CRYPTOGRAPHY NOTES
CRYPTOGRAPHY NOTES
CUE
NOTES
What is security?
Definition of Security : The quality or state of being secure—free from danger. A secure system
What are the critical has multiple layers of protection, including physical, personal, operational, communications,
infrastructure areas network, and information security.
that require security? Critical Infrastructure Areas : Telecommunications, electrical power systems, gas/oil,
banking/finance, transportation, water supply, government services, and emergency services.
What does the CIA
CIA Triad
Triad represent?
o Confidentiality : Ensures that only authorized parties can access systems or data.
Why is balancing Measures include information classification, secure document storage, and user education.
confidentiality, o Integrity : Ensures that data is accurate, complete, and uncorrupted. Threats include
corruption during compilation, storage, or transmission.
integrity, and
o Availability : Ensures that authorized users can access data when needed. It implies
availability important?
protection against interference or obstruction.
What is privacy in the Balancing CIA : Disconnecting a computer from the Internet increases confidentiality but reduces
context of computing? availability and integrity due to lost updates. Extensive data checks enhance integrity but reduce
confidentiality and availability. The CIA Triad forms the foundation of information security. Modern
systems expand these principles into additional characteristics like accuracy, authenticity, utility,
How does legislation and possession.
like PIPEDA protect
privacy? Definition of Privacy : Informational self-determination, the ability to control information about
oneself. This includes deciding who sees it, who uses it, what they use it for, and whom they share it
with.
Who are the
adversaries in PIPEDA (Canada) : Legislation requiring organizations to follow ten Fair Information Principles,
cybersecurity? including accountability, purpose identification, consent, limitation of collection, and safeguarding
data.
What are the main Adversaries : Amateurs ("script kiddies"),Crackers, Organized crime, Terrorists
types of threats? Threats : Interruption (Denial of Service), Interception (Unauthorized Access), Modification
(Tampering), Fabrication (Counterfeiting)
What are assets,
Adversaries exploit vulnerabilities in systems to cause harm. For instance, hackers may launch DDoS
vulnerabilities, threats, attacks to disrupt services or steal sensitive data.
attacks, and controls?
Example: A phishing attack targets individuals to intercept login credentials, compromising both
confidentiality and integrity.
What are the methods
of defense against Terminology and concepts Assets : Things we protect, such as hardware, software, and data.
threats? Vulnerabilities : Weaknesses in a system that can be exploited. Threats : Potential causes of
incidents that may harm a system. Attacks : Actions exploiting vulnerabilities to execute threats.
Controls : Measures to remove or reduce vulnerabilities.
What are the key
principles of computer A vulnerability in a file server that does not authenticate users could lead to an attack where
security? unauthorized users access or modify files.
Controls might include implementing strong authentication mechanisms or encrypting sensitive
data.
Methods of Defense :
o Prevent: Block the attack.
o Deter: Make the attack harder or more expensive.
o Deflect: Make the system less attractive to attackers.
o Detect: Identify ongoing or past attacks.
o Recover: Mitigate the effects of an attack.
Defense in Depth : Combining multiple defense strategies to enhance overall security.
Example: To protect against laptop theft, one could use deterrents (locks), detection (alarms), and
recovery (insurance).
Principles of computer security
o Principle of Easiest Penetration : Attackers target the weakest link in a system
o Principle of Adequate Protection : Security measures should match the value of the
assets being protected.
o Principle of Effectiveness : Controls must be efficient, easy to use, and appropriate.
o Principle of Weakest Link : A failure in any part of the security system can compromise
the entire system.
LECTURE 2
CUE
NOTES
What is a threat?
Terms
What is vulnerability? Threat : A potential cause of an incident that may result in harm to a system or organization.
What is risk? Vulnerability : A weakness of an asset or group of assets that can be exploited by one or more threats.
Who are threat agents? Risk : The potential for loss, damage, or destruction of an asset as a result of a threat exploiting a
vulnerability.
What are the main
types of damage Threat Agent : Entities that knowingly seek to manifest a threat.
caused by threats? Example: In a system with weak passwords:
Vulnerability : Passwords are vulnerable to dictionary attacks.
What are the Threat : An intruder exploits this weakness to break into the system.
components of a
Risk : Resources within the system are prone to illegal access, modification, or damage.
threat?
Damages
o Interruption : Destruction or unavailability of services/resources.
What are the types of o Interception : Unauthorized parties gaining access to resources.
threat agents? o Modification : Unauthorized parties altering resources.
o Fabrication : Unauthorized parties inserting fake assets/resources.
Example: A denial-of-service (DoS) attack interrupts service availability, while a virus might modify files,
What are the types of
and phishing could lead to unauthorized interception of credentials.
vulnerabilities?
Components of a threat
o Threat Agents : Criminals, terrorists, disgruntled employees, hackers, etc.
How do vulnerabilities o Capability : Software, technology, education, methods, etc., available to threat agents.
manifest themselves? o Threat Inhibitors : Factors discouraging threats, such as fear of capture or technical difficulty.
o Threat Amplifiers : Factors encouraging threats, such as peer pressure or access to information.
o Threat Catalysts : Events or circumstances triggering threats.
o Threat Motivators : Reasons driving threat agents, such as personal gain, power, or curiosity.
Example: A hacker motivated by fame might use advanced tools (capability) but be deterred by strict legal
consequences (inhibitor).
Threat Agents
o Natural : Fire, floods, power failure, earthquakes, etc.
o Unintentional : Insider or outsider actions without malicious intent.
o Intentional : Hostile insiders or outsiders, such as foreign agents, industrial spies, terrorists,
organized crime, hackers, and political dissidents.
Example: A natural disaster like a flood could destroy hardware, while a disgruntled employee might
intentionally leak sensitive data.
Vulnerabilities
o Physical Vulnerabilities : Weaknesses in physical security, such as unlocked doors or
unprotected devices.
o Natural Vulnerabilities : Susceptibility to environmental factors like heat or humidity.
o Hardware/Software Vulnerabilities : Bugs, misconfigurations, or outdated systems.
o Media Vulnerabilities : Stolen or damaged storage media.
o Emanation Vulnerabilities : Radiation emissions revealing sensitive information.
o Communication Vulnerabilities : Weaknesses in network communications.
o Human Vulnerabilities : Errors, lack of awareness, or social engineering.
Example: An employee writing down passwords exposes the system to human vulnerability, while outdated
software creates a software vulnerability.
Manifestation of Vulnerabilities
o External Misuse : Visual spying, misrepresenting, or physical scavenging.
o Hardware Misuse : Logical scavenging, eavesdropping, interference, or physical attacks.
o Masquerading : Impersonation, piggybacking, spoofing, or network weaving.
o Pest Programs : Trojan horses, logic bombs, worms, or viruses.
o Bypasses : Trapdoor attacks or password cracking.
o Active Misuse : Basic active attacks, incremental attacks, or denial of service.
o Passive Misuse : Browsing, interference, aggregation, or covert channels.
Example: A Trojan horse (pest program) might masquerade as legitimate software, allowing attackers to
bypass security measures.
What are some
Vulnerabilities
examples of
vulnerabilities? o Through Employees : Social interaction, discussing work in public, taking data out of the office,
installing unauthorized software, or disabling security tools.
o Through Former Employees : Retaining company data or discussing company matters.
o Through Technology : Social networking, file sharing, legacy systems, or storing data on mobile
What are the main
devices.
threats to information o Through Hardware : Susceptibility to dust, heat, or humidity; hardware design flaws; or
security? outdated hardware.
o Through Software : Insufficient testing, bugs, unchecked user input, or software complexity.
o Through Network : Unprotected communications, insecure architecture, or unnecessary scripts
What are common types executing.
of attacks? o Through IT Management : Missed patches, configuration errors, or inadequate change
management.
o Through Partners/Suppliers : Disruption of services, lost mail, or sharing confidential data.
Example: An employee opening a phishing email introduces malware into the system, creating a
vulnerability.
Threats to Information Security
o Acts of Human Error or Failure : Caused by inexperience, improper training, or incorrect
assumptions.
o Deviations in Quality of Service : Internet, communication, or power irregularities affecting
system availability.
o Espionage/Trespass : Unauthorized access to confidential information.
o Information Extortion : Stealing information and demanding compensation for its return.
o Sabotage or Vandalism : Deliberate acts to damage or deface systems.
o Deliberate Acts of Theft : Taking physical, electronic, or intellectual property.
o Deliberate Software Attacks : Malware like viruses, worms, or Trojan horses.
o Compromises to Intellectual Property : Software piracy or copyright infringement.
o Forces of Nature : Natural disasters disrupting systems.
o Technical Hardware Failures : Flaws in equipment causing unreliable service.
o Technical Software Failures : Bugs or purposeful shortcuts in software.
o Technological Obsolescence : Outdated infrastructure leading to unreliable systems.
Example: A DDoS attack (deliberate software attack) overwhelms a server, causing service interruption.
Attack Descriptions
o IP Scan and Attack : Scanning IP addresses for vulnerabilities and targeting them.
o Web Browsing : Infecting Web pages to spread malware.
o Virus : Infecting executable files to propagate.
o Unprotected Shares : Copying viral components via file shares.
o Mass Mail : Sending infected emails to addresses in contact lists.
o SNMP Vulnerabilities : Exploiting Simple Network Management Protocol weaknesses.
o Hoaxes : Attaching real viruses to fake warnings.
o Back Doors : Using unauthorized access mechanisms.
o Password Crack : Reverse-calculating passwords.
o Brute Force : Trying all possible password combinations.
o Dictionary Attack : Using a list of common passwords.
o Denial-of-Service (DoS) : Overloading a system with requests.
o Distributed Denial-of-Service (DDoS) : Coordinated DoS from multiple locations.
o Spoofing : Falsifying IP addresses to gain access.
o Man-in-the-Middle : Intercepting and modifying network traffic.
o Spam : Sending unsolicited emails, potentially carrying malware.
o Mail-Bombing : Flooding a target with excessive emails.
o Sniffers : Monitoring network traffic to steal information.
o Social Engineering : Manipulating individuals to reveal sensitive information.
o Buffer Overflow : Exploiting memory allocation errors to execute malicious code.
o Ping of Death : Sending oversized ICMP packets to crash systems.
o Additional Content :
Example: A DDoS attack targets a website, overwhelming it with traffic and rendering it inaccessible.
LECTURE 3
CUE
NOTES
What is an intrusion?
Introduction to IDPS
What is intrusion
prevention? o Intrusion : Occurs when an attacker attempts to gain entry into or disrupt the normal
operations of an information system.
What is intrusion o Intrusion Prevention : Activities that deter intrusions from occurring.
detection? o Intrusion Detection : Procedures and systems created to detect system intrusions.
o Intrusion Reaction : Actions taken when an intrusion event is detected.
o Intrusion Correction : Restoring operations to a normal state after an intrusion.
What are the types of
IDPS? Intrusion detection and prevention systems (IDPS) play a critical role in modern cybersecurity by
identifying, mitigating, and responding to threats. Example: A network-based IDPS detects unusual traffic
What are the advantages patterns indicative of a potential attack and alerts administrators.
and disadvantages of
NIDPS and HIDPS? Types of IDPS
Network-Based IDPS (NIDPS) :
Focuses on protecting network information assets.
Installed at specific points in the network to monitor traffic.
What are the detection Looks for attack patterns using signature matching.
methods used by IDPS?
How do signature-based
and anomaly-based Advantages: Disadvantages:
methods differ? Can cover large networks with few Overwhelmed by high traffic
devices. volumes.
Passive deployment minimizes disruption. Cannot analyze encrypted packets.
Harder for attackers to detect. May miss certain types of attacks,
such as fragmented packets.
Advantages: Disadvantages:
Detects attacks that may elude NIDPS. More management overhead.
Not affected by switched network Vulnerable to direct attacks.
protocols. High resource consumption
Analyzes audit logs for inconsistencies.
Application-Based IDPS :
Hybrid approaches combine multiple detection methods to improve accuracy and reduce false positives.
Example: A signature-based IDPS might detect a known virus, while an anomaly-based system could
identify a novel attack pattern.
IDPS Response Behavior
Legal implications of honeypots and padded cells must be carefully considered to avoid entrapment issues.
What are scanning and Example: A padded cell system might simulate a vulnerable server to capture attacker actions without
analysis tools? risking real data.
Scanning and Analysis Tools
What is biometric access o Scanning Tools :
control?
o Used to identify vulnerabilities in systems and networks.
o Include port scanners, OS detection tools, and wireless security tools.
o Vulnerability Scanners :
o Active scanners initiate traffic to find holes in systems.
o Passive scanners listen to network traffic to detect vulnerabilities.
o Packet Sniffers :
o Collect copies of packets for analysis.
o Useful for diagnosing network issues but can also be misused for eavesdropping.
Firewall analysis tools help administrators discover and configure firewall rules effectively.
Example: A vulnerability scanner might reveal outdated software versions, prompting updates to close
security gaps.
Biometric Access Control
Biometric Access Control :
o Uses measurable human characteristics to authenticate users.
o Includes fingerprint, palm print, hand geometry, facial recognition, retinal scans, and
iris patterns.
Acceptability :
o Balances user acceptance with security effectiveness.
o Highly reliable systems may be perceived as intrusive, leading to resistance from
users.
Biometrics provide strong authentication but must be implemented carefully to ensure privacy and
usability.
Example: A fingerprint scanner ensures only authorized personnel can access sensitive areas.
LECTURE 4
CUE
NOTES
Why is program security
important? Program Security
What are the types of Importance of Program Security : Programs constitute a significant part of computing systems,
program flaws? including operating systems, device drivers, network infrastructure, databases, and applications.
Key Questions :
CUE
NOTES
Why is security not solely Security Beyond Technology : While technology plays a critical role in security, administrative and
a technical issue? physical controls are equally important.
What are the types of A well-documented security plan reflects input from various stakeholders, such as information owners,
physical security system operators, and security managers. Example: A hospital's security plan might prioritize protecting
measures? patient data while ensuring uninterrupted access for authorized medical staff.
How do they protect Risk Analysis
against natural disasters
and theft? Definition : Risk analysis involves identifying assets, assessing vulnerabilities, estimating likelihoods, and
computing expected losses. Risk Exposure Formula :
i. Steps : Identify assets.
ii. Determine vulnerabilities. Risk = Threat × Vulnerability
iii. Estimate likelihood of exploitation.
Risk Exposure = Risk Impact × Risk
iv. Compute expected annual loss.
Probability
v. Survey applicable controls and their costs.
vi. Project annual savings of control.
Risk analysis helps organizations decide whether to accept, mitigate, transfer, or avoid risks. Example: A
company might calculate the risk exposure of a server outage by multiplying the financial impact of
downtime by its probability of occurrence.
Organizational Security Policies
A security policy is a high-level management document that informs users of the goals and constraints on
system usage.
Functions : Recognize sensitive information assets. Clarify security responsibilities. Promote awareness
among existing employees. Guide new employees.
Audience : Users: Those interacting with the system. Owners: Individuals responsible for maintaining the
system. Beneficiaries: Stakeholders benefiting from secure operations.
Physical Security
Protection Against Natural Disasters : Earthquakes, hurricanes, floods, fires, storms, etc. Measures
include structural reinforcement, flood barriers, fire suppression systems, and backup power supplies.
Environmental Protection : Electrical issues: Blackouts, spikes, surges, sags, faults. Air conditioning and
humidity controls. Electromagnetic interference (EMI) protection.
Theft Prevention : Internal and external threats. Measures include locks, guards, surveillance cameras,
and secure storage.
What is a business
continuity plan (BCP)? Business Continuity and Disaster Recovery