Unit 1
Unit 1
Unit 1
Text Books :
⮚ Network Security Essentials by William
Stallings
▪ Security Mechanisms
● E-commerce, Banking
▪ Network eavesdropping
▪ Malicious Data Modification
▪ Address spoofing (impersonation)
▪ ‘Man in the Middle’ (interception)
▪ Denial of Service attacks
▪ Application layer attacks
HACKERS
Confidentiality
Integrity Availability
Security Services
⮚ We can think information security services as replicating
the types of functions normally associated with physical
documents
⮚ RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
CIA TRAID
Confidentiality
⮚ Confidentiality refers to an organization’s efforts to keep
their data private or secret and mainly involves ensuring
that only those who are authorized have access to
specific assets and that those who are unauthorized are
actively prevented from obtaining access.
Example
⮚ 1. only authorized Payroll employees should have
access to the employee payroll database.
⮚ 2. it’s reasonable for ecommerce customers to expect
that the personal information they provide to an
organization (such as credit card, contact, shipping, or
other personal information) will be protected
Violations
⮚ Confidentiality can be violated intentionally or by
unintentionally.
⮚ Intentionally, by direct attacks, eavesdropping etc
⮚ unintentionally through human error, carelessness, or
inadequate security controls
Countermeasures
⮚ to protect confidentiality include
⮚ Data classification and labeling;
⮚ Strong access controls and authentication mechanisms;
⮚ encryption of data in process, in transit, and in storage;
⮚ adequate education and training for all individuals with
access to data
Integrity
⮚ Integrity refers to the quality of something being whole or
complete.
⮚ Integrity is about ensuring that data has not been
tampered with and, therefore, can be trusted. It is
correct, authentic, and reliable.
Example : Ecommerce customers expects product and
pricing information to be accurate, and that quantity,
pricing, availability
Violations : integrity can be compromised directly via an
attack vector (tampering with intrusion detection
systems, modifying configuration files, or changing
system logs to evade detection) or unintentionally,
through human error, lack of care, coding errors, or
inadequate policies, procedures, and protection
mechanisms.
⮚ Countermeasures that protect data integrity include
encryption, hashing, digital signatures, intrusion
detection systems, auditing, version control, and strong
authentication mechanisms and access controls.
⮚ Note that integrity goes hand in hand with the concept
of non-repudiation: the inability to deny something. By
using digital signatures in email, for example, a sender
cannot deny having sent a message, and the recipient
cannot claim the message received was different from
the one sent. Non-repudiation assists in ensuring
integrity.
Availability
⮚ Availability means that networks, systems, and applications
are up and running. It ensures that authorized users have
timely, reliable access to resources when they are needed.
⮚ Example : Many things can jeopardize availability, including hardware
or software failure, power failure, natural disasters, and human error .
⮚ Violations : Well-known attack that threatens availability is
the denial-of-service, in which the performance of a system,
website, web-based application, or web-based service is
intentionally and maliciously degraded, or the system
becomes completely unreachable.
⮚ Countermeasures to help ensure availability include
redundancy (in servers, networks, applications, and
services), hardware fault tolerance (for servers and storage),
regular software patching and system upgrades, backups,
comprehensive disaster recovery plans, and denial-of-
service protection solutions.
Security Services (X.800)
⮚ Authentication - assurance that the
communicating entity is the one claimed
⮚ Access Control - prevention of the
unauthorized use of a resource
⮚ Data Confidentiality –protection of data from
unauthorized disclosure
⮚ Data Integrity - assurance that data received is
as sent by an authorized entity
⮚ Non-Repudiation - protection against denial by
one of the parties in a communication
Security Mechanism
⮚ feature designed to detect, prevent, or
recover from a security attack
⮚ no single mechanism that will support all
services required
⮚ however one particular element underlies
many of the security mechanisms in use:
● cryptographic techniques
⮚ hence our focus on this topic
Security Mechanisms (X.800)
⮚specific security mechanisms:
● encipherment, digital signatures, access
controls, data integrity, authentication
exchange, traffic padding, routing control,
notarization
⮚pervasive security mechanisms:
● trusted functionality, security labels, event
detection, security audit trails, security
recovery
Types of Security Mechanism
⮚ Network Security is field in computer technology that deals
with ensuring security of computer network infrastructure.
Therefore security mechanism can also be termed as is set
of processes that deal with recovery from security attack.
Various mechanisms are designed to recover from these
specific attacks at various protocol layers.
Types of Security Mechanism are :
1. Encipherment :
This security mechanism deals with hiding and covering of data
which helps data to become confidential. It is achieved by applying
mathematical calculations or algorithms which reconstruct
information into not readable form. It is achieved by two famous
techniques named Cryptography and Encipherment. Level of data
encryption is dependent on the algorithm used for encipherment .
2. Access Control :
This mechanism is used to stop unattended access to data which
you are sending. It can be achieved by various techniques such as
applying passwords, using firewall, or just by adding PIN to data
3. Notarization :
This security mechanism involves use of trusted third party in
communication. It acts as mediator between sender and receiver so
that if any chance of conflict is reduced. This mediator keeps record
of requests made by sender to receiver for later denied.
⮚ 4.Data Integrity :
This security mechanism is used by appending value to data to which is
created by data itself. It is similar to sending packet of information known to
both sending and receiving parties and checked before and after data is
received. When this packet or data which is appended is checked and is
same while sending and receiving data integrity is maintained.
⮚ 5.Authentication exchange :
This security mechanism deals with identity to be known in communication.
This is achieved at the TCP/IP layer where two-way handshaking
mechanism is used to ensure data is sent or not
⮚ 6.Bit stuffing :
This security mechanism is used to add some extra bits into data which is
being transmitted. It helps data to be checked at the receiving end and is
achieved by Even parity or Odd Parity.
⮚ 7.Digital Signature :
This security mechanism is achieved by adding digital data that is not visible
to eyes. It is form of electronic signature which is added by sender which is
checked by receiver electronically. This mechanism is used to preserve data
which is not more confidential but sender’s identity is to be notified.
A Model for Network Security
1) A message is to be transferred from one party to
another across some sort of internet.
⮚The Red Boxes represent long term states that may be occupied for
years. For a specification to be advanced to draft status, some operational
experience is to be obtained.