Mumtaz Ali Rajput mumtaz.ali@superior.edu.pk +92 – 301- 4949 409 INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput mumtaz.ali@superior.edu.pk +92 – 301-

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security Chapter 1
Chapter 1 – Introduction Part 1 1. Defining Security The security of a system, application, or protocol is always relative to – A set of desired properties.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
CIT 380: Securing Computer Systems
By Marwan Al-Namari Author: William Stallings
Data & Network Security
Cryptography and Network Security
Information System and Network Security
Information Security.
Network Security.
CNET334 - Network Security
Cryptography.
Encryption
Information and Network Security
10CS835 Information Security
Cryptography.
Computer Security Security Concepts September 20, 2018
Introduction 9/20/2018 Defining Security The “security” of a system, application, or protocol is always a relative feature that is defined by A set of.
NET 311 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Cryptography : Introduction
Introduction to Cryptography (1)
Cryptography and Network Security Chapter 1
Basic of Modern Cryptography
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Information and Network Security
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Security Mechanisms Network Security.
Key Exchange, Man-in-the-Middle Attack
Security Attacks Network Security.
Cryptography and Network Security Chapter 1
Presentation transcript:

Mumtaz Ali Rajput mumtaz.ali@superior.edu.pk +92 – 301- 4949 409 INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput mumtaz.ali@superior.edu.pk +92 – 301- 4949 409

Information Security Aspects of Security Threat and attack Security Mechanisms Encryption and Decryption Caesar Cipher Information Security (IS)

Information Security (IS) Introduction 11/21/2018 Introduction Information Security (IS)

Information Security (IS) Aspects of Security Security attack Any action that compromises the security of information owned by an organization. Security mechanism A process that is designed to detect, prevent or recover from a security attack. Security service Services that enhances the security of the data processing systems and the information transfers of an organization. These services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. The OSI security architecture focuses on security attacks,mechanisms,and services. Information Security (IS)

Information Security (IS) Threat and attack A threat is a possible potential danger that might exploit a vulnerability. Exploit is a sequence of commands that take advantage of a vulnerability in order to cause damage Vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system An attack is an unlawful attempt on a system security that drives from an intelligent threat. Information Security (IS)

Information Security (IS) Security Attacks Any action that compromises the security of information owned by an organization Information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems have a wide range of attacks Classification according to X.800 Passive attack Active attack A threat is a possible potential danger that might exploit a vulnerability. Is a sequence of commands that take advantage of a vulnerability in order to cause vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Information Security (IS)

Information Security (IS) Passive attack Obtaining message content Traffic analysis Passive attacks attempt to learn or make use of information from the system but does not affect system resources. By eavesdropping on, or monitoring of, transmissions to: + obtain message contents or + monitor traffic flows ( … opponent could determine the frequency and length of messages being exchange this kind of information maybe helpful in determining the nature of communication that was taking place) Are difficult to detect because they do not involve any alteration of the data. Information Security (IS)

Information Security (IS) Active attack Masquerade Replay previous messages Modify messages in transit Denial of service Active attacks attempt to alter system resources or affect their operation. By modification of data stream to: + masquerade of one entity as some other + replay previous messages (as shown above in Stallings Figure 1.4b) + modify messages in transit + denial of service Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical,software,and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them. Information Security (IS)

Information Security (IS) Threats and Attacks Snooping: the interception(Capture) of information intended for someone else during its transmission over a communication channel. Alice Bob Eve Information Security (IS)

Communication channel Threats and Attacks Alteration: unauthorized modification of information. Example: the man-in-the-middle attack, where a network stream is intercepted, modified, and retransmitted. encrypt decrypt ciphertext C shared secret key plaintext M plaintext M′ Communication channel Sender Recipient Attacker (intercepting) ciphertext C′ Information Security (IS)

Information Security (IS) Threats and Attacks Denial-of-service: the interruption or degradation of a data service or information access. Example: email spam, to the degree that it is meant to simply fill up a mail queue and slow down an email server. Alice Information Security (IS)

Information Security (IS) Threats and Attacks Masquerading: the fabrication of information that is purported(suppose) to be from someone who is not actually the author. “From: Alice” (really is from Eve) Information Security (IS)

Information Security (IS) Threats and Attacks Repudiation: the denial of a commitment or data receipt. This involves an attempt to back out of a contract or a protocol that requires the different parties to provide receipts acknowledging that data has been received. Information Security (IS)

Information Security (IS) Threats and Attacks Correlation and traceback: the integration of multiple data sources and information flows to determine the source of a particular data stream or piece of information. Bob Information Security (IS)

Information Security (IS) Security Mechanisms Specific security mechanisms: Encipherment: use of mathematical algorithm to transform data into a form that is not understandable Digital signatures : use of cryptographic transformation on a data unit that allows a recipient of the data unit to prove that source and integrity of data unit Access controls: mechanisms that enforce access rights to resources Data integrity: Information Security (IS)

Information Security (IS) Cont. Authentication exchange mechanism used to ensure the integrity of an entity by mean of information exchange Traffic padding insertion of bits in a data stream to frustrate traffic analysis attempt Routing control enable selection of physically secure route for data transmission Notarization use of trusted third party to ensure certain properties of data exchange Information Security (IS)

Examples of Security Violations A transmit a file (containing sensitive information) to B. C, who is not authorized to read the file, is able monitor the transmission Administrator D sends a message to computer E for updating an authorization file. F intercept the message, alters its content to add or delete entries, and then forwards the message to E. E accept the message and update the authorization file Rather than intercept, F constructs its own message and send it to E Information Security (IS)

Information Security (IS) Cont. An employee X is fired. X is able to intercept the message that is send to invalidate the employee account. X is able to delay the message long enough to access the sensitive information from the server. X then forward the message and the action taken. This delay may go unnoticed A message is send from a customer to a stockbroker. Afterwards, investment loose value and customer denies the sending message. Information Security (IS)

Encryption and Decryption The message M is called the plaintext. Alice will convert plaintext M to an encrypted form using an encryption algorithm E that outputs a ciphertext C for M. encrypt decrypt ciphertext plaintext shared secret key Communication channel Sender Recipient Attacker (eavesdropping)

Encryption and Decryption As equations: C = E(k, M) M = D(k, C) The encryption and decryption algorithms are chosen so that it is infeasible for someone other than Alice and Bob to determine plaintext M from ciphertext C. Thus, ciphertext C can be transmitted over an insecure channel that can be eavesdropped by an adversary. Information Security (IS)

Information Security (IS) Cryptosystem The set of possible plaintexts The set of possible ciphertexts The set of encryption keys The set of decryption keys The correspondence between encryption keys and decryption keys The encryption algorithm to use The decryption algorithm to use Information Security (IS)

Information Security (IS) Caesar Cipher Replace each letter with the one “three over” in the alphabet. Information Security (IS) Public domain image from http://commons.wikimedia.org/wiki/File:Caesar3.svg

Information Security (IS) Caesar Cipher m e t a f r p y h w d i u s b For each plaintext p, substitute the ciphertext letter C as follows C = E(3, p) = (p + 3) mod 26 Generic form of Caesar algorithm is C = E(k, p) = (p + k) mod 26 p = D(k, C) = (C - k) mod 26 k ranges from 1 to 25 Involves replacing each letter of the alphabet with the letter standing three places further Information Security (IS)

Information Security (IS)

Cryptanalysis of Caesar Cipher Why cryptanalysis on Caesar cipher, because En/-decryption algorithm is known Only 25 keys to try Language is known and easily recognizable Mostly algorithm is known but the key set is very large, e.g. triple DES 3.7 x 1050 keys Information Security (IS)

Information Security (IS)