Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

Unit-5

NETWORK &
INFORMATION SECURITY

Computer Network &


Cyber Security
Prepared By:
Prof. Chaitanya Kale
Data Privacy

• Data privacy, sometimes also referred to as information privacy, is an


area of data protection that concerns the proper handling of sensitive
data including, notably, personal data but also other confidential data,
such as certain financial data and intellectual property data, to meet
regulatory requirements as well as protecting the confidentiality and
immutability of the data.
• Data privacy is the protection of personal data from those who should
not have access to it and the ability of individuals to determine who
can access their personal information.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Why is Data Privacy important?
• Business Asset Management: Data is perhaps the most important asset a
business owns. We live in a data economy where companies find enormous
value in collecting, sharing and using data about customers or users, especially
from social media.

• Regulatory Compliance: Managing data to ensure regulatory compliance is


arguably even more important. A business may have to meet legal
responsibilities about how they collect, store, and process personal data, and
non-compliance could lead to a huge fine. If the business becomes the victim
to a hack or ransomware, the consequences in terms of lost revenue and lost
customer trust could be even worse.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Data Storage
• Data storage is the recording (storing) of information (data) in
a storage medium.
• Handwriting, phonographic recording, magnetic tape, and optical
discs are all examples of storage media. Biological molecules such
as RNA and DNA are considered by some as data storage.
• Recording may be accomplished with virtually any form of energy.
Electronic data storage requires electrical power to store and retrieve
data.
• Data storage in a digital, machine-readable medium is sometimes
called digital data. Computer data storage is one of the core functions
of a general-purpose computer.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
What is encryption?
• Encryption means that the sender converts original information into
another form and sends the unintelligible message over the network.
• It helps us to secure data that we send, receives, and store.
• Data can be text messages saved on our cell phone, logs stored on our
fitness watch, and details of banking sent by your online account.
• It is the procedure of taking ordinary text, such as a text or email, and
transforming it into an unreadable type of format known as "cipher
text."
• The ciphertext is converted back to the real form when the recipient
accesses the message, which is known as decryption.
• It helps to protect the digital information either saved on or spread
through a network such as an internet on computer systems

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Symmetric Encryption
• Symmetric encryption encrypts and decrypts the information using a
single password.
• In this encryption technique, the message is encrypted with a key, and
the same key is used for decrypting the message.
• It is the simplest and commonly known encryption technique. It makes
it easy to use but less secure.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Symmetric Encryption

• It is called symmetric encryption because the same key is responsible


for encrypting or decrypting the data.
• The single key used in symmetric encryption is used to encrypt plain
text into ciphertext, and that same key is used to decrypt that
ciphertext back into plain text.
• Symmetric encryption is also called secret key encryption.
• The algorithm behind the symmetric encryption executes faster and
less complex, so it is the preferred technique to transmit the data in
bulk.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Asymmetric Encryption
• Asymmetric encryption uses two keys for encryption and decryption.
• It is based on the technique of public and private keys. A public key,
which is interchanged between more than one user. Data is decrypted
by a private key, which is not exchanged.
• It is slower but more secure. The public key used in this encryption
technique is available to everyone, but the private key used in it is not
disclosed.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Asymmetric Encryption
• The drawback of this encryption is that it takes more time than the
symmetric encryption process.
• Asymmetric encryption is slower than secret-key encryption because,
in secret key encryption, a single shared key is used to encrypt and
decrypt the message, while in public-key encryption, two different
keys are used, both related to each other by a complex mathematical
process.
• Therefore, we can say that encryption and decryption take more time
in public-key encryption.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Diffie-Hellman Key Exchange

• The Diffie-Hellman key exchange (also known as exponential key


exchange) is a method for securely exchanging cryptographic keys
over an insecure channel.
• It is a fundamental building block of many secure communication.
• The security of the Diffie-Hellman key exchange relies on the fact that
it is computationally infeasible for an attacker to determine the shared
secret keys from the public values protocols, including SSL/TLS and
SSH.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Where is Diffie-Hellman Key Exchange Used?

• The Diffie-Hellman key exchange (also known as exponential key


exchange) is a widely used and trusted technique for securely
exchanging cryptographic keys over an insecure channel. It is used in
many different contexts, including −
• Secure communication protocols − The Diffie-Hellman key exchange
is used in many secure communication protocols, such as SSL/TLS and
SSH, to establish a secure channel between two parties. It allows the
parties to agree on a shared secret key that can be used to encrypt and
decrypt messages exchanged over the channel.
• Virtual private networks (VPNs) − The Diffie-Hellman key exchange
is often used in VPNs to establish a secure connection between a client
and a server. It allows the client and server to agree on a shared secret
key that can be used to encrypt and decrypt traffic exchanged over the
VPN connection.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Where is Diffie-Hellman Key Exchange Used?

• Secure file transfer protocols − The Diffie-Hellman key exchange is


used in many secure file transfer protocols,such as SFTP and FTPS, to
establish a secure channel for transferring files between two parties.It
allows the parties to agree on a shared secret key that can be used to
encrypt and decrypt the transferred files.

• Other applications − The Diffie-Hellman key exchange is also used in


many other applications where secure communication is required, such
as secure email, secure web browsing, and secure voice over IP (VoIP).
It is a flexible and widely supported technique for establishing secure
communication channels.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure

• The most distinct feature of Public Key Infrastructure (PKI) is that it


uses a pair of keys to achieve the underlying security service. The key
pair comprises of private key and public key.
• PKI provides assurance of public key. It provides the identification of
public keys and their distribution. An anatomy of PKI comprises of the
following components.
– Public Key Certificate, commonly referred to as ‘digital
certificate’.
– Private Key tokens.
– Certification Authority.
– Registration Authority.
– Certificate Management System.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
1. Digital Certificate

• For analogy, a certificate can be considered as the ID card issued to


the person. People use ID cards such as a driver's license, passport to
prove their identity.
• Digital Certificates are not only issued to people but they can be issued
to computers, software packages or anything else that need to prove
the identity in the electronic world.
• Digital certificates are based on the ITU standard X.509 which defines
a standard certificate format for public key certificates and
certification validation. Hence digital certificates are sometimes also
referred to as X.509 certificates.
• Public key pertaining to the user client is stored in digital certificates
by The Certification Authority (CA) along with other relevant
information such as client information, expiration date, usage, issuer
etc.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
2. Certifying Authority (CA)
• The key functions of a CA are as follows −
• Generating key pairs − The CA may generate a key pair
independently or jointly with the client.
• Issuing digital certificates − The CA could be thought of as the PKI
equivalent of a passport agency − the CA issues a certificate after
client provides the credentials to confirm his identity. The CA then
signs the certificate to prevent modification of the details contained in
the certificate.
• Publishing Certificates − The CA need to publish certificates so that
users can find them. There are two ways of achieving this. One is to
publish certificates in the equivalent of an electronic telephone
directory. The other is to send your certificate out to those people you
think might need it by one means or another.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
3. Certifying Authority (CA)
• The key functions of a CA are as follows −
• Verifying Certificates − The CA makes its public key available in
environment to assist verification of his signature on clients’ digital
certificate.
• Revocation of Certificates − At times, CA revokes the certificate
issued due to some reason such as compromise of private key by user
or loss of trust in the client. After revocation, CA maintains the list of
all revoked certificate that is available to the environment.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
4. Registration Authority (RA)

• CA may use a third-party Registration Authority (RA) to perform the


necessary checks on the person or company requesting the certificate
to confirm their identity.
• The RA may appear to the client as a CA, but they do not actually sign
the certificate that is issued.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
5. Certificate Management System (CMS)

• It is the management system through which certificates are published,


temporarily or permanently suspended, renewed, or revoked.
• Certificate management systems do not normally delete certificates
because it may be necessary to prove their status at a point in time,
perhaps for legal reasons.
• A CA along with associated RA runs certificate management systems
to be able to track their responsibilities and liabilities.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Infrastructure
6. Private Key Tokens

• While the public key of a client is stored on the certificate, the


associated secret private key can be stored on the key owner’s
computer. This method is generally not adopted.
• If an attacker gains access to the computer, he can easily gain access to
private key.
• For this reason, a private key is stored on secure removable storage
token access to which is protected through a password.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Why is user authentication important?

• Requiring users to provide and prove their identity adds a layer of


security between adversaries and sensitive data.
• With authentication, IT teams can employ the least privileged access
to limit what employees can see.
• The average employee, for example, doesn't need access to company
financials, and accounts payable doesn't need to touch developer
projects.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
1. Kerberos
• Kerberos is a type of protocol that is used to authenticate users.
• It validates the client and server during networking with the help of a
cryptographic key.
• It is designed to strongly authenticate the users during the reporting of
the application.
• All the proposals of Kerberos are available at MIT.
• The main use of the Kerberos is in the product-based companies.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
2. Lightweight Directory Access Protocol(LDAP)

• LDAP stands for Lightweight Directory Access Protocol. With


the help of this protocol, we can determine the organization,
individual, or any other devices during the networking over the
internet.
• It is also called a Directory as a service. Lightweight Directory
Access Protocol (LDAP) is the ground for Microsoft Building
Activity Directory.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
3. OAuth2

• OAuth2 is a type of authentication protocol for the framework. It


provides permission to the users which are coming through the HTTP
servers.
• When the user makes a request to access the resources, suddenly, an
API call is created, and after that, the authentication token is
generated.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
3. SAML

• SAML stands for Security Assertion Markup Language.


• It is based on an XML-based authentication protocol.
• It provides authorization between the service provider and the identity
provider.
• It is also a product of the OASIS Security Service Technical
Committee.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Public Key Authentication Protocols
3. RADIUS

• RADIUS stands for Remote Authentication Dial-In User Service.


• It is a type of network protocol that provides accounting, centralized
authentication, and authorization.
• When the user makes a request to access all the resources, the
RADIUS server creates a temporary credential to access all the
resources.
• After this, the temporary credential is saved on the local database and
provides access to the user.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
PGP (Pretty Good Privacy)

• PGP stands for Pretty Good Privacy (PGP) which is invented by Phil
Zimmermann.
• PGP was designed to provide all four aspects of security, i.e., privacy,
integrity, authentication, and non-repudiation in the sending of email.
• PGP uses a digital signature (a combination of hashing and public key
encryption) to provide integrity, authentication, and non-repudiation.
• PGP uses a combination of secret key encryption and public key
encryption to provide privacy.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
PGP (Pretty Good Privacy)
• PGP is an open source and freely available software package for email
security.
• PGP provides authentication through the use of Digital Signature.
• It provides confidentiality through the use of symmetric block
encryption.
• It provides compression by using the ZIP algorithm, and EMAIL
compatibility using the radix-64 encoding scheme.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
IPSec (Internet Protocol Security)
• IP Security (IPSec) is a collection of protocols which is designed by
Internet Engineering Task Force (IETF) to provide security for a
packet at the network level.
• It helps to create confidential and authenticated and packets for the IP
layer as shown in below diagram −

• IPSec protocol aim is to provide security services for IP packets like


encrypting sensitive data/packets, authentication, and protection
against replay and data confidentiality.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Firewalls
• A firewall can be defined as a special type of network security device
or a software program that monitors and filters incoming and outgoing
network traffic based on a defined set of security rules.
• It acts as a barrier between internal private networks and external
sources (such as the public Internet).
• The primary purpose of a firewall is to allow non-threatening traffic
and prevent malicious or unwanted data traffic for protecting the
computer from viruses and attacks.
• A firewall is a cybersecurity tool that filters network traffic and helps
users block malicious software from accessing the Internet in infected
computers.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Firewalls

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
SOAR- Security orchestration,
automation and response

• Security orchestration, automation and response, or SOAR, is a stack


of compatible software programs that enables an organization to
collect data about security threats and respond to security events with
little or no human assistance.
• The goal of using a SOAR platform is to improve the efficiency of
physical and digital security operations.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
SOAR

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Edge Computing
• Edge Computing is a buzzword such as cloud, IoT, and Artificial
Intelligence.
• Simply saying, Edge Computing brings the decentralization of
networks.
• Edge Computing is the upcoming enhancement and advancement in
technology.
• The literal meaning of the word 'Edge' is the geographic location on
the planet to deliver services in a distributed manner.
• Edge Computing is a distributed computing system that allows to
bring computation of data and storage too close to the source (where
data is required).
• It brings computing as much close as possible so as to minimize the
bandwidth, improve response time, and use of latency.
• Instead of locating the data at a centralized place, the concept of edge
computing believes in distributing the computing process of the data.

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Challenges in Edge Computing

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Applications of Edge Computing

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
Benefits of Edge Computing

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale
References

• Fourauzan B., "Data Communications and Networking", 5th Edition,


Tata McGraw- Hill, Publications, ISBN: 0 – 07 – 058408 – 7.
• William Stallings; “Cryptography and Network Security-Principles
and Practices” 6th Edition , Pearson Education, 2014,
ISBN13:9780133354690.
• Bernard Menezes, “Network Security and Cryptography”, 1st Edition,
Cengage Learning, 2010, ISBN 81-315-1349-1.
• Raef Meeuwisse, “Cybersecurity for Beginners”, 2nd Edition, Cyber
Simplicity, 2017, ISBN- 9781911452157.
• Javapoint.com

Unit-5 Network & Information Security || Class- TY Mtrx || Prepared By: Prof. Chaitanya Kale

You might also like