Itec 100 l1 l3 Sir Jed
Itec 100 l1 l3 Sir Jed
Itec 100 l1 l3 Sir Jed
Threats - A threat is an object, person, or other entity that represents a constant danger to an
asset.
Threat Categories
• Acts of human error or failure
• Forces of nature
• Technological obsolesce
Computer Security - generic name for the collection of tools designed to protect data and to
thwart hackers.
Internet Security - measures to protect data during their transmission over a collection of
interconnected networks.
- ASPECTS OF SECURITY
• Security Mechanism
• Security Service
Security Attack
• any action that compromises the security of information owned by an organization
- Passive
- Active
Examples:
Integrity means that data cannot be modified without authorization. Like confidentiality, it can
be applied to a stream of messages, a single message or selected fields within a message.
TWO TYPES OF INTEGRITY SERVICES ARE AVAILABLE:
Connection-Oriented Integrity Service: This service deals with a stream of messages,
assures that messages are received as sent, with no duplication, insertion, modification,
reordering or replays. Destruction of data is also covered here. Hence, it attends to both
message stream modification and denial of service.
Connectionless-Oriented Integrity Service: It deals with individual messages regardless of
larger context, providing protection against message modification only. An integrity service
can be applied with or without recovery. Because it is related to active attacks, major concern
will be detection rather than prevention. If a violation is detected and the service reports it,
either human intervention or automated recovery machines are required to recover.
SECURITY MECHANISMS
- According to X.800, the security mechanisms are divided into those implemented in a
specific protocol layer and those that are not specific to any particular protocol layer or
security service. X.800 also differentiates reversible & irreversible encipherment mechanisms.
A reversible encipherment mechanism is simply an encryption algorithm that allows data to be
encrypted and subsequently decrypted, whereas irreversible encipherment include hash
algorithms and message authentication codes used in digital signature and message
authentication applications.
Digital Signature: The appended data or a cryptographic transformation applied to any data
unit allowing to prove the source and integrity of the data unit and protect against forgery.
Access Control: A variety of techniques used for enforcing access permissions to the system
resources.
Data Integrity: A variety of mechanisms used to assure the integrity of a data unit or stream
of data units.
Traffic Padding: The insertion of bits into gaps in a data stream to frustrate traffic analysis
attempts.
Routing Control: Enables selection of particular physically secure routes for certain data and
allows routing changes once a breach of security is suspected.
Notarization: The use of a trusted third party to assure certain properties of a data exchange
Trusted Functionality: That which is perceived to b correct with respect to some criteria.
Security Level: The marking bound to a resource (which may be a data unit) that names or
designates the security attributes of that resource.
Event Detection: It is the process of detecting all the events related to network security.
Security Audit Trail: Data collected and potentially used to facilitate a security audit, which is
an independent review and examination of system records and activities.
Security Recovery: It deals with requests from mechanisms, such as event handling and
management functions, and takes recovery actions.
Data - is transmitted over network between two communicating parties, who must cooperate
for the exchange to take place.
A logical information channel is established by defining a route through the internet from
source to destination by use of communication protocols by the two parties. Whenever an
opponent presents a threat to confidentiality, authenticity of information, security aspects
come into play.
Information access threats intercept or modify data on behalf of users who should not have
access to that data
Service threats exploit service flaws in computers to inhibit use by legitimate users Viruses
and worms are two examples of software attacks inserted into the system by means of a disk
or also across the network.
The security mechanisms needed to cope with unwanted access fall into two broad
categories.
-The strategy used by the cryptanalysis depends on the nature of the encryption scheme and
the information available to the cryptanalyst. There are various types of cryptanalytic attacks
based on the amount of information known to the cryptanalyst.
Cipher text only – A copy of cipher text alone is known to the cryptanalyst.
Known plaintext – The cryptanalyst has a copy of the cipher text and the corresponding
plaintext.
Chosen plaintext – The cryptanalysts gains temporary access to the encryption machine.
They cannot open it to find the key, however; they can encrypt a large number of suitably
chosen plaintexts and try to use the resulting cipher texts to deduce the key.
Chosen cipher text – The cryptanalyst obtains temporary access to the decryption machine,
uses it to decrypt several string of symbols, and tries to use the results to deduce the key
CAESAR CIPHER - The earliest known use of a substitution cipher and the simplest was by
Julius Caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter
standing 3 places further down the alphabet. e.g., plain text : pay more money
PLAYFAIR CIPHERS - It is the best known multiple –letter encryption cipher which
treats diagrams in the plaintext as single units and translates these units into cipher
text diagrams.
HILL CIPHER - It is also a multi letter encryption cipher. It involves substitution of ‘m’
ciphertext letters for ‘m’ successive plaintext letters.
POLYALPHABETIC CIPHERS
Polyalphabetic means that the same letter of a message can be represented by different
letters when encoded.
Vigenere cipher is a polyalphabetic cipher based on using successively shifted alphabets, a
different shifted alphabet for each of the 26 English letters.
TRANSPOSITION TECHNIQUES
Rail fence is simplest of such cipher, in which the plaintext is written down as a sequence of
diagonals and then read off as a sequence of rows.
STEGANOGRAPY - A plaintext message may be hidden in any one of the two ways. The
methods of steganography conceal the existence of the message, whereas the methods of
cryptography render the message unintelligible to outsiders by various transformations of the
text.
Character marking – selected letters of printed or typewritten text are overwritten in pencil.
The marks are ordinarily not visible unless the paper is held to an angle to bright light.
Invisible ink – a number of substances can be used for writing but leave no visible trace until
heat or some chemical is applied to the paper.
Pin punctures – small pin punctures on selected letters are ordinarily not visible unless the
paper is held in front of the light.
Typewritten correction ribbon – used between the lines typed with a black ribbon, the
results of typing with the correction tape are visible only under a strong light.
Drawbacks of Steganography
LECTURE 2.1
A hardware vulnerability is an exploitable weakness in a computer system that
enables attack through remote or physical access to system hardware.
Rowhammer is classified as a vulnerability affecting some recent DDR DRAM devices where
repeated access to a memory row can result in bit flips in adjustment rows. This means that,
tentatively, a hacker can change any value of the memory’s bit.
Meltdown RDCL (Rogue Data Cache Load) capitalizes on the non-functional execution
capabilities of Intel CPUs. Hackers can use it to break through the kernel’s privilege
boundaries, which typically safeguard sensitive secrets.
A variant of the Spectre security vulnerability, SSB or Speculative Store Bypass enables
hackers to execute memory readers before memory write addresses are revealed. It can also
be used to leak cross-process data. The vulnerability impacts Intel, AMD and ARM variants of
processors.
Screwed drivers according to researchers at Eclypsium, over 40 drivers from major BIOS
vendors — including Huawei, Asus, Toshiba and NVIDIA — are susceptible to “screwed
drivers” vulnerabilities. These are driver design flaws that enable hackers to escalate user
privileges in order to access OS kernel models. The escalation opens and writes access to
control registers (CR), model-specific registers (MSR), chipset I/O space, kernel and physical
virtual memory.
USBAnywhere - this is a collection of USB vulnerabilities that affect the BMC (baseboard
management controller) on Supermicro’s server hardware. Hackers can use them to hijack
thousands of server boards.
Viruses which are the most commonly-known form of malware and potentially the most
destructive. They can do anything from erasing the data on your computer to hijacking your
computer to attack other systems, send spam, or host and share illegal content.
Fake security software poses as legitimate software to trick you into opening your system to
further infection, providing personal information, or paying for unnecessary or even damaging
"clean ups".
Browser hijacking software changes your browser settings (such as your home page and
toolbars), displays pop-up ads and creates new desktop shortcuts. It can also relay your
personal preferences to interested third parties.
Memory-resident viruses -These viruses hide inside the computer's memory (RAM) and are
activated when the computer is turned on, infecting opened files.
Macro viruses -Maybe the most common type of virus, it infects applications like Microsoft
Word or Microsoft Excel which use macro languages.
File infectors -These viruses attach themselves to program files, usually certain .COM
or .EXE files. When the program file is run, the virus program inside them is also run.
Boot sector viruses -These viruses attach to the DOS boot sector on diskettes or the master
boot record on hard disks. The find their way onto your computer from floppy disks containing
the boot disk virus.
VIRUS COUNTERMEASURES
Detection:Once the infection has occurred, determine that it has occurred and locate the
virus.
Identification: Once detection has been achieved, identify the specific virus that has infected
a program.
Removal: Once the specific virus has been identified, remove all traces of the virus from the
infected program and restore it to its original state. Remove the virus from all infected
systems so that the disease cannot spread further.
Generic decryption (GD):technology enables the antivirus program to easily detect even the
most complex polymorphic viruses, while maintaining fast scanning speeds .
Virus signature scanner: A module that scans the target code looking for known
virus signatures.
Integrated mail systems: Systems such as Lotus Notes and Microsoft Outlook make it very
simple to send anything to anyone and to work with objects that are received.
Mobile-program systems: Capabilities such as Java and ActiveX allow programs to move on
their own from one system to another.
An ntrusion Detection System (IDS) is a system that monitors network traffic for suspicious
activity and issues alerts when such activity is discovered. It is a software application that
scans a network or a system for harmful activity or policy breaching.
Network intrusion detection systems (NIDS) are set up at a planned point within the
network to examine traffic from all devices on the network. It performs an observation of
passing traffic on the entire subnet and matches the traffic that is passed on the subnets to
the collection of known attacks.
Host intrusion detection systems (HIDS) run on independent hosts or devices on the
network. A HIDS monitors the incoming and outgoing packets from the device only and will
alert the administrator if suspicious or malicious activity is detected. It takes a snapshot of
existing system files and compares it with the previous snapshot.
Protocol-based intrusion detection system (PIDS) comprises of a system or agent that
would consistently resides at the front end of a server, controlling and interpreting the protocol
between a user/device and the server.
Anomaly-based IDS was introduced to detect the unknown malware attacks as new malware
are developed rapidly. In anomaly-based IDS there is use of machine learning to create a
trustful activity model and anything coming is compared with that model and it is declared
suspicious if it is not found in model.
Password Management
Passwords are a set of strings provided by users at the authentication prompts of we
accounts.
Password management is a set of principles and best practices to be followed by users
while storing and managing passwords in an efficient manner to secure passwords as much
as they can to prevent unauthorized access.
Login spoofing- Passwords are illegally collected through a fake login page by
cybercriminals.
Sniffing attack- Passwords are stolen using illegal network access and with tools like key
loggers.
Shoulder surfing attack- Stealing passwords when someone types them, at times using a
micro-camera and gaining access to user data.
Brute force attack- Stealing passwords with the help of automated tools and gaining access
to user data.
Data breach- Stealing login credentials and other confidential data directly from the website
database.
Traditional methods of password management
• Writing down passwords on sticky notes, post-its, etc.
• Often forgetting passwords and seeking the help of 'Forgot Password' option
• Store all enterprise passwords in one place and enforce secure password policies
within the business environment
The career computer criminal understands the targets of computer crime. Criminals seldom
change fields from arson, murder, or auto theft to computing; more often, criminals begin as
computer professionals who engage in computer crime, finding the prospects and payoff
good.
Terrorists
We see terrorists using computers in three ways:
targets of attack: denial-of-service attacks and web site defacements are popular for any
political organization because they attract attention to the cause and bring undesired negative
attention to the target of the attack.
propaganda vehicles: web sites, web logs, and e-mail lists are effective, fast, and
inexpensive ways to get a message to many people.
methods of attack: to launch offensive attacks requires use of computers.
METHODS OF DEFENSE
Encryption provides secrecy for data . The most powerful tool in providing computer security
is coding . By transforming data so that it is unintelligible to the outside observer , the value of
an interception and the possibility of a modification or a fabrication are almost nullified.
Software Controls - Programs themselves are the second link in computer security .
Programs must be secure enough to exclude outside attack . They must also be developed
and maintained so that one can be confident of the dependability of the programs .
Hardware Controls - Numerous hardware devices have been invented to assist in computer
security . These devices range from hardware implementations of encryption to locks limiting
access to theft protection to devices to verify users' identities.
Policies - Some controls on computing systems are achieved through added hardware or
software features , as described above . Other controls are matters of policy . In fact , some of
the simplest controls , such as frequent changes of passwords , can be achieved at
essentially no cost but with tremendous effect .
Physical controls include locks on doors , guards at entry points , backup copies of
important software and data , and physical site planning that reduces the risk of natural
disasters . Often the simple physical controls are overlooked while more sophisticated
approaches are sought .
Effectiveness of Controls - Merely having controls does no good unless they are used
properly . The next section contains a survey of some factors that affect the effectiveness of
controls .
Awareness of Problem - People using controls must be convinced of the need for security;
people will willingly cooperate with security requirements only if they understand why security
is appropriate in each specific situation .
Likelihood of Use - Of course , no control is effective unless it is used . The lock on a
computer room door does no good if people block the door open .
Principle of Effectiveness - Controls must be used to be effective . They must be efficient ,
easy to use , and appropriate.
Overlapping Controls - Several different controls may apply to one exposure . For example ,
security for a microcomputer application may be provided by a combination of controls on
program access to the data , on physical access to the microcomputer and storage media ,
and even by file locking to control access to the processing programs.
Periodic Review - Few controls are permanently effective . Just when the security specialist
finds a way to secure assets against certain kinds of attacks , the opposition doubles its
efforts in an effort to defeat the security mechanism . Thus , judging the effectiveness of a
control is an ongoing task .
ELEMENTARY CRYPTOGRAPHY
Cryptography
-secret writing is the strongest tool for controlling against many kinds of security threats. Well-
disguised data cannot be read, modified, or fabricated easily.
-is rooted in higher mathematics: group and field theory, computational complexity, and even
real analysis, not to mention probability and statistics.
The Caesar cipher has an important place in history. Julius Caesar is said to have been the
first to use this scheme, in which each letter is translated to the letter a fixed number of places
after it in the alphabet. Caesar used a shift of 3.
Cryptanalysis of Substitution Ciphers - the techniques described for breaking the Caesar
cipher can also be used on other substitution ciphers. Short words, words with repeated
patterns, and common initial and final letters all give clues for guessing the permutation.
A one-time pad is sometimes considered the perfect cipher. The name comes from an
encryption method in which a large, nonrepeating set of keys is written on sheets of paper,
glued together into a pad.
Long Random Number Sequences - A close approximation of a one-time pad for use on
computers is a random number generator. In fact, computer random numbers are not
random; they really form a sequence with a very long period.
The Vernam cipher is immune to most cryptanalytic attacks. The basic encryption involves
an arbitrarily long nonrepeating sequence of numbers that are combined with the plaintext.
Book Ciphers - Another source of supposedly "random" numbers is any book, piece of
music, or other object of which the structure can be analyzed.
Transpositions, Making “Good” Encryption algorithms
Making “Good” Encryption Algorithms - Substitution algorithms “hide” the plaintext and
dissipate high letter frequencies • Transposition algorithms scramble text • Many “good”
algorithms combine both techniques
Shannon’s Characteristics of “Good” Ciphers - Amount of secrecy needed should
determine the amount of labour appropriate for encryption/decryption. • Set of keys and
enciphering algorithm should be free from complexity. • Implementation should be simple •
Errors in ciphering should not propagate. • Size of ciphertext should be no larger than the size
of the plaintext
Properties of “Trustworthy” Encryption Systems - Based on sound mathematics • Been
analyzed by competent experts and found to be sound • Stood the “test of time” • Three
Examples: • DES (data encryption standard) • RSA (Rivest-Shamir-Adelman) • AES
(Advanced Encryption Standard)
Symmetric and Asymmetric Encryption Systems - Symmetric requires one “secret” key
that is used for encryption AND decryption (e.g. Caesar cipher might use a “key” of 3 to
indicate shift by 3) • As long as key remains secret, authentication is provided • Problem is
key distribution; if there are n users, we need n * (n-1)/2 unique keys
Symmetric and Asymmetric Encryption Systems - Asymmetric requires two keys one of
which is a “public key” • The public key is used for encryption and the “private” key is used for
decryption • If there are n users, there are n public keys that everyone knows and n private
keys known only to the user
Stream and Block Ciphers - Stream ciphers – convert one symbol of plaintext immediately
into a symbol of ciphertext • Transformation depends on the plaintext symbol, the key, and the
algorithm • Error can affect all text after the error
Stream and Block Ciphers - Block cipher encrypts a group of plaintext symbols as one block
(e.g. columnar transposition)
Uses of Encryption
Encryption - can help protect data you send, receive, and store, using a device. That can
include text messages stored on your smartphone, running logs saved on your fitness watch,
and banking information sent through your online account.
Encryption -is the process that scrambles readable text so it can only be read by the person
who has the secret code, or decryption key. It helps provide data security for sensitive
information.
- is the process of taking plain text, like a text message or email, and scrambling it into
an unreadable format — called “cipher text.” This helps protect the confidentiality of digital
data either stored on computer systems or transmitted through a network like the internet.
Types of Encryption
Data Encryption Standard: is considered a low-level encryption standard. The U.S.
government established the standard in 1977. Due to advances in technology and decreases
in the cost of hardware, DES is essentially obsolete for protecting sensitive data.
Triple DES: runs DES encryption three times. Here’s how it works: It encrypts, decrypts, and
encrypts data — thus, “triple.” It strengthens the original DES standard, which became
regarded as too weak a type of encryption for sensitive data.
RSA: takes its name from the familial initials of three computer scientists. It uses a strong and
popular algorithm for encryption. RSA is popular due to its key length and therefore widely
used for secure data transmission.
Advanced Encryption Standard: is the U.S. government standard as of 2002. AES is used
worldwide.
Twofish: is considered one of the fastest encryption algorithms and is free for anyone to use.
It’s used in hardware and software.