ITC3213
ITC3213
ITC3213
Today’s Lecture
• Introduction & Motivation
• Cybercrimes
Hacking
Cracking
Cyberterrorism
Script Kiddie
Cyberextortion
• Strategies For a Secure Network
Password
Backup
Protection Tools
Training
Security Zones and User Roles
Introduction & Motivation
• The needs for Information Security have been in existence prior to
the advent of data processing equipment.
• During that time, information felt to be valuable to an organization
were secured primarily by:
• Physical Means: e.g. use of rugged filing cabinets with a combination lock
for storing sensitive documents.
• Administrative Means: Personal screening procedures used during the
hiring process.
• Introduction of computers necessitated the need for automated tools
for protecting files and other stored information especially on time-
sharing systems or systems that can be accessed over a public
network. The generic name for the tools that can help us achieved
this Computer Security.
Introduction & Motivation
• Introduction of distributed computing and the transfer of data
between devices through networks and communication facilities is
one of the major changes that affected security of data, hence
necessitated the need of Network Security/ internet security.
• There are no clear boundaries between Computer Security and
Internet Security.
• In this course, we focuses on internet security. Internet security
consists of measures to deter, prevent, detect, and correct security
violations that involve the transmission of information.
• The objective of internet security is to establish rules and measures to
use against attacks over the Internet.
Introduction & Motivation
(Some Examples of Security Violations)
• User X transmits a file containing sensitive information to User Y. User
Z (not authorized to read the file) monitor the transmission and copy
the file.
• User intercepts a message in transmission, alter it and send it to the
recipient as if it was directly from the sender.
• A user construct a message and send it to another user, claiming that
it was from a different user.
• A user intercept a message in transmission and delay its delivery.
• A user denying a message he/she sent for some personal cover-up or
gains
Cybercrimes
Criminal activities carried out by means of computers or the Internet
• Cyberextortion: a crime involving an attack or threat of an attack
coupled with a demand for money to stop the attack. E.g.
Ransomware. Noun: Cyberextortionist.
• Hacking: An unlawful access to computer or computer network.
Hackers often claim that they do this to find leaks in the security of a
network.
• Cracking: intentional access to a computer or computer network with
the intention of destroying or stealing information. Noun: Cracker
• Cyberterrorism: is the use of computer network or the internet to
destroy computer for political or ideological reasons. It requires highly
skilled individuals with huge investment in both time and money.
Noun: Cyberterrorist.
Cybercrimes
• Attack By an Unethical Employee: this involves an employee illegally
accessing his/her company’s network with the intension of getting
top secret information and sell them or give them to their
competitors as a revenge.
• Script Kiddie(ing): Script Kiddie is an unskilled cracker with no
technical skills, that uses prewritten scripts or codes to hack into
computers.
Strategies For a Secure Network
• Establish and enforce a proven password
• Backup your data
• Increase your employees’ skillset: Regularly train your staff on the
latest IT best practices related to internet security and other fields.
• Create security culture: advise your employees not disclose or share
log in details in any way.
• Defined security zones and user roles
• Activate the use of cloud in your organization
• Invest in IT infrastructures: install antivirus, firewalls, malware
blocking and intrusion detection software.
OSI Security Architecture
• To effectively assess the security needs of an organization and to
evaluate and choose various security products and policies, the
person responsible for security needs some systematic approach of
defining the requirements for security and characterizing the
approaches to satisfy those requirements.
• This systematic approach is defined by an International Standard
Recommendation called OSI Security Architecture.
• This architecture focuses on:
I. Security Attack:
Any action that is capable of compromising the security of information
owned by an organization.
II. Security Mechanism:
A process (or a device encapsulating such process) that is designed to
detect, prevent, or recover from a security attack.
OSI Security Architecture
III. Security Service:
A processing or communication service that enhances the security of the
data processing systems and the information transfers of an organization. They are
intended to counter security attacks and make use of one or more security
mechanisms to provide the service.
Difference Between Threat and Attack
According to RFC 2828, Internet Security Glossary:
• Threat: A potential for violation of security, which exists when there is
a circumstance, capability, action, or event that could breach security
and cause harm. That is, a threat is a possible danger that might
exploit a vulnerability.
• Attack: An assault on system security that derives from an intelligent
threat; that is, an intelligent act that is a deliberate attempt
(especially in the sense of a method or techniques) to evade security
services and violate the security policy of a system.
Types of Attack
The meaningful means of classifying security attacks is in terms of:
• Passive Attacks:
attempts to learn or make use of information from the system
but does not affect system resources.
• Active Attacks:
attempts to alter system resources or affect their normal
operations.
Passive Attack
• An attack in the nature of secretly listening to transmissions
(Eavesdropping) or monitoring of such transmissions.
• The goal of the attacker is to obtain the information being
transmitted.
• The most common of this attack is the Release of Message Contents:
Passive Attack
• In view of the above form of attack, there is the need of masking
contents of messages (e.g. through Encryption) to prevent an attacker
from eavesdropping on sensitive information from telephone
conversation, email messages or a transferred file.
• Even if the contents of transmitted messages are masked, the
attacker can also use another form of Passive Attack called Traffic
Analysis, that is, observing the pattern of these messages.
• The attacker could determine the location of the communicating
entities, the length and frequency of the information being
exchanged.
• Passive Attacks are very difficult to detect because they do not
involve any alteration to the message being transmitted.
Active Attack
• This form of attack involved the modification of the data stream or
the creation of a false stream. It has four categories: Masquerade,
Replay, Modification of Messages, and Denial of Service.
• Masquerade takes place when an entity pretends to be a different
entity, it usually involves one of the other categories of Active Attacks.
For example cases involving replaying authentication sequences.
Active Attack
• Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Active Attack
• Modification of Messages: simply means that some portion of a
legitimate message is altered, or that messages are delayed or
reordered to produce an unauthorized effect. In other words, it
involves receiving packets, modifying them and send them on.
Active Attack
• Denial of Service prevents the normal use or management of
communications facilities. E.g. an entity may suppress all messages
directed to a particular destination; disruption of an entire network
through disabling or disturbing it with a lot of messages so as to
degrade performance.
Active Attack
• Unlike Passive Attacks, it is quite difficult to prevent Active Attacks
because of physical, software and network vulnerabilities. The goal is
to detect and recover from any disruption or delays they caused.