Krishan-Lecture 3 (2022-23) Network Security Aspects & Threats
Krishan-Lecture 3 (2022-23) Network Security Aspects & Threats
Lecture - 3
Subject – Network Security & Cryptography
Class – B.E IT 5th Sem
by
Dr. Krishan Saluja
– Something user is
• fingerprint, voice, or retinal scans
Authentication
Absence of Authentication
Authorization
– Object
• is entity to which access can be controlled
– Access Right
• defines the ways in which a subject can access an object.
Message Integrity
Confidentiality
Message Integrity
Availability
broadcast media
promiscuous NIC (network interface card) reads all packets passing
by
can read all unencrypted data (e.g. passwords)
e.g.: C sniffs B’s packets
A C
36
Packet Sniffing
What kinds of data can we get?
Asked another way, what kind of
information would be most useful to a
malicious user?
Answer: Anything in plain text
Passwords are the most popular
37
Active Attacks
Also have “active attacks” which Active Intruder
attempt to alter system resources or affect
their operation.
By modification of data stream to:
+ masquerade of one entity as
some other
+ replay previous messages
+ modify messages in transit
+ denial of service
TCP Attacks (Session Hijacking and
Masquerading)
39
TCP Attacks (Session Hijacking and
Masquerading)
40
TCP Attacks (Session Hijacking and
Masquerading)
41
TCP Attacks (Session Hijacking and
Masquerading)
Packets
The Void
42
TCP Attacks (Session Hijacking and
Masquerading)
ISN, SRC=Alice
43
Social Engineering Attack
People can be just as dangerous as
unprotected computer systems
People can be lied to, manipulated, bribed,
threatened, harmed, tortured, etc. to give up
valuable information
Most humans will breakdown once they are
at the “harmed” stage, unless they have
been specially trained
Think government here…
44
Social Engineering Attacks
Any suggestions !
Any Queries !