Professional Documents
Culture Documents
NSP-background 2024
NSP-background 2024
CST 434
Overview of Security
Background
AGENDA
• What is security
• Need for security
• Security definition
• Security Principles/Goals
• Security attacks
• Attack on security goals
• Model for network security
• Methods of Defense
• Cryptography
• Symmetric Vs Public Key Cryptography
Overview
• What is security?
• Why do we need security?
• Who is vulnerable?
What is “Security”
• Cryptography
– Study of mathematical techniques related to aspects of
information security (Set of techniques)
• Cryptanalysis
– The process of breaking the security policies
• Cryptology
- Cryptography + cryptanalysis
• Cryptosystems are computer systems used to encrypt data for
secure transmission and storage
Vulnerability Vs Threat
• Vulnerability and threat are fundamental concepts in cybersecurity,
and they refer to distinct aspects of the security landscape.
• Vulnerability: A vulnerability is a weakness or flaw in a system,
application, or network that can be exploited by a threat to
compromise its security. It's a gap in security measures that, if
exploited, could lead to unauthorized access, data breaches, or other
negative consequences. Vulnerabilities can arise due to coding errors,
misconfigurations, design flaws, or other factors. Identifying and
patching vulnerabilities is essential to prevent potential threats from
exploiting them.
• Threat: A threat is a potential danger or harmful action that could
exploit vulnerabilities and cause harm to an organization's assets,
systems, or data. Threats can be either internal or external and
encompass a wide range of actors, such as hackers, malware,
disgruntled employees, or natural disasters. Threats exploit
vulnerabilities to carry out attacks, and they can vary in severity and
impact. Threats can be intentional (malicious) or unintentional
(accidental).
Launching the attack
Steps are
1. Vulnerability - a flaw in a system’s design, security procedures, or
internal controls
2. Discovery of Vulnerability-Trace
3. Threat - a malicious act that seeks to steal or damage data or
discompose the digital network or system
4. Exploitation of Vulnerability-Utilize
5. Attack-Make Damage/Impact
Scenario: Hospital Ransomware Attack
• Vulnerability
• Flaw: A hospital's computer system runs outdated software, lacking the latest
security patches. This creates a vulnerability in their network's security.
• Discovery of Vulnerability
• Trace: Cybercriminals use automated scanning tools and discover that the hospital's
network is using vulnerable, outdated software.
• Threat
• Malicious Act: The attackers plan a ransomware attack, intending to encrypt the
hospital's data and demand payment for its release, thereby causing significant
disruption to hospital operations.
• Exploitation of Vulnerability
• Utilize: The attackers exploit the identified vulnerability by using a known exploit
(malicious code) that takes advantage of the outdated software to gain unauthorized
access to the hospital’s network.
• Attack
• Make Damage/Impact: Once inside the network, the attackers deploy ransomware,
which encrypts critical data, including patient records and administrative
information. They demand a ransom in exchange for the decryption key. This attack
leads to disrupted medical services, delayed patient care, and potential risk to patient
safety.
Attacks, Services and Mechanisms
• Encryption
• Software Controls (access limitations in a data base, in operating
system protect each user from other users)
• Hardware Controls (smartcard)
• Policies (frequent changes of passwords)
• Physical Controls
Cryptographic Techniques
Cryptography
Some security services can be implemented using
cryptography. Cryptography, a word with Greek origins,
means “secret writing”.
Steganography
The word steganography, with its origin in Greek, means
“covered writing”, in contrast to cryptography, which means
“secret writing”.
Basic Terminology
• plaintext - the original message
• ciphertext - the coded message
• cipher - algorithm for transforming plaintext to
ciphertext
• key - info used in cipher known only to
sender/receiver
• encipher (encrypt) - converting plaintext to
ciphertext
• decipher (decrypt) - recovering ciphertext from
plaintext
• cryptography - study of encryption
principles/methods
• cryptanalysis (code breaking) - the study of
principles/ methods of deciphering ciphertext
without knowing key
Basic Terminologies
• Advantages:
– Simple
– Faster
• Disadvantages:
– Key must exchanges in secure way
– Easy for hacker to get a key as it is passed in unsecure
way.
– No Authentication
Asymmetric-key cryptography
Public Key Cryptography
Public Key Infrastructure (PKI)
Asymmetric-key cryptography
Public Key Cryptography
Public Key Infrastructure (PKI)
Merits:
• More secured
• Two parties don't need to have their private keys already shared in order to
communicate using encryption.
• Authentication and Non-Repudiation are possible. (Authentication means
that you can encrypt the message with my public key and only I can decrypt it
with my private key.
• Non-repudiation means that you can "sign" the message with your private
key and I can verify that it came from you with your public key.)
De-Merits: Asymmetric Encryption algorithms are comparatively complex.
• Time consuming process for Encryption and Decryption. Complex, resource
intensive
Thank You