security practics unit 1
security practics unit 1
security practics unit 1
CP 4391
S. VILMA VERONICA
ASSISTANT PROFESSOR
DEPARTMENT OF M.E.(CSE)
CP 4391 - SECURITY PRACTICES
COURSE OBJECTIVES:
✔ To learn the core fundamentals of system and web security concepts
✔ To have through understanding in the security concepts related to networks
✔ To deploy the security essentials in IT Sector
✔ To be exposed to the concepts of Cyber Security and cloud security
✔ To perform a detailed study of Privacy and Storage security and related Issues
CP 4391 - SECURITY PRACTICES
UNITS
1. SYSTEM SECURITY
2. NETWORK SECURITY
3. SECURITY MANAGEMENT
When we send our data from the source side to the destination side we have
to use some transfer method like the internet or any other communication
channel by which we are able to send our message.
The two parties, who are the principals in this transaction, must cooperate for
the exchange to take place.
When the transfer of data happened from one source to another source some
logical information channel is established between them by defining a route
through the internet from source to destination and by the cooperative use of
communication protocols (e.g., TCP/IP) by the two principals.
UNIT - 1 SYSTEM SECURITY
When we use the protocol for this logical information channel the main aspect
of security has come who may present a threat to confidentiality, authenticity,
and so on.
This model shows that there are four basic tasks in designing a particular
security service:
This model shows that there are four basic tasks in designing a particular
security service:
Passive: Attackers gain access to a network and can monitor or steal sensitive
information, but without making any change to the data, leaving it intact.
Active: Attackers not only gain unauthorized access but also modify data, either
deleting, encrypting or otherwise harming it.
UNIT - 1 SYSTEM SECURITY
1. Authentication
Authentication is used by a server when the server needs to know exactly who
is accessing their information or site.
Authentication is used by a client when the client needs to know that the server
is system it claims to be.
UNIT - 1 SYSTEM SECURITY
Security Services and mechanisms
2. Access Control
Network access control is a method of enhancing the security of a private
organizational network by restricting the availability of network resources to
endpoint devices that comply with the organization’s security policy.
UNIT - 1 SYSTEM SECURITY
Security Services and mechanisms
2. Access Control
UNIT - 1 SYSTEM SECURITY
Security Services and mechanisms
3. Data Integrity
Data integrity is defined as the data contained in the database is both correct
and consistent.
For this purpose, the data stored in the database must satisfy certain types of
procedures (rules). The data in a database must be correct and consistent.
4. Data Confidentility
5. Non repudiation
It means one party cannot deny receiving a message or a transaction nor can
the other party deny sending a message or a transaction.
It defines security services and security mechanisms that can be used at each of
the seven layers of the OSI model to provide security for data transmitted over
a network.
1. Security Attack
2. Security mechanism
3. Security Service
UNIT - 1 SYSTEM SECURITY
Classification of OSI Security Architecture
UNIT - 1 SYSTEM SECURITY
Classification of OSI Security Architecture
1. Security Attacks:
A security attack is an attempt by a person or entity to gain unauthorized
access to disrupt or compromise the security of a system, network, or device.
These are defined as the actions that put at risk an organization’s safety.
UNIT - 1 SYSTEM SECURITY
Classification of OSI Security Architecture
1. Passive Attack:
Attacks in which a third-party intruder tries to access the message/ content/
data being shared by the sender and receiver by keeping a close watch on the
transmission or eave-dropping the transmission is called Passive Attacks.
UNIT - 1 SYSTEM SECURITY
Classification of OSI Security Architecture
1. Passive Attack:
Attacks in which a third-party intruder tries to access the message/ content/
data being shared by the sender and receiver by keeping a close watch on the
transmission or eave-dropping the transmission is called Passive Attacks.
Passive attacks are further divided into two parts based on their behavior:
1. Eavesdropping
2. Traffic analysis
UNIT - 1 SYSTEM SECURITY
Classification of OSI Security Architecture
Eavesdropping:
This involves the attacker intercepting and listening to communications
between two or more parties without their knowledge or consent.
Traffic analysis:
This involves the attacker analyzing network traffic patterns and metadata to
gather information about the system, network, or device.
Here the intruder can’t read the message but only understand the pattern and
length of encryption.
Active Attacks:
Active attacks refer to types of attacks that involve the attacker actively
disrupting or altering system, network, or device activity.
Active Attacks:
The message/ data transmitted doesn’t remain in its usual form and shows
deviation from its usual behavior.
Active attacks are further divided into four parts based on their behavior:
Denial of service (DoS) attacks involve the attacker sending a large volume of
traffic to a system, network, or device in an attempt to overwhelm it and make
it unavailable to legitimate users.
UNIT - 1 SYSTEM SECURITY
Classification of OSI Security Architecture
2. Security Mechanism
The mechanism that is built to identify any breach of security or attack on the
organization, is called a security mechanism.
3. Security Services:
Security services refer to the different services available for maintaining the
security and safety of an organization.
They help in preventing any potential risks to security. Security services are
divided into 5 types:
1. Authentication
2. Access control
3. Data Confidentiality
4. Data integrity
5. Non- repudiation
UNIT - 1 SYSTEM SECURITY
1. Authentication is the process of verifying the identity of a user or device in order to
grant or deny access to a system or device.
2. Access control involves the use of policies and procedures to determine who is allowed
to access specific resources within a system.
3. Data Confidentiality is responsible for the protection of information from being accessed
or disclosed to unauthorized parties.
4. Data integrity is a security mechanism that involves the use of techniques to ensure that
data has not been tampered with or altered in any way during transmission or storage.
5. Non- repudiation involves the use of techniques to create a verifiable record of the
origin and transmission of a message, which can be used to prevent the sender from
denying that they sent the message.
UNIT - 1 SYSTEM SECURITY
Benefits of OSI Architecture:
1. Providing Security:
OSI Architecture in an organization provides the needed security and safety, preventing
potential threats and risks.
2. Organising Task:
The OSI architecture makes it easy for managers to build a security model for the
organization based on strong security principles.
The standard definition of requirements defined using OSI Architecture is globally accepted.
UNIT - 1 SYSTEM SECURITY
The prefix “crypt” means “hidden” and suffix graphy means “writing”.
UNIT - 1 SYSTEM SECURITY
Confidentiality: Information can only be accessed by the person for whom it is intended and
no other person except him can access it.
Symmetric Key Systems are faster and simpler but the problem is that sender
and receiver have to somehow exchange key in a secure manner.
Hash Functions:
There is no usage of any key in this algorithm.
A hash value with fixed length is calculated as per the plain text which makes it
impossible for contents of plain text to be recovered.
Even if the public key is known by everyone the intended receiver can only
decode it because he alone knows the private key.
UNIT - 1 SYSTEM SECURITY
Applications Of Cryptography:
1. Computer passwords
2. Digital Currencies
3. Secure web browsing
4. Electronic Signatures
5. Authentication
6. Cryptocurrencies
7. End-to-end encryption
UNIT - 1 SYSTEM SECURITY
Websites and Web applications has became a necessity in this world, From business,
companies, education, collaboration, personal blogs, foods and groceries, health and
medicine, social media platforms, accessing Government Services and Digital payments and
even voting everything is available in the Internet.
These days its has become common to get our daily works done via some button clicks on the
screen and the common question “are website secure?”.
Every legitimate website tries to provide at most security but no form of internet is
completely, a 100% secure.
UNIT - 1 SYSTEM SECURITY
SECURITY WEB APPLICATION:
Website vs WebApp :
Websites are static HTML, CSS, with some JS files displayed according styling provided in CSS.
Websites aren’t dynamic, they can’t submit forms, can’t generate pages dynamically and
might be limited in other accepts too.
Web Applications are the programs which can accept form submissions, generate pages
dynamically, communicate with database to do CURD processes and more.
UNIT - 1 SYSTEM SECURITY
SECURITY WEB APPLICATION:
✔ Keeping backups
✔ Keeping backups
It is basically stands for the Open Web Application Security Project, it is a non-profit global
online community consisting of tens of thousands of members and hundreds of chapters that
produces articles, documentation, tools, and technologies in the field of web application
security.
UNIT - 1 SYSTEM SECURITY
OWASP
The data that is injected through this attack vector makes the application do something it is
not designed for.
2. Broken Authentication
Broken Authentication is a vulnerability that allows an attacker to use manual or automatic
methods to try to gain control over any account they want in a system.
In worse conditions, they could also gain complete control over the system.
This vulnerability occurs when there is broken access to resources, it means there are some
improperly configured missing restrictions on authenticated users which allows them to
access unauthorized functionality or data like access to others accounts, confidential
documents, etc.
6. Security Misconfiguration
It is estimated that up to 95% of cloud breaches are the result of human errors and this fact
leads us to the next vulnerability called security misconfiguration.
XSS vulnerability allows a hacker to inject malicious client-side scripts into a website and then
use the web application as an attack vector to hijack user sessions, or redirecting the victim
to malicious websites.
8. Insecure Deserialization
Insecure Deserialization vulnerability allows an attacker to remotely execute code in the
application, tamper or delete serialized (written to disk) objects, conduct injection attacks,
replay attacks, and elevate privileges.
Insufficient logging and ineffective integration of the security systems allow attackers to pivot
to other systems and maintain persistent threats.