Professional Documents
Culture Documents
Security Fundamental
Security Fundamental
Functions:
- framing.
- Mac Addresses.
- Error control.
Sub-layers:
- LLC (logical link control).
- MAC (Media Access Control).
ISO 7 Layers
Functions :
- Logical Addressing.
- Encapsulating.
- Routing.
ISO 7 Layers
Functions:
- Segmenting.
- TCP / UDP Protocols.
ISO 7 Layers
Function :
Initiate , Manage , Terminate Session.
ISO 7 Layers
Functions :
- encryption.
- Compression.
- Formatting.
ISO 7 Layers
Hop-to-hop delivery
Endpoint Security
Endpoint Protection
• Endpoints are hosts which commonly consist
of laptops, desktops, servers, and IP phones,
as well as employee-owned devices.
Endpoints are particularly susceptible to
malware-related attacks that originate
through email or web browsing.
• Endpoints have typically used traditional
host-based security features, such as
antivirus/antimalware, host-based firewalls,
and host-based intrusion prevention systems
(HIPSs).
• Endpoints today are best protected by a
combination of NAC, an email security
appliance (ESA), and a web security appliance
(WSA).
Layer 2 Security Threats
Layer 2 Vulnerabilities
Recall that the OSI reference model is divided into seven
layers which work independently of each other. The figure
shows the function of each layer and the core elements
that can be exploited.
51
Security Services
• Authentication - assurance that the communicating entity is the one claimed
52
Data Confidentiality
• Data Confidentiality
De f I n I t I o n
53
Definitions
• Plaintext: easy to understand form (original message)
54
Definitions
• Hacking.
• Cracking.
De f I n I t I o n
• Ethical hacking.
56
list of important terms used in the field
of hacking:
• Adware − Adware is software designed to force pre-chosen ads to display on your system.
• Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and
password protections.
• Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal
information.
• Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan
horses, spyware, adware, scareware, and other malicious programs.
• Spyware − Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such
information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
• SQL Injection − SQL injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are
inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
• Trojan − A Trojan, or Trojan Horse, is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that
are supposed to be there designed with an intention to destroy files, alter information, steal passwords or other information.
• Virus − A virus is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the
system or destroying data.
• Zombie Drone − A Zombie Drone is defined as a hi-jacked computer that is being used anonymously as a soldier or 'drone' for malicious activity, for
example, distributing unwanted spam e-mails.
Encryption (Ciphering)
58
Classes: Block cipher vs. Stream cipher
62
Classes: Block cipher vs. Stream cipher
operation
63
Classes: Block cipher vs. Stream cipher
64
Modes: (ECB, CBC, CFB, OFB, CTR)
65
Modes: (ECB, CBC, CFB, OFB, CTR)
66
Encryption - Types
Symmetrical Encryption
Encryption
Asymmetrical Encryption
67
Symmetrical Encryption
Symmetrical Classic
Symmetrical Encryption[
Symmetrical Modern
69
Symmetrical Classic Encryption
• Example of Symmetrical Classic Encryption:
• Caesar / Rot-13 …
• Vigenere …
• Hill …
• Substitution / Atbash …
• Playfair …
• ADFGVX …
• Byte Addition …
• XOR …
• Vernam …
• Homophone…
• Permutation / Transposition …
• Solitaire …
70
Caesar Cipher (too old – not used today)
• can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
• example:
• K=3
meet me after the party
PHHW PH DIWHU WKH SDUWB
• then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
71
where P = plaintext, C = ciphertext, E = the encryption method, D = the decryption method, and k = the key.
How to find the key ?
Only 26 possible keys – try them all !
Example Cryptanalysis
• given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
This is an unusual paragraph. I’m curious how quickly you can find out what is so unusual about it. It looks so
plain you would think nothing was wrong with it. In fact, nothing is wrong with it! It is unusual though. Study it,
and think about it, but you still may not find anything odd. But if you work at it a bit, you might find out! Try to
do so without any coaching! You probably won’t, at first, find anything particularly odd or unusual or in any way
dissimilar to any ordinary composition. That is not at all surprising, for it is no strain to accomplish in so short a
paragraph a stunt similar to that which an author did throughout all of his book, without spoiling a good writing
job, and it was no small book at that. By studying this paragraph assiduously, you will shortly, I trust, know what
is its distinguishing oddity. Upon locating that “mark of distinction,” you will probably doubt my story of this
author and his book of similar unusuality throughout. It is commonly known among book-conscious folk and
proof of it is still around. If you must know, this sort of writing is known as a lipogram, but don’t look up that
word in any dictionary until you find out what this is all about.—Unknown
Modern Symmetrical Encryption
78
Symmetrical Encryption
Symmetrical Classic
Symmetrical Encryption[
Symmetrical Modern
79
Symmetrical Modern Encryption
80
Asymmetrical Encryption
Public Key Encryption – Encryption
Asymmetrical Encryption
Digital Signature
Asymmetrical Encryption
• This authenticates sender, who is only person who has the matching key
• Diffie-Hellman
• Users Alice & Bob who wish to swap keys agree on:
• Prime q=353 and α=3