Lec 1
Lec 1
CRYPTOGRAPHY IN FINTECH
Chapter 1:
Information and Network Security Concepts
Course Information
▪ Aims
This module addresses the problem of securing computer systems. Different levels of computer threats and different
authentication methods are studied. Ciphering and cryptographic techniques are studied to create secure algorithms.
In addition, web security is introduced for the student to be aware of the different security techniques used at present.
Course Information
Learning outcomes
▪ Knowledge: On completion of this module, the successful student will be able to:
▪ Illustrate the concepts of Hash Function, Message Digest and Message Authentication Code.
▪ Discriminate between different authentication methods used for access control in computer systems.
▪ Propose, apply and evaluate security, privacy and integrity policies for a system.
▪ Although the use of the CIA triad to define security objectives is well established,
some in the security field feel that additional concepts are needed to present a
complete picture. Two of the most commonly mentioned are:
▪ Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator.
▪ Accountability: The security goal that generates the requirement for actions of an
entity to be traced uniquely to that entity.
LEVELS OF IMPACT
▪ Can define 3 levels of impact from a security breach*
▪ Low: The loss could be expected to have a limited adverse effect
on organizational operations, organizational assets, or individuals.
▪ (i) cause a degradation in mission capability to an extent and duration that
the organization is able to perform its primary functions, but the effectiveness
of the functions is noticeably reduced;
▪ (ii) result in minor damage to organizational assets;
▪ (iii) result in minor financial loss; or
▪ (iv) result in minor harm to individuals.
LEVELS OF IMPACT
▪ Moderate: The loss could be expected to have a serious adverse
effect on organizational operations, organizational assets, or
individuals
▪ (i) cause a significant degradation in mission capability to an extent and
duration that the organization is able to perform its primary functions, but the
effectiveness of the functions is significantly reduced;
▪ (ii) result in significant damage to organizational assets;
▪ (iii) result in significant financial loss; or
▪ (iv) result in significant harm to individuals that does not involve loss of life or
serious, life-threatening injuries.
LEVELS OF IMPACT
▪ High: The loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational assets,
or individuals.
▪ (i) cause a severe degradation in or loss of mission capability to an extent and
duration that the organization is not able to perform one or more of its primary
functions;
▪ (ii) result in major damage to organizational assets;
▪ (iii) result in major financial loss; or
▪ (iv) result in severe or catastrophic harm to individuals involving loss of life or
serious life threatening injuries.
OUR AIM
▪ our focus is on Internet Security
▪ which consists of measures to deter, prevent, detect, and correct security violations
that involve the transmission & storage of information
COMPUTER SECURITY CHALLENGES
1. not simple
2. must consider potential attacks
3. involve algorithms and secret info
4. must decide where to deploy mechanisms
5. battle of intelligence between attacker / admin
6. not perceived on benefit until fails
7. requires regular monitoring
8. too often an after-thought
OSI SECURITY ARCHITECTURE
▪ ITU-T X.800 “Security Architecture for OSI”
▪ defines a systematic way of defining and providing security requirements
▪ for us it provides a useful overview of concepts we will study
ASPECTS OF SECURITY
▪ consider 3 aspects of information security:
▪ security attack
▪ security mechanism
▪ security service
SECURITY ATTACK
▪ any action that compromises the security of information owned
by an organization
▪ information security is about how to prevent attacks, or failing
that, to detect attacks on information-based systems
▪ often threat & attack used to mean same thing
▪ have a wide range of attacks
▪ can focus of generic types of attacks
▪ passive
▪ active
PASSIVE ATTACKS
PASSIVE ATTACKS
▪ Have “passive attacks” which attempt to learn or make
use of information from the system but does not affect
system resources.
▪ By eavesdropping on, or monitoring of, transmissions to:
▪ obtain (message contents + monitor traffic flows)
▪ RFC 2828:
“a processing or communication service provided by a system to give a specific kind of protection
to system resources”
SECURITY SERVICES (X.800)
▪ Authentication - assurance that the communicating entity is the
one claimed
▪ Peer entity authentication
▪ Data origin authentication:
▪ X.800 standard
▪ security attacks, services, mechanisms
▪ models for network (access) security