Lecture 1 - SRTY 6002 - Introduction To Network Security-Update 22W - 20221027
Lecture 1 - SRTY 6002 - Introduction To Network Security-Update 22W - 20221027
SRTY-6002
Lecture 1
Introduction to Network Security
Professor Bio
4
Classroom Conduct
• Testing
• Current and tested Respondus Lockdown Browser
• Hard wired Ethernet access (RJ45 patch cable)
• Working, tested, fully powered laptop (lost time due to PC problems is not recoverable)
• Student card displayed at all times
5
Student Success
6
Student Success
• Attendance is required!
• Be on time
• Take notes this is essential
• Hand in ALL assignments
• Put the assignment name and your last name in the file name
• Assignments need a cover page that includes 5 things:
• your name, student number, course code, assignment number, and date
• All assignments submitted via FOL in the correct dropbox!
• Assignments submitted in any other method including email will not get review or graded.
• Assignments submitted using the wrong dropbox will not get graded.
• Dropbox is open until the noted time, example 11:59pm. You must submit before this time.
• Assignments must have references - Failure to do this may result in an academic offense which
could result in a grade of zero for the assignment
• Assignments submitted compressed are not accepted -
• Assignments submitted compressed will not be marked and will result in a mark of 0
• Prepare properly for tests – include your laptop, PS, cables,
• Do all the homework
• Do NOT miss tests
7
References
• Missed Tests
• Students are not entitled to complete missed tests
• In case of a significant event supported by documentation AND professor’s approval AND
prior notification, a missed test may be completed
• Rewrites & extra grade items
• Students will not be permitted to rewrite tests
• Students will not be entitled to extra work or assignments in order to raise a grade
• Talk to the professor if you have an extenuating circumstances.
9
Course Information Sheet
• Learning Outcomes
• What you are expected to be able to demonstrate that you have
learned
• Questions on tests will reflect these items
• Detailed Content
• What you should expect to be taught each week
• Content & tests or assignments
10
Lecture 1
Asymmetric encryption
Authentication protocols
measures to deter,
prevent, detect, and
correct security
violations that involve
the transmission of
information
Computer Security
The NIST Computer Security Handbook defines the term computer security
as:
“the protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity, availability and
confidentiality of information system resources” (includes hardware, software,
firmware, information/ data, and telecommunications)
Computer Security Objectives
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or
disclosed to unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information may
be disclosed
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to
authorized users
Breach of Security - Levels of Impact
gh
• The loss could be expected to have a
serious adverse effect on organizational
• Security attack
• Any action that compromises the security of information owned by an organization
• Security mechanism
• A process (or a device incorporating such a process) that is designed to detect,
prevent, or recover from a security attack
• Security service
• A processing or communication service that enhances the security of the data
processing systems and the information transfers of an organization
• Intended to counter security attacks, and they make use of one or more security
mechanisms to provide the service
Table 1.1
Threats and Attacks (RFC 4949)
•A means of classifying
security attacks, used both in
X.800 and RFC 4949, is in
terms of passive attacks and
active attacks
•A passive attack attempts to
learn or make use of
information from the system
but does not affect system
resources
•An active attack attempts to
alter system resources or
affect their operation
Passive Attacks
Security
Services
(X.800)
• The ability to limit and control the access to host systems and
applications via communications links
• To achieve this, each entity trying to gain access must first be
indentified, or authenticated, so that access rights can be tailored to the
individual
Data Confidentiality
Specific Security
Mechanisms
• Encipherment
• Digital signatures
• Access controls
• Data integrity Pervasive Security Mechanisms
• Authentication exchange
• Trusted functionality
• Traffic padding
• Security labels
• Routing control
• Event detection
• Notarization
• Security audit trails
• Security recovery
Table 1.3
Security
Mechanisms
(X.800)
Traffic flow Y Y Y
confidentiality
Data integrity Y Y Y
Nonrepudiatio Y Y Y
n
Availability Y Y
Fundamental Security Design Principles
Isolation Encapsulation
• Applies in three contexts: • Can be viewed as a specific
• Public access systems should be form of isolation based on
isolated from critical resources to object-oriented functionality
prevent disclosure or tampering
• Protection is provided by
• Processes and files of individual
users should be isolated from one
encapsulating a collection of
another except where it is explicitly procedures and data objects in
desired a domain of its own so that the
• Security mechanisms should be internal structure of a data
isolated in the sense of preventing object is accessible only to the
access to those mechanisms procedures of the protected
subsystem, and the procedures
may be called only at
designated domain entry points
Fundamental Security Design Principles
Modularity Layering
• Refers both to the development of • Refers to the use of multiple,
security functions as separate, overlapping protection approaches
protected modules and to the use addressing the people,
of a modular architecture for technology, and operational
mechanism design and aspects of information systems
implementation • The failure or circumvention of
any individual protection approach
will not leave the system
unprotected
Fundamental Security Design Principles
Least astonishment
• Means that a program or user interface should always respond in
the way that is least likely to astonish the user
• The mechanism for authorization should be transparent enough
to a user that the user has a good intuitive understanding of how
the security goals map to the provided security mechanism
Attack Surfaces
• NIST is a U.S. federal agency that deals with measurement science, standards, and technology related
to U.S. government use and to the promotion of U.S. private-sector innovation
• Despite its national scope, NIST Federal Information Processing Standards (FIPS) and Special
Publications (SP) have a worldwide impact
Internet Society
• ISOC is a professional membership society with world-wide organizational and individual membership
• Provides leadership in addressing issues that confront the future of the Internet and is the organization
home for the groups responsible for Internet infrastructure standards
ITU-T
• The International Telecommunication Union (ITU) is an international organization within the United
Nations System in which governments and the private sector coordinate global telecom networks and
services
• The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors of the ITU and
whose mission is the development of technical standards covering all fields of telecommunications
ISO
• Modularity: Modular arithmetic is a special type of arithmetic that involves only integers.
Since modular arithmetic is such a broadly useful tool in number theory.
• Prime Numbers: A prime number (or simply prime) is a positive integer $p>1$ whose only
positive divisors are 1 and itself.
• Source:
• Glenn Olson:
https://www.youtube.com/playlist?list=PLr3WmPgPWZfX1HUpeyKkP6ir2wOFhqXMO
• Videos: 5, 6, 7 ,8, 9, 14, 18, 19, 20, 21, 22, 23, 67, 68, 70, 71, 72, 74, 75
Subset of Numbers
• Integers
• …-3,-2,-1,0,1,2,3…
• Whole Numbers
• 0,1,2,3….
• Rule for 3 – is the sum of the digits is divisible by 3 then then the entire number is
divisible by 3
• Rule for 9 – is the sum of the digits is divisible by 9 then then the entire number is
divisible by 9
Divisibility Problems
• Is 123,456,789 divisible by 9?
• Prime is a natural number with only two positive distinct divisors of 1 and itself.
• Examples are 7= 1x7
• Composite is a natural number with some other positive divisor besides 1 and
itself
• Examples 6 6=1x6 and 6 = 2x3
• What is 1?
• Is it prime
• Is it composite
• Or neither
• What is the smallest composite integer which is not divisible by the first 8 prime
numbers?
Prime Factors
• If a | 1, then a = ±1
• If a | b and b | a, then a = ±b
• Any b ≠ 0 divides 0
•If a | b and b | c, then a | c
b = 7; g = 14; h = 63; m = 3; n = 2
7 | 14 and 7 | 63.
To show 7 (3 * 14 + 2 * 63),
we have (3 * 14 + 2 * 63) = 7(3 * 2 + 2 * 9),
and it is obvious that 7 | (7(3 * 2 + 2 * 9)).
Division Algorithm
a = qn + r 0 ≤ r < n; q = [a/n]
Relationships
Euclidean Algorithm
•We stated that two integers a and b are relatively prime if their
only common positive integer factor is 1; this is equivalent to
saying that a and b are relatively prime if gcd(a,b) = 1
• The modulus
• If a is an integer and n is a positive integer, we define a mod n to be the remainder when a
is divided by n; the integer n is called the modulus
• Thus, for any integer a:
a = qn + r 0 ≤ r < n; q = [a/ n]
a = [a/ n] * n + ( a mod n)
11 mod 7 = 4; - 11 mod 7 = 3
Modular Arithmetic
• Congruent modulo n
• Two integers a and b are said to be congruent modulo n if (a mod n) = (b mod
n)
• This is written as a = b(mod n)2
• Note that if a = 0(mod n), then n | a
23 = 8 (mod 5) because 23 - 8 = 15 = 5 * 3
- 11 = 5 (mod 8) because - 11 - 5 = - 16 = 8 * (- 2)
81 = 0 (mod 27) because 81 - 0 = 81 = 27 * 3
Modular Arithmetic
•Modular arithmetic exhibits the following properties:
1. [(a mod n) + (b mod n)] mod n = (a + b) mod n
11 mod 8 = 3; 15 mod 8 = 7
[(11 mod 8) + (15 mod 8)] mod 8 = 10 mod 8 = 2
(11 + 15) mod 8 = 26 mod 8 = 2
[(11 mod 8) - (15 mod 8)] mod 8 = - 4 mod 8 = 4
(11 - 15) mod 8 = - 4 mod 8 = 4
[(11 mod 8) * (15 mod 8)] mod 8 = 21 mod 8 = 5
(11 * 15) mod 8 = 165 mod 8 = 5
Table 2.2(a) - Arithmetic Modulo 8
Additive
and
Multiplicative Inverse
Modulo 8
a = p1 a1 * p2 a2 * . . . * pp1 a1
where p1 < p2 < . . . < pt are prime numbers and where each ai is a
positive integer
•This is known as the fundamental theorem of arithmetic
Table 2.5
Primes Under 2000
Primes less than 2000
•Algorithm is:
TEST (n)
1.
• Find integers k, q, with k > 0, q odd, so that (n – 1)=2kq ;
2.
• Select a random integer a, 1 < a < n – 1 ;
4.
• for j = 0 to k – 1 do
5.
• if (a2jq mod n = n – 1) then return (“inconclusive") ;
6.
• return (“composite") ;
Deterministic Primality Algorithm
• Slides 12-84 © 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.