socket Layer Secure Electronic Transaction
has considerably weaker encryption, with a electronic payment transaction, uses 1024-
maximum of 128-bit encryption. bit encryption throughout the transaction.
Authentication-
Authentication-
Here, all parties get authentication to the
SSL certificates are not endorsed by any
transaction because SET’s certificates are
8. financial institution or payment brand
backed not just by a Certificate Authority,
association, so they cannot effectively
but also by financial institutions and
validate all parties.
MasterCard International.
Security-
Security-
SET enables transaction security from the
SSL only protects the cardholder and the
cardholder’s desktop to the merchant via
9. merchant, which is insufficient to prevent
bank approvals and back through the
fraud. SSL transactions, in other words, are
gateway, leaving an indisputable audit trail
never assured.
and, as a result, a guaranteed transaction.
SSL TLS
SSL stands for Secure Socket Layer. TLS stands for Transport Layer Security.
SSL (Secure Socket Layer) supports TLS (Transport Layer Security) does not support
the Fortezza algorithm. the Fortezza algorithm.
SSL (Secure Socket Layer) is the 3.0 version. TLS (Transport Layer Security) is the 1.0 version.
In SSL( Secure Socket Layer), the Message In TLS(Transport Layer Security), Hashed
Authentication Code protocol is used. Message Authentication Code protocol is used.
SSL TLS
SSL (Secure Socket Layer) is less secured as TLS (Transport Layer Security) provides high
compared to TLS(Transport Layer Security). security.
SSL uses port to set up explicit connection. TLS uses protocol to set up implicit connection.
The most common threat to security is the attack by the intruder. Intruders are often
referred to as hackers and are the most harmful factors contributing to the vulnerability of
security. They have immense knowledge and an in-depth understanding of technology and
security. Intruders breach the privacy of users and aim at stealing the confidential
information of the users. The stolen information is then sold to third-party, which aim at
misusing the information for their own personal or professional gains.
Intruders are divided into three categories:
• Masquerader: The category of individuals that are not authorized to use the
system but still exploit user’s privacy and confidential information by possessing
techniques that give them control over the system, such category of intruders is
referred to as Masquerader. Masqueraders are outsiders and hence they don’t
have direct access to the system, their aim is to attack unethically to steal data/
information.
• Misfeasor: The category of individuals that are authorized to use the system,
but misuse the granted access and privilege. These are individuals that take
undue advantage of the permissions and access given to them, such category of
intruders is referred to as Misfeasor. Misfeasors are insiders and they have direct
access to the system, which they aim to attack unethically for stealing data/
information.
• Clandestine User: The category of individuals those have
supervision/administrative control over the system and misuse the authoritative
power given to them. The misconduct of power is often done by superlative
authorities for financial gains, such a category of intruders is referred to as
Clandestine User. A Clandestine User can be any of the two, insiders or outsiders,
and accordingly, they can have direct/ indirect access to the system, which they
aim to attack unethically by stealing data/ information.
98
Below are the different ways adopted by intruders for cracking passwords for stealing
confidential information:
• Regressively try all short passwords that may open the system for them.
• Try unlocking the system with default passwords, which will open the system if
the user has not made any change to the default password.
• Try unlocking the system by personal information of the user such as their name,
family member names, address, phone number in different combinations.
• Making use of Trojan horse for getting access to the system of the user.
• Attacking the connection of the host and remote user and getting entry through
their connection gateway.
• Trying all the applicable information, relevant to the user such as plate numbers,
room numbers, locality info.
To prevent intruders from attacking the computer system, it is extremely important to be
aware of the preventive measures which leads to strengthening of the security posture.
Also, whenever there is potential detection of the system being attacked make sure to reach
cyber security experts as soon as possible.
Firewall Design Principles
Characteristics of Firewall
1. Physical Barrier: A firewall does not allow any external traffic to enter a system
or a network without its allowance. A firewall creates a choke point for all the
external data trying to enter the system or network and hence can easily block
access if needed.
2. Multi-Purpose: A firewall has many functions other than security purposes. It
configures domain names and Internet Protocol (IP) addresses. It also acts as a
network address translator. It can act as a meter for internet usage.
3. Flexible Security Policies: Different local systems or networks need different
security policies. A firewall can be modified according to the requirement of the
user by changing its security policies.
4. Security Platform: It provides a platform from which any alert to the issue
related to security or fixing issues can be accessed. All the queries related to
security can be kept under check from one place in a system or network.
5. Access Handler: Determines which traffic needs to flow first according to
priority or can change for a particular network or system. specific action requests
may be initiated and allowed to flow through the firewall.
99
1. Different Requirements: Every local network or system has its threats and
requirements which needs different structure and devices. All this can only be
identified while designing a firewall. Accessing the current security outline of a
company can help to create a better firewall design.
2. Outlining Policies: Once a firewall is being designed, a system or network
doesn’t need to be secure. Some new threats can arise and if we have proper
paperwork of policies then the security system can be modified again and the
network will become more secure.
3. Identifying Requirements: While designing a firewall data related to threats,
devices needed to be integrated, Missing resources, and updating security
devices. All the information collected is combined to get the best results. Even if
one of these things is misidentified leads to security issues.
4. Setting Restrictions: Every user has limitations to access different level of data
or modify it and it needed to be identified and taken action accordingly. After
retrieving and processing data, priority is set to people, devices, and
applications.
5. Identify Deployment Location: Every firewall has its strengths and to get the
most use out of it, we need to deploy each of them at the right place in a system
or network. In the case of a packet filter firewall, it needs to be deployed at the
edge of your network in between the internal network and web server to get the
most out of it.
4. Layered Defense
A network defense must be multiple-layered in the modern world because if the security is
broken, the network will be exposed to external attacks. Multilayer security design can be
set to deal with different levels of threat. It gives an edge to the security design and finally
neutralizes the attack on the system.
5. Consider Internal Threats
While giving a lot of attention to safeguarding the network or device from external attacks.
The security becomes weak in case of internal attacks and most of the attacks are done
internally as it is easy to access and designed weakly. Different levels can be set in network
security while designing internal security. Filtering can be added to keep track of the traffic
moving from lower-level security to higher level.
Advantages of Firewall:
1. Blocks infected files: While surfing the internet we encounter many unknown
threats. Any friendly-looking file might have malware in it.
The firewall neutralizes this kind of threat by blocking file access to the system.
2. Stop unwanted visitors: A firewall does not allow a cracker to break into the
system through a network. A strong firewall detects the threat and then stops
the possible loophole that can be used to penetrate through security into the
system.
3. Safeguard the IP address: A network-based firewall like an internet connection
firewall(ICF). Keeps track of the internet activities done on a network or a system
and keeps the IP address hidden so that it can not be used to access sensitive
information against the user.
4. Prevents Email spamming: In this too many emails are sent to the same
address leading to the server crashing. A good firewall blocks the spammer
source and prevents the server from crashing.
5. Stops Spyware: If a bug is implanted in a network or system it tracks all the
data flowing and later uses it for the wrong purpose. A firewall keeps track of all
the users accessing the system or network and if spyware is detected it disables
it.
Trusted systems
Trusted systems refer to computer systems or devices that are designed and implemented
with strong security measures to ensure the integrity, confidentiality, and availability of
data and resources. These systems are built upon the concept of trust, where the
components and processes within the system are reliable and can be trusted to operate
securely.
Trusted Systems are special systems designed to serve the purpose of providing security.
Safety is ensured by trusted system in a manner by protecting the system against malicious
software’s and third party intruders. Trusted system allow only verified users to access the
101
computer system. Trusted system are responsible for providing security at different levels
and based on different parameters.
Trusted Systems are based on different level of security. They are mentioned as below:
• Multilevel Security: This type of Trusted system ensures that security is
maintained at different levels of the computer system. It ensures that the
information is prevented from being at risk. The different security levels of
computer systems are :
• Top Secret Level
• Secret Level
• Confidential Level
• Unclassified Level
• The order of security level is also given by top level security having the highest
priority followed by secret Level priority, confidential Level priority and then
least priority is assigned to unclassified level priority. If security is not cleared at
one particular level, flow of information is restricted. Also, one important point
that must be kept in mind is that ‘Read Up’ and ‘Write Down’ are not permitted
in multilevel security.
• Data Access Control: This type of Trusted system provides additional security
to the verified process of log-in. It helps in setting permissions for different users,
giving them limited access and restricting any additional accesses granted. There
are three basic models of Data Access Control:
• Access Matrix: They are composed of three parts
• Subject
• Object
• Access right
• Access Control List: They are composed of different entries of
objects depicting user access and the level of access granted (public
or private). Access control list demonstrate column-wise split.
• Capability List: They are composed of authorized users and the
granted operations for them. Users can have multiple capability
tickets. Capability list demonstrate row-wise split.
• Reference Monitor: This type of trusted system provides hardware level
security by limiting the access to objects. Reference monitor maintain security
rules ensuring that ‘Read Up’ and ‘Write Down’ operations are not performed.
Reference monitor ensure that the entire security maintaining process that is
carried out is verified and safe.
Importance of Trusted System:
• Identity Verification: Trusted systems ensure that only verified users are given
access. The verification process takes place that each user is identified uniquely.
• Safety Maintained: Trusted system ensures that safety is maintained by
preventing direct access to confidential information.
• Limiting Access: Permissions and access that are absolutely necessary are
granted for users. Unwanted rules and permissions are avoided.
102
Unit-4
Introduction to Digital Forensics
Digital forensics is the field of forensic science that focuses on the investigation, recovery,
and analysis of digital evidence in order to uncover and understand digital crimes or
incidents. It involves the collection, preservation, examination, and presentation of digital
evidence in a legally admissible manner.
Digital forensics is applicable in various scenarios, including criminal investigations, incident
response, civil litigation, and corporate investigations. It encompasses a wide range of
techniques and methodologies to extract and analyze data from digital devices such as
computers, smartphones, tablets, servers, and network infrastructure.
1. Identification and Recovery: The first step in digital forensics is to identify and recover
relevant digital evidence. This involves preserving the integrity of the evidence and
employing proper techniques to acquire data from various sources, including hard drives,
memory, network traffic, and cloud storage.
4. Reporting and Presentation: The findings and conclusions derived from the digital
forensic analysis are documented in a comprehensive report. The report includes detailed
information about the methods used, the evidence collected, the analysis performed, and
the results obtained. This report may be presented in a court of law or shared with relevant
stakeholders for further action.
- Disk imaging: Creating a bit-for-bit copy of a storage device to preserve the original data
for analysis.
- File carving: Extracting files and data fragments from unallocated disk space or damaged
storage media.
- Network forensics: Analyzing network traffic and logs to reconstruct communication
patterns, identify intrusion attempts, or determine the source of an attack.
- Memory forensics: Examining the volatile memory of a computer to identify running
processes, recover passwords, or gather evidence of malicious activities.
104
- Mobile device forensics: Extracting data from smartphones, tablets, or other mobile
devices to uncover communications, location information, or application usage.
- Malware analysis: Analyzing malicious software to understand its behavior, purpose, and
potential impact.
- Data recovery: Employing specialized techniques to recover deleted or damaged data from
storage devices.
1. Computer Forensics: Computer forensics involves the examination and analysis of digital
evidence from computer systems, including desktops, laptops, servers, and storage devices.
It encompasses the recovery of deleted files, analysis of system artifacts, examination of
internet browsing history, and identification of user activities.
3. Mobile Device Forensics: Mobile device forensics deals with the examination and analysis
of data from smartphones, tablets, and other mobile devices. It involves extracting
information such as call logs, text messages, emails, contacts, location data, and app usage.
Mobile device forensics also includes analyzing data from SIM cards and mobile
applications.
5. Memory Forensics: Memory forensics involves analyzing the volatile memory (RAM) of a
computer system. It aims to identify running processes, extract encryption keys, recover
passwords, and gather evidence of malicious activities that may not be present on the disk.
Memory forensics is particularly useful in investigating advanced malware, rootkits, and
volatile system states.
6. Cloud Forensics: Cloud forensics deals with the investigation of digital evidence stored in
cloud computing environments. It involves analyzing data stored in cloud services, such as
email providers, file storage platforms, or virtual machines. Cloud forensics requires
understanding the specific mechanisms and logging capabilities of different cloud service
providers.
8. Incident Response Forensics: Incident response forensics is conducted during and after a
cybersecurity incident or breach. It involves the identification and containment of the
incident, preservation of digital evidence, analysis of compromised systems, and
reconstruction of events to determine the cause and impact of the incident.
1. Crime Investigation: Digital forensics enables investigators to collect and analyze digital
evidence, which can provide crucial insights into criminal activities. It helps in identifying
perpetrators, establishing timelines, and linking individuals or entities to specific actions or
incidents.
1. Technical Complexity: Digital forensics requires specialized knowledge, skills, and tools to
effectively collect and analyze digital evidence. It can be technically complex, and the lack
of skilled professionals in the field can pose challenges in conducting thorough
investigations.
106
2. Data Overload: With the increasing amount of digital data generated, investigators may
face challenges in handling and analyzing large volumes of data. The sheer volume of data
can make the forensic analysis time-consuming and resource-intensive.
4. Legal and Privacy Considerations: Digital forensics must adhere to legal and privacy
requirements to ensure the admissibility of evidence in court. Balancing the need for
investigation with individual privacy rights can be complex, requiring careful consideration
and compliance with legal procedures.
3. Volume and Complexity of Data: The exponential growth of digital data presents a
significant challenge in digital forensics. Investigators must handle large volumes of data
from various sources, including computers, mobile devices, cloud storage, and network logs.
Analyzing and processing massive datasets can be time-consuming and resource-intensive,
requiring advanced tools and techniques to extract relevant information efficiently.
107
5. Cloud Computing and Virtualization: The widespread adoption of cloud computing and
virtualization introduces unique challenges for digital forensics. Investigators may face
difficulties in accessing and preserving evidence stored in cloud environments, as well as in
distinguishing between virtual and physical resources. The dynamic nature of cloud systems
and the potential for shared infrastructure raise issues related to data privacy, jurisdiction,
and chain of custody.
6. Privacy and Legal Considerations: Digital forensics must navigate complex legal and
privacy frameworks to ensure the admissibility of evidence and protect individual rights.
Investigators must follow strict procedures to maintain the integrity of evidence, preserve
privacy, and adhere to legal requirements. Balancing the need for investigation with privacy
concerns and complying with relevant laws and regulations can be challenging.
6. Presentation and Communication: The findings and conclusions derived from the digital
forensic analysis may need to be presented to various stakeholders, such as law
enforcement agencies, legal counsel, or internal management. Effective communication of
complex technical concepts to non-technical audiences is crucial, ensuring that the
significance and implications of the findings are clearly conveyed.
• Hans Gross (1847 -1915): First use of scientific study to head criminal investigations
• FBI (1932): Set up a lab to offer forensics services to all field agents and other law
authorities across the USA.
• In 1978 the first computer crime was recognized in the Florida Computer Crime Act.
• Francis Galton (1982 – 1911): Conducted first recorded study of fingerprints
• In 1992, the term Computer Forensics was used in academic literature.
• 1995 International Organization on Computer Evidence (IOCE) was formed.
• In 2000, the First FBI Regional Computer Forensic Laboratory established.
• In 2002, Scientific Working Group on Digital Evidence (SWGDE) published the first
book about digital forensic called “Best practices for Computer Forensics”.
• In 2010, Simson Garfinkel identified issues facing digital investigations.
Forensic software and hardware play a crucial role in digital forensics investigations,
enabling investigators to effectively collect, analyze, and interpret digital evidence. Here are
some commonly used types of forensic software and hardware:
109
Forensic Software:
1. Disk Imaging Tools: Disk imaging software creates forensic copies or images of digital
storage media, such as hard drives or memory cards. It ensures the preservation of the
original data while allowing investigators to work on the copies, minimizing the risk of
altering or damaging the evidence. Examples of disk imaging tools include EnCase, FTK
Imager, and dd (a command-line tool).
2. Forensic Analysis Suites: These comprehensive software packages provide a wide range
of tools and functionalities for analyzing and examining digital evidence. They typically
include features for file system analysis, deleted file recovery, keyword search, metadata
extraction, and report generation. Popular forensic analysis suites include EnCase, X-Ways
Forensics, and Autopsy.
3. Network Forensic Tools: Network forensic software helps in the analysis of network traffic
and identifying network-based attacks or intrusions. These tools capture and analyze
network packets, reconstruct network sessions, and extract relevant information such as IP
addresses, protocols used, and communication patterns. Wireshark, NetworkMiner, and
tshark are commonly used network forensic tools.
4. Mobile Forensic Tools: Mobile forensic software specializes in extracting and analyzing
data from smartphones, tablets, and other mobile devices. These tools can recover call logs,
text messages, contacts, emails, app data, and other digital artifacts. Popular mobile
forensic tools include Oxygen Forensic Suite, Cellebrite UFED, and Magnet AXIOM.
5. Data Recovery Tools: Data recovery software helps in retrieving deleted or lost data from
digital storage media. It can be useful in recovering deleted files, fragmented data, or data
from damaged or formatted drives. Notable data recovery tools include R-Studio,
GetDataBack, and TestDisk.
Forensic Hardware:
1. Write Blockers: Write blockers are hardware devices used to ensure the integrity of digital
evidence by preventing any modifications to the original storage media during the
investigation process. They allow read-only access to the storage devices, preventing
accidental or intentional writes. Popular write blockers include Tableau, WiebeTech, and
Forensic ComboDock.
2. Forensic Imagers: Forensic imagers are dedicated hardware devices used to create
forensic copies of digital storage media. They ensure fast and reliable imaging, often with
multiple simultaneous operations and verification mechanisms. Examples include Tableau
Forensic Imager, Logicube Forensic Dossier, and Forensic Falcon.
3. Hardware Write Blockers: Similar to software write blockers, hardware write blockers
provide read-only access to storage media, preventing write operations. These devices
connect between the storage media and the investigator's system, ensuring that no
110
modifications are made to the evidence. Popular hardware write blockers include Tableau,
WiebeTech, and CRU.
These are just a few examples of the software and hardware tools used in digital forensics.
It's worth noting that the choice of tools may depend on factors such as the type of
investigation, the complexity of the case, budget considerations, and the expertise of the
forensic examiner.
1. Investigating Cybercrimes: With the rise of cybercrimes, computer forensics plays a vital
role in investigating and prosecuting digital offenses. It helps identify and gather evidence
related to hacking, data breaches, financial fraud, identity theft, intellectual property theft,
and other cybercrimes. Computer forensics techniques are crucial for tracking digital
footprints, uncovering the methods used by perpetrators, and building a case for legal action.
2. Preventing Cyber Attacks: Computer forensics not only investigates cybercrimes but also
contributes to preventing future attacks. By analyzing digital evidence from past incidents,
forensic experts can identify vulnerabilities, weaknesses, and patterns of attack. This
information enables organizations to implement stronger security measures, patch
vulnerabilities, and develop effective incident response plans.
3. Ensuring Data Integrity: Computer forensics helps maintain the integrity and admissibility
of digital evidence. Forensic methodologies and tools ensure that evidence is collected,
preserved, and analyzed in a forensically sound manner, following strict protocols and legal
requirements. This is crucial for ensuring the evidence holds up in court, supporting legal
proceedings and increasing the chances of successful prosecution.
5. Uncovering Insider Threats: Computer forensics plays a significant role in identifying and
investigating insider threats within organizations. It helps detect unauthorized access, data
leaks, employee misconduct, or other insider-related incidents. By analyzing digital trails,
111
email communications, system logs, and user activities, forensic experts can provide valuable
insights into the actions and intentions of internal actors.
6. Resolving Digital Disputes: Computer forensics is often utilized in civil litigation cases and
disputes involving digital evidence. It helps resolve issues related to intellectual property
theft, trade secrets, contract breaches, and digital fraud. By analyzing digital artifacts,
metadata, and communication records, forensic experts can provide expert testimony and
support legal proceedings.
The legal perspectives of cybercrimes and cybersecurity involve the application of laws,
regulations, and legal frameworks to address and mitigate cyber threats, protect
individuals' rights, and hold perpetrators accountable. These legal aspects play a crucial role
in shaping cybersecurity policies, establishing standards, and facilitating effective response
and prevention strategies. Here is an introduction to the legal perspectives of cybercrimes
and cybersecurity:
1. Laws and Regulations: Various laws and regulations have been enacted globally to
address cybercrimes and protect digital systems and data. These laws define offenses,
specify penalties, and outline legal procedures for investigating and prosecuting
cybercriminals. Examples include the Computer Fraud and Abuse Act (CFAA) in the United
States, the European Union's General Data Protection Regulation (GDPR), and the
Cybercrime Convention of the Council of Europe.
3. Privacy and Data Protection: As digital systems and data become more interconnected,
protecting privacy and personal data has become a significant concern. Laws and
regulations, such as the GDPR, focus on safeguarding individuals' privacy rights and
imposing obligations on organizations to handle personal data responsibly. Legal
frameworks provide guidance on data breach notification requirements, data minimization,
consent, and individual rights regarding their personal information.
4. Intellectual Property Rights: Cybercrimes often involve the theft, infringement, or misuse
of intellectual property (IP). Laws pertaining to copyright, patents, trademarks, and trade
112
secrets are relevant in addressing cybercrimes related to IP. Protecting intellectual property
rights encourages innovation and creativity while ensuring that digital assets are adequately
safeguarded.
6. Incident Response and Reporting: Laws and regulations often require organizations to
have incident response plans in place to handle cybersecurity incidents. These plans outline
steps to be taken in the event of a breach, including reporting requirements to regulatory
authorities and affected individuals. Compliance with incident response obligations helps
organizations minimize the impact of breaches, meet legal requirements, and maintain
public trust.
8. Compliance and Industry Regulations: Various industry sectors have specific regulations
and compliance frameworks related to cybersecurity. For example, the financial sector may
have regulations such as the Payment Card Industry Data Security Standard (PCI DSS), while
the healthcare sector follows the Health Insurance Portability and Accountability Act
(HIPAA). These regulations aim to ensure the security and confidentiality of sensitive data
within specific industries.
Cyber Laws
Cyber laws, also known as cybercrime laws or internet laws, refer to the legal regulations,
statutes, and frameworks that govern activities in the digital domain. These laws are
specifically designed to address issues related to cybercrimes, data protection, online
privacy, intellectual property, and the use of technology and the internet. Cyber laws aim
to establish legal guidelines, rights, and responsibilities for individuals, organizations, and
governments operating in the digital realm.
Cyber laws are essential for several reasons:
113
3. Promoting Cybersecurity Measures: Cyber laws often include provisions that promote
cybersecurity practices and standards. They require organizations to implement reasonable
security measures to protect data and systems, thereby reducing the risk of cyber attacks.
By establishing legal obligations for cybersecurity, these laws encourage proactive
measures to prevent and mitigate cyber threats.
4. Protecting Privacy and Data Protection: With the increasing digitization of personal
information, cyber laws play a crucial role in protecting privacy and data protection rights.
They regulate the collection, use, storage, and sharing of personal data by organizations and
individuals. Cyber laws, such as data protection laws and privacy regulations, ensure that
personal information is handled responsibly and that individuals have control over their
data.
7. Building Trust and Confidence: Cyber laws help build trust and confidence in the digital
ecosystem. By establishing legal protections and frameworks, individuals and organizations
can have greater confidence in conducting online transactions, sharing information, and
engaging in digital activities. Cyber laws create a sense of security and accountability,
promoting the growth of digital economies and innovation.
114
8. Promoting Responsible Use of Technology: Cyber laws also address issues related to
responsible use of technology. They define boundaries and limitations for activities such as
hacking, cyberbullying, and harassment, discouraging malicious and harmful behavior in the
digital realm. Cyber laws promote ethical and responsible conduct online, fostering a safer
and more inclusive digital environment.
Overall, cyber laws are crucial for protecting individuals, organizations, and society as a
whole in the digital age. They provide legal mechanisms to address cybercrimes, promote
cybersecurity measures, safeguard privacy and data protection, facilitate international
cooperation, protect intellectual property, build trust, and encourage responsible use of
technology.
The Information Technology Act, 2000 also Known as an IT Act is an act proposed by the
Indian Parliament reported on 17th October 2000. This Information Technology Act is based
on the United Nations Model law on Electronic Commerce 1996 (UNCITRAL Model) which
was suggested by the General Assembly of United Nations by a resolution dated on 30th
January, 1997. It is the most important law in India dealing with Cybercrime and E-
Commerce.
The main objective of this act is to carry lawful and trustworthy electronic, digital and online
transactions and alleviate or reduce cybercrimes. The IT Act has 13 chapters and 90 sections.
The last four sections that starts from ‘section 91 – section 94’, deals with the revisions to
the Indian Penal Code 1860.
The IT Act, 2000 has two schedules:
• First Schedule –
Deals with documents to which the Act shall not apply.
• Second Schedule –
Deals with electronic signature or electronic authentication method.
The offences and the punishments in IT Act 2000 :
The offences and the punishments that falls under the IT Act, 2000 are as follows :-
1. Tampering with the computer source documents.
2. Directions of Controller to a subscriber to extend facilities to decrypt
information.
3. Publishing of information which is obscene in electronic form.
4. Penalty for breach of confidentiality and privacy.
5. Hacking for malicious purposes.
6. Penalty for publishing Digital Signature Certificate false in certain particulars.
7. Penalty for misrepresentation.
8. Confiscation.
9. Power to investigate offences.
10. Protected System.
11. Penalties for confiscation not to interfere with other punishments.
12. Act to apply for offence or contravention committed outside India.
13. Publication for fraud purposes.
115
SECTION PUNISHMENT
This section of IT Act, 2000 states that any act of destroying, altering or
stealing computer system/network or deleting data with malicious intentions
without authorization from owner of the computer is liable for the payment
Section 43 to be made to owner as compensation for damages.
This section of IT Act, 2000 states that any corporate body dealing with
sensitive information that fails to implement reasonable security practices
Section causing loss of other person will also liable as convict for compensation to the
43A affected party.
Section 66 This Section is for Violation of privacy by transmitting image of private area
E is punishable with 3 years imprisonment or 2,00,000 fine or both.
The Indian IT Act recognizes digital signatures as a valid and legally binding means of signing
electronic documents. The Act provides for the use of digital signatures for authentication
and verification of electronic records and digital transactions. It defines a digital signature
as a unique electronic method of signing a document, which is used to verify the
authenticity and integrity of the electronic document.
The IT Act also provides for the establishment of a Controller of Certifying Authorities (CCA)
who is responsible for regulating and overseeing the functioning of Certifying Authorities
(CAs) in the country. CAs issue digital certificates which contain a digital signature, and these
certificates are used to verify the authenticity of electronic records and transactions.
The use of digital signatures has become increasingly popular in India, particularly in the
banking, financial and e-commerce sectors, where it provides a secure and convenient
means of carrying out electronic transactions. The legal recognition of digital signatures
116
under the Indian IT Act has helped to promote the growth of e-commerce and the digital
economy in the country.
Here's how digital signatures are addressed in the Indian IT Act:
1. Legal Recognition: The Indian IT Act provides legal recognition to digital signatures and
considers them at par with physical signatures. Section 3 of the Act states that any
electronic record that is authenticated by means of a digital signature is considered to be
legally valid and enforceable.
2. Digital Signature Certificates (DSC): The Act establishes the concept of Digital Signature
Certificates (DSC) and certifying authorities. Certifying authorities are responsible for
issuing digital certificates that contain the public key of the certificate holder and other
relevant information. These certificates are used for verifying the authenticity of digital
signatures.
3. Certifying Authorities: The Act outlines the requirements and procedures for the
appointment and regulation of certifying authorities. Certifying authorities are required to
follow specific guidelines and security practices to ensure the integrity and reliability of the
digital certificates they issue. The Act also empowers the Controller of Certifying Authorities
(CCA) to oversee the functioning of certifying authorities in India.
4. Authentication and Verification: The Indian IT Act recognizes digital signatures as a means
of authenticating electronic records and transactions. When a digital signature is applied to
an electronic record, it signifies that the person who possesses the private key
corresponding to the public key embedded in the digital certificate has authenticated the
record. The Act establishes the process for verifying digital signatures, including the use of
public key infrastructure (PKI) technology.
5. Legal Implications: The Act clarifies the legal implications of using digital signatures. It
states that a digital signature cannot be denied legal validity and enforceability solely on
the grounds that it is in an electronic form or that it is a digital signature. In legal
proceedings, a digital signature is treated as evidence of the authenticity and integrity of
the electronic record to which it is affixed.
6. Offenses and Penalties: The Indian IT Act also includes provisions related to the misuse
or fraudulent use of digital signatures. Unauthorized access to someone's digital signature
private key or the tampering of digital signatures is considered an offense under the Act and
can lead to penalties and imprisonment.
1. Unauthorized Access and Hacking: Section 66 of the IT Act deals with unauthorized access
to computer systems, networks, or computer resources. Offenders can face imprisonment
of up to three years and/or a fine.
2. Identity Theft and Impersonation: Section 66C of the IT Act addresses identity theft,
where a person fraudulently uses another person's identity. The punishment for this offense
is imprisonment of up to three years and/or a fine.
3. Cyber Fraud: Section 66D of the IT Act deals with cheating by personation using a
computer resource. Offenders can face imprisonment of up to three years and/or a fine.
5. Cyber Stalking: Section 354D of the Indian Penal Code (IPC) deals with cyber stalking. The
punishment for this offense is imprisonment of up to three years and/or a fine.
6. Data Theft and Unauthorized Copying: Section 43 and 43A of the IT Act deal with offenses
related to unauthorized access, copying, or extraction of data. The punishment for this
offense can include imprisonment of up to three years and/or a fine.
7. Child Pornography: The Protection of Children from Sexual Offenses (POCSO) Act, 2012,
and the IT Act address offenses related to child pornography. Offenders can face
imprisonment ranging from five years to life imprisonment, depending on the severity of
the offense.
It's important to note that these punishments are not exhaustive, and there may be
additional provisions in other laws that address specific cybercrimes and their penalties.
Additionally, the punishment for cybercrimes can vary based on the discretion of the courts
and the specific circumstances of each case.
118