Unit 3 and 4
Unit 3 and 4
Vulnerability:
Generally, can’t be
Can be controlled. Can be controlled.
2. controlled.
developing an incident
resolving the
management plan, etc. help to
vulnerabilities in that
lower down the possibility of
order.
cyber risks.
Can be detected by
Can be detected by Can be detected by identifying mysterious emails,
anti-virus software penetration testing suspicious pop-ups, observing
and threat hardware and many unusual password activities, a
detection logs. vulnerability scanners. slower than normal network,
5. etc.
Trap Door:
A trap door is kind of a secret entry point into a program that allows
anyone to gain access to any system without going through the usual
security access procedures.
Another definition of a trap door is it is a method of bypassing normal
authentication methods. Therefore it is also known as a back door.
Trap Doors are quite difficult to detect and also in order to find them
the programmers or the developers have to go through the components
of the system.
Programmers use Trap door legally to debug and test programs. Trap
doors turn to threats when any dishonest programmers gain illegal
access.
Also known as slag code, a logic bomb often remains undetected until it
executes its function or launches its payload. The set of conditions able to set it
off is virtually unlimited. Additionally, the degree of destruction from a logic
bomb can vary greatly from deleting files and corrupting data to clearing hard
drives and causing application failure.
Unlike many other types of cyber attacks, a logic bomb attack is subtle yet
often sophisticated and capable of causing explosive damage that's difficult to
trace or mitigate. A malicious piece of code is secretly inserted into a
computer's or network's existing software. It may also be inserted into other
forms of malware such as viruses, worms or Trojan horses.
A logic bomb is sneaky because its code lies dormant until the trigger occurs.
This deliberate time lag between code insertion and action (payload release)
enables bombers to control when the attack happens. More importantly, it
enables them to cover their tracks since the logic bomb usually remains
undetectable, sometimes for months or even years.
The bomb's "detonator" is the particular condition that must be met. If the
trigger is related to a date or time, the logic bomb will go off on a certain date
-- e.g., Y2K -- and is known as a time bomb. Its payload refers to the specific
component that's programmed to cause damage, such as deleting files, sending
spam emails and stealing data.
Require all users to activate security features like auto protect and
email screening.
Avalanche effect
the avalanche effect is a term associated with a specific behavior of
mathematical functions used for encryption. Avalanche effect is considered as
one of the desirable property of any encryption algorithm. A slight change in
either the key or the plain-text should result in a significant change in the cipher
-text. This property is termed as avalanche effect.
In simple words, it quantifies the effect on the cipher-text with respect to the
small change made in plain text or the key.
Even though the concept of avalanche effect was identified by “Shannon’s
property of confusion”, the term was first mentioned by Horst Feistel. To
implement a strong cipher or cryptographic hash function, this should be
considered as one of the primary design objective.
In case of algorithm that uses hash value, even a small alteration in an input
string should drastically change the hash value. In other words, flipping single bit
in input string should at least flip half of the bits in the hash value.
A good encryption algorithm should always satisfy the following relation:
Salami Attack
A salami attack is a cybercrime that attackers typically use to commit financial crimes. Criminals
steal money or resources from financial accounts on a system one at a time. This attack occurs
when several minor attacks combine to form a powerful attack. Because of this type of
cybercrime, these attacks frequently go undetected. Anyone guilty of such an attack faces
punishment under Section 66 of the IT Act. Salami Slicing and Penny Shaving are two significant
types of salami attacks in cybersecurity.
Digital Signature
A digital signature is a mathematical technique used to validate the authenticity
and integrity of a digital document, message or software. It's the digital
equivalent of a handwritten signature or stamped seal, but it offers far more
inherent security. A digital signature is intended to solve the problem of
tampering and impersonation in digital communications.
If the recipient can't open the document with the signer's public key, that
indicates there's a problem with the document or the signature. This is how
digital signatures are authenticated.
Digital certificates, also called public key certificates, are used to verify that
the public key belongs to the issuer. Digital certificates contain the public key,
information about its owner, expiration dates and the digital signature of the
certificate's issuer. Digital certificates are issued by trusted third-party
certificate authorities (CAs), such as DocuSign or GlobalSign, for example. The
party sending the document and the person signing it must agree to use a given
CA.
Digital signature technology requires all parties trust that the person who
creates the signature image has kept the private key secret. If someone else
has access to the private signing key, that party could create fraudulent digital
signatures in the name of the private key holder.
The Direct Digital Signature is only included two parties one to send a message
and the other one to receive it. According to the direct digital signature both
parties trust each other and know their public key. The message is prone to get
corrupted and the sender can decline the message sent by him at any time.
Advantages:
Simplicity: Direct digital signatures are simple and straightforward to
implement, requiring only the use of digital certificates and a secure
private key.
Speed: Direct digital signatures are fast and efficient, allowing for
quick signing of electronic documents.
Security: Direct digital signatures are secured using strong
cryptographic techniques, making it difficult for unauthorized parties
to access or alter the signature.
Disadvantages:
Limited scope: Direct digital signatures can only be used for documents
that are exchanged between two parties, making it less suitable for
situations that require multiple signatures.
Lack of impartiality: Direct digital signatures may be seen as less
impartial than arbitrated digital signatures, as they do not require a
third-party to verify the identity of the signer.
The Arbitrated Digital Signature includes three parties in which one is the sender,
the second is a receiver and the third is the arbiter who will become the medium
for sending and receiving messages between them. The message is less prone to
get corrupted because a timestamp is included by default.
Advantages:
Impartiality: Arbitrated digital signatures require a trusted third-
party to verify the identity of the signer, providing greater impartiality
and validity to the signature.
Multiple signatures: Arbitrated digital signatures can be used for
documents that require multiple signatures, such as contracts and
agreements.
Legal recognition: Arbitrated digital signatures are often legally
recognized, making it easier to comply with legal requirements for
electronic signatures.
Disadvantages:
Complexity: Arbitrated digital signatures can be more complex to
implement and use compared to direct digital signatures, requiring the
involvement of a trusted third-party and compliance with certain
regulations.
Cost: Arbitrated digital signatures can be more expensive than direct
digital signatures due to the involvement of a trusted third-party and
the need for compliance with certain regulations.
Dependence on third-party: Arbitrated digital signatures require a
trusted third-party to verify the identity of the signer, making it
important to choose a reliable and trustworthy third-party.
Benefits of IDS
Detects malicious activity: IDS can detect any suspicious activities and
alert the system administrator before any significant damage is done.
Improves network performance: IDS can identify any performance
issues on the network, which can be addressed to improve network
performance.
Compliance requirements: IDS can help in meeting compliance
requirements by monitoring network activity and generating reports.
Provides insights: IDS generates valuable insights into network traffic,
which can be used to identify any weaknesses and improve network
security.
Detection Method of IDS
1. Signature-based Method: Signature-based IDS detects the attacks on
the basis of the specific patterns such as the number of bytes or a
number of 1s or the number of 0s in the network traffic. It also detects
on the basis of the already known malicious instruction sequence that is
used by the malware. The detected patterns in the IDS are known as
signatures. Signature-based IDS can easily detect the attacks whose
pattern (signature) already exists in the system but it is quite difficult
to detect new malware attacks as their pattern (signature) is not
known.
2. Anomaly-based Method: Anomaly-based IDS was introduced to detect
unknown malware attacks as new malware is developed rapidly. In
anomaly-based IDS there is the use of machine learning to create a
trustful activity model and anything coming is compared with that model
and it is declared suspicious if it is not found in the model. The machine
learning-based method has a better-generalized property in
comparison to signature-based IDS as these models can be trained
according to the applications and hardware configurations.
Comparison of IDS with Firewalls
IDS and firewall both are related to network security but an IDS differs from a
firewall as a firewall looks outwardly for intrusions in order to stop them from
happening. Firewalls restrict access between networks to prevent intrusion and if
an attack is from inside the network it doesn’t signal. An IDS describes a
suspected intrusion once it has happened and then signals an alarm.
Multiple
network
Network, transport, Only IDPS which can
Network- subnets
and application TCP/IP analyze the widest range
Based
layer activity and groups of application protocols;
of hosts
Security Mechanism
A process (or a device incorporating such a process) that is designed to detect, prevent, or
recover from a security attack. The mechanisms are divided into those that are
implemented in a specific protocol layer, such as TCP or an application-layer protocol.
Security Mechanisms
1. Encipherment: Encipherment is hiding or covering data and can provide
confidentiality. It makes use of mathematical algorithms to transform data into a
form that is not readily intelligible. The transformation and subsequent recovery of
the data depend on an algorithm and zero or more encryption keys. Cryptography
and Steganography techniques are used for enciphering.
2. Data integrity: The data integrity mechanism appends a short check value to the
data which is created by a specific process from the data itself. The receiver
receives the data and the check value. The receiver then creates a new check value
from the received data and compares the newly created check value with the one
received. If the two check values match, the integrity of data is being preserved.
3. Digital Signature: A digital signature is a way by which the sender can
electronically sign the data and the receiver can electronically verify it. The sender
uses a process in which the sender owns a private key related to the public key that
he or she has announced publicly. The receiver uses the sender's public key to
prove the message is indeed signed by the sender who claims to have sent the
message.
4. Authentication exchange: A mechanism intended to ensure the identity of an
entity by means of information exchange. The two entities exchange some
messages to prove their identity to each other. For example the three-way
handshake in TCP.
5. Traffic padding: The insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts.
6. Routing control: Enables selection of particular physically secure routes for
certain data and allows routing changes which means selecting and continuously
changing different available routes between the sender and the receiver to prevent
the attacker from traffic analysis on a particular route.
7. Notarization: The use of a trusted third party to control the communication
between the two parties. It prevents repudiation. The receiver involves a trusted
third party to store the request to prevent the sender from later denying that he or
she has made such a request.
8. Access Control: A variety of mechanisms are used to enforce access rights to
resources/data owned by a system, for example, PINS, and passwords.