Cyber Security
Cyber Security
Cyber Security
By
Er. Amandeep Kaur
A.P (CSE)
Cyber Security
The events of Sept. 11 2001 proved that terror attacks
on nonmilitary targets could be crippling to our
national infrastructure.
A week after the first anniversary of the day that
changed everything, the White House released a 60-
page draft plan called the National Strategy to Secure
Cyberspace, which also points out that US businesses-
-and individuals--are potential targets for cyber-
terrorism.
The experts say we can't rule anything out, but are
advising us to be realistic.
What is Cyberspace?
Cyberspace is a worldwide network of computers and
the equipment that connects them, which by its very
design is free and open to the public (the Internet)
50000
40000
30000
Attacks
20000
10000
0
2000 2001 2002 2003
Clean up cost of Cyber-attacks
SirCam: 2.3 million computers affected
Clean-up: $460 million
Lost productivity: $757 million
Code Red: 1 million computers affected
Clean-up: $1.1 billion
Lost productivity: $1.5 billion
Love Bug: 50 variants, 40 million
computers affected
$8.7 billion for clean-up and lost
productivity
Nimda
Cost still to be determined
Virus Profiles
Sircam
(note the personal text)
INFORMATION
Integrity Availability
The Dilemma of Security
The problem that we cannot get away from in computer
security is that we can only have good security if everyone
understands what security means, and agrees with the need
for security.
Security is a social problem, because it has no meaning
until a person defines what it means to them.
The harsh reality is the following: In practice, most users
have little or no understanding of security. This is our
biggest security hole.
Meaning of Security Lies in Trust
Every security problem has this question it needs to answer
first: Whom or what do we trust?
On our daily lives, we placed some sort of technology
between us and the things we dont trust. For example lock
the car, set the house alarm, give Credit Card number only to
the cashier, etc.
So we decided to trust somebody/something to have some
sort of security (trust the lock, trust the police, trust the
cashier).
We have to have the same scenario for computer & network
systems we use today.
Components of an
Information System
People are the biggest threat to information security!!!
(WHY? Because WE are the weakest link)
Social Engineering . It is a system that manipulates the
actions of people in order to obtain information about a
system in order to obtain access.
Procedures are written blueprints for accomplishing a
specific task; step-by-step descriptions.
The obtainment of the procedures by an unauthorized user
would constitute a threat to the integrity of the information.
Figure 5
Hardware
Software
People
Procedures
Data
Components of an Information System
Figure 6 Internet
Remote System
Hacker
Access vs. Security
Security Access
VP- VP-
CISO
Systems Networks
Security Systems Network
Mgr Mgr Mgr
Security Systems Network
Admin Admin Admin
Security Systems Network
Tech Tech Tech
Bottom-Up Implementation By Network Administrators
What is Encryption ?
Encryption is the process of converting
messages, information, or data into a form
unreadable by anyone except the intended
recipient. As shown in the figure below,
Encrypted data must be deciphered, or
decrypted, before it can be read by the
recipient.
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ZYXWVUTSRQPONMLKJIHGFEDCBA
Figure 1: ATBASH Cipher
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Figure 2: Caesar Cypher
History of Cryptography
In 1518 Johannes Trithemius wrote the first printed
book on cryptology. It was also known as changing
key cipher.
ABCDEFGHIJKLMNOPQRSTUVWXYZ Plaintext
FGUQHXSZACNDMRTVWEJBLIKPYO T00
OFGUQHXSZACNDMRTVWEJBLIKPY T01
YOFGUQHXSZACNDMRTVWEJBLIKP T02
PYOFGUQHXSZACNDMRTVWEJBLIK T03
...
GUQHXSZACNDMRTVWEJBLIKPYOF T25
GJTXUVWCHYIZKLNMARBFDOESQP
W1
IKMNQLPBYFCWEDXGZAJHURSTOV
W2
HJLIKNXWCGBDSRVUEOFYPAMQZT
W3
...
BDFONGHJIKLSTVUWMYEPRQXZAC
Wn
Cryptographic Accelerators
Authentication Tokens
Biometric/Recognition Methods
Examples
Type Cryptographic Authentication Biometric/
Accelerator Token Recognition
Definition Coprocessor External device External
that calculates that interfaces device that
and handles the with device to measures
Random grant access. 2 human body
Number types: contact factors to
Generation and allow access
NonContact
Examples PCI coprocessor Credit Card, Fingerprint,
RSA SecurID Optical,
Voice and
Signature
recognition
Biometrics Devices
Forrester Research
A multimedia world..in transition..
Copper to glass
Radio + Satellite + IR
Fixed to mobile
Mankind
50 6Bn Machines
Machines
25
20Bn
0
Language 1%
Training 3%
Lack of skills 7%
Cost 9%
Implementation difficulty 10%
Lack of knowledge 10%
Technology resistance 10%
Customers not connected 24%
Security worries 25%
Its not about $ - It is about time
Rate of change Technology
Companies
Business
Society
People
Legal Systems
Governments
Today Time
Everything will be in Cyberspace
covered by a hierarchy of computers!
Cell
Body
Continent Home
Region Car
Building
Campus
World
Fractal Cyberspace: a network
of networks of platforms
Robert Statica Cybersecurity Original by Gordon Bell
Survival..