Unit 4
Unit 4
Unit 4
2. Biometric System
4. Digital Signatures
1. Access Control & Authentication
-It determines who(person or machine) can legitimately use a
network resource & which resource he or she can use.
-A technique known as two factor authentication is used.
-It includes;
-Passive token- Storage devices that contain a secret code like plastic
card with magnetic strip or chip containing hidden code.
When the message arrives at the receiving end, the receiver would use the
sender’s public key to decrypt the digital signature, thus restoring the
original hash of the message. The receiver can then verify the integrity of
the message by hashing the message again and comparing the two
hashes.
Digital Signature
Digital Signature
Digital Certificates
Digital certificates, also known as public key certificates or identity certificates, are
crucial components of modern digital security infrastructure. They are used to
establish the authenticity of digital entities such as websites, servers, or
individuals. Here's a breakdown of how they work:
• Issuance: Digital certificates are issued by trusted entities known as Certificate
Authorities (CAs). These authorities verify the identity of the entity requesting
the certificate, ensuring they are who they claim to be.
• Content: A digital certificate typically contains several pieces of information,
including:
– Public key: This is the key used for encryption and decryption. It's paired with a
private key, which is kept secret by the entity that owns the certificate.
– Identity information: This includes details about the entity or individual the
certificate is issued to, such as their name, organization, and email address.
– Expiry date: Certificates have a limited validity period, after which they expire and
need to be renewed.
– Issuer information: Information about the CA that issued the certificate.
– Digital signature: A cryptographic signature generated by the CA, which ensures the
integrity of the certificate and confirms that it hasn't been tampered with.
Digital Certificates
• Validation: When a digital certificate is presented, such as
when accessing a website secured with HTTPS, the
recipient (e.g., a web browser) verifies the certificate's
authenticity. This involves several steps:
– Checking the digital signature: The recipient verifies that the
digital signature on the certificate is valid and matches the
public key of the CA.
– Ensuring the certificate is not expired or revoked: The recipient
checks the certificate's validity period and may consult a
Certificate Revocation List (CRL) or Online Certificate Status
Protocol (OCSP) responder to ensure it hasn't been revoked.
– Verifying the identity: The recipient confirms that the identity
information in the certificate matches the entity it claims to
represent.
Securing Network
Securing a network involves implementing various
measures to protect it from unauthorized access, misuse,
modification, or denial of service. Here's a rundown of key
steps and strategies:
• Firewalls
• Encryption
• Access Control
• Network Segmentation
• Intrusion Detection and Prevention Systems (IDPS)
• Regular Updates and Patch Management
• Antivirus and Anti-malware Software
Secure Socket Layer(SSL)
• Secure Sockets Layer (SSL) is a cryptographic protocol that ensures
secure communication over a computer network, typically the internet.
• It provides encryption, integrity, and authentication, thereby
safeguarding the confidentiality and integrity of data transmitted
between a client and a server.
• SSL protocols are widely used to secure sensitive data transmissions,
such as login credentials, credit card numbers, and personal
information.
• SSL operates by establishing a secure connection between a client (e.g.,
a web browser) and a server (e.g., a website) through a process called
the SSL handshake.
• During this handshake, the client and server agree on encryption
algorithms and exchange digital certificates to authenticate each other's
identities.
• Once the handshake is completed, data exchanged between the client
and server is encrypted, protecting it from interception or tampering by
unauthorized parties.
Transport Layer Security(TLS)
• The transport layer of the OSI model, sitting above the TCP layer.
• It's commonly used in web browsing, email communication, messaging
applications, and any other service that requires secure communication over a
network.
• Here are some key aspects of TLS:
– Encryption: TLS encrypts data exchanged between the client and the server.
This encryption ensures that even if the data is intercepted, it cannot be
understood by unauthorized parties.
– Authentication: TLS provides mechanisms for both the client and the server
to authenticate each other. This helps in ensuring that the communication is
indeed happening with the intended parties and not with imposters.
– Integrity: TLS guarantees the integrity of the data being transmitted. It uses
cryptographic hash functions to detect if the data has been tampered with
during transmission.
– Compatibility: TLS is widely supported by web browsers, servers, and other
networked applications, making it the de facto standard for securing
internet communications.
Virtual Private Network(VPN)
• A Virtual Private Network (VPN) is a technology
that creates a secure and encrypted connection
over a less secure network, such as the internet.
• It allows users to access resources on a private
network remotely as if they were directly
connected to the network's servers.
• VPNs are widely used for enhancing security and
privacy on the internet and for accessing
restricted content.
Virtual Private Network(VPN)
Here's how a VPN works:
• Encryption: When you connect to a VPN server, all data transmitted between
your device and the VPN server is encrypted. This encryption ensures that
even if someone intercepts the data, they won't be able to decipher it without
the encryption key.
• Tunneling: It a secure tunnel between your device & the VPN server. This
tunnel ensures that your data remains protected from interception while
traveling over the internet.
• Anonymity and Privacy: By connecting to a VPN server, your real IP address is
masked, and your internet traffic appears to originate from the VPN server's
location. This provides anonymity and enhances privacy, as your online
activities are more difficult to trace back to you.
• Access to Restricted Content: VPNs allow users to bypass geographic
restrictions and access content that may be blocked or restricted in their
location.
• Secure Remote Access: VPNs are commonly used by businesses to provide
secure remote access to their employees. Employees can connect to the
company's network securely from anywhere.
VPN Architecture
Protecting Networks
Protecting a network involves implementing various
security measures to safeguard it against unauthorized
access, data breaches, and other cyber threats. Here are
some essential steps to protect a network.
• Firewalls: Deploy firewalls to monitor and control
incoming and outgoing network traffic based on
predetermined security rules.
• Network Segmentation: Divide the network into
segments or zones to limit the spread of threats. This
can prevent attackers from moving laterally within the
network if one segment is compromised.
Protecting Networks
• Access Control: Implement strong authentication mechanisms such
as passwords, biometrics, or two-factor authentication (2FA) to
control access to the network resources. Use the principle of least
privilege, granting only the permissions necessary for users to
perform their jobs.
• Encryption: Encrypt sensitive data transmitted over the network
using protocols like SSL/TLS for web traffic and VPNs for remote
access. Also, encrypt data at rest to protect it if physical devices are
compromised.
• Patch Management: Regularly update network devices, operating
systems, and software applications to address vulnerabilities and
security flaws. Vulnerabilities in outdated software are often
exploited by attackers.
• Intrusion Detection and Prevention Systems (IDPS): Deploy IDPS to
monitor network traffic for signs of suspicious activity or known
attack patterns. These systems can detect and block threats in real-
time.