MSC(CA&IT)
MSC(CA&IT)
Plain CipherTe
Text Encryption xt Decryption
Plain CipherTe
Text Encryption xt Decryption
A+3=D K – 1 = J Y + 3 =B
Types of encryption
Substitution
Caesar cipher
One- time pad substitution
Vernam cipher
Book cipher
Vigenere cipher
Transposition (Permutation)
Columnar cipher
Cross cipher
Advantage s and disadvantage of cipher.
How to crack it.
Vigenere tableau
Shannon’s Characteristics of “Good”
Cipher
Secrecy needed amount of labor
Set of keys and algorithm should be free
from complexity
The implementation of the process should
be as simple as possible
Errors in ciphering should not propagate
and cause corruption of further information
in the message.
The size of the enciphered text should be
no longer than the text of the original
message.
Properties of trustworthy Encryption
System
It is based on sound Mathematics
It has been analyzed by competent experts
and found to be sound
It has stood the test of time.
Stream vs. Block Ciphers
Comparison
Stream Encryption Block Encryption
Algorithm Algorithm
Advantages Speed of Transfer Faster High Diffusion
Low Error Propagation Immunity to insert of
symbol
Disadvantage Low Diffusion Slowness of Encryption
s Susceptibility to Malicious Error Propagation
Substitution
Compare Between Confusion and Diffusion
The Data Encryption Standard
Developed for us government in the early
1970.
Product Cipher
M
Original Message
E1(M)
E2(E1(M)
Characteristics
P=D(KPRIV, E(KPUB,P)) P=D(KPUB, E(KPRIV,P))
RSA( Rivest-Shamir-Adelman) Algori
thm
The Application of Encryption
Hash Function
Key Exchange
Digital Signature
Check
Signature
Authentication
Cannot be reused
Not alterable
Certificate
What is Security?
Security is the protection of information,
systems and services against disasters,
mistakes and manipulation so that the
likelihood and impact of security incidents is
minimized. It consist of
Confidentiality
Integrity:
Availability:
Legal Compliance:.
A threat is a danger which could affect the
security (confidentiality, integrity, availability)
of assets, leading to a potential loss or
damage.
necessary?
Customer information or accounting
information could be disclosed, affecting
credibility.
This information could be used by (new)
competitors to launch more effective
marketing campaigns.
Virus development has continued at an
alarming rate in the last few years, leaving
few, if any companies untouched.
System interconnection increases security
risks significantly:
The following figures are included (source:
Datapro Research) as example, to give an idea
what is going on in the real world.
Common Causes of damage : Human Error 52%,
Dishonest people 10%, Technical Sabotage 10%,
Fire 15%, Water 10% and Terrorism 3%.
Who causes damage? Current employees 81%,
Outsiders 13%, Former employees 6%.
Types of computer crime: Money theft 44%,
Damage of software 16%, Theft of information
16%, Alteration of data 12%, Theft of services
10%.
IT security requirements
are often specified in
terms of
Assurance
Identification / Authentication
Accountability/Audit Trail
Access Control
Object Reuse
Accuracy
Non Repudation
needed?
A security policy is a preventative
mechanism for protecting important
company data and processes. It
communicates a coherent security
standard to users, management and
technical staff.
How to improving security?
Knowing what data & processes need to be
protected.
Recognizing the threats, judging possible
impacts.
Calculating the risks and deciding what risks
are acceptable.
Counter measures: Developing a strategy to
reduce the risk to an acceptable level, then
implement, test and tune the strategy.
Keep it simple
Keep it coherent.
Keep to standards if possible.
Two Security Approach
Top – Down : more precise, but can be slow and
have high initial costs.
Bottom – Up : faster but not more precise.
Physical Security
A Physical Security policy document should exist detailing the measures taken to protect buildings as regards
disasters (flooding, fire, earthquakes, explosions, power outage), theft, access control, safes, computer rooms
& wiring cabinets.
Access control
All users should be authorised.
Users should be able to set the privileges of objects belonging to them in their environment.
Users should be prevented from deleting others user's files in shared directories[7].
Consider allowing root login only via the console.
It should be possible to control user access to all objects on the system (files, printers, devices, databases, commands,
applications etc.) according to a stated policy.
Users should not be able to examine the Access Control granted to other users.
It should be possible to label data with a classification to .
Mandatory access control should be provided.
Logon Policy
Accounts should only exist for authorised persons.
Each user must be identified by a name or number and belong to a group.
Username and group name structure should be standardised enterprise wide (number of characters, composition) if
possible.
User and groups must be managed by the administrator (or equivalent), not by users themselves.
Group accounts are to be avoided (class forbidden).
Each user should have only one account on the system.
If guest accounts are used, their working environment should be very restricted
Guest accounts are not allowed.
Usernames and passwords should not be distributed in the same communication.
When a user is transferred or terminates employment, his account should be blocked or deleted immediately. Procedures
should exist whereby the personnel administration automatically informs system administrators.
A screenlock should be activated after 15mins idle time with password protection.
The current directory should not be included in the users search path.
User application & system configuration should only be writable by the user and not be world readable[8].
The users file creation mask ("umask" on UNIX) should not give world read or write access to new files created.
Users should be informed of actions that violate security. Likewise they must inform their security administrator if they
suspect a security violation.
If an account is subjected to continuous login failures in short period of time (e.g. 20 attempts in 1 hour), block the account
and notify the user. Don't do this for administrative accounts (open a denial of service attack weakness)!
When a user logs on the following should be displayed:
a legal notice informing the user of implications of system abuse.
the time & device of last successful and unsuccessful login (user should check that they are correct).
Logons should only be enabled when necessary (e.g. between 06:00 and 22:00 Monday to Friday.
Accountability and Audit
Audit trail logs and programs/utilities must be protected. They should only
be accessible by security personnel.
Logs should not contain passwords.
System administrator activity (especially use of su in UNIX) should be
logged.
Unsuccessful login attempts should be logged (and possibly notified).
Important events should raise an alarm (high priority message)
automatically.
It should be possible to specify auditing on a per subject and per object
basis.
Each entry in the audit log should contain at least: Username or UID, date
& time, terminal id, error level (success or failure) and event description.
Logs should be kept on read-only media if possible (paper, WORM). Logs
should also be forwarded to a specially secure machine instead of locally
on each machine, if possible. Avoid storing logs on shared filesystems.
All machines should have their clocks synchronised to guarantee the
validity of audit log timestamps.
Reliability of Service
Backup & Restore Policy
Backups should be made regularly and some backup media
should be stored regularly off-site.
Class backups should be stored in a locked safe. All media must
be accounted for. Old tapes must be destroyed, not thrown away.
Change Management (sw/hw installations or updates)
Only system administrators should install or update software on
servers. Users may not install software on class workstations.
Systems should be cleanly installed according to vendor
instructions.
A change log, detailing all changes to a system should be kept on
EVERY server. It is suggested that as a minimum, a simple text
file be created (e.g. /etc/mods) containing: Date, sysadmin name,
files changed and reason/comment.
OS installations should include installation of all recommended
patches.
Software Development
Policy
General Guidelines
Separate development and production environments
and data.
Consider security to be an integral part of application
development.
Test data should not contain confidential information.
Consider using a secured language (e.g. Java rather
than C, Tainted Perl rather than Perl).
Consider having major new systems ITSEC approved.
Production Guidelines
What documentation is to delivered with an
application? E.g. Operating, Installation,
Administration, Security, User Manuals.
Business Continuity Planning
Security crisis/disasters
If a serious attack or disaster occurs:
The Firecall team should take charge.
The concerned machine should be disconnected from the
network.
Document every single action taken, events, evidence found
(with time & date).
Analyse the system: what files changed? What
programs/accounts were added or modified? If modifications
are found, check for these modifications on similar systems.
Notify administrators, management and law enforcement
authorities as required.
If you discuss details of the attack with anyone via email, use
encrypted email with signatures.
Report the incident to a CERT/FIRST if necessary .
Enforcement
Users who do not adhere to this policy shall
be warned and the corresponding line
manager informed. A user who continues to
ignore warnings may be removed from his
function.
Physical Security
Buildings
Transport of Data
Backups
Disks
Laptops / mobile computers
Printers
Computers
"Clean desk"
Buildings
Zones should be defined, for example:
Zone 1: Areas open to the public.
Zone 2: Areas not open to the public, open to company staff.
Zone 3: Protected areas. Only accessible with identification, access strictly
controlled. Don't allow externals unaccompanied access.
Buildings should always be locked, except for access via a reception area during office
hours.
Public areas shouldn't have any computers with access to the internal Data Network,
unless through a Firewall.
Server rooms must be locked, if possible with electronic card access (Audit list).
Consider protect sensitive computers against radiation.
Consider protecting systems against Electromagnetic Pulses.
Server rooms must be locked, with electronic card access (Audit list). Very few people
should have access.
Buildings must be monitored 24 hrs x 7 days by security personnel.
Access to server rooms should be recorded on Video.
Contingency plans should exist which cover events such as power cuts, theft, fire,
flooding, explosions, earthquakes (where necessary) etc.
8.2 Transport of Data
What is the company policy on the use of
public, private, company transport as respects
the transport of Information (paper, diskettes,
disks, tapes, computers..)?
8.3 Backups
Backup media should be stored in locked safes
or locked rooms.
Regular backups (at least once per month)
should be stored off site.
Backups should only be transported by secure
methods (like money transport).
8.4 Disks
Floppy and removable disks are often a source of virus and illegal software (as is Email).
They may be also used to illegally copy confidential data. When data is erased from
diskettes, it must be completely erased (a standard product should be recommended for
PCs). Floppy drives are rarely needed when users have reliable networked printers, file
servers and email available.
Removable hard disks and floppy disks should only be used where absolutely necessary.
Avoid copying data to floppy disk.
Floppy drives should be removed, unless the internal network is considered too insecure.
Removable disks can be more secure than using a network server since all data is kept
locally. In this case disks must be kept carefully in a locked safe.
Confidential data should be encrypted. If the network server is not considered secure
enough, files may be treated locally, encrypted (using DES for example) and then saved
on the network server. This is preferable to the use of removable disks since regular
backups will be made. The risk of losing data is minimised (unless the DES key is lost or
forgotten).
Forbid repair of confidential disks, they must be destroyed unless it is 100% sure that the
disk has been written with nulls or 1s. Products which promise this feature presumably
require that the disk can still be accessed..
All disks should be classified and the classification level should be written on the disks.
Consider protecting media against Electromagnetic Pulses.
8.5 Laptops / mobile computers
Protect (encrypt) Laptop hard disks or individual
files/directories (a standard software should be
defined).
8.6 Printers
Only Printers in directors offices or restricted access
rooms should be used for printing confidential
information.
8.7 Computers
EPROM passwords should be used on PCs and
workstations.
Screens not used for 15 min should be blanked
automatically with password protection.
Computer housings should be locked if possible
Key Points
Unauthorized intrusion into a computer system or
network is one of the most serious threats to computer
security.
Intrusion detection systems have been developed to
provide early warnings of an intrusion so that
defensive action can be taken to prevent or minimizing
damage.
Intrusion detection involves detecting unusual patterns
of activity or patterns of activity that are known to
correlate with intrusions.
One important element of intrusion prevention is
password management, with the goal of preventing
unauthorized users from having access to the
passwords of others.
Intruders
Unauthorized intrusion into a computer
system or network is one of the most
serious threat to computer system. Types
of computer intruders are as follows:
Masquerader : to be outsider
Misfeasor : to be insider
Clandestine User : either Outsider or insider
Some of the Frequent attack on
Computer
Reported by Bell Labs
Attempts to copy the password file at a rate
exceeding once per every other day
Suspicious remote procedure call request at a
rate exceeding once per week
Attempts to connect to nonexistent “bait”
machines at least every two weeks.
Two levels of Hacker: High Level and Low Level
One of the result of the growing awareness of
the intruder problem has been the
establishment of a number of computer
emergency response team(CERT).
Intrusion Techniques
The password file can be protected in one of two ways:
One-way function
Access control
[goto main;
1234567;
subroutine infect-executable
:=
{loop
file :=get-random-
executable-file;
if(first-line-of-
file=1234567)
then goto
loop
else prepend
V to file; }
subroutine do-damage :=
{ whatever damage is
to be done }
subroutine trigger-pulled : =
{ return true if some
Cntd..
When this program is invoked, control passes
to its virus, which perform the following steps;
For each uninfected file P2 that is found, the
virus first compresses that file to produce P2
which is shorter than the original program by
the size of the virus.
A copy of the virus is prep-ended to the
compressed program.
The compressed version of the original infected
program p1 is uncompressed.
The uncompressed original program is
executed.
Types of Viruses
Parasitic virus : most common form of virus.
Attaches to file and replicates itself.
Memory-resident virus : lodges in memory
Boot sector virus : infects a master boot record
Stealth virus : a virus explicitly designed to
hide itself from detection by antivirus software.
Polymorphic virus : a virus that mutates with
every infection, making detection by the
signature of the virus impossible.
Metamorphic virus : this virus exactly same as
polymorphic virus only difference is it change
their behavior as well as their appearance.
Macro viruses
It is really treating for following reason:
A micro virus is platform independent. Macro
virus infect Microsoft word and and infect all
the hardware and operating system.
Macro virus infect document not exe file.
Macro virus easily spread. A common way by
electronic mail.
E-mail viruses
If the recipient opens the email attachment
, the word macro is activated and then
The e-mail virus sends itself to every one on
the mailing list in the user’s e-mail package.
The virus does local damage.
worms
A worms has same four phase as viruses ,
only the difference is in propagation phase
as below:
Search for other systems to infect by
examining host tables or similar repositories
of remote system addresses.
Establish a connection with a remote system.
Copy itself to the remote system and cause
the copy to be run.
State of worm Technology
Multiplatform
Multi-exploit
Ultrafast spreading
Polymorphic
Metamorphic
Transport vehicles
Zero-day exploit
Virus countermeasure
Best solution is : prevention
Detection:
Identification:
Removal:
Generation of Antivirus
First generation: simple scanners
Second generation: heuristic scanners
Third generation: activity traps
Fourth generation: full-featured protection
Advanced Antivirus
Techniques
Generic Decryption(GD)
CPU emulator:
Virus signature scanner:
Emulation control module:
Digital Immune system
Behavior-Blocking
Software
Attempts to open, view, delete, and/or
modify files;
Attempts to format disk drives and other
unrecoverable disk operations;
Modifications to the logic of executable files
or macros;
Modification of critical system settings, such
as start-up settings;
Scripting of e-mail and instant messaging
clients to send executable content; and
Initiation of network communications.
Distributed Denial of Service
attack
DDOS countermeasure
Attack prevention and preemption
(before the attack):
Attack detection and filtering (during
the attack):
Attack source trace-back and
identification (during and after the
attack):
Key Points - Firewall
A firewall forms a barrier through which the traffic
going in each direction must pass. A firewall
security policy dictates which traffic is authorized
to pass in each direction.
A firewall may be designed to operate as a filter at
the level of IP packets, or may operate at a higher
protocol layer.
A trusted system is a computer and operating
system that can be verified to implement a given
security policy. Typically, the focus of a trusted
system is access control. A policy is implemented
that dictates what objects may be accessed by
what subjects.
Firewall Characteristics
All traffic from inside to outside, and vice versa, must
pass through the firewall.
Only authorized traffic, as defined by the local
security policy, will be allowed to pass.
The firewall itself is immune to penetration. This
implies that use of a trusted system with a secure
operating system.
A firewall defines a single choke point.
A firewall provides a location for monitoring security-
related events.
A firewall is a convenient platform for several
Internet functions that are not security related.
A firewall can serve as the platform for IPSec.
four general techniques that firewalls use
to control access and enforce the site's
security policy.
Service control:
Direction control
User control:
Behavior control:
Limitation of firewall
The firewall cannot protect against attacks
that bypass the firewall.
The firewall does not protect against
internal threats
The firewall cannot protect against the
transfer of virus-infected programs or files.
Types of Firewall
Packet-Filtering Router
Source IP address:
Destination IP address:
Source and destination transport-level
address:
IP protocol field:
Interface:
disadvantage:
Because packet filter firewalls do not examine
upper-layer data.
Because of the limited information available
to the firewall, the logging functionality
present in packet filter firewalls is limited.
Most packet filter firewalls do not support
advanced user authentication schemes.
Finally, due to the small number of variables
used in access control decisions.
Combining SA
Key Management
The key management portion of IPSec involves
the determination and distribution of secret keys.
The IPSec Architecture document mandates
support for two types of key management:
Manual
Automated
The default automated key management
protocol for IPSec is referred to as ISAKMP/Oakley
and consists of the following elements:
Oakley Key Determination Protocol
Internet Security Association and Key
Management Protocol (ISAKMP)
Features of Oakley
It employs a mechanism known as cookies to
thwart clogging attacks.
It enables the two parties to negotiate a group;
this, in essence, specifies the global parameters
of the Diffie-Hellman key exchange.
It uses auntheticate to ensure against
replay attacks.
It enables the exchange of Diffie-Hellman
public key values.
It authenticates the Diffie-Hellman
exchange to thwart man-in-the-middle
attacks.
ISAKMP
The cookie must depend on the specific
parties. This prevents an attacker from
obtaining a cookie using a real IP address
and UDP port.
It must not be possible for anyone other
than the issuing entity to generate cookies
that will be accepted by that entity.
The cookie generation and verification
methods must be fast so, attacker can not
intercept it.
ISAKMP Header Format
Initiator Cookie (64 bits)
Responder Cookie (64 bits)
Next Payload (8 bits)
Major Version (4 bits)
Minor Version (4 bits)
Exchange Type (8 bits)
Flags (8 bits) : Encrypted Flag, Commit
Message ID (32 bits)
Length (32 bits)
Exchange Type (8 bits)
Message ID (32 bits):
Length (32 bits)
Secure socket layer (SSL) provides security services
between TCP and applications that use TCP. The
Internet standard version is called transport layer
service (TLS).
SSL/TLS provides confidentiality using symmetric
encryption and message integrity using a message
authentication code.
SSL/TLS includes protocol mechanisms to enable two
TCP users to determine the security mechanisms
and services they will use.
Secure electronic transaction (SET) is an open
encryption and security specification designed to
protect credit card transactions on the Internet.
Secure Socket Layer
Netscape originated SSL. Version 3 of the
protocol was designed with public review
and input from industry and was published
as an Internet draft document.
SSL Architecture
Two concepts
Connection :
such connections are peer-to-peer relationships.
The connections are transient.
Every connection is associated with one session.
Session :
Sessions are created by the Handshake Protocol.
Sessions define a set of cryptographic security
parameters, which can be shared among multiple
connections.
Sessions are used to avoid the expensive
negotiation of new security parameters for each
connection.
SSL Record Protocol
Confidentiality: The Handshake
Protocol defines a shared secret key
that is used for conventional
encryption of SSL payloads.
Message Integrity: The Handshake
Protocol also defines a shared secret
key that is used to form a message
authentication code (MAC).
SSL Record Header format
Content Type (8 bits)
Major Version (8 bits):the value is 3.
Minor Version (8 bits): the value is 0.
Compressed Length (16 bits):
Change Cipher Spec
Protocol
The Change Cipher Spec Protocol is one of
the three SSL-specific protocols that use
the SSL Record Protocol, and it is the
simplest.
This protocol consists of a single message,
which consists of a single byte with the
value 1.
The sole purpose of this message is to
cause the pending state to be copied into
the current state, which updates the cipher
suite to be used on this connection.
Alert Protocol
The Alert Protocol is used to convey SSL-related
alerts to the peer entity.
alert messages are compressed and encrypted.
unexpected_message:
bad_record_mac:
decompression_failure:
handshake_failure:
illegal_parameter:
close_notify:
no_certificate:
bad_certificate:
unsupported_certificate:
certificate_revoked:
certificate_expired:
certificate_unknown:
Handshake Protocol
The most complex part of SSL is the
Handshake Protocol.
This protocol allows the server and client to
authenticate each other and to negotiate
an encryption and MAC algorithm and
cryptographic keys to be used to protect
data sent in an SSL record.
The Handshake Protocol is used before any
application data is transmitted.
Transport Layer Security
TLS is an IETF standardization initiative whose
goal is to produce an Internet standard version
of SSL.
TLS is defined as a Proposed Internet Standard
in RFC 2246. RFC 2246 is very similar to SSLv3.
Differences
Version Number
For the current version of TLS, the Major Version is 3 and
the Minor Version is 1.
Message Authentication Code
Pseudorandom Function
Alert Codes decryption_failed
record_overflow:
unknown_ca:
access_denied:
Secure Electronic transaction
(SET)
SET is an open encryption and security
specification designed to protect credit card
transactions on the Internet.
The current version, SETv1, emerged from a call
for security standards by MasterCard and Visa in
February 1996.
A wide range of companies were involved in
developing the initial specification, including IBM,
Microsoft, Netscape, RSA, Terisa, and Verisign.
Beginning in 1996, there have been numerous
tests of the concept, and by 1998 the first wave
of SET-compliant products was available.
SET Services
Provides a secure communications channel
among all parties involved in a transaction
Provides trust by the use of X.509v3 digital
certificates
Ensures privacy because the information is
only available to parties in a transaction
when and where necessary
SET Overview
A good way to begin our discussion of SET
is to look at the business requirements for
SET, its key features, and the participants
in SET transactions.
Requirements
Provide confidentiality of payment and ordering
information:
Ensure the integrity of all transmitted data:
Provide authentication that a cardholder is a
legitimate user of a credit card account:
Provide authentication that a merchant can accept
credit card transactions through its relationship with a
financial institution:
Ensure the use of the best security practices and
system design techniques to protect all legitimate
parties in an electronic commerce transaction:
Create a protocol that neither depends on transport
security mechanisms nor prevents their use:
Facilitate and encourage interoperability among
software and network providers:
Key Features of SET
Confidentiality of information:
Integrity of data:
Cardholder account authentication:
Merchant authentication:
SET Participants
Cardholder:
Merchant:
Issuer:
Acquirer:
Payment gateway:
Certification authority (CA):
Acquire Payment
Gateway
Steps :
The customer opens an account.
The customer receives a certificate.
Merchants have their own certificates.
The customer places an order.
The merchant is verified.
The order and payment are sent.
The merchant requests payment
authorization.
The merchant confirms the order.
The merchant provides the goods or service.
The merchant requests payment.
Dual Signature
Payment Processing
Purchase request
Payment authorization
Payment capture