UNIT IV and V
UNIT IV and V
Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail.
Wireless Network Security: Mobile Device Security
Operational description
The actual operation of PGP consists of five services:
1. Authentication
2. Confidentiality
3. Compression
4. E-mail compatibility
5. Segmentation.
1. Authentication
The sequence for authentication is as follows:
The sender creates the message. SHA-1 is used to generate a 160-bit hash code of the
message. The hash code is encrypted with RSA using the sender’s private key and the result
is pretended to the message.
The receiver uses RSA with the sender’s public key to decrypt and recover the hash code.
The receiver generates a new hash code for the message and compares it with the decrypted
hash code. If the two match, the message is accepted as authentic.
2. Confidentiality
Confidentiality is provided by encrypting messages to be transmitted.
The sequence for confidentiality is as follows:
The sender generates a message and a random 128-bit number to be used as a session key
for this message only. The message is encrypted with the session key.
The session key is encrypted with RSA, using the receiver’s public key and is prepended to
the message. The receiver uses RSA with its private key to decrypt and recover the session
key. The session key is used to decrypt the message.
1
3. Compression
PGP compresses the message after applying the signature but before encryption. This has the
benefit of saving space for both e-mail transmission and for file storage.
Message encryption is applied after compression to strengthen cryptographic security. The
compression algorithm used is ZIP.
4. E-mail compatibility
PGP provides the service of converting the raw 8-bit binary stream to a stream of printable
ASCII characters.
2
PGP message generation
First consider message transmission and assume that the message is to be both signed and
encrypted. The sending PGP entity performs the following steps
S/MIME
S/MIME (Secure/Multipurpose Internet Mail Extension) is a security enhancement to
the MIME.
Secure/Multipurpose Internet Mail Extension (S/MIME) is an industry-standard for
email encryption and signature.
S/MIME encrypts and digitally signs emails to verify that they are verified and that
their contents have not been tampered with.
S/MIME is a commonly-used protocol for sending encrypted and digitally-signed
email messages and is implemented using S/MIME certificates.
3
Following are the limitations of SMTP scheme:
1. SMTP cannot transmit executable files.
2. SMTP cannot transmit text data that includes national language characters
3. SMTP servers may reject mail message over a certain size.
Uses of S/MIME
S/MIME can be used to:
Check that the email you sent has not been tampered with by a third party.
Create digital signatures to use when signing emails.
Encrypt all emails.
Check the email client you’re using.
Functions of S/MIME
Authentication
It refers to the verification of a computer user's or a website's identity.
Message Integrity
This is a guarantee that the message's contents and data have not been tampered with.
Non repudiation
This is a circumstance in which the original sender's identity and digital signatures are
validated so that there is no doubt about it.
Privacy
A data breach cannot be caused by an unintentional third party.
Data security
Data security is ensured by a mix of public and private keys
Services of S/MIME
Digital signature
Message encryption
4
Public and private keys will be used to encrypt and decrypt emails, ensuring that the emails
you send cannot be read by anyone other than the receiving party.
S/MIME certificates protect emails by preventing hackers from accessing or changing their
contents.
Offer both digital signatures and encryption.
While asymmetric encryption keeps your data private, digital signatures provide
authentication and message integrity.
S/MIME certificates are installed on email clients.
5
DKIM itself does not filter emails. However, it helps the receiving mail servers decide how
to best filter incoming messages. A successful DKIM verification often means a reduced
spam score for a message.
6
WIRELESS NETWORK SECURITY
Wireless networks are computer networks that are not connected by cables of any
kind.
Wireless security is the prevention of unauthorized access or damage to computers
using wireless networks.
Factors contributing to risk of wireless networks:
• Channel: Eavesdropping and jamming than wired networks. Wireless networks are also
more vulnerable to active attacks that exploit
• Mobility: Mobility results in a number of risks.
• Resources: Limited memory and processing resources with which to counter threats,
including denial of service and malware.
• Accessibility: Greatly increases their vulnerability to physical attacks.
7
• Malicious association: a wireless device is configured to appear to be a legitimate access
point, enabling the operator to steal passwords from legitimate users and then penetrate a
wired network through a legitimate wireless access point.
• Ad hoc networks: peer-to-peer networks between wireless computers with no access
point between them
Nontraditional networks: Nontraditional networks and links, such as personal network
Bluetooth devices, barcode readers, and handheld PDAs, pose a security risk in terms of
both eavesdropping and spoofing.
• Man-in-the middle attacks: This attack involves persuading a user and an access
point to believe that they are talking to each other when in fact the communication is
going through an intermediate attacking device. Wireless networks are particularly
vulnerable to such attacks.
Identity theft (MAC spoofing): This occurs when an attacker is able to eavesdrop on
network traffic and identify the MAC address of a computer with network privileges.
• Denial of service (DoS): The wireless environment lends itself to this type of attack,
because it is so easy for the attacker to direct multiple wireless messages at the target.
• Network injection: A network injection attack targets wireless access points that are
exposed to nonfiltered network traffic, such as routing protocol messages or network
management messages.
8
2.Securing Wireless Access Points: The main threat involving wireless access
points is unauthorized access to the network. The standard provides an
authentication mechanism for devices wishing to attach to a LAN or wireless
network.
9
MOBILE DEVICE SECURITY
Mobile Device Security refers to the measures designed to protect sensitive
information stored on and transmitted by laptops, smartphones, tablets, wearables,
and other portable devices.
At the root of mobile device security is the goal of keeping unauthorized users from
accessing the enterprise network.
Security Threats
• Lack of Physical Security Controls
Mobile device is required to remain on premises, the user may move the device within the
organization between secure and nonsecured locations. Theft and tampering are realistic
threats. The threat is two fold:
1) A malicious party may attempt to recover sensitive data from the device
itself
2) may use the device to gain access to the organization’s resources.
Use of Untrusted Mobile Devices
In addition to company-issued and company-controlled mobile devices, virtually all
employees will have personal smartphones and/or tablets. The organization must assume
that these devices are not trustworthy.
• Use of Untrusted Networks
If a mobile device is used on premises, it can connect to organization resources over the
organization’s own in-house wireless networks.
Thus, traffic that includes an off-premises segment is potentially susceptible to
eavesdropping or man-in-the- middle types of attacks.
Use of Applications Created by Unknown Parties
By design, it is easy to find and install third-party applications on mobile devices. This
poses the obvious risk of installing malicious software.
• Interaction with Other Systems
Unless an organization has control of all the devices involved in synchronization, there is
considerable risk of the organization’s data being stored in an unsecured location, plus the
risk of the introduction of malware.
Use of Untrusted Content
Mobile devices may access and use content that other computing devices do not encounter.
10
• Use of Location Services
The GPS service, it creates security risks. An attacker can use the location information to
determine where the device and user are located, which may be of use to the attacker.
Device security
Jail broker devices should not be used
Autolock enabled
Password/ PIN protection
11
Auto fill username and passwords should be avoided.
Software and OS should be up to date
Disable location services
Avoid installing third party application
Security trainings should be given to employees
Traffic security
All traffic in the network should be encrypted
All traffic should travel in secured channel
VPN should be used
Strong authentication protocols
Barrier security
Establishing barriers to prevent unauthorized sources into the network
12
UNIT V SECURITY PRACTICES
Firewalls and Intrusion Detection Systems: Intrusion Detection Password
Management, Firewall Characteristics Types of Firewalls, Firewall Basing,
Firewall Location and Configurations. Blockchains, Cloud Security and IoT
security
INTRUDERS
An intruder is someone who enters a system without permission.
An intruder is a person who goes into a place where they are not
supposed to be.
Intruder is generally referred to as hacker or cracker.
Intrusion Techniques:
The objective of the intruders is to gain access to a system or to increase
the range of privileges accessible on a system. Generally, this requires the
intruders to acquire information that should be protected. In most cases, the
information is in the form of a user password. Typically, a system must
maintain a file that associates a password with each authorized user. If such a
file is stored with no protection, then it is an easy matter to gain access to it.
The password files can be protected in one of the two ways:
1
One way encryption – the system stores only an encrypted form of user‟s
password.
Access control – access to the password file is limited to one or a very few
accounts.
Two countermeasures:
Detection
Prevention
INTRUSION DETECTION
An intrusion detection system (IDS) is a device or software that monitors a
network for malicious activity.
1. If an intrusion is detected quickly enough, the intruder can be
identified and ejected from the system before any damage is done or any data
are compromised.
2. An effective intrusion detection system can serve as a deterrent, so
acting to prevent intrusions.
3. Intrusion detection enables the collection of information about
intrusion techniques that can be used to strengthen the intrusion prevention
facility.
2
1. Statistical anomaly detection:
Involves the collection of data relating to the behavior of legitimate
users over a period of time.
Then statistical tests are applied to observed behavior to determine
with a high level of confidence whether that behavior is not legitimate
user behavior.
a. Threshold detection:
This approach involves defining thresholds, independent of user, for
the frequency of occurrence of various events.
b. Profile based:
A profile of the activity of each user is developed and used to detect
changes in the behavior of individual accounts.
2. Rule-based detection:
Involves an attempt to define a set of rules that can be used to decide
that a given behavior is that of an intruder.
a. Anomaly detection:
Rules are developed to detect deviation from previous usage patterns
b. Penetration identification:
An expert system approach is used which searches for suspicious
behaviour.
PASSWORD MANAGEMENT
Set of principles and practices followed by users while storing and managing
passwords to protect it from unauthorized access.
1. Password Protection
Password Protection can be done in 4 ways.
1. User education
3. Access Control
One way to thwart a password attack is to deny the opponent access to the
password file. If the encrypted password portion of the file is accessible only
by a privileged user, then the opponent cannot read it without already
knowing the password of a privileged user.
User education
Users can be told the importance of using hard-to-guess passwords and can be
provided with guidelines for selecting strong passwords.
Computer-generated passwords
If the passwords are quite random in nature, users will not be able to
remember them. Even if the password is pronounceable, the user may have
4
difficulty remembering it and so be tempted to write it down.
FIREWALL
A firewall:
1. Defines a single choke point that keeps unauthorized users out of the
protected network, prohibits potentially vulnerable services from entering or
leaving the network, and provides protection from various kinds of IP spoofing
and routing attacks.
3. is a convenient platform for several Internet functions that are not security
related, such as NAT and Internet usage audits or logs
4. A firewall can serve as the platform for IPSec to implement virtual private
networks.
FIREWALL CHARACTERISTICS
1. All traffic from inside to outside, and vice versa, must pass through the
firewall. This is achieved by physically blocking all access to the local
network except via the firewall.
5
2. Only authorized traffic, as defined by the local security policy, will be
allowed to pass.
Techniques that firewalls use to control access and enforce the sites
security policies are:
Behavior control: Controls how particular services are used (e.g. filter e-
mail)
Limitations of Firewall
The firewall cannot protect against attacks that bypass the firewall.
The firewall does not protect against internal threats.
The firewall cannot protect against the transfer of virus-infected programs or
files.
TYPES OF FIREWALLS
There are 3 common types of firewalls.
1. Packet Filtering Router
2. Application-level gateways
3. Circuit-level gateways
6
Packet Filtering Router
A packet filtering router applies a set of rules to each incoming IP packet and
then forwards or discards the packet.
The router is typically configured to filter packets going in both directions.
Filtering rules are based on the information contained in a network packet:
Source IP address – IP address of the system that originated the IP packet.
Destinations IP address – IP address of the system, the IP is trying to
reach.
Source and destination transport level address – transport level port
number.
IP protocol field – defines the transport protocol
Interface – for a router with three or more ports, which interface of the
router the packet come from or which interface of the router the packet is
destined for.
The packet filter is typically set up as a list of rules based on matches to fields
in the IP or TCP header. If there is a match to one of the rules, that rule is
invoked to determine whether to forward or discard the packet. If there is no
match to any rule, then a default action is taken.
7
Weakness of packet filter firewalls
Packet filter firewalls do not examine upper-layer data; They cannot prevent
attacks that employ application specific vulnerabilities or functions.
As limited information is available to the firewall, the logging functionality
present in packet filter firewall is limited.
It does not support advanced user authentication schemes.
They are generally vulnerable to attacks such as IP address spoofing.
8
firewall.
Countermeasure: to discard all packets that uses this option.
9
Circuit Level Gateway
Circuit level gateway can be a stand-alone system or it can be a specified
function performed by an application level gateway for certain applications. A
Circuit level gateway does not permit an end-to-end TCP connection; rather,
the gateway sets up two TCP connections, one between itself and a TCP user
on an inner host and one between itself and a TCP user on an outer host.
Once the two connections are established, the gateway typically relays TCP
segments from one connection to the other without examining the contents.
The security function consists of determining which connections will be
allowed.
A typical use of Circuit level gateways is a situation in which the system
administrator trusts the internal users. The gateway can be configured to
support application level or proxy service on inbound connections and circuit
level functions for outbound connections.
FIREWALL BASING
It is common to base a firewall on a stand-alone machine running a
common operating system, such as UNIX or Linux.
A bastion host is a critical strong point in the network’s security, serving
as a platform for an application-level or circuit-level gateway, or for
external services.
Host-Based Firewalls
A host-based firewall is a software module used to secure an individual host.
Personal Firewall
A personal firewall controls the traffic between a personal computer or
workstation on one side and the Internet or enterprise network on the other
side.
Personal firewall functionality can be used in the home environment and on
corporate intranets. Typically, the personal firewall is a software module on
the personal computer.
Personal firewalls are typically much less complex than either server-based
firewalls or stand-alone firewalls. The primary role of the personal firewall
is to deny unauthorized remote access to the computer. The firewall can also
monitor outgoing activity in an attempt to detect and block worms and other
malware.
DMZ Networks
12
Between these two types of firewalls are one or more networked devices in a
region referred to as a DMZ (demilitarized zone) network.
Systems that are externally accessible but need some protections are usually
located on DMZ networks.
The external firewall provides a measure of access control and protection for
the DMZ systems consistent with their need for external connectivity.
1. The internal firewall adds more stringent filtering capability, compared to the
13
external firewall, in order to protect enterprise servers and workstations from
external attack.
2. The internal firewall provides two way protection with respect to the DMZ.
First, the internal firewall protects the remainder of the network from attacks launched
from DMZ systems. Such attacks might originate from worms, rootkits, bots, or other ma
lware lodged in a DMZ system.
Second, an internal firewall can protect the DMZ systems from attack from the internal
protected network.
3. Multiple internal firewalls can be used to protect portions of the internal network
from each other.
At each corporate site, workstations, servers, and databases are linked by one or
more local area net- works (LANs).
VPNs are generally cheaper than real private networks using private lines but rely
on having the same encryption and authentication system at both ends.
Distributed Firewalls
14
Administrators can configure host- resident
firewalls on hundreds of servers and workstations as well as configure personal firew
alls on local and remote user systems.
BLOCKCHAINS
15
Blockchain is a secure series or chain of timestamped records stored in a
database that a group of users manages who are a part of a decentralized network.
16
proof instead of third-party trust for two parties to execute transactions over
the Internet. Each transaction protects through a digital signature.
Blockchain nodes
A node is a computer connected to the Blockchain Network. Node gets
connected with Blockchain using the client. The client helps in validating
and propagating transactions onto the Blockchain. When a computer
connects to the Blockchain, a copy of the Blockchain data gets downloaded
into the system and the node comes in sync with the latest block of data on
Blockchain. The Node connected to the Blockchain which helps in the
execution of a Transaction in return for an incentive is called Miners.
17
If the Central Server like Banks is compromised, the whole system is
affected including the participants.
Organizations doing validation charge high process thus making the
process expensive.
18
IOT SECURITY
IoT (Internet of Things) security refers to the measures and practices implemented
to protect the Internet of Things devices, systems, and networks from unauthorized
access, data breaches, and other potential threats.
The Internet of Things involves connecting various physical devices and objects to the
internet, enabling them to collect and exchange data.
Examples of IoT devices include smart home devices, industrial sensors, medical
devices, and connected vehicles.
19
monitor and manage. Asset tracking systems sometimes neglect to include IoT
devices, so they sit on the network without being managed or monitored.
Cloud Security
DDoS Security
20
Distributed Denial of Service (DDoS)is flooded with requests. Website slows
down the downloading until it crashes to handle the number of requests.
21