3 Networks
3 Networks
• Internet
• the ultimate wide area network spanning the entire globe; a vast collection
of smaller networks.
• Services – www, email, file transfer
• Not owned by any entity, not centrally administered
• Decentralized design – resources are spread out, no single server
• Access to Internet provided by ISP (Internet Service Provider)
• Intranets
• An intranet is a set of networks that are under the control of a single
administrative entity.
• The intranet uses the IP protocol and IP-based tools such as web browsers
and file transfer applications.
• The administrative entity limits use of the intranet to its authorized users.
• Most commonly, an intranet is the internal LAN of an organization.
• Purpose - Communication and data sharing
• In case an intranet is connected to internet, a firewall is used for protection
Different types of networks
• Extranet
• An extranet is a network that is also under the administrative
control of a single organization, but supports a limited connection
to a specific external network.
• For example, an organization may provide access to some aspects
of its intranet to share data with its business partners or
customers.
• These other entities are not necessarily trusted from a security
standpoint.
• A firewall controls the access rights and allows access to the
intranet only to the people who are authorized
• Features
• An external extension to a company’s local network;
• Limited access;
• Uses internet protocols;
Different types of networks
• Internet of Things
• Network of Individual things that are able to connect
to the Internet, communicate and exchange data
• All things carry the necessary hardware and
software and have an IP address
• Some ways to connect to internet
– Broadband access via DSL or cable modem
– WiFi access
– Dial up access via modem
– Mobile networks (3G, 4G)
• Globalization has been accelerated by the technical
advances linked to network development.
Importance of standards in the construction
of networks
• Standards enable compatibility through a common “language”
internationally.
• Allows the interoperability / compatibility among different computer
hardware and software.
• Allows a set of rules in order for the networks to function properly
throughout the world due to the fact some countries might not have access
to advanced technology and will still have to access the world wide network.
a) International Standards Organization (ISO)
b) International Telecommunications Union (ITU)
c) American National Standards Institute (ANSI)
d) Institute of Electrical and Electronics Engineers (IEEE)
e) Electronic Industries Association (EIA)
f) Internet Engineering Task Force (IETF)
Networks, Communication and Layers
• Different computer systems manufacturers
• Hardware differs, Software differs, still systems need to
communicate
• Standards came into place
• Communication was through different layers (each layer uses
different protocols)
• Software application in one system creates some data to be sent to
another software application in another system
• Data format to be understandable by both applications
• Data is encoded before passed on to the network
• Data is broken up into packets with destination address
• Packets travel through the network (Routing protocols)
• Only 1s, 0s travel over media
• Finally receiving application reassembles the data
Networks, Communication and Layers
• Advantages of Layers
– Easy to manage
– Greater understanding of each layer
– Common language for each layer
– Makes protocol design easier
– A manufacturer can focus on technologies of a particular layer
– Products of different manufacturers can work together
– When changes are made to one layer, the impact on the
other layers is minimized.
– Enables troubleshooting efforts to be pinpointed on the layer
that carries out the suspected cause of the problem
– Technology advances of a layer are independent of
technology advancements of other layers
Communication over networks is broken
down into different layers (OSI model)
• The computer communications networks we use today are based on the OSI reference model.
• Established by ISO (International Standards Organization)
• Aim of the OSI model is to allow communications across many different technical platforms
and to allow easy development.
• To reach this, the model defines seven consecutive layers with individual roles.
• The OSI is a standardized system/model for network connection; Consists of (7) layers; Each
dealing with specific parts of network communication; For example the physical layer which
defines the physical connection;
OSI
• Layer 7 - Application layer:
• This layer provides functions for the applications
running on a computer. Data input and output
happens over this layer.
• Examples of common functions include:
– Protocols for providing remote file services, such as open,
close, read, write, and shared access to files
– File transfer services and remote database access
– Message handling services for electronic mail applications
– Global directory services to locate resources on a network
– A uniform way of handling a variety of system monitors and
devices
– Remote job execution
OSI
• Layer 6 - Presentation layer:
• This layer is the system specific presentations of the data (i. e. ASCII).
• It enables the correct exchange of data between different systems.
• Also, data compression and encryption belong to this layer.
• In general, it ensures that data sent by the application layer can be read by the
presentation layer of the receiving system.
• If necessary, it works as a translation layer between the different data formats used by
the two systems.
• Layer 5 - Session layer:
• This layer sets up, coordinates and terminates conversations. Services include
authentication and reconnection after an interruption.
• The term session refers to a connection for data exchange between two parties
• If a communication session is broken, the session layer determines where to restart the
transmission once the session has been reconnected
• This layer is also responsible for determining the terms of the communication session
• Layer 4 - Transport layer:
• Functions of this layer include segmenting the data stream into packets, reassembling
with sequence numbers, acknowledgements, error detection and correction, flow
control (TCP , UDP)
OSI
• Layer 3 - Network Layer:
• In packet oriented networks, this layer is responsible for the forwarding of
data packets.
• Data forwarding happens over the entire network and includes the routing
of packets between the network nodes.
• The Network layer of the OSI model is responsible for managing logical
addressing information in the packets and the delivery of those packets to
the correct destination.
• Routers, which are special computers used to build the network, direct the
data packet generated by Network Layer using information stored in a table
known as routing table.
• The routing table is a list of available destinations that are stored in memory
on the routers.
• The logical address is used by network layer protocols to deliver the packets
to the correct network.
• The Logical addressing system used in Network Layer is known as IP address.
• IP addresses are also known as Logical addresses or Layer 3 addresses.
OSI
• Layer 2 - Data Link layer:
• Task of this layer is to ensure a faultless transmission of data and to regulate access to
the transmission medium, by breaking up the bit stream in frames and providing
those with checksums to be able to detect a corrupted data packet.
• The Data Link Layer is logically divided into two sublayers, The Media Access Control
(MAC) Sublayer and the Logical Link Control (LLC) Sublayer.
• Media Access Control (MAC) Sublayer determines the physical addressing of the
hosts.
• Logical Link Control (LLC) Sublayer helps to communicate with the upper-level layers.
• The MAC sub-layer maintains MAC addresses (physical device addresses) for
communicating with other devices on the network.
• MAC addresses are burned into the network cards and constitute the low-level
address used to determine the source and destination of network traffic.
• MAC Addresses are also known as Physical addresses, Layer 2 addresses, or Hardware
addresses.
• The Logical Link Control sublayer is responsible for synchronizing frames (indicating
the beginning and end of data, error checking, and flow control (transmission rate
according to the receiver buffer).
MAC address format
• Problems
• Employers can claim the employees as part time consultants or the like to
avoid paying benefits like insurance, medical plans, taxes; The strain on
families that result when a family member works at home; At-home
employees miss interaction with co-workers at the office; At-home
employees think they work too much, employers think they do not work
enough; Employees cannot monitor employees; Expense of setting up a
VPN;
VPN Encapsulation of Packets
VPN- BASIC ARCHITECTURE
Working of a VPN
Two connections – one is made to the Internet
and the second is made to the VPN.
Datagrams – contains data, destination and
source information.
Firewalls – VPNs allow authorized users to
pass through the firewalls.
Protocols – protocols create the VPN tunnels.
Four Critical Functions
Authentication – validates that the data was sent
from the sender.
Access control – limiting unauthorized users from
accessing the network.
Confidentiality – preventing the data to be read
or copied as the data is being transported.
Data Integrity – ensuring that the data has not
been altered
Secure VPN
• All traffic on the VPN must be encrypted, authenticated
and then sent along virtual tunnels
• Secure VPN technologies
– Internet Protocol Security protocol (IPSec) which functions in
both transport and tunnel mode
• Allows the secure transmission of data over public IP-based networks
• Uses standard encryption algorithm to provide confidentiality (AES –
Advanced Encryption Standard)
• Provides authentication via digital certificates
– Secure Sockets Layer (SSL) 3.0 or Transport Layer Security (TLS)
with encryption
• These are much simpler than IPSec based VPNs
• The use of this technology does not require special client software
because all web servers and web browsers support this method of
providing a VPN
Trusted VPN
• Over the years, implementations of trusted VPNs have moved from
raw private circuits leased from telecommunications vendors to
private IP network circuits leased from Internet providers.
• All traffic on the VPN relies on the security of a provider’s network.
• Layer 2 VPNs implemented using
– Asynchronous transfer mode (ATM) circuits
– Frame relay circuits
– Transport of layer 2 frames over Multiprotocol Label Switching (MPLS)
– All these transmit packets via a fixed path ( just like circuit switching. Differences
exist in size of data, controlling mechanisms)
• Layer 3 VPNs
– MPLS with constrained distribution of routing information through Border
Gateway Protocol (BGP)
– Multiprotocol Label Switching (MPLS) is a type of data-carrying service for high-
performance telecommunications networks that directs data from one network
node to the next based on short path labels rather than long network
addresses, avoiding complex lookups in a routing table.
Hybrid VPN
• A combination of both secure and trusted
technologies or a combination of two VPN
technologies
Common VPN types
• Site to site VPN
– This type connects entire networks and facilitates secure data interchange
between different sites.
– a site-to-site VPN should eliminate the need for each computer to run VPN
client software as if it were on a remote-access VPN.
– Dedicated VPN client equipment can accomplish this goal in a site-to-site
VPN.
– VPN gateways are used (VPN gateway is a physical router device that
connects two or more devices or networks together in a VPN infrastructure)
Common VPN types
• Remote Access VPN
– This type connects individual hosts to private
networks and facilitates teleworkers who need to
access their company’s network securely using the
internet.
– Every host has VPN client software installed
• Remote Access VPNs provide remote connectivity to telecommuters and mobile
users. They’re typically an alternative to dedicated dial or ISDN connections. They
offer users a range of connectivity options as well as a much lower cost solution.
Intranet VPNs link corporate headquarters, remote offices, and branch offices over a
shared infrastructure using dedicated connections. The VPN typically is an alternative
to a leased line. It provides the benefit of extended connectivity and lower cost.
1) There is a limit on central cable length and number of nodes that can be connected.
2) Dependency on central cable in this topology has its disadvantages. If the main cable
(i.e. bus ) encounters some problem, whole network breaks down.
3) Proper termination is required to dump signals. Use of terminators is must.
4) It is difficult to detect and troubleshoot fault at individual station.
5) Maintenance costs can get higher with time.
6) Efficiency of Bus network reduces, as the number of devices connected to it increases.
7) It is not suitable for networks with heavy traffic.
8) Security is very low because all the computers receive the sent signal from the source.
Star Topology
• In Star topology, all the components of network are
connected to the central device called “hub” which may
be a hub, a router or a switch.
• All the workstations are connected to central device with
a point-to-point connection.
• All the data on the star topology passes through the
central device before reaching the intended destination.
• Hub acts as a junction to connect different nodes
present in Star Network, and at the same time it
manages and controls whole of the network.
• Depending on which central device is used, “hub” can
act as repeater or signal booster.
• Central device can also communicate with other hubs of
different network.
• Unshielded Twisted Pair (UTP) Ethernet cable is used to
connect workstations to central node.
Star Topology
• Advantages of Star Topology
• 1) As compared to Bus topology it gives far much better performance, signals don’t
necessarily get transmitted to all the workstations. A sent signal reaches the intended
destination after passing through no more than 3-4 devices and 2-3 links. Performance
of the network is dependent on the capacity of central hub.
2) Easy to connect new nodes or devices. In star topology new nodes can be added
easily without affecting rest of the network. Similarly components can also be removed
easily.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesn’t affect the rest of network. At the same time its
easy to detect the failure and troubleshoot it.
• 1G
– 1G refers to the first generation of wireless telephone
technology, mobile telecommunications which was first
introduced in 1980s and completed in early 1990s.
– It’s Speed was upto 2.4kbps, allowed voice calls.
– It used Analog Signal and AMPS was first launched in USA as
1G mobile systems
• Features
– Poor Voice Quality
– Poor Battery Life
– Large Phone Size
– No Security
– Limited Capacity
– Poor Handover
Wireless communication
• 2G
– 2G technology refers to the 2nd generation which is based on
GSM.
– It was launched in Finland in the year 1991 and used digital
signals.
– It’s data speed was upto 64kbps.
• Features include:
– services such as text messages, picture messages and MMS
(multi media message)
– better quality and capacity.
• Drawbacks:
– 2G requires strong digital signals to help mobile phones work.
– Was unable to handle complex data such as Videos.
Wireless communication
• 2.5G is a technology between the second (2G)
and third (3G) generation of mobile telephony.
• It is sometimes described as 2G Cellular
Technology combined with GPRS.
• Features Includes:
– Phone Calls
– Send/Receive E-mail Messages
– Web Browsing
– Speed : 64-144 kbps
VoIP
• VoIP, or Voice over Internet Protocol, is a method for taking analog audio signals, like the kind
you hear when you talk on the phone, and turning them into digital data that can be transmitted
over the Internet.
• Usually, voice go via circuit switched connections.
• In VoIP, voice go via packet switched connections. (voice converted to digital, broken down into
packets)
• Audio (and video) stream transmitted over internet; Broadband internet connection needed;
• That can be integrated in an office desktop computer; with collaboration desk
endpoints/webcams/desktop computer/widgets/ touch screen/specific applications/IP phones;
• Dependent on bandwidth, routers (QOS)
• 3G
– 3G technology refer to third generation which was introduced in year 2000s.
– Data Transmission speed increased to 144kbps- 2Mbps.
– Typically called Smart Phones and features increased its bandwidth and data transfer rates
to accommodate web-based applications and audio and video files.
• Features Include:
– Providing Faster Communication
– More secure than 2G
– Send/Receive Large Email Messages
– High Speed Web / More Security
– Video Conferencing / 3D Gaming
– TV Streaming/ Mobile TV/ Phone Calls
– Large Capacities and Broadband Capabilities
• Drawbacks:
– Expensive fees for 3G Licenses Services
– It was challenge to build the infrastructure for 3G
– High Bandwidth Requirement
– Expensive 3G Phones.
– Large Cell Phones
Wireless Access – Adv & Disadv
• An advantage is that users can access quickly with mobile
devices; Anywhere in the building and do not need to be
at the workstation;
• Users can logon with their own devices (if properly
configured); More familiar with interface/functions;
• One disadvantage is security as it could be possible to get
to the server from a nearby neighbourhood if not very
secure; Less secure than the cabled system in the building;
• Wireless signal could be weak in some parts of the
building; Leading to frustrated/ineffective employees;
Wireless communication
• 4G
– 4G technology refer to or short name of fourth Generation which was
started from late 2000s.
– Capable of providing 100Mbps – 1Gbps speed.
• Features Include:
– More Security
– High Speed
– High Capacity
– Low Cost Per-bit
• Drawbacks:
– Battery use is more
– Hard to implement
– Need complicated hardware
– Expensive equipment required to implement next generation
network.
Wireless communication
• 5G
– 5G promises significantly faster data rates, higher connection density, much
lower latency, among other improvements
– Data rate of 1 gbps – 20 gbps
– Every day devices connected paving way for IOT (Internet of Things)
– started from late 2010s.
– Complete wireless communication with almost no limitations.
– It is highly supportable to WWWW (Wireless World Wide Web).
• Features Include:
– High Speed, High Capacity
– 5G technology providing large broadcasting of data in Gbps .
– Multi – Media Newspapers, watch T.V programs with the clarity as to that of an
HD Quality.
– Faster data transmission compared to previous generations.
– Large Phone Memory, Dialing Speed, clarity in Audio/Video.
– Support interactive multimedia ,voice, streaming video, Internet and other
– 5G is More Effective and More Attractive.
Parameters 1G 2G 3G 4G
Location of first
USA Finland Japan South Korea
commercialization
AMPS
(Advanced
IMT2000,
Technology Mobile Phone IS-95, GSM LTE, WiMAX
System), NMT, WCDMA
TACS
Circuit
switching for
Circuit Voice and Packet switching
Switching type except for Air Packet switching
switching Packet
Interface
switching for
Data
Speed (data rates) 2.4 Kbps to 14.4 Kbps 3.1 Mbps 100 Mbps
14.4 kbps
Digital
Digital version
Special First wireless of 1G broadband, Very high
Characteristic communication speed speeds, All IP
technology
increments
Parameters 1G 2G 3G 4G
Supports Voice only Voice and Data Voice and Data Voice and Data
Internet service No Internet Narrowband Broadband Ultra Broadband
Bandwidth Analog 25 MHz 25 MHz 100 MHz
Simpler (less Multimedia Speed, High
features (SMS, High security, speed handoffs,
complex)
Advantage MMS), Internet international MIMO
network
access and SIM roaming technology,
elements introduced Global mobility
Limited capacity, High power
Hard to
not secure, poor Low network consumption, implement,
battery life, large Low network
Disadvantages range, slow data complicated
phone size, coverage, High
background rates cost of spectrum hardware
required
interference licence
Voice calls, Short High speed
Video applications,
messages,
Applications Voice Calls browsing conferencing, mobile TV,
mobile TV, GPS Wearable
(partial)
devices
Wireless communication
• WiMAX
– Worldwide Interoperability for Microwave Access
– Based on Wireless MAN technology
– IEEE 802.16
– Provide portable broadband connectivity
– standardized wireless version of Ethernet intended primarily as an
alternative to wire technologies (such as Cable Modems, DSL and T1 links)
to provide broadband access to customer premises.
– WiMAX would operate similar to WiFi, but at higher speeds over greater
distances and for a greater number of users.
– WiMAX has the ability to provide service even in areas that are difficult for
wired infrastructure to reach and the ability to overcome the physical
limitations of traditional wired infrastructure.
– Designed to make high quality, long range data and voice communications
affordable
– Maximum range is 30 miles
– Speed – about 40 Mbps
– Wimax 2.0 1 gbps for fixed devices, 100 mbps for mobile devices
– Better than WiFi in terms of range, scalability, bit rate and QoS
– LOS offers more stability
• What Is DSL?
– Telephones are traditionally connected to a service
provider's network through a local loop -- a pair of twisted
copper wires.
– Human voices have a frequency range of 0 to 3,400 hertz,
but copper telephone wires have the ability to handle
frequencies up to several million hertz.
– DSL technology transfers digital data in frequency ranges
higher than 3,400 hertz, allowing a regular copper
telephone line to be used for both voice and data transfer.
• What Is a T1 Line?
– High speed
– dedicated four-wire fibre access
WIMAX vs LTE
• Both are considered 4G, all IP technology
• Different channels
• LTE is compatible with 3G n 2G, but WIMAX is
not
• Building a LTE network is more expensive
• LTE allows much greater speed for mobile
users
• WIMAX is not popular
Wireless networks
• Sensor networks
– Temperature, sound, pressure sensors placed at fixed
locations and are linked by wireless network to
perform distributed sensing tasks
– Used for environmental sampling, security &
surveillance, health care monitoring, underwater
measurements etc
Network Security - Problems
• Intruders, hackers, unauthorized users can
– Disable operations
– Disturb the privacy of legitimate users
– Gain unauthorized access
– Insert viruses or malicious code
– Launch denial of service attacks
– Steal identities
– Steal devices
– Steal sensitive information that is stored or transmitted
Encryption
• It uses complex mathematical algorithms and encryption keys to alter a
message into a form that is not understandable to an unauthorized
person.
• Only the person with the correct key can decode the message and read
it.
• Symmetric Key Encryption
– Single key encryption or secret key encryption
– Same key is used for encryption and decryption
– Each device has a secret code that is used to encrypt a packet
– The receiving device should know and use the same key to decode the packet
received.
– DES (Data Encryption Standard) uses a 56 bit key.
– 72057594037927936 possible combinations
– A brute force attack of modern computer can crack the code
– AES (Advanced Encryption Standard) used 128,192,256 bit key
– Uses less computer resources compared to the Public Key Encryption
Encryption
• Public Key Encryption
– Asymmetric Encryption
– Uses public key for encryption and private key for
decryption
– These two keys are mathematically linked
– This type of encryption is used on the internet
– Transport Layer Security (TLS) and Secure Socket
Layer (SSL) are based on public key encryption
– Messages take more time to encrypt and decrypt
– The authenticity of the public key needs to be
verified
Methods of Network Security
• Use user id & password to access
– weak passwords are easy to crack
– Atleast eight characters, a combination of numbers, upper case, lower case, symbols
• Install anti virus software
– To prevent, detect and remove malicious software
• Use a password to access the web interface that is used to setup the wireless routers or
access points
• Turn on / off wireless connectivity as required
• Enable / Disable SSID broadcast
– Wireless router or access point broadcasts its SSID.
– All wireless devices in range can identify it
– Force devices to enter the SSID manually by disabling the display of name
– But still a smart intruder can easily detect hidden wireless networks and sniffer tools can get the SSID
• Block access to wireless devices by MAC address
– Every NIC has unique MAC address (12 digits/chars with a size of 48 bit)
– Example – 00:40:96:9d:68:16 (in hex format)
– Provide access to devices based on MAC addresses
– MAC spoofing becomes a problem
– All source MAC addresses are trusted when the Trusted MAC list is empty.
Different methods of network security
• Wireless Encryption
• Wired Equivalent Privacy (WEP)
– Often mistakenly referred to as the Wireless Encryption Protocol
– can be cracked by a malicious individual within minutes.
– Introduced in 1999 to provide data confidentiality
– 40/64 bit and 128 bit encryption key lengths
– Adds processing overheads that slow down the wireless connection
– It’s usually easily identifiable, since the password is generally a
series of hexadecimal characters (that is: 0–9, A–F).
– Easy to crack
– It offers interoperability with older devices
Different methods of network security
• Wireless Encryption
• Wi-Fi Protected Access (WPA)
• Adopted in 2003 by Wi-Fi alliance
• it’s more secure and more resource intensive.
• successor WPA2 (2004)
• The differences between WPA and WPA2 lie in the encryption
methods used, TKIP and AES respectively.
• Temporal Key Integrity Protocol (TKIP) dynamically changes keys
as the system is used
Different methods of network security
• Wireless Protected Setup (WPS)
• Also called Quick Security Setup
• the goal of the protocol is to allow home users who know little of wireless security and may be
intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy
to add new devices to an existing network without entering long passphrases
• It requires a WPS router and WPS compatible devices.
• Should be switched off when not used
• Methods
– PIN method
– PIN has to be read from either a sticker or display on the new wireless device.
– This PIN must then be entered at the network's access point.
– Alternately, a PIN provided by the access point may be entered into the new device.
– Push button method
– the user has to push a button on both the access point and the new wireless client device.
– Near Field Communication method
– the user has to bring the new client close to the access point to allow a near field communication between the
devices.
– USB transfer method
– the user uses a USB flash drive to transfer data between the new client device and the network's access point.
Different methods of network security
• Wireless Encryption
• Pre-shared Key (PSK)
• PSK is the most common method of securing a wireless network, mostly because
it’s the easiest to implement and doesn't require a separate authentication server.
• In this method, everyone on your secure wireless network connects to access
points utilizing the same password, which is probably known by everyone. For a
home environment, this is probably OK.
• You’d assume that most of the people you’re letting on your network are your
friends or family, and – depending on the quality of your friends and family – you
can probably trust them with access to your network.
• The trouble with PSK is, especially for businesses, that if you want to remove one
user’s access to your network, you need to give everybody else the new key.
• This may include all of your employees, contractors, and any other guests that
have been on your network.
• It could be a lot of work for a large company, especially if it’s all because of one
employee leaving the company.
Different methods of network security
• Firewall
– Its primary objective is to control the incoming and outgoing network traffic by
analysing the data packets and determining whether it should be allowed
through or not, based on a predetermined rule set.
– It may be hardware (Built in router firewall) or software.
• Intrusion detection system (IDS) is a passive detection system that can
detect the presence of an attack and logs/stores that information.
• Intrusion prevention system (IPS) is a network device that continually
scans across the network, searching for inappropriate activity and if a
potential threat is present, the IPS may shut it down.
• Prevent Physical Access
– Possible for a building to be shielded from electromagnetic interference
– Or Directional antennas can be used to restrict the spread of the signal
– Costs are more
• Use encryption software for sensitive information sent over the internet
• One factor authentication
• This is something that the user knows, such as a password.
• Advantages
• The access is unique, as only you know it.
• Also, this is a very easy way for you to access the network, since
all you do is input a password.
• Disadvantages
• The major one is that generally people do use easy passwords
which are quite easy to guess/bruteforce.
• Also, a lot of people have their unhashed passwords saved on
their website, meaning that it is quite easy to obtain them.
• Two factor authentication
• Two factor authentication requires something you have
and something you know.
• A second authentication factor enhances security by
introducing an independent type of ID, one only the
original person should be able to provide, such as a
thumb print or a swipe card.
• Example - Swiping a card and entering a PIN.
• Disadvantage
• If you lose one of these, you are not able to access.
• Three factor authentication
• In addition to the previous two factors, the third factor is
“something a user is.”
• Examples of a third factor are all biometric such as the user’s
voice, hand configuration, a fingerprint, a retina scan or similar.
• The most recognized form of three-factor authentication is
usually the retina scan.
• An advantage to three factor authentication is that it is
obviously going to be more secure to any of the other two
factor authentications.
• Disadvantage - if you do not have access to one of them, you
are unable to gain access.
Block Vs Stream Cipher
• A block cipher is a method of encrypting text (to
produce ciphertext) in which a cryptographic key and
algorithm are applied to a block of data (for example,
64 contiguous bits) at once as a group rather than to
one bit at a time.
• A stream cipher is a method of encrypting text (to
produce ciphertext) in which a cryptographic key and
algorithm are applied to each binary digit in a data
stream, one bit at a time. This method is not much
used in modern cryptography.
DES (Symmetric)
• DES works by using the same key to encrypt and decrypt a message,
so both the sender and the receiver must know and use the same
private key.
• The Data Encryption Standard is a block cipher, meaning a
cryptographic key and algorithm are applied to a block of data
simultaneously rather than one bit at a time.
• To encrypt a plaintext message, DES groups it into 64-bit blocks.
• Each block is enciphered using the secret key into a 64-bit
ciphertext by means of permutation and substitution.
• The process involves 16 rounds and can run in four different modes,
encrypting blocks individually or making each cipher block
dependent on all the previous blocks.
• A round consists of several processing steps that include
substitution, transposition and mixing of the input plaintext and
transform it into the final output of ciphertext
Substitution
• A substitution cipher is a method of encoding
by which units of plaintext are replaced with
ciphertext, according to a fixed system;
Transposition
• A transposition cipher is a method of
encryption by which the positions held by
units of plaintext (which are commonly
characters or groups of characters) are shifted
according to a regular system, so that the
ciphertext constitutes a permutation of the
plaintext.
• Example – Columnar Transposition
DES (Symmetric)
• Decryption is simply the inverse of encryption, following the
same steps but reversing the order in which the keys are
applied.
• For any cipher, the most basic method of attack is brute force,
which involves trying each key until you find the right one.
• The length of the key determines the number of possible keys --
and hence the feasibility -- of this type of attack.
• DES uses a 64-bit key, but eight of those bits are used for parity
checks, effectively limiting the key to 56-bits.
• Hence, it would take a maximum of 2^56, or
72,057,594,037,927,936, attempts to find the correct key.
• Triple DES (3DES) performs three iterations of the DES algorithm
• 3DES encryption is obviously slower than plain DES.
AES (Symmetric)
• The Advanced Encryption Standard or AES is a symmetric block cipher
• AES is more secure than its predecessors -- DES and 3DES -- as the
algorithm is stronger and uses longer key lengths.
• It also enables faster encryption than DES and 3DES, making it ideal
for software applications, firmware and hardware that require either
low-latency or high throughput, such as firewalls and routers.
• It is used in many protocols such as SSL/TLS and can be found in most
modern applications and devices that need encryption functionality.
• AES comprises three block ciphers, AES-128, AES-192 and AES-256.
Each cipher encrypts and decrypts data in blocks of 128 bits using
cryptographic keys of 128-, 192- and 256-bits, respectively.
• There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and
14 rounds for 256-bit keys.
RSA (Public)
• RSA is a cryptosystem for public-key encryption, and is widely used for securing
sensitive data, particularly when being sent over an insecure network such as the
Internet.
• In RSA cryptography, both the public and the private keys can encrypt a message; the
opposite key from the one used to encrypt a message is used to decrypt it.
• This attribute is one reason why RSA has become the most widely used asymmetric
algorithm
• It provides a method of assuring the confidentiality, integrity, authenticity and non-
reputability of electronic communications and data storage
• Nonrepudiation is a way to guarantee that the sender of a message cannot later deny
having sent the message and that the recipient cannot deny having received the
message.
• RSA derives its security from the difficulty of factoring large integers that are the
product of two large prime numbers.
• Multiplying these two numbers is easy, but determining the original prime numbers
from the total -- factoring -- is considered infeasible due to the time it would take
even using today’s super computers.
SSL
• The Secure Sockets Layer (SSL) is a computer networking protocol
that manages server authentication, client authentication and
encrypted communication between servers and clients.
• SSL uses a combination of public-key and symmetric-key
encryption to secure a connection between two machines,
typically a Web or mail server and a client machine,
communicating over the Internet or an internal network.
• Using the OSI reference model as context, SSL runs above the
TCP/IP protocol, which is responsible for the transport and
routing of data over a network, and below higher-level protocols
such as HTTP and IMAP, encrypting the data of network
connections in the application layer of the Internet Protocol suite.
SSL
• The SSL protocol includes two sub-protocols: the record protocol and the "handshake"
protocol.
• These protocols allow a client to authenticate a server and establish an encrypted SSL
connection.
• In what's referred to as the "initial handshake process," a server that supports SSL
presents its digital certificate to the client to authenticate the server's identity.
• The authentication process uses public-key encryption to validate the digital certificate
and confirm that a server is in fact the server it claims to be.
• Once the server has been authenticated, the client and server establish cipher settings
and a shared key to encrypt the information they exchange during the remainder of the
session.
• This provides data confidentiality and integrity.
• This whole process is invisible to the user.
• For example, if a webpage requires an SSL connection, the URL will change from HTTP to
HTTPS and a padlock icon appears in the browser once the server has been authenticated.
• The handshake also allows the client to authenticate itself to the server. In this case, after
server authentication is successfully completed, the client must present its certificate to
the server to authenticate the client's identity before the encrypted SSL session can be
established.
TLS
• Transport Layer Security (TLS) is a protocol that ensures privacy
between communicating applications and their users on the Internet.
• When a server and client communicate, TLS ensures that no third
party may eavesdrop or tamper with any message.
• TLS is the successor to the Secure Sockets Layer (SSL).
• TLS is composed of two layers: the TLS Record Protocol and the TLS
Handshake Protocol.
• The TLS Handshake Protocol allows the server and client to
authenticate each other and to negotiate an encryption algorithm
and cryptographic keys before data is exchanged.
• The TLS Record Protocol provides connection security with some
encryption method such as the Data Encryption Standard (DES).
• The TLS Record Protocol can also be used without encryption.
SSL vs TLS
• There are two distinct ways that a program can initiate a secure connection with a
server:
• By Port (a.k.a. explicit):
– Connecting to a specific port means that a secure connection should be used.
– For example, port 443 for https (secure web), 993 for secure IMAP, 995 for secure POP, etc.
– These ports are setup on the server ready to negotiate a secure connection first, and do
whatever else you want second.
• By Protocol (a.k.a. implicit):
– These connections first begin with an insecure “hello” to the server and only then switch to
secured communications after the handshake between the client and the server is
successful.
– If this handshake fails for any reason, the connection is severed.
– A good example of this is the command “STARTTLS” used in outbound email (SMTP)
connections.
• The “By Port” method is commonly referred to as “SSL” or “explicit” and the “By
Protocol” method is commonly referred to as “TLS” or “implicit” in many program
configuration areas.
Initialization Vector
• An initialization vector (IV) is an arbitrary number that can be used along with a secret
key for data encryption.
• This number, also called a nonce, is employed only one time in any session.
• The use of an IV prevents repetition in data encryption, making it more difficult for a
hacker using a dictionary attack to find patterns and break a cipher.
• For example, a sequence might appear twice or more within the body of a message.
• If there are repeated sequences in encrypted data, an attacker could assume that the
corresponding sequences in the message were also identical.
• The IV prevents the appearance of corresponding duplicate character sequences in the
ciphertext.
• The ideal IV is a random number that is made known to the destination computer to
facilitate decryption of the data when it is received.
• The IV can be agreed on in advance, transmitted independently or included as part of
the session setup prior to exchange of the message data.
• The length of the IV (the number of bits or bytes it contains) depends on the method of
encryption.
• The IV length is usually comparable to the length of the encryption key or block of the
cipher in use.
• IV changes for every block of data
RC4
• RC4 (Rivest Cipher 4) is a stream cipher.
• While remarkable for its simplicity and speed in software,
multiple vulnerabilities have been discovered in RC4,
rendering it insecure.
• Particularly problematic uses of RC4 have led to very
insecure protocols such as WEP.
• RC4 generates a pseudorandom stream of bits (a keystream).
• As with any stream cipher, these can be used for encryption
by combining it with the plaintext using bit-wise exclusive-or
• decryption is performed the same way
TKIP
• TKIP is a suite of algorithms that works as a "wrapper" to WEP, which
allows users of legacy WLAN equipment to upgrade to TKIP without
replacing hardware.
• TKIP uses the original WEP programming but "wraps" additional code at
the beginning and end to encapsulate and modify it.
• Like WEP, TKIP uses the RC4 stream encryption algorithm as its basis.
• The new protocol, however, encrypts each data packet with a unique
encryption key, and the keys are much stronger than those of its
predecessor.
• To increase key strength, TKIP includes four additional algorithms:
– A cryptographic message integrity check to protect packets(michael key)
– An initialization-vector sequencing mechanism that includes hashing, as opposed
to WEP's plain text transmission (IV has sequence numbers)
– A per-packet key-mixing function to increase cryptographic strength (key mixing
with xor function)
– A re-keying mechanism to provide key generation every 10,000 packets.
EAP
• The Extensible Authentication Protocol (EAP) is a protocol for wireless
networks that expands on authentication methods used by the Point-to-
Point Protocol (PPP), a protocol often used when connecting a computer to
the Internet.
• EAP can support multiple authentication mechanisms, such as token cards,
smart cards, certificates, one-time passwords, and public key encryption
authentication.
• Here's how it works: in communications using EAP, a user requests
connection to a wireless network through an access point (a station that
transmits and receives data, sometimes known as a transceiver).
• The access point requests identification (ID) data from the user and
transmits that data to an authentication server.
• The authentication server asks the access point for proof of the validity of
the ID.
• After the access point obtains that verification from the user and sends it
back to the authentication server, the user is connected to the network as
requested.
CCMP
• Counter Mode with Cipher Block Chaining Message Authentication
Code Protocol (CCMP) is an encryption protocol
• CCMP offers enhanced security compared with similar technologies
such as Temporal Key Integrity Protocol (TKIP).
• CCMP employs 128-bit keys and a 48-bit initialization vector that
minimizes vulnerability to replay attacks.
• The Counter Mode component provides data privacy.
• The Cipher Block Chaining Message Authentication Code
component provides data integrity and authentication.
• The enhanced privacy and security of CCMP compared with TKIP
requires additional processing power, often necessitating new or
upgraded hardware.
Advantages & Disadvantages of each method
of network security
Method Advantages Disadvantages
No security High speeds Anyone can access the
network
Use a password to access Easy to use Takes some time to enter
your device It will prevent the username and
unauthorized access. password. If it is weak,
then it is easy to crack.
Install an antivirus program Very good protection from May slow down your
on your device malicious software device
Use a software firewall It will monitor and control May slow down your
the traffic flow between device
your computer and the
network and prevent
unauthorized access to
your device
Advantages & Disadvantages of each
method of network security
Method Advantages Disadvantages
Use a password to access the If a person has access to the Takes some time to enter the
web interface that is used to LAN, uses a web browser and user name and password. If
setup your wireless routers enters the IP address of the it is weak then it is easy to
or access point router, he/she will need a crack.
password to log into the
web-based Utility page of the
modem / router / access
point
Turn On / off Wireless Complete security If the wireless is disabled
connectivity then there is no wireless
network
Enable / disable SSID Invisible to novice users Experienced attackers can
broadcast easily find your SSID
Limit access to wireless Extra security By sniffing the wireless
devices by MAC address transmissions, the allowed
list of MAC addresses can be
easily discovered.
Difficult to manage the list.
Advantages & Disadvantages of each
method of network security
Method Advantages Disadvantages
WEP wireless security • WEP offers is • WEP encryption uses a
interoperability, since all shared key authentication
wireless devices support and sends the same key
basic WEP encryption. with data packets being
• This can be useful when transmitted across the
trying to use older devices wireless network. If
that need wireless malicious users have
connectivity. (Works with enough time and gather
legacy systems) enough data they can
eventually piece together
their own key.
• If the master key needs to
be changed, it will have to
be manually changed on
all devices connected to
the network. This can be a
tedious task if you have
many devices connected
to your network.
Advantages & Disadvantages of each
method of network security
Method Advantages Disadvantages
WPA, WPA2 wireless security WPA uses much stronger • incompatibility with legacy
encryption algorithms than hardware and older
its predecessor. WPA uses a operating systems.
Temporary Key Integrity • WPA also has a larger
Protocol (TKIP), which performance overhead
dynamically changes the key and increases data packet
as data packets are sent size leading to longer
across the network. Since the transmission.
key is constantly changing, it
makes cracking the key much
more difficult than that of
WEP. If the need arises to
change the global key, WPA
will automatically advertise
the new key to all devices on
the network without having
to manually change them.
Advantages & Disadvantages of each
method of network security
Method Advantages Disadvantages
WPS Ease of use New technology
No need to know the SSID Works only with WPS
and security keys or certified devices.
passphrases Some known security issues.
Prevent physical access Limited to the interior of the Very expensive
user’s premises
Use routers’ hardware Prevent hackers and Can’t stop persons in range of
firewall unauthorized persons on the your wifi from getting onto
Internet from getting access your wifi network
to your network
Use encryption software for Extremely difficult for an This process takes some time.
sensitive information sent unauthorized person to read
over the internet your sensitive files
Advantages & Disadvantages of each
method of network security
• userID:
• Advantages:
– Access rights to the network can be set for each
user
– User groups can be created to manage user rights
in batches
• Disadvantages:
– A userID can be stolen
– Does not protect against intercepting messages in
the network
Advantages & Disadvantages of each
method of network security
• Wi-Fi Protected Access: Advantages of WPA
– Provides extremely strong wireless security
– Adds authentication to WEP’s basic encryption
– Offers backward compatible WEP support for devices that aren’t
upgraded
– Integrates with radius servers to allow administration, auditing, and
logging
• Disadvantages of WPA
– Except when using with the Pre-Shared Key (WPA-PSK), complicated
setup is required, unsuitable for typical home users
– Older firmware usually will not be upgraded to support it
– Incompatible with older operating systems such as Windows 95
– Greater performance overhead than WEP
– Remains vulnerable to Denial of Service attacks
Advantages & Disadvantages of each
method of network security
• Firewall
• Advantages
– Relatively inexpensive or free for personal use.
– New releases are becoming user friendly.
– Some firewalls but not all can detect viruses, worms, Trojan horses,
or data collectors.
– A firewall blocks evil packets from being permitted to reach a place
where they can do harm.
• Disadvantages
– Firewalls evolve due to cracker's ability to circumvent the increases.
– Firewalls cannot protect you from internal sabotage within a
network or from allowing other user’s access to your PC.
– Firewalls offer weak defence from viruses.
Advantages & Disadvantages of each
method of network security
• MAC address
• Advantages
– The advantage to MAC filtering is that there is no attachment cost to
devices that connect to the network.
– The policy is set on a router or switch, and the equipment attached
either is permitted or it is not.
– The person attaching the equipment has nothing to do.
• Disadvantage
– The disadvantage to MAC filtering is that it is easy to spoof.
– Because of the broadcast nature of Ethernet, and particularly wireless
Ethernet, an advisory can sit on the wire and just listen to traffic to and
from permitted MAC addresses.
– Then, the advisory can change his MAC address to a permitted one, and
in most cases obtain access to the network.