CNS Chapter 01 Batch 2019
CNS Chapter 01 Batch 2019
Cryptography and
Network Security
CS-321
Short discussion on
2
Marks Distribution
Assignments
Quizes
Mid Term
Final Exam
3
Achievement
4
Cryptography and
Network Security
Overview & Chapter 1
6
Standards Organizations
National Institute of Standards & Technology
(NIST)
Internet Society (ISOC)
International Telecommunication Union
Telecommunication Standardization Sector
(ITU-T)
International Organization for Standardization
(ISO)
RSA Labs (de facto)
7
Background
Information Security requirements have changed in
recent times (due to attacks on sensitive info.)
11
Levels of Impact
can define 3 levels of impact from a
security breach
Low
Moderate
High
12
Low Impact
The loss could be expected to have a limited adverse effect on
organizational operations, organizational assets, or individuals.
A limited adverse effect means that, for example, the loss of
confidentiality, integrity, or availability might
(i) cause a degradation in mission capability to an extent
13
Moderate Impact
The loss could be expected to have a serious adverse effect on
organizational operations, organizational assets, or individuals.
A serious adverse effect means that, for example, the loss
might
(i) cause a significant degradation in mission capability to an
14
High Impact
The loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational
assets, or individuals.
A severe or catastrophic adverse effect means that, for
example, the loss might
(i) cause a severe degradation in or loss of mission
15
Examples of Security
Requirements
confidentiality – student grades
integrity – patient information
availability – authentication service
authenticity – admission ticket
non-repudiation – stock sell order
16
Confidentiality
Confidentiality - Student grade information is an asset whose
confidentiality is considered to be highly important by students.
Grade information should only be available to students, their
parents, and employees that require the information to do their
job. Student enrollment information may have a moderate
confidentiality rating. This information is seen by more people
on a daily basis, is less likely to be targeted than grade
information, and results in less damage if disclosed. Directory
information, such as lists of students or faculty or departmental
lists, may be assigned a low confidentiality rating or indeed no
rating. This information is typically freely available to the public
and published on a school's Web site.
17
Integrity
Consider a hospital patient's allergy information stored in
a database. The doctor should be able to trust that the
information is correct and current. Now suppose that an
employee (e.g., a nurse) who is authorized to view and
update this information deliberately falsifies the data to
cause harm to the hospital. The database needs to be
restored to a trusted basis quickly, and it should be
possible to trace the error back to the person responsible.
Patient allergy information is an example of an asset with
a high requirement for integrity. Inaccurate information
could result in serious harm or death to a patient and
expose the hospital to massive liability.
18
Availability
The more critical a component or service, the
higher is the level of availability required. Consider
a system that provides authentication services for
critical systems, applications, and devices. An
interruption of service results in the inability for
customers to access computing resources and
staff to access the resources they need to perform
critical tasks. The loss of the service translates into
a large financial loss in lost employee productivity
and potential customer loss.
19
Computer Security Challenges
1. not simple – easy to get it wrong
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived on benefit until fails
8. requires regular monitoring a process, not an
event
9. too often an after-thought
10. regarded as impediment to using system 20
21
Aspects of Security
consider 3 aspects of information security:
security attack
security mechanism (control)
security service
note terms
threat – a potential for violation of security
vulnerability – a way by which loss can happen
attack – an assault on system security, a
deliberate attempt to evade security services
22
Attacks, Services and
Mechanisms
Security Attack: Any action that compromises
the security of information.
27
Active Attack: Interruption
Fabricate message
30
Active Attack: Modification
Modify message
32
Week-1
Session-2
33
How to do an Attack
The following describes some of the ways
through which any information systems
can be attacked.
a. Social Engineering
b. Viruses / Trojan Horses / Worms
c. Denial of Service (DoS)
d. IP Spoofing
e. Replay Attack
34
Social Engineering
Social engineering is a technique used by attackers
to gain system access or information by exploiting
the basic human instinct to be helpful.
RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
42
Security Services (X.800)
Authentication - assurance that communicating
entity is the one claimed
have both peer-entity & data origin authentication
Access Control - prevention of the unauthorized
use of a resource
Data Confidentiality –protection of data from
unauthorized disclosure
Data Integrity - assurance that data received is
as sent by an authorized entity
Non-Repudiation - protection against denial by
one of the parties in a communication
Availability – resource accessible/usable 43
Security Mechanism
a.k.a. control
feature designed to detect, prevent, or
recover from a security attack
no single mechanism that will support all
services required
however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques
hence our focus on this topic
44
Security Mechanisms (X.800)
specific security mechanisms: (May be
incorporated into the appropriate protocol layer in order
to provide some of the OSI security services)
encipherment, digital signatures, access controls,
49
Model for Network Security
using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service
50
Model for Network Access
Security
51
Model for Network Access
Security
using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated
information or resources
note that model does not include:
1. monitoring of system for successful
penetration
2. monitoring of authorized users for misuse
3. audit logging for forensic uses, etc. 52
Summary
topic roadmap & standards organizations
security concepts:
confidentiality, integrity, availability
X.800 security architecture
security attacks, services, mechanisms
models for network (access) security
53