12
12
2. Encryption and Decryption: It involves the conversion of plaintext into ciphertext through
encryption and then back to plaintext through decryption using cryptographic keys.
3. Integrity Checks: Cryptography helps ensure data integrity through hash functions and digital
signatures, making sure data has not been altered or tampered with during transmission.
5. Types and Algorithms: There are many types of cryptography, including symmetric-key
cryptography and asymmetric-key cryptography, employing various algorithms like AES, RSA,
and ECC for different security needs.
4. Regulatory Compliance: Cryptography helps organizations comply with privacy laws and
regulations like GDPR, HIPAA, which mandate the protection of personal and sensitive data.
5. Data Integrity: It ensures that data sent over networks is not altered or destroyed by
unauthorized parties, maintaining its accuracy and consistency throughout its lifecycle.
1. Caesar Cipher: One of the earliest known uses of cryptography is the Caesar cipher, used by
Julius Caesar to send messages with shifted letters to conceal their content.
2. Scytale: Used by the Spartans, a scytale was a tool used to perform a transposition cipher,
where a strip of parchment was wound around a staff, and the message was written across
it.
3. Zimmermann Telegram: During World War I, the Zimmermann Telegram was a secret
diplomatic communication sent by the German Foreign Office that proposed a military
alliance between Germany and Mexico, which was intercepted and deciphered by the
British, influencing the American decision to enter the war.
4. Navajo Code Talkers: In World War II, the Navajo language was used to create a code that
was never broken by the Japanese, demonstrating a unique use of natural language as a tool
for encryption.
5. Public Key Cryptography: Introduced in the 1970s, public key cryptography revolutionized
secure communication by allowing parties to share a public key for encryption and a private
key for decryption, facilitating secure communications without the need to share a secret
key.
Layer 1: Physical
• Function: This layer is responsible for the physical transmission of data
over communication media. It includes the hardware components like
cables, switches, and the electrical signals or light pulses that travel
through them.
• Example: Ethernet cables, fiber optics.
• Security Functions: Includes preventing unauthorized access to network media and
safeguarding the physical infrastructure from attacks and environmental hazards.
• Examples:
• Cable shielding
• Locking devices for ports
• Surveillance cameras and access control systems to secure data centers
•
• MAC (Media Access Control) security: Uses MAC filtering and port security.
• Frame authentication and encryption using protocols like IEEE 802.1AE (MACsec).
•
Layer 3: Network
• Function: Manages the delivery of packets across different networks
and handles routing through intermediary routers. It involves logical
addressing, which ensures that packets reach the correct destination
network.
• Example: IP (Internet Protocol), ICMP.
• Security Functions: Manages device addressing, tracks the path of the data packets, and
implements routing control to prevent unauthorized network access and attacks.
• Examples:
Layer 4: Transport
• Function: Ensures complete data transfer. This layer manages end-to-
end communication, provides error checking, and ensures that data
arrives in sequence and without loss, duplication, or errors.
• Example: TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
• Security Functions: Provides communication session management, including the security
of data segments between hosts.
• Examples:
• SSL/TLS for secure connections that encrypt data before it's transmitted over the
internet.
• Transport Layer Security protocols to detect message tampering, message
interception, and forgery.
• Security Functions: Controls the dialogs (sessions) between computers, managing session
setup, maintenance, and termination to prevent unauthorized access during a session.
• Examples:
Layer 5: Session
• Function: Manages sessions between applications. This layer
establishes, manages, and terminates the connections between the
local and remote application.
• Example: API calls that manage sessions like NFS, SQL, and RPC.
Layer 6: Presentation
• Function: Transforms data to provide a standard interface for the
application layer. Encryption, compression, and translation of data
between different formats are tasks handled here.
• Example: SSL/TLS, MIME.
• Security Functions: Translates, encrypts, and compresses data formats, focusing on the
syntax and semantics of the data transmitted.
• Examples:
• Data encryption standards like AES and DES used for encrypting data before
transmission.
• Secure data translation services that ensure data is appropriately formatted and
secured for communication between different systems.
•
Layer 7: Application
• Function: Closest to the end user. This layer interacts with software
applications that implement a communicating component. It provides
network services to the applications.
• Example: HTTP, FTP, SMTP.
• Security Functions: Ensures that applications have adequate security measures in place,
including authorization, authentication, and message integrity.
• Examples:
• Application-level firewalls that inspect the data being transmitted to and from an
application.
• Email encryption services, secure file transfer protocols like SFTP and HTTPS, and
various authentication mechanisms like OAuth and SAML.
Active Attacks
Active attacks involve the alteration of data or systems. In these attacks, the
attacker intervenes or alters the communication by inserting, deleting, or
modifying the data. The primary objective is to disrupt the normal
functionality of network services or to gain unauthorized access to perform
malicious actions.
Examples of Active Attacks:
1. Denial-of-Service (DoS) Attacks: An attacker floods the server with an
overwhelming amount of traffic, which renders the service unavailable
to legitimate users. A famous example is the 2016 attack on Dyn, a
major DNS host, which temporarily brought down sites like Twitter,
Netflix, and Reddit.
2. Man-in-the-Middle (MitM) Attacks: These occur when an attacker
intercepts a communication between two systems and alters the
information. A real-world example includes attacks on insecure WiFi
networks, where attackers intercept data being transmitted between
the user’s device and the network.
3. Session Hijacking: Here, the attacker takes control of a user session
after successfully obtaining, for instance, session tokens or cookies. An
example of this would be attackers hijacking a user’s active session to
gain unauthorized access to a banking site.
4. SQL Injection: It involves inserting malicious SQL queries via input data
from the client to the application, aiming to manipulate the backend
database. Real-world examples include attacks on web applications to
steal data like user credentials and financial information.
5. DNS Spoofing: This involves altering DNS records to redirect traffic from
legitimate servers to fake ones, often to steal confidential information.
The attack on Brazilian bank customers in 2016, where DNS cache
poisoning redirected users to malicious websites, is a notable example.
Passive Attacks
Passive attacks involve monitoring or eavesdropping on communications. The
attacker does not modify the content of the communication; instead, they
clandestinely gather information from the system without the user's
knowledge, which is often undetectable.
Examples of Passive Attacks:
1. Traffic Analysis: By intercepting data being transmitted over a network,
attackers can analyze patterns, frequencies, and data sizes to extract
sensitive information. An example would be espionage activities where
attackers gather metadata to track communication patterns.
2. Eavesdropping: This occurs when attackers listen to private
conversations or digital communications. An example includes
"sniffing" attacks on unsecured networks, such as public WiFi, where
attackers capture unencrypted data being transmitted.
3. Wiretapping: Involves connecting to a communication line and listening
to the voice or data passing through it. Historical examples include law
enforcement agencies using legal wiretaps; however, unauthorized
wiretaps have also been used for corporate espionage.
4. Packet Sniffing: Attackers use packet sniffers to capture data packets as
they travel over the network. Real-world examples include the use of
tools like Wireshark by attackers to capture passwords and other
sensitive data on unencrypted networks.
5. Shoulder Surfing: This simple yet effective passive attack involves
looking over someone’s shoulder to get information like passwords and
PINs. It’s often seen in public places like ATMs and during public
transport travel.
Overview of Authentication Mechanisms
1. Knowledge-Based Authentication (KBA): This is the most common form
of authentication that requires the user to provide something they
know, typically a password or PIN. Advanced forms of KBA might
include security questions.
2. Token-Based Authentication: This involves something the user has,
such as a smart card, a key fob, or a software token generated by an
app like Google Authenticator. These tokens produce a one-time code
used to authenticate the user.
3. Biometric Authentication: This method requires something the user is,
based on unique biological traits. Examples include fingerprint
scanning, facial recognition, iris scanning, and voice recognition. These
methods are often used in high-security environments.
4. Multi-Factor Authentication (MFA): Combines two or more
independent credentials: what the user knows (password), what the
user has (security token), and what the user is (biometric verification).
MFA is an effective way to increase the security of user logins.
5. Certificate-Based Authentication: Uses digital certificates to
authenticate an entity. These certificates are typically issued by a
trusted Certificate Authority (CA) and use public key infrastructure (PKI)
to verify the holder's identity.
6. Behavioral Biometrics: This emerging method involves patterns derived
from the user's behavior such as typing rhythm, mouse movements,
and walking patterns. It is typically used continuously during a session
to ensure the authenticated user is still the one in control.
Example of a Typical Authentication Process Flow
Let's take the example of a typical web-based authentication process using a
username and password, enhanced by multi-factor authentication:
1. User Registration: The user creates an account by choosing a username
and password, which are then stored in the database, often hashed for
security.
2. Login Request: The user navigates to the login page and enters their
username and password.
3. Credential Verification:
o The server retrieves the stored password hash corresponding to
the username.
o It hashes the entered password using the same hashing
algorithm and compares it with the stored hash.
o If the hashes match, the password is verified.
4. Multi-Factor Authentication:
o Once the initial password is verified, the server prompts for a
second factor; suppose it's a code from an authenticator app.
o The user opens the app and inputs the code displayed.
o The server verifies the code against what it expects; if it matches,
the second factor is verified.
5. Session Initiation:
o Upon successful verification of all factors, the server initiates a
session for the user.
o It may issue a token or session ID, which is stored in the user's
browser cookies and used for maintaining session state across
multiple requests.
6. Continuous Authentication (if applicable):
o The system might continue to verify the user's identity by
checking behavioral biometrics or re-prompting for the second
factor after a certain period or when suspicious activity is
detected.
Explaining Access Control
Access control is a fundamental security concept that restricts and regulates
who or what can view or use resources in a computing environment. Here’s
an overview of the mechanisms involved:
1. Identification: The initial stage where users claim an identity (e.g.,
username) before accessing a system.
2. Authentication: The system verifies the user’s identity (as discussed
previously) before granting access.
3. Authorization: Determines the resources a user can access and what
actions they can perform with those resources based on predefined
policies.
4. Accountability: Tracks user activities through logging and monitoring,
ensuring that users are held accountable for their actions while
accessing the system resources.
5. Audit: Regular checks and validations to ensure that access control
policies and procedures are followed correctly.
Example of Role-Based Access Control System (RBAC)
RBAC is an approach where access decisions are based on the roles that
individual users have within the organization. Here’s how a typical RBAC
system might work:
1. Role Definition: Roles are defined based on job competencies,
responsibilities, and job needs. For example, roles such as Admin,
Editor, and Viewer could be defined within a company’s content
management system.
2. Assign Roles: Users are assigned roles based on their responsibilities.
For instance, a content manager might be assigned the role of 'Editor',
while an IT support staff might be given 'Admin' role.
3. Permissions Assignment: Permissions to access specific resources are
assigned to roles, not individual users. For example, the 'Editor' role
might have permissions to create, edit, and delete content, whereas
the 'Viewer' role can only view content.
4. Access Decision: When a user attempts to perform an action, the
system checks the permissions of the user's assigned role before
allowing access. If the role has the necessary permissions, the action is
permitted.
5. Enforcement: The system enforces these policies consistently and
uniformly, ensuring that each user can only perform actions that their
assigned roles allow.
Real-World Example:
In a hospital, the RBAC system might assign different access rights to different
roles:
• Doctors: Access to all medical records and the ability to prescribe
medications.
• Nurses: Access to medical records but cannot prescribe medications.
• Administrative Staff: Access only to administrative files and not to
detailed medical records.
Example of RBAC Implementation in an Educational Institution
Here’s a step-by-step example illustrating how RBAC could be implemented:
1. Role Definitions and Assignments:
o System Admin: Manages system-level operations, user accounts,
role assignments, and security policies.
o Registrar: Manages student admissions, enrollment status, and
transcript processing.
o Faculty Member: Manages course content, assignments, grades,
and student performance evaluations.
o Student: Accesses personal academic information, course
materials, and institutional announcements.
2. Permission Assignment:
o System Admins are granted permissions to modify all system and
network settings.
o Registrars are given permissions to edit and update student
records and process requests for transcripts but cannot alter
academic content.
o Faculty Members can upload course materials, record grades,
and view the academic records of their students.
o Students can view personal academic records, course materials,
and submit assignments but cannot see other students' private
data.
3. Access Control Enforcement:
o The RBAC system automatically checks the role of a user
whenever they attempt to access a resource.
o Access decisions are made based on the permissions assigned to
their role.
4. Periodic Review and Adjustment:
o Periodically, the institution reviews role definitions and access
permissions to ensure they align with current educational
standards and privacy regulations.
o Adjustments are made to accommodate changes in policy, new
educational technology integrations, or shifts in staff and student
needs.
5. Security and Compliance:
o The institution ensures that RBAC settings comply with
educational privacy laws such as FERPA (Family Educational
Rights and Privacy Act) in the U.S., which governs access to
educational information and records.
Benefits in Education
• Enhanced Security: Limits access to sensitive information, reducing the
risk of data breaches.
• Operational Efficiency: Streamlines user management by categorizing
access within predefined roles.
• Regulatory Compliance: Eases compliance with laws and regulations by
controlling who can view or manipulate sensitive data.
• Scalability: Facilitates easier management as institutions grow and
roles change over time.
RBAC, by controlling access according to an individual's role within an
educational institution, not only protects sensitive data but also enhances the
operational dynamics by ensuring that all users have access to the resources
they need to fulfill their academic or administrative roles effectively.
Role-Based Access Control (RBAC) can be highly effective in managing the
complex security requirements of a transportation system, where access to
sensitive data and system control must be meticulously controlled to ensure
safety, efficiency, and compliance. In a transportation setting, RBAC helps to
segregate duties and responsibilities across various roles such as dispatchers,
maintenance staff, vehicle operators, and administrators. Here's how RBAC
might be structured and implemented in a transportation system:
Key Roles in a Transportation System
1. Transportation Administrators: High-level access for managing the
entire system, policy settings, and compliance.
2. Operation Managers: Manage day-to-day operations, scheduling, and
emergency responses.
3. Maintenance Staff: Access to maintenance schedules, vehicle health
data, and repair modules.
4. Drivers and Pilots: Access to their specific route information,
operational tasks, and communication tools.
5. Ticketing Agents: Access to fare and ticketing systems, but no access to
operational controls.
6. IT Staff: Access to manage and secure the network and software
systems, without access to operational transportation data unless
necessary.
Example of RBAC Implementation in a Transportation System
Let's consider a city-wide public transportation network that includes buses,
subways, and trams:
1. Role Definitions and Assignments:
o System Administrators: Overall system controls, including user
and role management, and high-level operational changes.
o Dispatch Officers: Manage route assignments, monitor vehicle
locations, and handle communications with drivers.
o Maintenance Engineers: Scheduled and unscheduled
maintenance access, diagnostics, and repair records.
o Drivers: Access to daily route data, operational status, and
emergency alert systems.
o Customer Service Representatives: Manage customer inquiries,
ticketing issues, and access to fare adjustment controls.
2. Permission Assignment:
o System Administrators can modify all system settings, including
route planning and fare structures.
o Dispatch Officers have permissions to view and manage routes,
schedules, and direct communications with drivers.
o Maintenance Engineers can access detailed vehicle diagnostics,
maintenance databases, and update maintenance logs.
o Drivers receive daily operational data relevant only to their
routes and vehicles.
o Customer Service Representatives handle ticketing software and
respond to customer queries without access to vehicle controls.
3. Access Control Enforcement:
o The RBAC system ensures that when users log into the system,
they can only access information and functions that are
necessary for their roles.
o This is enforced through login credentials tied to specific roles
that define what each user can see and do within the system.
4. Audit and Compliance:
o Regular audits are conducted to ensure that access rights are
correctly assigned and that no unauthorized access occurs.
o Compliance with regulatory standards like safety and data
privacy regulations is continuously monitored and enforced.
5. Security and Efficiency:
o By limiting access based on roles, the system enhances security
by reducing the potential for accidental or malicious system
changes.
o Efficiency is improved by ensuring that all personnel have quick
access to the tools and information they need to perform their
roles without unnecessary barriers.
Benefits in Transportation
• Enhanced Security: Reduces the risk of unauthorized access to critical
operational systems.
• Operational Integrity: Ensures that operational data is only modified by
authorized personnel, maintaining the reliability of transportation
schedules and safety.
• Regulatory Compliance: Facilitates adherence to transportation safety
and data security regulations.
• Scalability: Allows for easy addition of new roles and modification of
existing roles as the transportation network evolves or expands.
Implementing RBAC in a transportation system not only secures sensitive
operational data but also streamlines processes, making the management of
complex transportation networks more effective and compliant with
regulatory standards.
Data confidentiality refers to measures implemented to ensure that sensitive
information is accessible only to those authorized to view it. Protecting the
confidentiality of data is crucial for maintaining privacy, securing business
information, ensuring customer trust, and complying with regulatory
requirements. Here are several methods widely used to ensure data
confidentiality:
1. Encryption
• Description: Encryption transforms readable data into a scrambled,
unintelligible format using a secure algorithm and a key. Only those
with the correct key can decrypt and access the original information.
• Application: It is used for both data at rest (e.g., databases, stored files)
and data in transit (e.g., data being transmitted over networks).
2. Access Control
• Description: Access control systems restrict access to data by ensuring
only authorized users can access specific resources. This is often
managed through authentication mechanisms and authorization
policies.
• Application: Employed in software systems, databases, and operating
systems to manage who can view or use the data.
3. Data Masking
• Description: Data masking involves obscuring specific data within a
database to ensure that sensitive information is replaced with fictional
but realistic data. This allows developers and analysts to work with
data without accessing sensitive information.
• Application: Commonly used in development and testing environments
where real data is needed for testing but sensitive information must be
protected.
4. Secure Socket Layer (SSL)/Transport Layer Security (TLS)
• Description: SSL and TLS are protocols that provide secure
communication over a computer network. They use encryption to
protect the data being transmitted, thereby ensuring its confidentiality.
• Application: Widely used on the Internet for securing data transferred
between web browsers and servers, including credit card transactions,
logins, and other personal information.
5. Data Minimization
• Description: Data minimization involves limiting the processing of
personal data to what is strictly necessary for specific purposes. By
reducing the amount of data collected and retained, the risk of
exposure is minimized.
• Application: Enforced by privacy regulations like GDPR, where only
necessary data is collected, and retention periods are limited.
6. Digital Rights Management (DRM)
• Description: DRM is a set of access control technologies that restrict
the usage of proprietary hardware and copyrighted works. It helps
protect the confidentiality of content by controlling how it is used,
copied, and distributed.
• Application: Used by software providers, music and film industries, and
digital media companies to control how their digital content is accessed
and shared.
7. Steganography
• Description: Steganography involves hiding messages within other non-
secret text or data, making the transmission of a message unnoticed.
The objective is to hide the existence of the message.
• Application: Can be used in various digital formats, including images,
videos, and audio files, where data is hidden within these files.
8. End-to-End Encryption (E2EE)
• Description: E2EE encrypts data on the sender's system and only the
recipient is able to decrypt it. No intermediaries, not even the service
providers, can decrypt and read the content.
• Application: Commonly used in messaging apps like WhatsApp and
email services to ensure that only communicating users can read the
messages.
Implementing these methods helps ensure that sensitive data remains
confidential, safeguarding it against unauthorized access, disclosure, and
theft. This is crucial for maintaining the integrity of personal data, corporate
information, and national security information.
30
Conclusion
• Modular arithmetic is fundamental in
cryptography.
• Used in encryption, key exchange, and digital
signatures.
• Efficient computation techniques like modular
exponentiation are crucial.
• Understanding number theory helps in secure
algorithm design.
Discrete Logarithm Problem
(DLP)
• A fundamental problem in number theory and
cryptography.
• Basis for cryptographic protocols like Diffie-
Hellman, ElGamal, and DSA.
• Defined in cyclic groups where finding exponents
is difficult.
Mathematical Definition