Sub:Network Security: UNIT-1
Sub:Network Security: UNIT-1
Sub:Network Security: UNIT-1
UNIT-1
Information Security:
It can be defined as measures adopted to
prevent the unauthorized use, misuse,
modification or denial of use of knowledge,
facts, data.
Information security has been affected by
two major developments over the last several
decades.
Introduction of computers into organizations.
Introduction of distributed systems.
Security Attacks
Availability:
Assures that systems work promptly and
service is not denied to authorized users.
Integrity:
Assures that information and programs are
changed only in a specified and authorized
manner.
Confidentiality:
Assures that private or confidential information is
not made available or disclosed to unauthorized
individuals
Authenticity:
Verifying that users are who they say they are
and that each input arriving at the system
came from a trusted source.
Interception
An unauthorized party gains access to an asset. Attack
on confidentiality.
Examples:
Wire tapping to capture data in a network.
Illicitly copying data or programs
Eavesdropping
Modification:
When an unauthorized party gains access and tampers
an asset. Attack is on Integrity.
Examples:
Changing data file
Altering a program and the contents of a message
Fabrication
An unauthorized party inserts a counterfeit
object into the system. Attack on Authenticity.
Also called impersonation.
Examples:
Hackers gaining access to a personal email and
sending message
Insertion of records in data files
nsertion of spurious messages in a network
Security Attacks
Security attacks can be classified in terms of
Passive attacks and Active attacks.
Passive attacks:
Passive attacks are very difficult to detect
because they do not involve any alternation of
the data.
As the communications take place in a very
normal fashion, neither the sender nor
receiver is aware that a third party has read
the messages or observed the traffic pattern.
So, the emphasis in dealing with passive
attacks is on prevention rather than detection.
Active attacks:
it is quite difficult to prevent active attacks
absolutely, because of the wide variety of
potential physical, software and network
vulnerabilities.
Instead, the goal is to detect active attacks
and to recover from any disruption or delays
caused by them.
Security Services:
It is a processing or communication service
that is provided by a system to give a specific
kind of production to system resources.
Security services implement security policies
and are implemented by security mechanisms.
Confidentiality
Confidentiality is the protection of transmitted
data from passive attacks.
It is used to prevent the disclosure of information
to unauthorized individuals or systems.
It has been defined as ensuring that information
is accessible only to those authorized to have
access.
Protection of traffic flow from analysis. Ex: A
credit card number has to be secured during
online transaction.
Authentication
This service assures that a communication is
authentic.
For a single message transmission, its function is
to assure the recipient that the message is from
intended source.
For an ongoing interaction two aspects are
involved:
First, during connection initiation the service
assures the authenticity of both parties.
Second, the connection between the two hosts is
not interfered allowing a third party to
masquerade as one of the two parties.
Integrity
Integrity means that data cannot be modified
without authorization.
Like confidentiality, it can be applied to a
stream of messages, a single message or
selected fields within a message.
Two types of integrity services are available. They are
Non-repudiation
Non-repudiation prevents either sender or
receiver from denying a transmitted message.
This capability is crucial to e-commerce. Without
it an individual or entity can deny that he, she or
it is responsible for a transaction, therefore not
financially liable.
Access Control
It is the ability to limit and control the access to
host systems and applications via communication
links. For this, each entity trying to gain access
must first be identified or authenticated, so that
access rights can be tailored to the individuals.
Availability
It is defined to be the property of a system or
a system resource being accessible and usable
upon demand by an authorized system entity.
Security Mechanisms:
Specific Security Mechanisms:
Encipherment: It refers to the process of applying
mathematical algorithms for converting data into a
form that is not intelligible. This depends on algorithm
used and encryption keys.
Digital Signature: The appended data or a
cryptographic transformation applied to any data unit
allowing to prove the source and integrity of the data
unit and protect against forgery.
Access Control: A variety of techniques used for
enforcing access permissions to the system resources.
Data Integrity: A variety of mechanisms used to assure
the integrity of a data unit or stream of data units.
Session Hijacking:
Session Hijacking is security threat to which
most systems are prone to.
Session hijack is a process whereby the
attacker inserts themselves into an existing
communication session
between
two
computers.
The three main protocols that manage the
data flow on which session hijacking occurs
are TCP, UDP, and HTTP.