SlideShare una empresa de Scribd logo
1 de 39
Lec-2: Cryptography &Network
Security
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
Bakhtar University 1
Outlines to be discussed…. Today
• Case studies
• Security Needs and Objectives
• Exploiters
• Why Security is difficult to achieve ?
• How Security become an issue?
• Threat Modeling
• Risk assessment
• How to get Secure?
• 3 Aspects of Security
• Points to remember
Bakhtar University 2
Case Study---1
• Read the following incident and try to find which security breach/breaches occurred, and
what can go wrong.
• "The U.S The Department of Energy (DOE) has confirmed a recent cyber incident that
occurred at the end of July 2013 and resulted in the unauthorized disclosure of federal
employee Personally Identifiable Information (PII). It is believed about 14,000 past and
current DOE employees PII may have been affected,
• The incident included the compromise of 14 servers and 20 workstations. The data that
was exposed includes names, date of births, blood types, Social Security Numbers, other
government-issued identification numbers, and contact information.
• At the time, officials blamed Chinese hackers, but two weeks later a group calling itself
Parastoo (a common girls name in Farsi) claimed they were behind the breach, posting
data that was hacked from a DOE webserver.
• [http://www.csoonline.com/article/738230/u.s.-dept.-of-energy-reports-second-
security-breach]
Bakhtar University 3
Case Study --- 2
• Read the following incident and try to find which security breach/breaches
occurred, and what can go wrong.
• "In early February, a hotel franchise management company that manages
168 hotels in 21 states suffered a data breach that exposed hundreds of
guests’ debit and credit cards information in 2013.
• White Lodging Services Corporation maintains hotel franchises for some of
the top names in lodging such as Hilton, Marriott, Westin and Sheraton.
Sources reported that the data breach centered mainly around the gift
shops and restaurants within these hotels managed by White Lodging, not
necessarily the front desk computers where guests pay for their rooms”.
• [http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-
breaches-of-2014/]
Bakhtar University 4
Finding about the case studies
• Hundreds of security breaches occurring around us
• All
• Companies
• Organizations
• Individuals needs
• Security Must be deployed at multiple levels
To be
vigilant
Bakhtar University 5
Security Needs and Objectives
• Authentication (who is the person, server, software etc.)
• Authorization (what is that person allowed to do)
• Privacy (controlling one’s personal information)
• Anonymity (remaining unidentified to others)
• Non-repudiation (user can’t deny having taken an action)
• Audit (having traces of actions in separate systems/places)
Bakhtar University 6
Safety VS Security
• Safety: is about protecting from
• accidental risks,
• road safety,
• air travel safety
• Security: is about mitigating risks of
• dangers,
• caused by intentional,
• malicious actions,
• homeland security,
• airport and aircraft security,
• information and computer security,
• Easier to protect against accidental than malicious misuse
Bakhtar University 7
One of the most time consuming thing is to have an enemy
(E.B. White)
Bakhtar University 8
Exploiters
• Hacker
• Cracker
• Intruder
• Attacker
The Intention is
destruction
The intention is not
destruction
-Not Ordinary people
-Evil-genius
-Expert level
programmers
-Know working and
functionality of the
system
-Don’t create risks or
vulnerability, just
exploiting it
Bakhtar University 9
Threat
• Threat
• A possible danger that may exploit a vulnerability
• Vulnerability
• A weakness in the system which allows an attacker to reduce it usage.
• Attack
• Any action that compromises the security of information owned by an organization.
• An intelligent act
• Deliberate attempt (especially in the sense of a method or technique) to evade
security services and violate the security policy of a system.
• When something really happen and the computer system has been compromised
Bakhtar University 10
Why Security is difficult to achieve?
Bakhtar University 11
Why security is difficult to achieve?
• Attacker chooses
• Time
• Place
• Method
• Possible attacks
• Currently known attacks
• Yet to be discovered attacks
• Software /system security is difficult to measure
• Client’s don’t demand security
• Client’s can’t sue a vendor
• Physical access
Bakhtar University 12
How Security Became an Issue
• People and businesses depend greatly on computer technology and
automation in many different aspects of their lives.
• Examples:
• public utilities,
• military defense systems,
• financial institutions,
• medical equipment,
Bakhtar University 13
How Security Became an Issue
• With the increasing exposure to computing and processing, the
individuals who used computers learned more about using the
technology and getting the most out of it.
• However, the good things in life often have a darker side. Taking
technology down from the pedestal of the mainframe and putting it
into so many individuals’ hands led to a lot of issues that never had to
be dealt with in the mainframe days.
Bakhtar University 14
How Security became an Issue
• Now there were thousands of people not versed and experienced in
computing who had much more access to important data and
processes.
• Barriers and protection mechanisms were not in place to protect
employees and systems from mistakes, so important data got
corrupted accidentally, and individual mistakes affected many other
systems instead of just one.
Bakhtar University 15
Threat Modeling
• A procedure for optimizing network security by identifying
• objectives and vulnerabilities, and then defining countermeasures to prevent,
or mitigate the effects of, threats to the system.
• What threats will the system face?
• What could go wrong?
• How could the system be attacked and by whom?
Bakhtar University 16
Risk Assessment
• How much to worry about them?
• Calculate or estimate potential loss and its likelihood
• Risk management
• Reduce both probability and consequences of a security breach
Bakhtar University 17
Threat Modeling and Risk Assessment
• Secure against what and from Whom?
• who will be using the application?
• what does the user (and the admin) care about?
• where will the application run? (on a local system as Administrator/root? An
intranet application?
• As a web service available to the public? On a mobile phone?) what are you
trying to protect and against whom?
Bakhtar University 18
What steps to take for Threat Modeling
and Risk Assessment?
Bakhtar University 19
Steps to Take
• Evaluate
• Threat
• Risks
• Consequences
• Address the threats and Mitigate the risks
100% security
is not possible
Bakhtar University 20
Assignment#01
Write a Risk Assessment and Analysis Report on your
organization.
Bakhtar University 21
Trade-off
• More Security = Higher Cost, Less convenience in functionality and
productivity
• Security measures should be as invisible as possible
• This means that it should not irritate users or slow down the software (too
much).
• Example: Forcing a password change everyday.
• Users will find a workaround, or just stop using it.
• Note:
• It is better to choose security level relevant to your needs
Bakhtar University 22
Testing Security
• Called Penetration Testing
• Proactive and authorized attempt to evaluate the security of an IT
infrastructure
• By safely attempting to exploit system vulnerabilities including
• OS
• Service
• Application flaws
• Improper configurations
• Risky end user’s behaviour
Bakhtar University 23
How to get Secure?
• Three Aspects of Security
• Security Attack (any action that compromise the security)
• Security Mechanism (a mechanism that is designed to detect, prevent, or
recover from a security attack)
• Security Service (a service that enhances the security of data processing
systems, and information transfers. A security service makes use of one or
more security mechanism)
• Know your Enemy
• Types of attacks
• Typical tricks
• Commonly exploited vulnerabilities
Bakhtar University 24
Security Attacks
• Passive attacks: This is an attack on the network in the nature of
eavesdropping or monitoring of transmission of data
– Aims to learn or make use of information from the system but does not affect
system resources.
– Difficult to detect, measures are available to prevent their success.
• Active attacks: This involves modification of the data in transmission
or the creation of a false stream.
– Attempts to alter system resources or a affect their operation
– Difficult to prevent, measures available to detect and recover from
destruction
9/24/2017 Bakhtar University 25
• Active and passive security threats
Security Threats
9/24/2017 Bakhtar University 26
Passive threats
Release of
message content
Traffic
analysis
Active threats
Masquerade
Replay
Modification of
Message content DoS
 Active and passive security threats
Passive attacks
• Release of message content:
• Content of a message are read.
• A message may be carrying sensitive or confidential data.
• For example: A telephone conversation, email messages, or confidential
information
9/24/2017 Bakhtar University 27
Passive attacks
• Traffic analysis:
• An intruder makes inferences by observing message patterns
• Can be done even if messages are encrypted
• Inferences: Location and identity of hosts
9/24/2017 Bakhtar University 28
Active Attacks
• Masquerade: An entity pretends to be some other entity.
• Example: An entity captures an authentication sequence and replays it later
to impersonate the original entity
• Replay: Involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
• Modification: A portion of a legitimate message altered to produce
an undesirable effect
• Denial of service: Inhibits normal use of computer and
communications resources and facilities
9/24/2017 Bakhtar University 29
Security Mechanisms
• In order to detect, prevent, or recover from these security attacks, we
use security mechanisms
• There is no single mechanism which will provide all the services or
perform all the functions mentioned
• A variety of mechanisms are used to detect and prevent certain
attacks, and to provide certain functions and services
9/24/2017 Bakhtar University 30
Security Mechanisms
• Encryption
• Software Controls (access limitations in a database, in operating
system protect each user from other users)
• Hardware Controls (smart card)
• Policies (frequent changes of passwords)
• Physical Controls
• Information flowing over an secure communications channel, for
example: Virtual Private Network (VPN)
9/24/2017 Bakhtar University 31
9/24/2017 Bakhtar University 32
Security Services
• Enhance security of data processing systems and
information transfers of an organization
• Intended to counter security attacks
• Using one or more security mechanisms
• Often replicates functions normally associated with
physical documents, for example:
• signatures, dates, protection from disclosure, tampering,
destruction; be notarized or witnessed; be recorded or
licensed
9/24/2017 Bakhtar University 33
Security Services
• A classification of security services:
- Confidentiality (privacy)
- Authentication (who created or sent the data)
- Integrity (has not been altered)
- Non-repudiation (the order is final)
- Access control (prevent misuse of resources)
- Availability (permanence, non-erasure)
• Denial of Service Attacks, Virus that deletes files
9/24/2017 Bakhtar University 34
Protection, Detection, Reaction
•An ounce of Prevention is worth a pound of Cure
Bakhtar University 35
Protection, Detection, Reaction
• Better to protect that to recover.
• Detection is necessary because total prevention is impossible to
achieve.
• Without some kind of reaction,
• detection is useless .
• Like a burglar alarm that no-one listens and responds to.
• Protection, detection, reaction: each and every of the three elements
is very important.
• Security solutions focus too often on protection only.
Bakhtar University 36
Is a particular security measure good?
• What problem does it solve?
• Whether it really solves the problem you have.
• How well does it solve the problem?
• Will it work as expected?
• What new problems does it add?
• What are the economic and social costs?
• Cost of implementation, lost functionality or productivity.
• Given the above, is it worth the costs?
Bakhtar University 37
Points to Remember
• There is never a free lunch
• Don’t go for free software
• Free wallpapers
• Etc
• No one is going to give you anything free
Bakhtar University 38
Thank You
For Your Patience
Bakhtar University 39

Más contenido relacionado

La actualidad más candente

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 

La actualidad más candente (20)

Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Data security
Data securityData security
Data security
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
06. security concept
06. security concept06. security concept
06. security concept
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Security tools
Security toolsSecurity tools
Security tools
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 

Similar a Cryptography and Network Security # Lecture 2

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
standfordabbot
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 

Similar a Cryptography and Network Security # Lecture 2 (20)

Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CCNA_Security_01.ppt
CCNA_Security_01.pptCCNA_Security_01.ppt
CCNA_Security_01.ppt
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
U nit 4
U nit 4U nit 4
U nit 4
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 

Más de Kabul Education University

Más de Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

Cryptography and Network Security # Lecture 2

  • 1. Lec-2: Cryptography &Network Security Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬ Bakhtar University 1
  • 2. Outlines to be discussed…. Today • Case studies • Security Needs and Objectives • Exploiters • Why Security is difficult to achieve ? • How Security become an issue? • Threat Modeling • Risk assessment • How to get Secure? • 3 Aspects of Security • Points to remember Bakhtar University 2
  • 3. Case Study---1 • Read the following incident and try to find which security breach/breaches occurred, and what can go wrong. • "The U.S The Department of Energy (DOE) has confirmed a recent cyber incident that occurred at the end of July 2013 and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). It is believed about 14,000 past and current DOE employees PII may have been affected, • The incident included the compromise of 14 servers and 20 workstations. The data that was exposed includes names, date of births, blood types, Social Security Numbers, other government-issued identification numbers, and contact information. • At the time, officials blamed Chinese hackers, but two weeks later a group calling itself Parastoo (a common girls name in Farsi) claimed they were behind the breach, posting data that was hacked from a DOE webserver. • [http://www.csoonline.com/article/738230/u.s.-dept.-of-energy-reports-second- security-breach] Bakhtar University 3
  • 4. Case Study --- 2 • Read the following incident and try to find which security breach/breaches occurred, and what can go wrong. • "In early February, a hotel franchise management company that manages 168 hotels in 21 states suffered a data breach that exposed hundreds of guests’ debit and credit cards information in 2013. • White Lodging Services Corporation maintains hotel franchises for some of the top names in lodging such as Hilton, Marriott, Westin and Sheraton. Sources reported that the data breach centered mainly around the gift shops and restaurants within these hotels managed by White Lodging, not necessarily the front desk computers where guests pay for their rooms”. • [http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data- breaches-of-2014/] Bakhtar University 4
  • 5. Finding about the case studies • Hundreds of security breaches occurring around us • All • Companies • Organizations • Individuals needs • Security Must be deployed at multiple levels To be vigilant Bakhtar University 5
  • 6. Security Needs and Objectives • Authentication (who is the person, server, software etc.) • Authorization (what is that person allowed to do) • Privacy (controlling one’s personal information) • Anonymity (remaining unidentified to others) • Non-repudiation (user can’t deny having taken an action) • Audit (having traces of actions in separate systems/places) Bakhtar University 6
  • 7. Safety VS Security • Safety: is about protecting from • accidental risks, • road safety, • air travel safety • Security: is about mitigating risks of • dangers, • caused by intentional, • malicious actions, • homeland security, • airport and aircraft security, • information and computer security, • Easier to protect against accidental than malicious misuse Bakhtar University 7
  • 8. One of the most time consuming thing is to have an enemy (E.B. White) Bakhtar University 8
  • 9. Exploiters • Hacker • Cracker • Intruder • Attacker The Intention is destruction The intention is not destruction -Not Ordinary people -Evil-genius -Expert level programmers -Know working and functionality of the system -Don’t create risks or vulnerability, just exploiting it Bakhtar University 9
  • 10. Threat • Threat • A possible danger that may exploit a vulnerability • Vulnerability • A weakness in the system which allows an attacker to reduce it usage. • Attack • Any action that compromises the security of information owned by an organization. • An intelligent act • Deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. • When something really happen and the computer system has been compromised Bakhtar University 10
  • 11. Why Security is difficult to achieve? Bakhtar University 11
  • 12. Why security is difficult to achieve? • Attacker chooses • Time • Place • Method • Possible attacks • Currently known attacks • Yet to be discovered attacks • Software /system security is difficult to measure • Client’s don’t demand security • Client’s can’t sue a vendor • Physical access Bakhtar University 12
  • 13. How Security Became an Issue • People and businesses depend greatly on computer technology and automation in many different aspects of their lives. • Examples: • public utilities, • military defense systems, • financial institutions, • medical equipment, Bakhtar University 13
  • 14. How Security Became an Issue • With the increasing exposure to computing and processing, the individuals who used computers learned more about using the technology and getting the most out of it. • However, the good things in life often have a darker side. Taking technology down from the pedestal of the mainframe and putting it into so many individuals’ hands led to a lot of issues that never had to be dealt with in the mainframe days. Bakhtar University 14
  • 15. How Security became an Issue • Now there were thousands of people not versed and experienced in computing who had much more access to important data and processes. • Barriers and protection mechanisms were not in place to protect employees and systems from mistakes, so important data got corrupted accidentally, and individual mistakes affected many other systems instead of just one. Bakhtar University 15
  • 16. Threat Modeling • A procedure for optimizing network security by identifying • objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. • What threats will the system face? • What could go wrong? • How could the system be attacked and by whom? Bakhtar University 16
  • 17. Risk Assessment • How much to worry about them? • Calculate or estimate potential loss and its likelihood • Risk management • Reduce both probability and consequences of a security breach Bakhtar University 17
  • 18. Threat Modeling and Risk Assessment • Secure against what and from Whom? • who will be using the application? • what does the user (and the admin) care about? • where will the application run? (on a local system as Administrator/root? An intranet application? • As a web service available to the public? On a mobile phone?) what are you trying to protect and against whom? Bakhtar University 18
  • 19. What steps to take for Threat Modeling and Risk Assessment? Bakhtar University 19
  • 20. Steps to Take • Evaluate • Threat • Risks • Consequences • Address the threats and Mitigate the risks 100% security is not possible Bakhtar University 20
  • 21. Assignment#01 Write a Risk Assessment and Analysis Report on your organization. Bakhtar University 21
  • 22. Trade-off • More Security = Higher Cost, Less convenience in functionality and productivity • Security measures should be as invisible as possible • This means that it should not irritate users or slow down the software (too much). • Example: Forcing a password change everyday. • Users will find a workaround, or just stop using it. • Note: • It is better to choose security level relevant to your needs Bakhtar University 22
  • 23. Testing Security • Called Penetration Testing • Proactive and authorized attempt to evaluate the security of an IT infrastructure • By safely attempting to exploit system vulnerabilities including • OS • Service • Application flaws • Improper configurations • Risky end user’s behaviour Bakhtar University 23
  • 24. How to get Secure? • Three Aspects of Security • Security Attack (any action that compromise the security) • Security Mechanism (a mechanism that is designed to detect, prevent, or recover from a security attack) • Security Service (a service that enhances the security of data processing systems, and information transfers. A security service makes use of one or more security mechanism) • Know your Enemy • Types of attacks • Typical tricks • Commonly exploited vulnerabilities Bakhtar University 24
  • 25. Security Attacks • Passive attacks: This is an attack on the network in the nature of eavesdropping or monitoring of transmission of data – Aims to learn or make use of information from the system but does not affect system resources. – Difficult to detect, measures are available to prevent their success. • Active attacks: This involves modification of the data in transmission or the creation of a false stream. – Attempts to alter system resources or a affect their operation – Difficult to prevent, measures available to detect and recover from destruction 9/24/2017 Bakhtar University 25 • Active and passive security threats
  • 26. Security Threats 9/24/2017 Bakhtar University 26 Passive threats Release of message content Traffic analysis Active threats Masquerade Replay Modification of Message content DoS  Active and passive security threats
  • 27. Passive attacks • Release of message content: • Content of a message are read. • A message may be carrying sensitive or confidential data. • For example: A telephone conversation, email messages, or confidential information 9/24/2017 Bakhtar University 27
  • 28. Passive attacks • Traffic analysis: • An intruder makes inferences by observing message patterns • Can be done even if messages are encrypted • Inferences: Location and identity of hosts 9/24/2017 Bakhtar University 28
  • 29. Active Attacks • Masquerade: An entity pretends to be some other entity. • Example: An entity captures an authentication sequence and replays it later to impersonate the original entity • Replay: Involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect • Modification: A portion of a legitimate message altered to produce an undesirable effect • Denial of service: Inhibits normal use of computer and communications resources and facilities 9/24/2017 Bakhtar University 29
  • 30. Security Mechanisms • In order to detect, prevent, or recover from these security attacks, we use security mechanisms • There is no single mechanism which will provide all the services or perform all the functions mentioned • A variety of mechanisms are used to detect and prevent certain attacks, and to provide certain functions and services 9/24/2017 Bakhtar University 30
  • 31. Security Mechanisms • Encryption • Software Controls (access limitations in a database, in operating system protect each user from other users) • Hardware Controls (smart card) • Policies (frequent changes of passwords) • Physical Controls • Information flowing over an secure communications channel, for example: Virtual Private Network (VPN) 9/24/2017 Bakhtar University 31
  • 33. Security Services • Enhance security of data processing systems and information transfers of an organization • Intended to counter security attacks • Using one or more security mechanisms • Often replicates functions normally associated with physical documents, for example: • signatures, dates, protection from disclosure, tampering, destruction; be notarized or witnessed; be recorded or licensed 9/24/2017 Bakhtar University 33
  • 34. Security Services • A classification of security services: - Confidentiality (privacy) - Authentication (who created or sent the data) - Integrity (has not been altered) - Non-repudiation (the order is final) - Access control (prevent misuse of resources) - Availability (permanence, non-erasure) • Denial of Service Attacks, Virus that deletes files 9/24/2017 Bakhtar University 34
  • 35. Protection, Detection, Reaction •An ounce of Prevention is worth a pound of Cure Bakhtar University 35
  • 36. Protection, Detection, Reaction • Better to protect that to recover. • Detection is necessary because total prevention is impossible to achieve. • Without some kind of reaction, • detection is useless . • Like a burglar alarm that no-one listens and responds to. • Protection, detection, reaction: each and every of the three elements is very important. • Security solutions focus too often on protection only. Bakhtar University 36
  • 37. Is a particular security measure good? • What problem does it solve? • Whether it really solves the problem you have. • How well does it solve the problem? • Will it work as expected? • What new problems does it add? • What are the economic and social costs? • Cost of implementation, lost functionality or productivity. • Given the above, is it worth the costs? Bakhtar University 37
  • 38. Points to Remember • There is never a free lunch • Don’t go for free software • Free wallpapers • Etc • No one is going to give you anything free Bakhtar University 38
  • 39. Thank You For Your Patience Bakhtar University 39

Notas del editor

  1. http://www.coresecurity.com/penetration-testing-overview#sthash.B23EFh9Z.dpuf
  2. Proposed by: Bruce Schneier