Security and Cryptographhy
Security and Cryptographhy
LECTURE NOTES
person a message was intended for can read it. The art of cryptography has been
used to code messages for thousands of years and continues to be used in bank
ensure only the person that a message was written for can read and process the
Cryptography can be traced all the way back to ancient Egyptian hieroglyphics
1
through techniques like cryptographic keys and digital signing to protect data
Types of Cryptography
Hash Function
this type of cryptography, you can use only a single key. The sender and the
receiver can use that single key to encrypt and decrypt a message. Because there
is only one key for encryption and decryption, the symmetric key system has
2
one major disadvantage: the two parties must exchange the key in a secure
employs the use of two keys. This cryptography differs from and is more secure
than symmetric key cryptography. In this system, each user encrypts and
decrypts using two keys or a pair of keys (private key and public key). Each
user keeps the private key secret and the public key is distributed across the
network so that anyone can use those public keys to send a message to any other
user. You can use any of those keys to encrypt the message and can use the
key cryptography.
3
Hash Function
This algorithm makes no use of any keys. A hash value with a fixed length is
calculated based on the plain text, making it impossible to recover the plain
functions.
Cryptographic algorithms are primarily of two types, and you can use them for
principle. It converts plain text to ciphertext at the receiver end and vice versa.
If we use User A’s public key for encryption, we must use the same user’s
4
DES: Data Encryption Standard (DES) is a symmetric cipher algorithm that
encrypts and decrypts data using the block cipher method. The algorithm uses
48-bit keys to convert the plain text in 64-bit blocks into ciphertext. It operates
Examples of Cryptography
encryption these days. This feature is available in WhatsApp via the asymmetry
model or public key methods. Only the intended recipient is aware of the actual
message. After the WhatsApp installation, the server registers the public keys,
Digital signatures are the next real-time application of cryptography. When two
clients must sign documents for a business transaction. However, if two clients
never meet, they may not believe each other. The use of encryption in digital
encrypt text by combining them with keys such as phrases, digits, words, and so
5
on. You can define the effectiveness by the strength of the cryptographic
Applications of Cryptography
sender and the intended receiver without any addition to the information being
detected.
Conclusion
6
unauthorized access. This is where cryptography comes into play. Cryptography
Cyber security is the most concerned matter as cyber threats and attacks are
7
being impacted. So, all these firms whether IT or non-IT firms have understood
8
• Cyber is related to the technology which contains systems, network and
programs or data.
Listed below are the reasons why cyber security is so important in what’s
Because of the above reasons, cyber security has become an important part of
the business and the focus now is on developing appropriate response plans that
9
Cyber security Fundamentals – Confidentiality:
parties.
• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
Integrity
parties.
• Cryptographic checksums
10
• Data backups
Availability
Availability is making sure that authorized parties are able to access the
• Implementing firewalls
• Data redundancy
malicious code to alter computer code, logic or data and lead to cybercrimes,
1) Web-based attacks
2) System-based attacks
11
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the
1. Injection attacks
It is the attack in which some data will be injected into a web application to
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
introduced into a DNS resolver's cache causing the name server to return an
computer. The DNS spoofing attacks can go on for a long period of time
3. Session Hijacking
applications create cookies to store the state and user sessions. By stealing the
4. Phishing
user login credentials and credit card number. It occurs when an attacker is
12
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a
large number of guesses and validates them to obtain actual data like user
6. Denial of Service
the users. It accomplishes this by flooding the target with traffic or sending it
information that triggers a crash. It uses the single system and single internet
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site,
packet.
Application layer attacks- Its goal is to crash the web server and is measured in
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated
8. URL Interpretation
13
It is a type of attack where we can change the certain parts of a URL, and one
can make a web server to deliver web pages for which he is not authorized to
browse.
files which is available on the web server or to execute malicious files on the
client and server and acts as a bridge between them. Due to this, an attacker will
be able to read, insert and modify the data in the intercepted connection.
System-based attacks
1. Virus
programs when executed. It can also execute instructions that cause harm to the
system.
2. Worm
14
It is a type of malware whose primary function is to replicate itself to spread to
3. Trojan horse
and unusual activity, even when the computer should be idle. It misleads the
4. Backdoors
5. Bots
A bot (short for "robot") is an automated process that interacts with other
network services. Some bots program run automatically, while others only
execute commands when they receive specific input. Common examples of bots
The 7 layers of cyber security should center on the mission critical assets you
15
2: Data Security – Data security controls protect the storage and transfer of
data.
7: The Human Layer – Humans are the weakest link in any cyber security
management controls that protect mission critical assets from a wide variety of
users.
attacks. Any company that manages, transmits, stores, or otherwise handles data
16
Before identifying specific dangers to modern data systems, it is crucial to
Cyber threats are security incidents or circumstances with the potential to have a
result in the installation of malware that infects your data, failure of a staff
member to follow data protection protocols that cause a data breach, or even a
tornado that takes down your company’s data headquarters, disrupting access.
Types of vulnerabilities in network security include but are not limited to SQL
When threat probability is multiplied by the potential loss that may result, cyber
17
SECURITY VULNERABILITIES, THREATS AND ATTACKS – Categories
of vulnerabilities
18
• Passive – Make use of information from the system without affecting
system resources
Computer criminals
and data; they have the potential to cripple much of effective business and
We say computer crime is any crime involving a computer or aided by the use
ways to protect ourselves, our businesses, and our communities against those
crimes and why. Many studies have attempted to determine the characteristics
19
commit crimes, we may be able in the future to spot likely criminals and prevent
CIA Triad
The CIA Triad is actually a security model that has been developed to help
Confidentiality
It's crucial in today's world for people to protect their sensitive, private
collections that are organized by who needs access to the information and how
sensitive that information actually is - i.e. the amount of damage suffered if the
Some of the most common means used to manage confidentiality include access
control lists, volume and file encryption, and Unix file permissions.
Integrity
20
Data integrity is what the "I" in CIA Triad stands for.
This is an essential component of the CIA Triad and designed to protect data
from deletion or modification from any unauthorized party, and it ensures that
when an authorized person makes a change that should not have been made the
Availability
This is the final component of the CIA Triad and refers to the actual availability
of your data. Authentication mechanisms, access channels and systems all have
to work properly for the information they protect and ensure it's available when
it is needed.
The CIA Triad is all about information. While this is considered the core factor
For example, even though availability may serve to make sure you don't lose
about information security in itself doesn't guarantee that someone else hasn't
It's important to understand what the CIA Triad is, how it is used to plan and
21
principles behind it. It's also important to understand the limitations it presents.
When you are informed, you can utilize the CIA Triad for what it has to offer
and avoid the consequences that may come along by not understanding it.
organization’s most common assets are information assets. These are things
such as databases and physical files – i.e. the sensitive data that you store
What is a threat: A threat is any incident that could negatively affect an asset –
or accidental.
22
Motive of Attackers
motivations and the actions they take. As shown in Figure, operational cyber
security risks arise from three types of actions: i) inadvertent actions (generally
by insiders) that are taken without malicious or harmful intent; ii) deliberate
actions (by insiders or outsiders) that are taken intentionally and are meant to do
harm; and iii) inaction (generally by insiders), such as a failure to act in a given
availability of the correct person to take action Of primary concern here are
retaliatory actions.
other economically valuable assets (e.g., funds, credit card information); fraud;
also include fun, curiosity, and a desire for publicity or ego gratification.
23
Types of Active attacks:
system to gain access or to gain greater privileges than they are authorized for.
A masquerade may be attempted through the use of stolen login IDs and
authentication mechanism.
Session replay: In this type of attack, a hacker steals an authorized user’s log in
information by stealing the session ID. The intruder gains access and the ability
machine.
web resource.
single target.
24
Passive Attacks: Passive attacks are relatively scarce from a classification
perspective, but can be carried out with relative ease, particularly if the traffic is
not encrypted.
two entities. For the attack to be useful, the traffic must not be encrypted. Any
Traffic analysis: the attacker looks at the metadata transmitted in traffic in order
to deduce information relating to the exchange and the participating entities, e.g.
the form of the exchanged traffic (rate, duration, etc.). In the cases where
encrypted data are used, traffic analysis can also lead to attacks by
without the user's knowledge or approval. It can be very difficult to remove and
very damaging.
Characteristics
25
• Requires a host to replicate and usually attaches itself to a host file or a
things, such as delete files or send documents via e-mail. A worm can
worm:
horse attacks because security is user focused and user directed. Thus the
26
compromise of a user account could lead to the compromise of the entire
A Logic Bomb is malware that lies dormant until triggered. A logic bomb is a
Hardware Attacks:
backdoors aren’t limited to software and hardware, but they also affect
other hardware
27
• Backdoor creation; the presence of hidden methods for bypassing normal
- like computer viruses and hacking -- by one country to disrupt the vital
computer systems of another, with the aim of creating damage, death and
destruction. Future wars will see hackers using computer code to attack an
service attacks.
Cyber Crime:
by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly
28
Cyber Terrorism:
unlawful attacks and threats of attacks against computers, networks and the
obtaining secrets and information without the permission and knowledge of the
Security Policies:
29
A security policy also considered to be a "living document" which means that
the document is never finished, but it is continuously updated as requirements of
the technology and employee changes.
We use security policies to manage our network security. Most types of security
policies are automatically created during the installation. We can also customize
policies to suit our specific environment.
1) It increases efficiency.
30
31
INTRODUCTION: CYBER FORENSICS
CYBER FORENSICS:
Computer forensics is the application of investigation and analysis techniques to gather and
preserve evidence.
32
Forensic examiners typically analyze data from personal computers, laptops, personal digital
assistants, cell phones, servers, tapes, and any other type of media. This process can involve
anything from breaking encryption, to executing search warrants with a law enforcement
team, to recovering and analyzing files from hard drives that will be critical evidence in the
most serious civil and criminal cases.
The forensic examination of computers, and data storage media, is a complicated and highly
specialized process. The results of forensic examinations are compiled and included in
reports. In many cases, examiners testify to their findings, where their skills and abilities are
put to ultimate scrutiny.
DIGITAL FORENSICS:
Computer forensics is also important because it can save your organization money. ... From a
technical standpoint, the main goal of computer forensics is to identify, collect, preserve, and
analyze data in a way that preserves the integrity of the evidence collected so it can be used
effectively in a legal case.
33
In an effort to fight e-crime and to collect relevant digital evidence for all crimes, law
enforcement agencies are incorporating the collection and analysis of digital evidence, also
known as computer forensics, into their infrastructure. Law enforcement agencies are
challenged by the need to train officers to collect digital evidence and keep up with rapidly
evolving technologies such as computer operating systems.
34
FORENSICS ANALYSIS OF EMAIL:
E-mail forensics refers to the study of source and content of e-mail as evidence to identify the
actual sender and recipient of a message, data/time of transmission, detailed record of e-mail
transaction, intent of the sender, etc. This study involves investigation of metadata, keyword
searching, port scanning, etc. for authorship attribution and identification of e-mail scams.
• Header Analysis – Meta data in the e-mail message in the form of control
information i.e. envelope and headers including headers in the message body contain
information about the sender and/or the path along which the message has traversed.
Some of these may be spoofed to conceal the identity of the sender. A detailed
analysis of these headers and their correlation is performed in header analysis.
• Bait Tactics – In bait tactic investigation an e-mail with http: “<imgsrc>” tag having
image source at some computer monitored by the investigators is send to the sender
of e-mail under investigation containing real (genuine) e-mail address. When the e-
mail is opened, a log entry containing the IP address of the recipient (sender of the e-
mail under investigation) is recorded on the http server hosting the image and thus
sender is tracked. However, if the recipient (sender of the e-mail under investigation)
is using a proxy server then IP address of the proxy server is recorded. The log on
proxy server can be used to track the sender of the e-mail under investigation. If the
proxy server’s log is unavailable due to some reason, then investigators may send the
tactic e-mail containing a) Embedded Java Applet that runs on receiver’s computer or
b) HTML page with Active X Object. Both aiming to extract IP address of the
receiver’s computer and e-mail it to the investigators.
35
when ISP or proxy does not maintain a log or lack of co-operation by ISP’s or failure
to maintain chain of evidence.
Erasing or deleting an email doesn’t necessarily mean that it is gone forever. Often emails
can be forensically extracted even after deletion. Forensic tracing of e-mail is similar to
traditional detective work. It is used for retrieving information from mailbox files.
• OST and PST Viewer – Nucleus Technologies’ OST and PST viewer tools help you
view OST and PST files easily without connecting to an MS Exchange server. These
tools allow the user to scan OST and PST files and they display the data saved in it
including email messages, contacts, calendars, notes, etc., in a proper folder structure.
36
The geographical location of an IP address is key information for determining the
threat level or validity of an e-mail message.
Collection: The first step in the forensic process is to identify potential sources of data and
acquire data from them.
Examination:After data has been collected, the next phase is to examine the data, which
involves assessing and extracting the relevant pieces of information from the collected data.
This phase may also involve bypassing or mitigating OS or application features that obscure
data and code, such as data compression, encryption, and access control mechanisms.
Analysis: Once the relevant information has been extracted, the analyst should study and
analyze the data to draw conclusions from it. The foundation of forensics is using a
methodical approach to reach appropriate conclusions based on the available data or
determine that no conclusion can yet be drawn.
37
Reporting: The process of preparing and presenting the information resulting from the
analysis phase. Many factors affect reporting, including the following:
FORENSICS INVESTIGATION:
Forensics are the scientific methods used to solve a crime. Forensic investigation is the
gathering and analysis of all crime-related physical evidence in order to come to a conclusion
about a suspect. Investigators will look at blood, fluid, or fingerprints, residue, hard drives,
computers, or other technology to establish how a crime took place. This is a general
definition, though, since there are a number of different types of forensics.
38
39
TYPES OF FORENSICS INVESTIGATION
• Forensic Archaeology
• Forensic Dentistry
• Forensic Entomology
• Forensic Graphology
• Forensic Pathology
• Forensic Psychology
• Forensic Science
• Forensic Toxicology
Digital forensics has been defined as the use of scientifically derived and proven methods
towards the identification, collection, preservation, validation, analysis, interpretation, and
presentation of digital evidence derivative from digital sources to facilitate the reconstruction
of events found to be criminal.But these digital forensics investigation methods face some
major challenges at the time of practical implementation. Digital forensic challenges are
categorized into three major heads as per Fahdi, Clark, and Furnell are:
• Technical challenges
• Legal challenges
• Resource Challenges
40
TECHNICAL CHALLENGES
As technology develops crimes and criminals are also developed with it. Digital forensic
experts use forensic tools for collecting shreds of evidence against criminals and criminals
use such tools for hiding, altering or removing the traces of their crime, in digital forensic this
process is called Anti- forensics technique which is considered as a major challenge in digital
forensics world.
2 Data hiding in storage space Criminals usually hide chunks of data inside the
storage medium in invisible form by using system
commands, and programs.
41
Other Technical challenges are:
• Skill gap
• Steganography
• Legal challenges
42