Introduction to Cyber Security / Information Security Module 1: Pre-requisites in Information and Network Security Chapter 1: Overview of Networking Concepts 1. 2. 3. 4. 5. 6. Basics of Communication Systems Transmission Media Topology and Types of Networks TCP/IP Protocol Stacks Wireless Networks The Internet Chapter 2: Information Security Concepts 1. Information Security Overview: Background and Current Scenario 2. Types of Attacks 3. Goals for Security 4. E-commerce Security 5. Computer Forensics 6. Steganography Chapter 3: Security Threats and Vulnerabilities 1. Overview of Security threats 2. Weak / Strong Passwords and Password Cracking 3. Insecure Network connections 4. Malicious Code 5. Programming Bugs 6. Cyber crime and Cyber terrorism 7. Information Warfare and Surveillance Chapter 4: Cryptography / Encryption 1. Introduction to Cryptography / Encryption 2. Digital Signatures 3. Public Key infrastructure 4. Applications of Cryptography DES’s Fergusson College (Autonomous), Pune Page 1 Chapter 1: Overview of Networking Concepts Basics of Communication Systems: Communication is simply the act of transferring information from one place, person or group to another. This sharing of information can be local, i.e. face to face or remote communication. The information which is exchanged among the users is called as data. Data Communication is an exchange of data between two devices via some transmission medium such as wired cable. Effectiveness of data communication depends upon three fundamental characteristics: a. Delivery: The system must deliver data to the right destination. Data must be received by the intended device and only by that device. b. Accuracy: The data must be delivered accurately. c. Timeliness: The data must be delivered in timely manner. Every communication involves (at least) one sender, a message and a recipient. There are five major components which are involved in communication, such as: a. Message is the information to be communicated. It can consist of text, number, picture, audio, video etc. b. The Sender is the device that sends the data message. It can be computer, telephone handset, cell phone and so on. c. The Receiver is the device that receives the data message. It can be computer, telephone handset, television and so on. d. The Transmission Media is the physical path by which a message travels from sender to receiver. It could be a twisted-pair wire, coaxial cable, fiber optic cable, radio waves. e. A Protocol is a set of rules that governs data communication. It represents an agreement between the communicating devices. DES’s Fergusson College (Autonomous), Pune Page 2 Data Communication System During this communication, message which user wants to transmit, it has to be first converted to bit format. i.e. sequence of bits. These bits will then transmit to the destination. Then destination again converts it to the readable format. Data Transmission: Data transmission refers to the process of transferring data between two or more digital devices. Data is transmitted from one device to another in analog or digital format. There are two types of transmission: a. Serial Transmission: In Serial Transmission, data-bit flows from one computer to another computer in bi-direction. In this transmission one bit flows at one clock pulse. For e.g. USB, modem Serial Transmission DES’s Fergusson College (Autonomous), Pune Page 3 Serial communication can take many forms depending on the type of transmission mode and data transfer. The transmission modes are classified as Simplex, Half Duplex, and Full Duplex. • Simple Mode: In simplex mode, the communication is unidirectional, as on one way street. E.g.: Keyboards and traditional monitors. • Half-Duplex mode: In half-duplex mode each station can transmit and receive but not at the same time. E.g.: walkie-talkies • Full-Duplex Mode: In full-duplex mode, both stations can transmit and receive simultaneously. E.g.: telephone network, Video Calling b. Parallel Transmission: In Parallel Transmission, many bits are flow together simultaneously from one computer to another computer. Parallel Transmission is faster than serial transmission to transmit the bits. For e.g. Printer, billing machines Parallel Transmission DES’s Fergusson College (Autonomous), Pune Page 4 Computer Network: Computer Network is a set of devices (often referred to as nodes) connected by communication media. A node can be a computer or printer or any other device capable of sending and receiving data. Most network use distributed processing, in which a task is divided among multiple computers Computer Network To be considered effective and efficient, a network must meet a number of criteria. The most important of these are performance, reliability, and security. a. Performance: Can be measured by transit time and response time. Transit time is the amount of time required for a message to travel from one device to another. Response time is the elapsed time between an inquiry and a response. b. Reliability: Is measured by the frequency of failures, the time it takes a link to recover from failure and the network robustness in a catastrophe. c. Security: This refers to the ability to protect data from unauthorized access. There are different types of network connection, which helps the user to communicate over a link. a. Point to point link: Provides a dedicated links between two devices. - The entire capacity of the link is reserved. - Use an actual length of the wire or cable to connect the two ends. DES’s Fergusson College (Autonomous), Pune Page 5 b. Multipoint: More than two specific devices share the link or network - The channel capacity is shared - If several devices can use the link simultaneously, it is a specially shared connection. - If users must takes turns, it a timeshared connection. Computer Network Topologies: Geometric representation of how the computers are connected to each other is known as topology. There are four types of topology – Mesh, Star, Bus and Ring. Network Topologies a. Mesh Topology - The mesh topology incorporates a unique network design in which each computer on the network connects to every other. This creates a point-to-point connection between every device on the network Mesh Topology b. Star topology – all computers and devices are connected to a main hub or switch. The hub or switch amasses and disburses the flow of data within the network. Star topology is the most common type of network and follows the Ethernet standard. DES’s Fergusson College (Autonomous), Pune Page 6 Star Topology c. Bus topology – In this arrangement computers and devices are connected to a single linear cable called a trunk. The trunk is also referred to as the backbone or a segment. Each end of the trunk must be discharged to prevent the signal from rebounding back up the cable. d. Ring topology – computers and devices are connected to a closed loop cable. Here there are no terminating ends so if one system crashes the entire network goes down. Each computer functions as a repeater and charges the signal before sending it to the next station. Ring Topology DES’s Fergusson College (Autonomous), Pune Page 7 Types of Networks: A network is consist of group of computer systems, servers, networking devices are linked together to share resources, including a printer or a file server. The connections are established by using either cable media or wireless media. a. LAN (Local Area Network) - A Local Area Network is a privately owned computer network covering a small Networks geographical area, like a home, office, or groups of buildings e.g. a school Network. - A LAN is used to connect the computers and other network devices so that the devices can communicate with each other to share the resources. - For example, a library will have a wired or wireless LAN Network for users to interconnect local networking devices e.g., printers and servers to connect to the internet. b. MAN (Metropolitan Area Networks) - MAN stands for Metropolitan Area Networks is one of a number of types of networks. A MAN is a relatively new class of network. - MAN is larger than a local area network and as its name implies, covers the area of a single city. c. WAN (Wide Area Networks) - A wide area network (WAN) is a telecommunication network. A wide area network is simply a LAN of LANs or Network of Networks. - WANs connect LANs that may be on opposite sides of a building, across the country or around the world. DES’s Fergusson College (Autonomous), Pune Page 8 Internet ➢ Internet is a communication system which has brought wealth of information to our fingertips. ➢ Internet has brought revolution in the many aspects of our daily lives. ➢ Most of our day to day work is now handed over to internet. For e.g. ▪ Sending a mail. ▪ Reading a news paper. ▪ Payment of utility bills. ▪ Making the reservation. ▪ Chatting. ▪ Getting information about specific topic. ➢ It is a collaboration of more than hundreds of thousands of wide and local area networks and switching stations. ➢ Private individuals as well as various organizations use the Internet. ➢ Users who want Internet Connection use the services of ISPs. Internet Service Providers. ➢ There are, ▪ International Internet Service Providers ▪ National Internet Service Providers ▪ Regional Internet Service Providers ▪ Local Internet Service Providers ▪ World Wide Web (WWW) DES’s Fergusson College (Autonomous), Pune Page 9 Network Protocols It is a set of rules that governs data communications. It defines, - What is communicated? - How it is communicated? - When it is communicated Key elements of the network protocol are, - Syntax : Structure/ format of data –order in which it is presented - Semantics : meaning of each section of bits- how pattern to be interpreted – What action to be taken - Timing: When data to be sent and how fast they can be sent Network Standard - It is essential in creating and maintaining an open and competitive market for equipment manufacturers and in guaranteeing national and international interoperability of data and telecommunications technology and processes. - It provides guidelines to manufacturers, vendors, government agencies. - For e.g. : ISO - International Organization Of Standardization Network OSI Model ➢ OSI stands for Open System Interconnection is a reference model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. ➢ OSI consists of seven layers, and each layer performs a particular network function. 1. Physical Layer 2. Data-Link Layer 3. Network Layer 4. Transport Layer 5. Session Layer 6. Presentation Layer 7. Application Layer DES’s Fergusson College (Autonomous), Pune Page 10 ➢ OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a particular task. ➢ Each layer is self-contained, so that task assigned to each layer can be performed independently. Functions of the OSI Layers Network TCP/IP model: The TCP/IP model was developed prior to the OSI model. The TCP/IP model is exactly similar to the OSI model. The three topmost layers in the OSI model, however, are represented in TCP/IP by a single layer called the application layer & their functionalities are performed by that single layer only. The TCP/IP model consists of five layers: the application layer, transport layer, network layer, data link layer and physical layer. 5 DES’s Fergusson College (Autonomous), Pune Page 11 5 DES’s Fergusson College (Autonomous), Pune Application Page 12 Chapter 2: Information Security Concepts Information Security Overview Information system means to consider available countermeasures or controls stimulated through uncovered vulnerabilities and identify an area where more work is needed. Information security in today’s enterprise is a “well-informed sense of assurance that the information risks and controls are in balance.” Security is: - Freedom from risk or danger; safety. Freedom from doubt, anxiety, or fear; confidence. Something that gives or assures safety The need for Information security: 1. Protecting the functionality of the organization: The decision maker in organizations must set policy and operates their organization in compliance with the complex, shifting legislation, efficient and capable applications. 2. Enabling the safe operation of applications: The organization is under immense pressure to acquire and operates integrated, efficient and capable applications. The modern organization needs to create an environment that safeguards application using the organizations IT systems, particularly those application that serves as important elements of the infrastructure of the organization. 3. Protecting the data that the organization collect and use: Data in the organization can be in two forms that are either in rest or in motion, the motion of data signifies that data is currently used or processed by the system. The values of the data motivated the attackers to seal or corrupt the data. This is essential for the integrity and the values of the organization’s data. 4. Safeguarding technology assets in organizations: The organization must add intrastate services based on the size and scope of the organization. Organizational growth could lead to the need for public key infrastructure; the information security mechanism used by the large organization is complex in comparison to a small organization. The small organization generally prefers symmetric key encryption of data. DES’s Fergusson College (Autonomous), Pune Page 13 Goals for Information Security The following are the key security goals 1. Prevention - Designed security should prevent attacker for violating the security policy. 2. Detection – Security should allow the detection of attacker’s violation of security policy and information. 3. Recovery – Designed security should stop the attack, assess it and repairs the damage caused by it if any. It also specifies that, providing security policy will allows the functionality of the system even if the attack is succeeded. Different Security Approaches: Organization can take several approaches to implement its security model: • No security - Implement no security at all. • Security through obscurity - Nobody knows about its existence and contents. • Host security- Security is enforced individually for each host. • Network Security- focus is to control network access to various hosts & their services rather than individual host. Security Policies – Security Policy defines what is, and what is not, allowed in the organization in terms of accessing the information. Defined policies should have following characteristics: • Affordable - In the terms of cost & effort in security system, define policies should be affordable/ • Functional – Policies should provide expected security mechanism of functionality. • Legal – Defined Policy should meet the legal requirements. • Cultural Issues – Policies should be according to people’s expectations, working style and belief. DES’s Fergusson College (Autonomous), Pune Page 14 Security Principles There are basically 6 principles of security which needs to be followed. 1. Confidentiality - It specifies that only the sender and the intended recipients should be able to access the contents of a message. - Confidentiality gets compromised if an unauthorized person is able to access the message. - For example, in the Figure below user A sends a confidential message to user B, and if user C gets access to this message, which is not, desired and defeats the confidentiality. Figure: Loss of confidentiality 2. Authentication – - It helps to establish the proof of identities. - This process ensures that the origin of message or document is correctly identified. - For example, in the figure below User C posed as user A, and transfers the message to B. And B does not know about the same, this type of attack is known as Fabrication. Figure: Absence of authentication DES’s Fergusson College (Autonomous), Pune Page 15 3. Integrity – - When the contents of the message are changed after the sender sends it, but before it reaches the intended recipient, we say that the integrity of the message is lost. - For example, in the figure below user C modifies the message of user A and makes changes in it and then transfers it to user B. So modification of message leads to loss of integrity. Figure: Loss of Integrity 4. Non- repudiation – - There are situations when user sends a message and later on refuses that she had he/she had sent that message. - In the figure below, user A repudiates or denies that the message is not sent from him. - Non- repudiation does not allow the sender of a message to refuse the claim of not sending that message. Figure: Establishing non-repudiation DES’s Fergusson College (Autonomous), Pune Page 16 5. Access Control – - It determines who should be able to access what? - An access control mechanisms allows user to impose the restrictions on who can access what content. 6. Availability – • It states that resources should be available to all authorized users. - For example, in figure below due to the intentional actions of an unauthorized user C, an authorized user A may not be able to contact a server computer B. - This would defeat the principle of availability. Such an attack is called as interruption. Figure: Attack on availability Attacks on Security An attack tends to be an undesirable act which is in process that may cause cracking of a message. It can also be termed as an action that compromises the security of information owned by an organization. Threat tends to be a promise of an attack to come or something that might make an attempt to attack a system. Information security is about how to prevent attacks, or to detect attacks on information-based systems Types of Attacks: A General View From common user’s point of view, attacks can be classified into three categories. 1. Criminal Attack 2. Publicity Attack 3. Legal Attack DES’s Fergusson College (Autonomous), Pune Page 17 1. Criminal Attack: In such attacks, sole aim of the attacker is to maximize financial gain by attacking computer system. Type of criminal attacks • Fraud – manipulation of e-money, credit cards, checks etc. • Scams – People are enticed to send money in return of great profit. • Destruction – Some sort of grudge is the motive behind such attack. • Identity theft – attacker does not steal anything from the user, he becomes the user. • Intellectual property theft – stealing companies trade secrets , databases etc • Brand theft - Fake website. 2. Publicity Attack: In such attacks, attacker wants to see their names appear on the television news channels and newspapers. These attackers are not hardcore criminals. They are normal people working in an organization or students in colleges. 3. Legal Attack: This type of attack is quite novel and unique. The aim of the attacker is to exploit the weakness of the working of the computer system. Types of Attacks: A General View 1. Passive Attacks: In passive attack, the attacker only monitors the traffic that attacks the confidentiality of the data. Passive Attacks are in the nature of eavesdropping on or monitoring of transmission. The goal of the opponent is to obtain information is being transmitted. Passive attacks are categorized into two types. DES’s Fergusson College (Autonomous), Pune Page 18 • The release of message content When the information is released against the wish of the user, then that is considered as the release of message content attack. In such attacks, attacker will not make any changes in the contents but he will just publish the information without your permission. Telephonic conversation, an electronic mail message or a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions. • Traffic analysis – In such attacks, attacker will not do anything with your information. Even he will not capture it but he will just keep an eye on the network which you are using for transferring the information. Attacker will analyze the information which you are transferring through that network. Such attempt of analyzing message to come up with likely patterns is the work of the traffic analysis attack. 2. Active Attacks: An Active attack attempts to alter system resources or effect their operations. Active attack involves some modification of the data stream or creation of false statement. Types of active attacks are as following: • Masquerade – This attack is also referred as Interruption attack. Masquerade attack takes place when one entity pretends to be different entity. A Masquerade attack involves one of the other forms of active attacks. • Modification of messages – It means that some portion of a message is altered or that message is delayed or reordered to produce an unauthorized effect. • Denial of Service – It prevents legitimate user from accessing some services, which they are eligible for. For e.g unauthorized user sends too many request to the server in a succession, so as to flood the network and deny other legitimate users from using the network facilities. E-Commerce Security Ecommerce entails buying/selling of products over the internet and has gain popularity in the recent years. Security is an essential part of any transaction that takes place over the internet. Customer will lose his/her faith in e-business if its security is compromised. Following are the essential requirements for safe ecommerce website: DES’s Fergusson College (Autonomous), Pune Page 19 1. Choose a secure ecommerce platform: Choose a strongly typed higher level language for the development. If open source tools/libraries are used then ensure that the frameworks does not create security holes in your application 2. Use a secure connection for online checkout--and make sure you are PCI compliant: Always use HTTPs protocol for all important transactions. 3. Don't store sensitive data: As part of the website, there is no need to store sensitive information like CVV number and other credit card information 4. Set up system alerts for suspicious activity: Build a system that alerts when an undesired event happens in the system. Multiple requests from the same IP for long periods of time can indicate malicious intent 5. Layer your security: Defence in depth is absolutely needed in ecommerce domain. Security features like multiple passwords and OTP helps in reducing the risk of hacking 6. Provide security training to employees: If the employees understand the importance of security then human error can be avoided 7. Patch your systems: New security loop holes are discovered on a daily basis. If the system is not up to date then risk of getting hacked increases exponentially 8. Make sure you have a Distributed Denial of Service (DDoS) protection and mitigation service: Have a mitigation strategy against network denial of service attack and block IPs that are sending lot of request to the system 9. Disaster recovery plan: Plan for unlikely failure of your system. In case of system failure ensure that sensitive data is not lost or corrupted by the system Computer Forensics: - - Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. Computer forensic is used in a. Criminal prosecution b. Insurance companies c. Law enforcement The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. At a high level following are the guidelines used to process the evidence in computer forensic: 1. Shut down the computer. Considerations must be given to volatile information. Prevents remote access to machine and destruction of evidence (manual or ant-forensic software) 2. Document the Hardware Configuration of the System. Note everything about the computer configuration prior to re-locating 3. Transport the Computer System to A Secure Location. Do not leave the computer unattended unless it is locked in a secure location DES’s Fergusson College (Autonomous), Pune Page 20 4. Make Bit Stream Backups of Hard Disks and Floppy Disks 5. Mathematically Authenticate Data on All Storage Devices. Must be able to prove that you did not alter any of the evidence after the computer came into your possession 6. Document the System Date and Time 7. Make a List of Key Search Words 8. Evaluate the Windows Swap File 9. Evaluate File Slack. File slack is a data storage area of which most computer users are unaware; a source of significant security leakage. 10. Evaluate Unallocated Space (Erased Files) 11. Search Files, File Slack and Unallocated Space for Key Words 12. Document File Names, Dates and Times Steganography: • • • • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieving by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc. Steganography can be used to conceal almost any type of digital content, including text, image, video or audio content; the data to be hidden can be hidden inside almost any other type of digital content. The content to be concealed through steganography -- called hidden text -- is often encrypted before being incorporated into the innocuous-seeming cover text file or data stream. DES’s Fergusson College (Autonomous), Pune Page 21 Chapter 3: Security Threats and Vulnerabilities • Overview of Security - Now the world is all about Mobiles, laptops, internet. The role we play on internet is – – – – • ➢ o As user of the system As a vendor / service provider of any system Either we perform transactions Access network resources, data • Sensitive data • Business data • Intellectual property What all we need to protect? Our asset - in terms of People: ▪ Employees or Customers ▪ Secure their personal data o Property ▪ Computers, infrastructure o Information ▪ Data, software product, critical company records ➢ Our ability to use our computers (denial of service attacks) ➢ Our reputation with the general public • Whom to protect from? ➢ Major sources of danger can be caused by Humans o By running malicious code o Carrying infected media (laptops) in from off site ➢ Purpose o Damage the data o To disrupt the operation o Unavailability of service o Defame someone DES’s Fergusson College (Autonomous), Pune Page 22 Some Important Security terms – 1. Vulnerability • It refers to the security flaws in a system which can be exploited to allow an attack • These flaws can treated as gaps/ weakness in the security program which can provide exposure to attack. • This weakness can be found in hardware, software or process that exposes a system to compromise • Hardware: Allowing USB port / wi –fi connection • Software: Interface given for third party integration • Process: unsecure gateway for online transactions 2. Threat: • A threat is what we’re trying to protect against. • Threat is anything or anyone that can exploit a vulnerability, – intentionally or accidentally, – obtain, damage, or destroy an asset. E.g. data stored on social media sites , Threat : misuse of uploaded photos • Threat source: Enemy with motivation to defame some one • Vulnerability: availability of data online Types of Threat: ➢ Unauthorized Access o o Accessing information or systems, without permission or rights to do so. How to take care? o Ensure you have a properly configured firewall, up to date ▪ malware prevention software ▪ All software has the latest security updates. o Encryption information where appropriate o Use strong passwords o Be alert and verify all requests for sensitive information o Ensure network is secure o Monitor for unusual network behavior ➢ Malware: o A collective term for malicious software, such as viruses, worms and trojans. o Designed to break into the systems or information for criminal, commercial or destructive purposes. o How to take care? o Ensure configured firewall, up to date malware prevention software o Do not click links or open attachments in emails from unknown senders o Do not visit un-trusted websites or install dubious software. DES’s Fergusson College (Autonomous), Pune Page 23 ➢ Cyber Espionage o The act of spying through the use of computers. o Involves the covert access (not through proper channel) or ‘hacking’ o Spying on company or government networks to obtain sensitive information. o How to take care? o Be alert and verify all requests for sensitive information o Ensure network is secure o Monitor for unusual network behavior ➢ Data Leakage: o The intentional or accidental loss, theft or exposure of sensitive company or personal information. o How to take care? o Ensure all sensitive information stored on removable storage media, mobile devices or laptops is encrypted o Be mindful of what you post online e.g. revealing company next project o check email recipients before pressing send o Never email company’s sensitive information to personal email accounts. ➢ Mobile Devices o The malicious attack / unauthorized access on mobile devices to get in information stored on them o These attacks can be performed wirelessly or through physical possession. o How to take care? o Avoid connecting to insecure, un-trusted public wireless networks o Keep Bluetooth in ‘undiscoverable’ mode. o Keep devices with you at all times o Use strong passwords\ ➢ Social Engineering: o Taking out sensitive information by tricking and manipulating others o either company info or personal info o This can be done through phone, email, online or in-person o While casual chat, employee of rival company may take out company’s next strategies o E.g. Sometimes helpdesk people may ask username and password o How to take care? o Verify all requests for sensitive information, no matter how legitimate (genuine) they may seem DES’s Fergusson College (Autonomous), Pune Page 24 o Never share your passwords with anyone – not even the helpdesk. o Never share sensitive info, if in doubt, Report if suspected ➢ Insiders: o An employee or worker with malicious intent to steal sensitive company information. o He can commit fraud or cause damage to company systems or information. o How to take care? o Ensure access to sensitive information is restricted to only those that need it o Revoke access when no longer required. o Report all suspicious activity or workers immediately. ➢ Phishing: o o o o A form of social engineering It involves sending of legitimate looking emails aimed at fraudulently extracting sensitive information from recipients usually to gain access to systems or for identity theft. e.g. Emails like “You have won lottery”. How to take care? o Look out for emails containing unexpected or unsolicited requests for sensitive information. o Look out for contextually relevant emails from unknown senders. o Never reply to such mails. ➢ System Compromise: o A system that has been attacked earlier is often used for attacking other systems. o How to take care? o Ensure vulnerable holes are tightly closed. o Ensure systems are hardened and configured securely, o Regularly scan them for vulnerabilities ➢ Denial of Service: o An intentional or unintentional attack on a system or on information o Resulting system unavailable and inaccessible to authorized users. o E.g. Etoys vs Etoy cyber war o How to take care? o Securely configure and harden all networks and network equipment against known DoS attacks. o Monitor networks through log reviews o Use intrusion detection or prevention systems. DES’s Fergusson College (Autonomous), Pune Page 25 ➢ Identity Theft: o The theft of an unknowing individual’s personal information. o This info will be used to commit a crime, usually for financial gain. o E.g. Filing for online - tax refund on someone else's behalf o http://www.irs.gov/uac/Examples-of-Identity-Theft-Schemes-Fiscal-Year2013 o How to take care o Never provide personal information to un-trusted individuals or websites. o Ensure personal information is protected when stored and securely disposed of when no longer needed. Passwords: • • • • • Usernames and password combinations are the most common means of providing access to information. A username identifies you as a unique individual, Password is then used to prove your identity. A password is a set of secret characters or words utilized to gain access. If passwords are not set properly, then there is threat of losing information or misusing it. Weak password: • A weak password is easy to detect both by humans and by computer. • Do NOT use: – Your username or family members name – Birthdays or other personal information such as addresses or phone numbers – A set of characters in alphabetic or numeric order (ex. Abcdef, 123456), in a row on a keyboard – Words that can be found in a dictionary Strong password: • An effective password that would be difficult to break. • For a password to be strong and hard to break, it should: – Contain 8 or more characters – Contain letters, numerals (0-9), Symbols (@ # $ etc) – Be significantly different from prior passwords General Instructions related to Passwords: • Try to change your password(s) every 6 months. • Make sure no one is watching you when you type password. • Ask anyone around you to kindly look away. DES’s Fergusson College (Autonomous), Pune Page 26 Password Cracking: • Attackers use this technique to break into someone account. • Password cracking software uses one of three approaches – intelligent guessing (about Personal info) – dictionary attacks – automation that tries every possible combination of characters • Given enough time, the automated method can crack any password. • However, it still can take months to crack a strong password. Insecure Network connections: 1. Using Bluetooth & Unsecure Wi-Fi 2. Wi-fi 3. Unsecured web site content – Digital Certificates associated with web contents 1. Unsecure Wi – fi • Case1: Leaving your home wireless network unsecured – Your neighbor will download contents – They can also download illegal contents like music, movies or child pornography, anything. – They can also access your personal data like your tax documents, financial records, online banking information, credit card numbers, emails, usernames and passwords • Case2: Using Public Unsecured Networks or Hotspots e.f. wi-fi in coffee shop, MG Road – Everyone know they are available for public use, even criminal too – Criminals will watch the online traffic looking for valuable information such as credit card numbers, usernames and passwords, or online banking information 2. Unsecure Web contents DES’s Fergusson College (Autonomous), Pune Page 27 Malicious code /Software: • • • • Known as Malware i.e. malicious software Designed to break into the systems or information for criminal, commercial or destructive purposes. Attackers use this software – to disrupt computer operation – gather sensitive information, – gain access to private computer network – To spy on network traffic Types of Malicious code – Viruses – Worms – Trojans – Spyware – Botnet – Zombie What is a computer virus? • • • • Virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. It’s estimated that the Conficker virus infected more than 10 million computers in 2009. Tens of thousands of computer viruses now operate over the Internet, and new computer viruses are discovered every day. How does a computer virus find me? DES’s Fergusson College (Autonomous), Pune Page 28 • • • • • Sharing music, files or photos with other users (songs.PK) Visiting an infected Web site Opening spam email or an email attachment Downloading free games, toolbars, media players and other system utilities Installing mainstream software applications without fully reading license agreements What does a computer virus do? • Can erase data • Encrypt files • Delete directory structures • Prohibit us from using our own machine , set up • Send files stored on our machine to contacts in our address book • replicate themselves or flood a network with traffic • making it impossible to perform any internet activity Virus Types - Parasitic Viruses: – Also called as File Infector Virus – This attaches itself to a file in order to propagate (to multiply) – Adds itself to start of the file or end of the file – COM and EXE files are common targeted file – Since these get loaded directly into the memory and execution always starts at the first instruction. Virus Type - Browser Hijacker: – Spread itself in numerous ways o including voluntary download – Effectively hijacks certain browser functions and re-directs the user automatically to particular sites. – E.g. CoolWebSearch Virus Type - Macro Virus: – Many programs provide support for macros e.g. Microsoft Excel, Outlook – Macros are special action programs implemented in macro programming language. – Unfortunately this facility opens door for virus to be hidden in normally genuine looking documents. – E.g. Melissa o a Word document supposedly containing the passwords to pornographic websites o The virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of itself. DES’s Fergusson College (Autonomous), Pune Page 29 Virus Type – E-Mail Viruses: – It’s a computer code sent to you as an e-mail note attachment – Opening the attachment will o destroying certain files on hard disk o Re-email the attachment to everyone in your address book – How to protect?? o Don't open messages from unknown senders o Immediately delete messages you suspect to be spam o Install antivirus which will scan email attachments How to know you are infected by Virus? • Your computer may be infected if you recognize any of these malware symptoms – Slow computer performance – Erratic (unreliable) computer behavior – Unexplained data loss – Frequent computer crashes How to protect computer from Virus? • Install best security software on your computer • Use antivirus protection and a firewall • Install antispyware software • Keep your antivirus protection and antispyware software up-to-date • Update operating system regularly • Increase browser security settings • Avoid questionable Web sites • Download software from trusted sites. • Carefully evaluate free software and file-sharing applications before downloading them. What is computer Worm? • • A standalone program that replicates itself in order to spread malicious code Worms normally – spread across network, – exploiting vulnerabilities (OS specific, network specific) – Installs a backdoor to allow creation of Zombie Virus DES’s Fergusson College (Autonomous), Pune Worm Page 30 Virus are dependent, need existing file to get attached to. Worms are separate entity. It does not need to attach it self to any existing file Viruses almost always corrupt or modify files on a targeted computer Worms will spread themselves to consume bandwidth Worm interfere with the normal use of computer or network Difference between Worms and Virus: Examples: 1. Morris Worm: • Released via Internet on November 2, 1988 • Intention was not cause damage, but to gauge the size of the Internet. • Mistake in code – Code written was checking if there is already running version of the program • If yes, don’t copy the version • Else copy program – Problem was though answer was yes, program was getting copied. – This level of replication was excessive and resulted into network down. The U.S. Government Accountability Office put the cost of the damage at $100,000– 10,000,000 for this 2. Stuxnet : • Discovered in June 2010, believed to have been created by the United States and Israel • Purpose: To attack Iran's nuclear facilities • Worm initially spread via Microsoft Windows and targets Siemens industrial control systems • Different variants of Stuxnet targeted five Iranian organizations. • Worm has not caused any damage to its customers. • But successfully damaged Siemens equipment procured by Iran. How they are spread? • Most known computer worms are spread in one of the following ways: • Files sent as email attachments Via a link to a web or FTP resource Via a link sent in an ICQ (I Seek You) or IRC (Internet Relay chat) chat message Via P2P (peer-to-peer) file sharing networks Some worms are spread as network packets. o They enter the computer memory, and then gets activated. • • • • 3. Email Worms DES’s Fergusson College (Autonomous), Pune Page 31 • • • • • • • • Spread thru email attachment, links in the message Instant Messaging Worms Spread thru instant messaging application, sending links to infected site Internet Worms Nasty ones, will try to get network down Scan available network resources or internet for vulnerable machines If found, try to connect and gain full access Send data packets or requests to install the worm or worm downloader How to stay safe from computer worms? • Because worms spread by exploiting vulnerabilities in operating systems, apply regular OS security updates. • Install Anti-spyware, Firewall or Anti Virus software. • Keep virus information up-to-date . • Be cautious while opening unexpected mail, attachment, visiting web sites. What is a Trojan? • • • • • • • • • It is malicious, security-breaking program that is disguised as something benign (genuine) Perform actions that have not been authorized by the user. Trojans are not able to self-replicate. It can come to your machine in form like movie or music file Trojan will get activated on clicking the file Damage it can do Erases your disk, sends your credit card numbers and passwords to a stranger Allows stranger hijack your computer to commit illegal denial of service attacks Trojan Types 1. Backdoor: • This program gives malicious user remote access to the infected machine • User can do any operation like – Sending, receiving, launching and deleting files, displaying data and rebooting the computer • Backdoor Trojans are often used to unite a group of victim computers, which can be used for Criminal purposes. 2. Rootkit: • Rootkits are designed to conceal certain objects or activities in your system. • Main purpose: is to prevent malicious programs being detected. DES’s Fergusson College (Autonomous), Pune Page 32 • This helps to extend the period in which programs can run on an infected compute 3. Banker: • They will steal your account data for online banking systems, e-payment systems and credit or debit cards. 4. DoS: • Conduct DoS (Denial of Service) attacks against a targeted web address. • Will send multiple requests – from your computer and several other infected computers How to protect yourself against Trojans? • Install effective anti-malware software • NEVER download blindly from people or sites which you aren't 100% sure about • Be sure what the file is before opening it • Beware of hidden file extensions • Don't download an executable program just to "check it out" Programming Bugs: These are programming related bugs – which open system to vulnerabilities. • During program execution, certain task needs privileges of “administrator” account, 1. access should be grant only for that task 2. Remove access on task completion. • Giving access to un-trusted user 1. Create temp user account 2. Give minimum access to perform necessary task 3. Ensure, program doesn’t give any kind of unwanted access to the user, which he can exploit further. How to handle Programming Bugs? • Design system carefully. • Listing different users and their access rights who will be accessing the system. • In case of third party integration, ensure the user gets only minimum access which is enough to perform given tasks. Cyber Crime: • • Computer crime or Cyber crime refers to any crime that involves a computer and a network. – The computer may have been used in the commission of a crime, or it may be the target. “ These are offences that are committed against individuals or groups of individuals – with a criminal motive to intentionally harm the reputation of the victim or – cause physical or mental harm to the victim directly or indirectly, DES’s Fergusson College (Autonomous), Pune Page 33 – • using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)" Cybercrime ranges across activities. – Fundamental breaches of personal or corporate privacy , identity theft. – transaction-based crimes such as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting – Deliberately altering data for either profit or political objectives. – Attempts to disrupt the actual workings of the Internet - spam, hacking, and denial of service attacks, cyber terrorism. Cyber Crime: Spam: • Spam is the unwanted sending of bulk email for commercial purpose, such as products and services advertisement. • It comprises roughly 50 percent of the e-mail. • Spam is a crime since it wastes both the storage and network capacities. • Spam is nearly free for perpetrators – A cost is same for sending 10 messages as well for 10 million. How does a spam work? • Spammer gets secret control of numerous infected machines connected to internet. – Such machines are known as zombie computers. • This network can be activated to flood the Internet with spam or to institute DoS attacks. • While Spam will be still ok but DoS can be used to blackmail Web sites by threatening to shut them down. Cyber Crime: Fraud: • Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. • Altering in an unauthorized way. • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect; • Altering or deleting stored data; • Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes. E.g. Malware code • Crimes coming under fraud are bank fraud, identity theft, extortion, and theft of classified information. Cyber Crime: Identity Theft: • Major problem for people using the Internet for cash transactions and banking services. • A criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. DES’s Fergusson College (Autonomous), Pune Page 34 • • • • • It can result in major financial losses for the victim and even spoil the victim’s credit history. Theft is anything which is taken without permission. This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading. Cyber Crime: Hacking: • This is a crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. – In the US, hacking is classified as a felony and punishable as such. • This is different from ethical hacking • In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location. • Most hackers have not been criminals but young people driven by intellectual curiosity. • Hacking costs the world economy billions of dollars annually. • Hacking is not always an outside job. • Hacking is old-fashioned industrial espionage by other means. • The largest known case of computer hacking was a spyware called GostNet discovered in late March 2009 by University of Toronto. – (Dalai Lama case) – compromised systems embassies and foreign affairs bureaus Cyber Crime: Cyber Stalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. • It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. • False accusations • Attempts to gather information about the victim. • Monitoring their target's online activities and attempting to trace their IP address in an effort to gather more information about their victims. • Encouraging others to harass the victim. • False victimization. • Attacks on data and equipment. • Ordering goods and services. • Arranging to meet. DES’s Fergusson College (Autonomous), Pune Page 35 • Cyberstalking is a form of cyberbullying Cyber Crime: Cyber bullying • Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet • Cyberbullying is referred as cyberstalking or cyberharassment when perpetrated by adults toward adults. Cyber Terrorism: • Cyber terrorism focuses upon the use of the Internet by non-state actors to affect a nation’s economic and technological infrastructure. • Cyber terrorist attack is designed to cause physical violence or extreme financial harm. • Possible cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. • How dangerous could these cyber attacks be? • There can be three levels of cyber terror capability : • Simple-Unstructured • Advanced-Structured • Complex-Coordinated • Cyber terrorism is possibly one of the top 10 events to "end the human race“. Cyber Terrorism: Methods of Protection • The only way to completely secure a system is to fully isolated from any outside connection. OR • Create unique passwords that are difficult to guess for all accounts that you use. • Use security software. • Check with vendors for upgrades and patches for your security software. • If you’re unsure about a website/email, don’t access it. Better safe than sorry. • Use sandboxing software. A free option is Sandboxie. Information Warfare: • Information Warfare is about WEALTH. • Information Warfare is about POWER. • Information Warfare is about FEAR. • Information Warfare is about POLITICS. • Information Warfare is about SURVIVAL. • Information – Data and Knowledge. • Information Infrastructures – Display, Store, Process, Transmit • Information-based Processes – Obtain, Exchange DES’s Fergusson College (Autonomous), Pune Page 36 Surveillance: • Computer and network surveillance is the monitoring of computer activity, of data stored on a hard drive, or being transferred over computer networks such as the Internet. • It is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. DES’s Fergusson College (Autonomous), Pune Page 37 Chapter 4: Cryptography Modern Nature of attack: • Automating attacks: the speed and concurrent working of computer attacks makes a serious issue. • Privacy concern: for different applications various companies collect loads of data which could be easily misused. • Distance does not matter: money is in digital form and can be moved from any place to other. Plain text: • Any communication language that we speak takes the form of plain text. Plain text can be understood by anyone knowing the language. Cipher text: • If you don’t want anyone to read your plain text simply code it to some other form. When a plain text message is codified using any suitable scheme, the resulting message is called cipher text. Encryption: • Encryption is the process of encoding plain text messages into cipher text is called as encryption. Decryption: • It is the reverse process of transforming cipher text messages back to plain text message is called decryption. DES’s Fergusson College (Autonomous), Pune Page 38 Process: • To encrypt the plain text, sender performs encryption i.e. it applies the encryption algorithm. • To decrypt the encrypted message the receiver performs decryption i.e. applies decryption algorithm. • Both the encryption and decryption algorithms must be same otherwise it could not retrieve the original message. • Every encryption and decryption process has two aspects : a) algorithm b) key used for the process. • Example: o If we had a combinational lock, we would need to remember the key, that is the combination, to open the lock ▪ say a number 871. o The fact that it is combination lock and how to open it (algorithm) is known to everyone. However the actual value of the key required to open the specific lock (871) is a secret. DES’s Fergusson College (Autonomous), Pune Page 39 Cryptography: It is the art and science of achieving security by encoding messages to make them non readable. Cryptanalysis: It is the technique of decoding message from non-readable format to readable format without knowing how they initially converted from readable to non readable format. Cryptology: It is the combination of cryptography and cryptanalysis. DES’s Fergusson College (Autonomous), Pune Page 40 Types of Cryptography Algorithm Cryptography algorithms are divided into two types, 1. Symmetric key Cryptography: o Same key for encryption as well as decryption. o Separate lock and key pairs should be used for each of the recipient. ▪ That is if A sends message to B as well as C, then A must have two different locks and their keys. o It means that if there are n no of persons involved, then the number of key lock pairs would be pairs = n * (n-1) /2 o So when no. of persons involved go on increasing the keeping track of each key lock pair becomes difficult. ▪ o The problem of key exchange is important issue. ▪ How will the sender convey the key to the receiver? ▪ If the key is not conveyed receiver can’t open (decrypt) the message. ▪ DES’s Fergusson College (Autonomous), Pune Page 41 2. Asymmetric key Cryptography: • • Asymmetric key cryptography involves the usage of one key for encryption and another different key for decryption. Here for each lock there are two different but related keys are used, o one for locking and other for unlocking. o Since 2 separate keys are required, the name is asymmetric key cryptography. Example : A want to send message to B • • • • • First thing A will do is ask B for the key to lock the message. Both the keys are with B currently. Then B hands over the key (k1) to A. A will use this key to lock the message and then send message to B. Since message is locked no one can read it. (apart from B) If somebody tries to steal the key k1, they can only lock another message. No one other than B can read the message. Asymmetric key Cryptography: Public Key • • • • So anybody who wants to have secure message from others will send the lock and key to that person and will request to use this key only. The important point is that when the sender changes, no need not create another pair of lock and key, you can still use the same lock and key for everyone. Rather these keys and locks are made available for general public The key k1 which is used to lock the message is called public key. DES’s Fergusson College (Autonomous), Pune Page 42 Asymmetric key Cryptography: (Private Key) • • • • So even though 1000 people want to send message to B, they can use the same lock and the public key distributed by B. Only B can read the message sent to him as the key to open the lock is not shared with anybody and it is only with B, this key is called as private key. Public keys are shared with everybody and used to lock the message while sending, Private keys are kept secret and not shared with anybody and used to unlock the message. Comparing Symmetric Key with Asymmetric Key Symmetric Key Asymmetric Key Work wise The same algorithm with the same key is used for encryption and decryption Same algorithm is used for encryption and decryption with a pair of keys , one for encryption and one for decryption The sender and receiver must share the algorithm and the key Both the sender and receiver must have one of the matched pair of keys. (not the same) Speed of encryption/ decryption is very fast Comparatively slower Size of cipher is almost equal to plain text Size of cipher is much more than original text Exchange of keys is big problem Key exchange is no problem at all No of keys required as compared to participant is moreEg if 1000 participants are there then the keys to be produced are 499500 No of keys to participant ratio is always 1 i.e for 1000 participant we require 1000 keys pairs (public-private) Used for encryption, decryption Encryption, decryption, digital certificate (integrity, non repudiation) DES’s Fergusson College (Autonomous), Pune Page 43 Symmetric Key Asymmetric Key Security wise The key must be kept secret. Only One of the two keys must be kept secret. Knowledge of the algorithm plus sample of cipher text are not sufficient to determine the key Knowledge of the algorithm plus one of the key plus sample of cipher text are not sufficient to determine the other key. DES’s Fergusson College (Autonomous), Pune Page 44 Digital Signature: • • • A digital signature serves the same purpose as a handwritten signature. Digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message possibly to ensure that the original content of the message that has been sent is unchanged. Unlike a handwritten signature, a digital signature is nearly impossible to counterfeit. Requirements of a digital signature • • • • • It must be a bit pattern that depends upon the message being signed. It must use some information unique to the sender, to prevent forgery and denial. It must be relatively easy to produce the digital signature. It must be practical to retain a copy of digital signature in storage. It must be computationally infeasible to forge a digital signature. When public key is used for encryption in digital signature? • Only private key can decrypt the message. • The private key is only with one intended user. • So this mechanism is used only for securing the message content ( no one else can reveal the contents) When private key is used for encryption in digital signature? • Only public key can decrypt the message. • The public key may be shared with multiple users. • So this mechanism is used neither for security nor for DES’s Fergusson College (Autonomous), Pune Page 45 Then what it is used for? • • • • • • • • • • • To let the world view your message. There are various things, like your resume, your visiting cards, your invitation card, movie tickets you have purchased online etc. which must be confirmed before using that they are from Authorised user. When any one can open (unlock) message by using public key it means it must be locked by only your private key, that’s the proof. It is original. If anyone makes an attempt to change the invitation card (which is impossible, since you only posses the private key), then the user can not open it with your public key. This is the concept of authentication. Apart from encryption that is hiding the message details from rest of the world; public key cryptography is even used for authentication. Authentication means identifying and proving the sender. Example: o A bank manager gets a request to reset the password for Priya’s saving account. How will the manager verify that the mail was sent by Priya herself? o So what the manager will do is simply check the digital signature associated with the mail sent by Priya. A digital signature enables the creator of a message to attach a code that acts as a signature. So when a recipient gets such a message, he/she gets the assurance proof that the message is from the alleged sender. And this achieves the purpose of non – repudiation (sender can not refuse about sending of the message) DES’s Fergusson College (Autonomous), Pune Page 46 Characteristics of Digital Signature: • • • • • The Signature is authentic The signature is unforgeable The signature is not reusable The signed document is unalterable The signature cannot be repudiated Public key infrastructure: (Digital Certificate) • • • • • • • • • • In certain situations, for instance when: - Trust needs to be established in unknown servers, such as an electronic banking service - Large organisations need their employees to be able to communicate securely - Or you are downloading a particular software How to trust someone (person or entity) whom you have never seen or you do not recognise? PKI is a model where the establishment of trust is outsourced. Public Key Infrastructure, (PKI), essential services o for managing digital certificates o Providing encryption keys for people, programs and systems. Public key infrastructure supports security mechanisms such as confidentiality, integrity, authentication, and non-repudiation. o However, to successfully implement these security mechanisms, you must carefully plan an infrastructure to manage them. A public key infrastructure (PKI) is a foundation on which other applications, system, and network security components are built. The PKI service is based on the concept of digital certificate. A certificate is a digital document (i.e. a formatted computer file) that binds a public key to a person, application, or service. Like passport helps in establishing our identity, a digital certificate establishes relationship between a user and his public key. It’s a proof that a particular public key belongs to particular user. Who signs the digital certificate in PKI? • • The digital certificates are signed by trusted third party(TTP) ( often recruited by government agencies). These certificates state user’s credentials (e.g. name, e-mail address, etc.) and their public key and are digitally signed by the TTP. DES’s Fergusson College (Autonomous), Pune Page 47 • TTPs are called Certificate Authority (CA) Why we trust digital certificate? • • • As you don’t know the unknown web server, or software, so some trusted third party(TTP) takes the responsibility to specify that it comes from the authentic site only. As the third party signs the digital certificate with their private key, it can not be changed by anybody else. We have the public key of CA with which we can unlock it. How to create digital certificate? • You or your organisation is ready with your web site, so you want a digital certificate for the user. • You need to contact a third party entity called RA (registration authority) • RA will register you, if needed may generate the public and private key for you, and if you already have the key pair then it will validate it. • RA will also go through verification process of your credentials. How to create digital certificate?... • After this RA passes all the information to the CA • CA will create a digital certificate after doing his own verification. • CA sends the digital certificate to the user and retains one copy for record. • He also maintains a certificate directory. What are the fields of certificate? Field Description Serial No Contains a unique no. given to certificate Algorithm Identifies the algorithm used by CA Issuer Name of CA Validity Contains 2 dates (not before and not after) Subject Name of user / organisation to whom the certificate is issued DES’s Fergusson College (Autonomous), Pune Page 48 Public key Subject’s public key and related information; This can never be blank Certificate hierarchy • • • • • • Now, change of scenario. Instead of building trust with certificate holder, user should build trust with CA who authorised the certificate. How to build trust? By verify the signature on a certificate against the CA’s public key . But how could user obtain the CA’s public key? Or what if the certificate is signed by CA from other country whom user never heard about? That why a hierarchy of CA is maintained. Certificate Authority Hierarchy • • • • • Also called chain of trust Each hierarchy begins with a root CA. This Root CA expresses trust in Intermediate CAs by signing their certificates. In turn, the intermediate CAs issue certificates to end users. How the Root CA can be trusted? It is self signed. Root CA certificates are included in every modern browsers and operating systems. DES’s Fergusson College (Autonomous), Pune Page 49 • So every browser takes care about the digital certificate and if it finds invalid, it will inform you. Cross certification • • • If two users are living in two different countries then their CA ‘s might be different then a cross-certificate is issued, it extends the trust relationship of a CA. A relying entity, for example, may desire to validate the public key certificate of an end entity whose signing CA’s public key it is not aware of. Assuming that the relying entity trusts its own CA, when it sees a cross-certificate signed by that CA, it will also trust that other CA, and subsequent certificates signed by it. The net effect of cross certification is to allow many PKI deployments to be both extensible and scalable. Certificate Revocation • • • • CA can a revoke a certificate. There might be various issues like : The holder complains that his private key is stolen CA finds that there is mistake while issuing it Holder leaves the organisation so this certificate is not for him. Services of PKI: o o o o o o Registration Certification Key recovery Key generation Cross verification Revocation DES’s Fergusson College (Autonomous), Pune Page 50 Applications of Cryptography: 1. Tamperproof hardware: (Authentication based) • • • 2. To store the private key of the user, you cannot use hard disk or anything on the network. In such cases special cryptographic hardware such as smart cards may be used to hold the user’s private key. The private key never leaves the cryptographic hardware. One time password: (Authentication based) • • Password generators use cryptography to generate session passwords (called one-timepassword, or OTP) that can be recognized by the verifying party as valid and cannot be guessed by an attacker. Internally such a token has a clock whose value is hashed and encrypted using a key shared with the verifying party. The verifying party has a clock that is synchronized with the token’s clock. 3) Device Encryption: • • Device encryption (sometimes also referred to as endpoint encryption) is the practice of encrypting the data stored on a device. The intention is to stop unauthorized people accessing the data. Device encryption applies to all sorts of devices: o Mobile devices such as PDAs or smart phones o Laptop hard drives o USB fl ash drives o Portable hard drives o Workstation or server hard drives 4) Security • • • • • • • Apart from private and organisational data security cryptography is used for : Secure file copying Secure backup of remote servers Setting up secure network Non- repudiation Data Integration Other Application o Bank cards and credit cards at automated teller machines DES’s Fergusson College (Autonomous), Pune Page 51 • o Home banking, e-commerce o Credit card transactions over the internet o Mobile communication Electronic purses (smart cards) DES’s Fergusson College (Autonomous), Pune Page 52 Assessment Section Sr. No. Question 1 Effectiveness of data communication depends upon three fundamental characteristics (Delivery, Accuracy, Timeliness) 2 Every communication involves (at least) one sender, a message and a recipient. 3 A Protocol is a set of rules that governs data communication. It represents an agreement between the communicating devices. 4 Data transmission True refers to the process of transferring data between two or more digital devices. 5 In Serial Transmission, data-bit flows from one computer to another computer in bi-direction. True 6 Serial Transmission is faster than Parallel transmission to transmit the bits. 7 Transmission modes are classified as 8 A Network is a set of devices (often referred to as nodes) connected by communication media True 9 Geometric representation of how the computers are connected to each other is known as topology . 10 LAN, MAN, WAN False Simplex, Half duplex, Full duplex are different types of networks. LAN 11 covers the geographical area, like a home, office, or groups of buildings e.g. a school Network. 12 MAN stands for 13 A wide area network is simply a LAN of LANs or Network of Networks. 14 are the key elements of Protocols Syntax, Semantics, Timing The Transmission Media is the physical path by which a message travels from sender to receiver. (T/F) True 15 16 17 Metropolitan Area Network True An attack tends to be an undesirable act which is in process that may cause cracking of a message. (T/F) True are the principals of Security. confidentiality, authentication, integrity, non-repudiation, access control, availability DES’s Fergusson College (Autonomous), Pune Page 53 18 19 Integrity Threat tends to be a promise of an attack to come or something that might make an attempt to attack a system. Attack 2. Publicity Attack are different types of attacks. 1.1. Criminal Passive 2. Active 20 21 means data cannot be edited in an unauthorized way. Virus 3. Legal Attack Piece of program that attaches itself to another legal program. Steganography 22 is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. 23 Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. (T/F) True Passive 24 attack, the attacker only monitors the traffic that attacks the confidentiality of the data. 25 An Active attack attempts to alter system resources or effect their operations. 26 Vulnerability True refers to the security flaws in a system which can be exploited to allow an attack 27 Accessing information or systems, without permission or rights is called as 28 The intentional or accidental loss, theft or exposure of sensitive company or personal information. Data leakage 29 30 Unauthorized access Phishing involves sending of legitimate looking emails aimed at fraudulently extracting sensitive information from recipients An intentional or unintentional attack on a system or on information which results in system unavailable and inaccessible to authorized users is called as Denial of service 31 Malware is designed to break into the systems or information for criminal, commercial or destructive purposes. DES’s Fergusson College (Autonomous), Pune Page 54 33 34 Virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A standalone program that replicates itself in order to spread malicious code is called as Computer worm 35 Viruses almost always corrupt or modify files on a targeted computer. 36 Worms will spread themselves to consume bandwidth 37 Worms are separate entity. It need to attach itself to any existing file . 38 Virus are dependent, does not need existing file to get attached to. 39 Encryption True True False False is the process of encoding plain text messages into cipher text is called as encryption Decryption 40 is the reverse process of transforming cipher text messages back to plain text message is called decryption. 41 Cryptography is the art and science of achieving security by encoding messages to make them non readable. Cryptanalysis 42 isthe technique of decoding message from non-readable format to readable format without knowing how they initially converted from readable to non readable format. 43 Combination of cryptography and cryptanalysis is called as 44 In data. 45 Asymmetric key In decryption of data. Symmetric key Cryptology _. Cryptography same key is used for encryption and decryption of Cryptography different keys are used for encryption and DES’s Fergusson College (Autonomous), Pune Page 55 46 In Symmetric key cryptography the same algorithm with the same key is used for encryption and decryption. True Digital signature 47 is an electronic signature that can be used to authenticate the identity of the sender of a message 48 Digital Signature is not reusable. 49 Digitally signed document is unalterable 50 Public key infrastructure supports security mechanisms such as confidentiality, integrity, authentication, and non-repudiation. True 51 Substitution In _ crptography technique the characters of a plain text are replaced by other characters, number or symbols. 52 In Transposition performed. True True crptography technique some permutations on the characters are DES’s Fergusson College (Autonomous), Pune Page 56