chapter 1
chapter 1
1
Course Objective
• Objective
– Understand the basic concept of cybersecurity
– Understand and analyze the basic concepts of Cryptography
– Understand, apply, and analyze the principles of cryptography
and common applications of Symmetric and Asymmetric
cryptography
– Acquire knowledge on ‘standard’ cryptographic solutions
(algorithms, protocols) used for confidentiality, integrity, non
– repudiation and authenticity and implement cryptographic
standards.
– Understand how to deploy and design Cryptographic
solutions to secure any information system.
2
Learning Outcomes
3
Course Outline
• Chapter – 1 Introduction to Cybersecurity
– What is Security?
– Computer and Network security definitions
– Cyberspace and cybersecurity definitions
– Who are the attackers
– Sources and consequences of risks
– Types of Vulnerabilities
– Security criteria
– Security attack types
– Security services and mechanisms
– Security model (X.800 and X.805)
4
Course Outline…
5
Course Outline…
• Chapter – 4 Asymmetric Cryptography
– Introduction to Public key Cryptography
– RSA Public key cryptography
– Key management and distribution protocol
– Diffie – Hellman Public Key Cryptography
• Chapter – 5 Digital signature, PKI, and Certificate Authority
– Digital Signature
• Message authentication
• Security requirements
• Digital Signature Using Public Key
• Digital Signature Using Message Digest (Hash functions)
– Cryptographic Hash functions
• MD5, SHA, MAC
– Public Key Infrastructure (PKI) and Certificate Authorities (CA)
• Distribution of public keys and PKI
• Direct key exchange protocols
• Authenticating users and their public keys with certificates signed by
6
Certificate Authorities (CA)
Course Outline…
Chapter - 6 Applied Cryptography I
• IPSec
– Network Security services
– Types of attacks
– Network Security/Protocols and vulnerabilities
– Attacks on TCP/IP Networks
– Network Layer security
– IP security (IPSec)
– Transport layer attacks and security solutions
7
Course Outline…
Chapter - 7 Applied Cryptography II
• SSL/TLS
– Secured Socket Layer (SSL)
• Secured Electronic Transaction (SET)
8
Evaluation
• Case study and presentation
• Assignments and Projects
• Quiz and exam
9
Chapter – One
Introduction to Cybersecurity
10
Outline
• What is Security?
• Computer and Network security definitions
• Cyberspace and cybersecurity definitions
• Who are the attackers
• Sources and consequences of risks
• Types of Vulnerabilities
• Security criteria
• Security attack types
• Security services and mechanisms
• Security model (X.800 and X.805)
11
Computer and Network Security
• What is Security?
Security is about:
• Threats (bad things that may happen, e.g. your money
getting stolen)
• Vulnerabilities (weaknesses in your defenses, e.g. your
front door being made of thin wood and glass)
• Attacks (ways in which the threats may be actualized,
• e.g. a thief breaking through your weak front door
while you and the neighbors are on holiday)
12
Computer and Network Security…
13
Computer and Network Security…
• Computer security is about
provisions and policies adopted to
protect information and property from
theft, corruption, or natural disaster
– while allowing the information and
property to remain accessible and
productive to its intended users.
• security of computers against:
– intruders (e.g.,hackers) and
– malicious software (e.g., viruses).
14
Computer and Network Security…
• Network security on the other hand deals with
provisions and policies adopted to prevent and monitor:
– unauthorized access, misuse, modification, or denial of the
computer network and network-accessible resources.
Not Sufficient!!
Internet 15
Cyberspace and Cybersecurity
Definition
• Cyberspace is composed of
hundreds of thousands of
interconnected computers,
servers, routers, switches,
communication link, and
information,
• that allow our critical
infrastructure to work.
Cybersecurity and Cyberspace: Definition…
• Cybersecurity is meant to describe the collection of:
– tools, policies, guidelines, procedures,
– risk management approaches,
– actions, trainings, best practices,
– assurance and technologies
• that can be used to protect the availability, integrity and confidentiality
of assets in the connected infrastructures belong to government,
private organizations and citizens.
• these assets include:
– connected computing devices, personnel, infrastructure, applications,
services, telecommunications systems, and data in the cyber-
environment.
Why Cyberecurity is needed?
19
Who is a Hacker? Types of Hackers
22
Types of Hackers: Motivations and initiatives
26
Consequences…
• Failure/End of service
• Reduction of QoS, down to Denial of Service (DDoS)
• Internal problems in the enterprise
• Trust decrease from partners (client, providers, share-
holders)
• Technology leakage
• Human consequences (personal data, sensitive data -
medical, insurances, …)
27
Cyberattack eg SCADA
• Categories of cyber-crime:
– The computer as a target: using a computer
to attack other computers.
– The computer as a weapon: using a
computer to commit real world crimes.
29
Cyber-Weapons
• Example
– Israeli attack on the Syrian air defense
system in 2007.
• they shutdown Syrian air defense
system using a cyber-attack.
– USA Sony company attacked by
(Guardians of Peace).
– Irans Stuxnet on nuclear power plant
– Egypt on Ethiopian CIs (GERD dam)
(Cyber_Horus Group) 31
Cyber-Terrorism
• Ransomware
33
Motivations of Cyber-Terrorists
• Cyber terrorist prefer using the cyber-
attack methods because of many advantages
for it.
– It is cheaper than traditional methods.
– The action is very difficult to be tracked.
– There are no physical barriers or check points
to cross.
– They can hide their personalities and location.
– They can use this method to attack a big
number of targets.
– They can do it remotely from anywhere in the
world.
– They can affect a large number of people.
34
Cyberattack surface
Cyber Crime
theft of
Technology
intellectual
leakage
property
theft of
DoS and
DDoS
financial
data
• Loss of • lost
Reputation, productivity
brand
36
Cybersecurity Spending
38
Cybersecurity Challenges…
39
Security Requirements
Properties of Security?
• Security is expressed in terms of:
Confidentiality (Privacy)
Integrity
No repudiation
Availability (Denial of Service)
40
Security Requirements (in detail)
Availability
• It requires that computer and network assets are only
available to authorized parties.
• computer and network should provide all the designated services
in the presence of all kinds of security attack.
41
Security Requirements ...
Integrity
• It requires that messages should be modified or altered only by
authorized parties.
– Modification includes writing, changing, deleting, and creating the
message that is supposed to be transmitted across the network.
42
Security Requirements ...
Confidentiality
• It requires that the message can only be accessible for reading by authorized
parties.
• It also requires that the system should verify the identity of a user.
Authentication
• It means that correct identity is known to communicating parties.
• This property ensures that the parties are genuine not impersonator.
Authorization
• This property gives access rights to different types of users.
– For example a network management can be performed by network
administrator only.
43
Computer and Network Security
Attacks
• Categories of Attacks
44
Computer and Network Security Attacks…
• Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication 45
Security attack types
• The attacks can also be classified by the following criteria.
– Passive or active,
– Internal or external,
– At different protocol layers.
Passive vs. active attacks
• A passive attack attempt to learn or make use of the information
without changing the content of the message and disrupting the
operation of the communication.
• Examples of passive attacks are:
-- Eavesdropping , traffic analysis, and traffic monitoring.
46
Security attack types…
47
Passive Attacks
• Passive attacks do not affect system resources
– Eavesdropping, monitoring
– The goal of the opponent is to obtain information that is being
transmitted
• Two types of passive attacks
– Release of message contents
– Traffic analysis
• Passive attacks are very difficult to detect
– Message transmission apparently normal
• No alteration of the data
– Emphasis on prevention rather than detection
• By means of encryption 48
Passive Attacks (1)
Release of Message Contents
49
Passive Attacks (2)
Traffic Analysis
50
Active Attacks
• Active attacks try to alter system resources or affect
their operation
– Modification of data, or creation of false data
• Four categories
– Masquerade of one entity as some other
– Replay previous message
– Modification of messages
– Denial of service (DoS): preventing normal use
• A specific target or entire network
• Difficult to prevent
– The goal is to detect and recover
51
Active Attacks (1)
Masquerade
52
Active Attacks (2)
Replay
53
Active Attacks (3)
Modification of Messages
54
Active Attacks (4)
Denial of Service
55
Security attack types…
56
Security attack types…
• Attacks on different layers of the TCP/IP model:
• The security attacks can also be classified as according to the
TCP/IP layers. Table shows the attack types at each layer.
Layer Attacks
Application layer E-mail bombing, Repudiation, data
corruption, malicious code attack
(Trojan, maleware,virus,...)
Transport layer Session hijacking, Altering checksum,
SYN flooding.
Network layer IP spoofing, ICMP echo,Worm hole, black
hole, gray hole, Byzantine, flooding
Data link layer Traffic analysis, disruption (E.g MAC
IEEE 802.11 Wi-Fi)
Physical layer Jamming, interception, eavesdropping
Cross-layer attack DoS, impersonation, replay, man-in-the-
57
middle attack
Common security attacks and their
countermeasures
• Finding a way into the network
– Firewalls
• Exploiting software bugs, buffer overflows
– Intrusion Detection Systems
• Denial of Service
– access filtering, IDS
• TCP hijacking
– IPSec
• Packet sniffing
– Encryption (SSL, HTTPS)
• Social problems
58
– Education
Model for Network Security
59
Model for Network Security…
• In considering the place of encryption, its useful to use the
above model.
• Information being transferred from one party to another over an
insecure communications channel,
– in the presence of possible opponents.
• The two parties, who are the principals in this transaction, must
cooperate for the exchange to take place.
• They can use:
– an appropriate security transform (encryption algorithm),
– with suitable keys (secret information),
– possibly negotiated using the presence of a trusted third
party.
60
Model for Network Security…
61
Eight Security Dimensions Address the
Breadth of Network Vulnerabilities
•Limit & control access to
network elements, services Access Control
•Provide Proof of Identity
& applications
•Examples: shared secret
•Examples: password, ACL, Authentication key, PKI, digital signature,
firewall
digital certificate
•Prevent ability to deny that
Non-repudiation
an activity on the network •Ensure confidentiality of
occurred data
•Examples: system logs, Data Confidentiality •Example: encryption
digital signatures
•Ensure data is received as
•Ensure information only Communication Security sent or retrieved as stored
flows from source to •Examples: MD5, digital
destination signature, anti-virus
•Examples: VPN, MPLS, Data Integrity
software
L2TP, IPsec, SSL, SSH,…
Availability
•Ensure network elements, •Ensure identification and
services and application network use is kept private
available to legitimate Privacy •Examples: NAT, encryption
users
•Examples: IDS/IPS,
62
network redundancy,
BC/DR
Cybersecurity Challenges
Summary
63
Key Cybersecurity Challenges
Lack of info.
Lack of national Lack of national
security
or regional legal cybersecurity
professionals and
frameworks framework
skills
Lack of international
lack of basic
cooperation
awareness among
between industry
users
experts, academia
From To
• Scope: Technical problem Business problem
• Ownership: IT Business
• Costs: Expense Investment
• Execution: Intermittent Integrated, continuous
• Approach: Practice-based Process-based
• Objective: IT security Business continuity
65
Solutions and recommendations
66
Thank you!
67