CH5-6 CS Lecture
CH5-6 CS Lecture
CH5-6 CS Lecture
Security Mechanism
Security mechanisms deal with prevention, detection, and recovery from a security attack.
Prevention involves mechanisms to prevent the computer from being damaged. Detection requires
mechanisms that allow detection of when, how, and by whom an attack occurred. Recovery
involves a mechanism to stop the attack, assess the damage done, and then repair the damage
• Personnel are used to frame security policy and procedures, and for training and awareness
• Security mechanisms use technologies like cryptography, digital signature, firewall, user
identification and authentication, and other measures like intrusion detection, virus protection,
and, data and information backup, as countermeasures for security attack.
Cryptography
Cryptography is the science of writing information in a “hidden” or “secret” form and is an ancient
art. Cryptography is necessary when communicating data over any network, particularly the
Internet. It protects the data in transit and also the data stored on the disk. Some terms commonly
used in cryptography are:
- These technique use two key, namely private and public keys. One key is used for encryption
and the other is used for decryption.
Hash Function
Hash function is a function that maps a message of any length into a fixed length hash value, which
serves as the authenticator.
Digital Signature
Digital signature is an electronic signature that can be used to authenticate the identity of the sender
of a message and to ensure that the original content of the message or document that has been sent
is unchanged.
Digital signature schemes normally gives two algorithms, one for signing which involves the
user’s secret or private key and one for verifying signatures which involves the user’s public
key
In a digital signature process, the sender uses a signing algorithm to sign the message. The message
and the signature are sent to receiver. The receiver receives the message and the signature and
applies the verifying algorithm to the combination. If the result is true, the message is accepted
otherwise it is rejected.
Firewall
A firewall is a security mechanism to protect a local network from the threats it may face while
interacting with other networks (Internet). A firewall can be a hardware component, a software
component, or a combination of both. It prevents computers in one network domain from
communicating directly with other network domains. All communication takes place through the
firewall, which examines all incoming data before allowing it to enter the local network.
Functions of Firewall:
The main purpose of firewall is to protect computers of an organization (local network) from
unauthorized access. Some of the basic functions of firewall are:
1. Firewalls provide security by examining the incoming data packets and allowing them to enter
the local network only if the conditions are met.
2. Firewalls provide user authentication by verifying the username and password. This ensures that
only authorized users have access to the local network.
3. Firewalls can be used for hiding the structure and contents of a local network from external
users. Network Address Translation (NAT) conceals the internal network addresses and replaces
all the IP addresses of the local network with one or more public IP addresses.
Types of Firewalls:
Packet filtering firewalls work at the network layer (OSI model), or the IP layer (TCP/IP). In this
each packet is compared to a set of criteria before it is forwarded. Depending on the packet and
the criteria, the firewall can drop, forward the packet or send a message to the originator. Rules
can be source and destination IP address, source and destination port number and protocol used.
The advantages of packet filtering firewalls is their low cost and low impact on network
performance.
It work at the session layer (OSI model), or the TCP layer (TCP/IP). They monitor TCP
handshaking between packets to determine whether a requested session is legitimate. Information
passed to a remote computer through a circuit level gateway appears to have originated from the
gateway. This is useful for hiding information about protected networks. Circuit level gateways
are relatively inexpensive and have the advantage of hiding information about the private network
they protect. On the other hand, they do not filter individual packets.
3. Application Level Gateway Firewall:
Application level gateways, also called proxies, are similar to circuit-level gateways except that
they are application specific. They can filter packets at the application layer of the OSI model.
Incoming or outgoing packets cannot access services for which there is no proxy. In plain terms,
an application level gateway that is configured to be a web proxy acts as the server to the internal
network and client to the external network. Because they examine packets at application layer,
they can filter application specific commands such as http: post and get, etc. Application level
gateways can also be used to log user activity and logins. They offer a high level of security, but
have a significant impact on network performance.
It combines the aspects of the other three types of firewalls. They filter packets at the network
layer, determine whether session packets are legitimate and evaluate contents of packets at the
application layer. They rely on algorithms to recognize and process application layer data instead
of running application specific proxies. Stateful multilayer inspection firewalls offer a high level
of security, good performance and transparency to end users. They are expensive however, and
due to their complexity are potentially less secure than simpler types of firewalls if not
administered by highly competent personnel.
A proxy server is an intermediary server that acts as a gateway between a client and
another server. When a client makes a request to access a resource, instead of directly
connecting to the server that hosts the resource, the client connects to the proxy
server. The proxy server then forwards the request to the appropriate server and relays
the response back to the client.
Proxy servers can serve multiple purposes, including:
1. Caching: Proxy servers can cache frequently accessed resources. When a client
requests a resource, the proxy server first checks if it has a cached copy. If it
does, the proxy server returns the cached copy, reducing the response time and
bandwidth usage.
2. Anonymity: Proxy servers can provide anonymity by acting as an intermediary
between the client and the server. The client's IP address is hidden from the
server, which can help protect privacy and bypass certain restrictions or filters.
3. Filtering: Proxy servers can be configured to filter content based on specific
rules or policies. This can be used to block access to certain websites or restrict
specific types of content.
4. Load balancing: Proxy servers can distribute client requests across multiple
servers, balancing the load and improving performance and scalability.
5. Security: Proxy servers can act as a security layer by inspecting and filtering
incoming and outgoing traffic. They can block malicious requests or filter out
potentially harmful content.
There are different types of proxy servers, including:
1. Forward proxy: A forward proxy is typically used by clients to access resources
on the internet. It sits between the client and the internet and forwards client
requests to external servers.
2. Reverse proxy: A reverse proxy is placed in front of web servers and acts as a
gateway for incoming client requests. It can handle tasks such as load
balancing, SSL termination, and caching.
3. Transparent proxy: A transparent proxy intercepts network traffic without
modifying it. Clients are unaware that their requests are being processed by a
proxy server.
4. Anonymous proxy: An anonymous proxy hides the client's IP address from the
server, providing a level of anonymity.
• Increase privacy and anonymity: VPNs can help users circumvent geographic-
based blocking and censorship.
• Avoid ISP throttling: VPNs can help prevent ISP throttling by keeping online
activities anonymous.
• Bypass website blocks and firewalls: VPNs can create a point-to-point tunnel
that masks a user's IP address.
Here's how a VPN works:
• The user's device establishes a digital connection with a remote server owned
by a VPN provider.
• The VPN hides the user's public IP address and "tunnels" traffic between the
device and the remote server.
• The website sends data back to the VPN server, where the data is encrypted and
sent back to the user's device.
• Once the data arrives at the device, it's decrypted so the user can read it.
2. Smart card
3. Biometrics
Identification is the process whereby a system recognizes a valid user’s identity. Authentication is
the process of verifying the claimed identity of a user. For example, a system uses user password
for identification. The user enters his password for identification. Authentication is the system
which verifies that the password is correct, and thus the user is a valid user. Before granting access
to a system, the user’s identity needs to be authenticated. If users are not properly authenticated
then the system is potentially vulnerable to access by unauthorized users. If strong identification
and authentication mechanisms are used, then the risk that unauthorized users will gain access to
a system is significantly decreased. Authentication is done using one or more combinations of -
what you have (like smartcards), what you know (Password), and what you are (Biometrics like
Fingerprints, retina scans).
Once the user is authenticated, the access controls for the user are also defined. Access controls is
what the user can access once he is authenticated.
- Intrusion detection is the process of identifying and responding to malicious activity targeted
at resource.
- IDS is system designed to test/analyze network system traffic/events against a given set of
parameters and alert/capture data when these threshold are met.
- IDS uses collected information and pre-defined knowledge-based system to reason about the
possibility of an intrusion.
- IDS also provides services to cop with intrusion such as giving alarms, activating programs
to try to deal with intrusion, etc.
Chapter 6
Authentication and access control
Terms related to authentication, including security definitions about passwords and words and
phrases about proving identity
• acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating
constraints and practices that a user must agree to for access to a corporate network, the
internet or other resources.
• access control - Access control is a security technique that regulates who or what can
view or use resources in a computing environment.
• access control list (ACL) - An access control list (ACL) is a list of rules that specifies
which users or systems are granted or denied access to a particular object or system
resource.
• active attack - An active attack is a network exploit in which a hacker attempts to make
changes to data on the target or data en route to the target.
• Active Directory Domain Services (AD DS) - Active Directory Domain Services (AD
DS) is a server role in Active Directory that allows admins to manage and store
information about resources from a network, as well as application data, in a distributed
database.
• Active Directory Federation Services (AD FS) - Active Directory Federation Services
(AD FS) is a feature of the Windows Server operating system (OS) that extends end
users' single sign-on (SSO) access to applications and systems outside the corporate
firewall.
• Amazon Cognito - Amazon Cognito is an Amazon Web Services product that controls
user authentication and access for mobile applications on internet-connected devices.
• authentication - Authentication is the process of determining whether someone or
something is who or what they say they are.
• bitcoin mining - Bitcoin mining is a type of cryptomining in which new bitcoin are
entered into circulation and bitcoin transactions are verified and added to the blockchain.
• cloud security - Cloud security, also known as cloud computing security, is the practice
of protecting cloud-based data, applications and infrastructure from cyberthreats and
cyber attacks.
• Common Access Card (CAC) - A Common Access Card (CAC) is a smart card issued
by the Unites States Department of Defense for accessing DOD systems and facilities.
• credential stuffing - Credential stuffing is the practice of using stolen login information
from one account to gain access to accounts on a number of sites through automated
login.
• credential theft - Credential theft is a type of cybercrime that involves stealing a victim's
proof of identity.
• cryptogram - A cryptogram is a word puzzle featuring encrypted text that the user
decrypts to reveal a message of some sort.
• data masking - Data masking is a method of creating a structurally similar but inauthentic
version of an organization's data that can be used for purposes such as software testing
and user training.
• Digital Signature Standard (DSS) - The Digital Signature Standard (DSS) is a digital
signature algorithm (DSA) developed by the U.
• Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is
a Safe Mode boot option for Windows Server domain controllers.
• FIDO (Fast Identity Online) - FIDO (Fast Identity Online) is a set of technology-agnostic
security specifications for strong authentication.
• identity provider - An identity provider (IdP) is a system component that provides an end
user or internet-connected device with a single set of login credentials that ensures the
entity is who or what it says it is across multiple platforms, applications and networks.
• identity theft - Identity theft, also known as identity fraud, is a crime in which an
imposter obtains key pieces of personally identifiable information (PII), such as Social
Security or driver's license numbers, to impersonate someone else.
• initialization vector - An initialization vector (IV) is an arbitrary number that can be used
with a secret key for data encryption to foil cyber attacks.
• Java Authentication and Authorization Service (JAAS) - The Java Authentication and
Authorization Service (JAAS) is a set of application program interfaces (APIs) that can
determine the identity of a user or computer attempting to run Java code, and ensure that
the entity has the privilege or permission to execute the functions requested.
• key fob - A key fob is a small, programmable device that provides access to a physical
object.
• key-value pair (KVP) - A key-value pair (KVP) is a set of two linked data items: a key,
which is a unique identifier for some item of data, and the value, which is either the data
that is identified or a pointer to the location of that data.
• logon (or login) - In computing, a logon is a procedure that enables an entity to access a
secure system such as an operating system, application, service, website or other
resource.
• Massachusetts data protection law - What is the Massachusetts data protection law?The
Massachusetts data protection law is legislation that stipulates security requirements for
organizations that handle the private data of residents.
• Microsoft Azure Key Vault - Microsoft Azure Key Vault is a cloud-based security
service offered by Microsoft as part of its Azure platform.
• Microsoft Windows Azure Active Directory (Windows Azure AD) - Microsoft Windows
Azure Active Directory (Windows Azure AD or Azure AD) is a cloud service that
provides administrators with the ability to manage end-user identities and access
privileges.
• Microsoft Windows Hello - Microsoft Windows Hello is a biometric identity and access
control feature that supports fingerprint scanners, iris scanners and facial recognition
technology on compatible devices running Windows.
• nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a
message via encryption and/or digital signatures or approved some information.
• password - A password is a string of characters used to verify the identity of a user during
the authentication process.
• password manager - A password manager is a technology tool that helps internet users
create, save, manage and use passwords across different online services.
• perfect forward secrecy (PFS) - Perfect Forward Secrecy (PFS), also known as Forward
Secrecy, is an encryption style known for producing temporary private key exchanges
between clients and servers.
• personal identity verification (PIV) card - A personal identity verification (PIV) card is a
United States Federal smart card that contains the necessary data for the cardholder to be
granted to Federal facilities and information systems and assure appropriate levels of
security for all applicable Federal applications.