Unit-1-Basic Principles
Unit-1-Basic Principles
UNIT-1
Basic Principles
Threat
A potential for violation of security, which exists when
there is a circumstance, capability, action, or event that
could breach security and cause harm. That is, a threat
is a possible danger that might exploit a vulnerability.
Attack
An assault on system security that derives from an
intelligent threat; that is, an intelligent act that is a
deliberate attempt (especially in the sense of a method
or technique) to evade security services and violate the
security policy of a system.
SECURITY GOALS
or Snooping
Def: the action of
secretly trying to find
out something,
especially
information about
someone's private
affairs.
Attacks Threatening Confidentiality
–Interception: attacks confidentiality.
– Eavesdropping, “man-in-the-middle” attacks.
–Traffic Analysis: attacks confidentiality, or secrecy.
masquerade
replay
modification of messages
Repudiation Integrity
Replaying: Capture
message and later replay
to destination
modification of messages
A repudiation attack happens when an
application or system does not adopt controls to
properly track and log users' actions, thus
permitting malicious manipulation or forging the
identification of new actions.
Attacks Threatening Integrity
Modification means that the attacker intercepts the
message and changes it.
Security Mechanism
(X.800)
Encipherment:
• Hiding or covering data
• Provide confidentiality
• Cryptography and Steganography
Data Integrity
• Appends to the data a short checkvalue that has
been created by a specific process
• The receiver receives the data and the checkvalue
Receiver creates a new checkvalue from the
received data
• This computed new checkvalue than compared
with the received one
• If both the checkvalues are same then the the data
is preserved
Digital signature
• Sender electronically signs the data and send using
his private key
• Receiver can electronically verify the signature using
sender’s public key
• Concept of public key and private key is used to sign
the data electronically
Authentication exchange
• Two entities exchange messages to prove their
identity to each other
Traffic padding
Inserting bogus data into the data traffic to thwart the
adversary’s attempt for traffic analysis
Routing control
Selecting and continuously changing different available
routes between the source and destination to prevent the
opponent from eavesdropping on a particular route
Notarization
Selecting a third party to control the communication
between the two entities
To prevent repudiation
Generally three part process: vetting/selection,
certifying, and record keeping
Access control
Uses methods to prove that a user has access rights
Passwords or pins or OTP
Relation between Services and Mechanisms
TECHNIQUES