-------------------------------UNIT 1-------------------------------
Computer Security Concepts
The principles and practices aimed at protecting computer systems, networks, and data
from unauthorized access, threats, damage, or disruption.
• Confidentiality: Protecting information from unauthorized disclosure.
• Integrity: Ensuring information is accurate and complete.
• Availability: Guaranteeing timely and reliable access to information.
OSI Security Architecture
• A framework for understanding and implementing security measures across the
seven layers of the OSI model.
• It addresses how security is integrated into network communications, from physical
transmission (Layer 1) to application-level (Layer 7).
Security Attacks
• Any attempt to compromise the confidentiality, integrity, or availability of
information or systems.
• Types include:
o Passive attacks (eavesdropping)
o Active attacks (modification, disruption, fabrication)
Security Services
• Mechanisms that enhance the security of data communication. Functionalities
provided to enhance the security of systems and communications.
Types include: Confidentiality, Integrity, Availability, Authentication, Non-
repudiation
Security Mechanisms
• Specific techniques and algorithms used to implement security services.
Examples: Encryption, Digital signatures, Access control
A Model for Network Security
• A conceptual framework for understanding and designing secure network systems.
• Typically includes:
o Security policy: Defines the security goals and constraints.
o Security services: Mechanisms to achieve security goals.
o Security mechanisms: Techniques to implement security services.
-------------------------------UNIT 2-------------------------------
Classical Encryption Techniques: Traditional methods of encrypting messages, often
using simple algorithms based on key manipulation to secure data.
Classical Encryption Techniques
• Stream Ciphers: Encrypt plaintext one bit at a time, often using a keystream
generator.
• Substitution Techniques: Replace plaintext characters with ciphertext characters.
o Caesar Cipher: Shifts each letter of the plaintext by a fixed number of
positions in the alphabet.
o Monoalphabetic Ciphers: Substitutes each plaintext letter with a unique
ciphertext letter.
o Playfair Cipher: Encrypts pairs of letters using a 5x5 matrix.
o Hill Cipher: Encrypts multiple letters at a time using linear algebra.
o Polyalphabetic Ciphers: Use multiple substitution alphabets, making
cryptanalysis more difficult.
• Transposition Techniques: Rearrange the order of plaintext characters.
Modern Encryption Standards
• Data Encryption Standard (DES): A symmetric-key block cipher that encrypts data
in 64-bit blocks.
• Triple DES (3DES): A more secure variant of DES that applies the DES algorithm
three times.
• Advanced Encryption Standard (AES): A symmetric-key block cipher that encrypts
data in 128-, 192-, or 256-bit blocks. It is widely considered to be very secure.
-------------------------------UNIT 3-------------------------------
• Asymmetric Key Cryptography: A cryptographic system using a pair of keys—one
public and one private—where the public key encrypts data and the private key
decrypts it. This system is widely used in secure data transmission.
• Number Theory: A branch of pure mathematics focused on the properties and
relationships of integers.
• Number Theory
• Prime Number: A natural number greater than 1 that has no positive divisors other
than 1 and itself.
• Fermat and Euler Theorems: Theorems used to prove the correctness of various
cryptographic algorithms.
• Testing for Primality: Algorithms to determine if a given number is prime.
• Chinese Remainder Theorem: A method to solve systems of linear congruences.
• Discrete Logarithm: The inverse operation of modular exponentiation.
• Public Key Cryptography
• RSA: A widely used public-key cryptosystem based on the difficulty of factoring
large integers.
• Key Management: The process of managing the creation, distribution, use, storage,
and destruction of cryptographic keys.
• Key Exchange Protocols
• Diffie-Hellman Key Exchange: A method for two parties to establish a shared
secret key over an insecure channel.
• El Gamal Algorithm: A public-key cryptosystem based on the difficulty of the
discrete logarithm problem.
• Elliptic Curve Cryptography (ECC): A public-key cryptosystem that uses elliptic
curves over finite fields. It offers similar security levels to other public-key
cryptosystems but with smaller key sizes.
-------------------------------UNIT 4-------------------------------
1. Data Integrity Algorithms: Techniques used to ensure data accuracy and
consistency over its lifecycle by detecting unauthorized changes.
2. Web Security: Measures and protocols designed to protect web applications, data,
and services from cyber threats, such as attacks and unauthorized access.
Cryptographic Hash Functions
3. Cryptographic Hash Functions: Algorithms that take an input and produce a fixed-
size string of bytes, typically unique to the original data, used for verifying data
integrity.
4. Applications of Cryptographic Hash Functions: Used in data integrity checks,
digital signatures, password hashing, and message authentication.
5. Two Simple Hash Functions: Basic examples like addition or bitwise operations,
though insecure for practical cryptographic purposes.
6. Requirements and Security: Effective hash functions must be collision-resistant,
preimage-resistant, and efficient to compute.
7. Hash Functions Based on Cipher Block Chaining: A method using block cipher
encryption to construct hash functions, providing added security.
8. Secure Hash Algorithm (SHA): A family of cryptographic hash functions, including
SHA-1, SHA-2, and SHA-3, widely used for secure data validation.
9. SHA-3: The latest member of the SHA family, based on the Keccak algorithm,
designed to provide enhanced security against potential attacks.
10. MD4, MD5: Older hash functions once widely used but now considered insecure
due to vulnerability to collision attacks.
Message Authentication Codes (MACs)
11. Message Authentication Codes (MACs): Short pieces of information that verify the
authenticity and integrity of a message, generated with a secret key.
12. Message Authentication Requirements: Ensure that messages are authentic and
haven't been altered in transit.
13. Message Authentication Functions: Algorithms that produce a MAC by combining
a message with a secret key.
14. Requirements for MAC Security: MACs must be resistant to forgery, meaning
attackers should not be able to generate valid MACs without the key.
15. Security of MACs: Strong MAC algorithms prevent unauthorized message
modification by requiring knowledge of a secret key.
Digital Signatures
16. Digital Signatures: Cryptographic methods for verifying the authenticity and
integrity of digital messages or documents, using a public-private key pair.
17. Digital Signature Schemes: Protocols like RSA and DSA that implement digital
signatures.
18. Digital Signature Standard (DSS): A federal standard for digital signatures,
specifying approved algorithms like DSA.
19. PKI (Public Key Infrastructure): A framework for managing digital certificates and
public-key encryption to secure communications.
20. X.509 Certificate: A standard for digital certificates that authenticate users and
devices within PKI.
Web Security
21. Web Security Issues: Threats including cross-site scripting (XSS), SQL injection,
and man-in-the-middle attacks that target web applications.
22. HTTPS: An encrypted version of HTTP using SSL/TLS to secure data in transit
between web browsers and servers.
23. SSH (Secure Shell): A protocol for secure remote login and file transfer by
encrypting communication between devices.
24. Email Security: Techniques for protecting email communications from
unauthorized access and threats.
25. PGP (Pretty Good Privacy): An encryption program that provides cryptographic
privacy and authentication for email.
26. S/MIME (Secure/Multipurpose Internet Mail Extensions): A standard for
encrypting and signing MIME data, providing email confidentiality and integrity.
IP Security
27. IPSec (Internet Protocol Security): A suite of protocols that secure IP
communications by authenticating and encrypting data packets at the network
layer.
-------------------------------UNIT 5-------------------------------
Network and System Security
1. OSI Security Architecture: A framework defining security services and
mechanisms applicable across the seven OSI layers to ensure secure data
transmission.
2. Access Control: Security mechanisms that restrict unauthorized access to
systems, networks, and data based on user identity and privileges.
3. Flooding Attacks: Malicious attempts to overwhelm a network or service by
sending an excessive volume of requests, leading to service disruption.
4. DoS (Denial of Service): An attack aimed at making a service unavailable to users
by overwhelming it with traffic or triggering resource exhaustion.
5. Distributed DoS (DDoS) Attacks: Similar to DoS attacks, but conducted from
multiple systems, often through a botnet, to intensify the attack's impact.
6. Intrusion Detection: Monitoring network or system activities to identify suspicious
patterns indicative of security breaches.
7. Host-Based and Network-Based Intrusion Detection:
a. Host-Based: Monitors individual hosts or devices for signs of intrusions.
b. Network-Based: Monitors network traffic for suspicious activities across the
network.
8. Honeypot: A security mechanism involving decoy systems or services intended to
attract and analyze malicious activity without endangering real systems.
9. Firewall: A network security device or software that controls incoming and outgoing
network traffic based on predefined security rules.
10. Intrusion Prevention System (IPS): A security tool that monitors network or system
activities for malicious behavior and takes action to prevent attacks.
11. Need for Firewall: Firewalls help secure a network by blocking unauthorized
access and filtering harmful traffic.
12. Firewall Characteristics and Access Policy: Firewalls enforce security rules
through access policies that dictate which traffic is allowed or denied based on
criteria like IP address, port, or protocol.
13. Types of Firewall:
a. Packet-Filtering: Filters packets based on headers.
b. Stateful Inspection: Monitors active connections and decisions based on
the state of traffic.
c. Proxy Firewall: Acts as an intermediary between users and networks.
d. Next-Generation Firewall (NGFW): Includes advanced features like deep
packet inspection and intrusion prevention.
14. DMZ (Demilitarized Zone) Networks: A subnetwork that acts as a buffer zone
between an internal network and the public internet, adding an extra layer of
security.
15. Intrusion Prevention System (IPS) Types:
a. Host-Based IPS: Monitors and protects individual devices from threats.
b. Network-Based IPS: Monitors network traffic to prevent malicious activities.
c. Hybrid IPS: Combines both host-based and network-based approaches for
comprehensive protection.
System Security
16. Operating System Security: Measures implemented to protect the OS from
threats, including authentication, authorization, and system integrity checks.
17. Application Security: Protecting applications by identifying and mitigating security
vulnerabilities within their code and environment.
18. Security Maintenance: Ongoing processes like patch management, vulnerability
assessments, and system updates to ensure security posture.
19. Multilevel Security (MLS): A security model that enables data classification and
access control based on multiple clearance levels.
20. Multilevel Security for Role-Based Access Control (RBAC): Applying MLS
principles to RBAC by assigning roles different clearance levels to restrict data
access.
21. Concepts of Trusted System: A system designed with built-in mechanisms to
enforce a security policy, ensuring data confidentiality and integrity.
22. Trusted Computing: Technology and standards for building secure computing
systems that can protect data and execute trusted applications in a secure
environment.
-------------------------------UNIT 6-------------------------------
Cybercrime and Information Security
• Cybercrime: Illegal activities committed using digital technologies.
• Information Security: Protecting information and systems from unauthorized
access, use, disclosure, disruption, modification, or destruction.
Classification of Cybercrimes
• Cybercrimes against persons: Cyber stalking, cyber bullying, online harassment.
• Cybercrimes against property: Hacking, data theft, intellectual property theft.
• Cybercrimes against government: Cyber terrorism, cyber warfare.
Legal Perspectives
• Indian Perspective: The Indian IT Act 2000 and its amendments provide a legal
framework to address cybercrimes.
• Global Perspective: International cooperation is essential to combat cybercrime,
with treaties and conventions like the Budapest Convention on Cybercrime.
Categories of Cybercrime
• Hacking: Unauthorized access to computer systems.
• Phishing: Deceiving users into revealing sensitive information.
• Malware: Malicious software that harms computer systems.
• Cyberterrorism: Using cyberattacks to intimidate or coerce governments or
individuals.
Social Engineering: Manipulating people to gain access to sensitive information or
systems.
Cyber Stalking: Using electronic communication to harass or threaten individuals.
Proxy Servers and Anonymizers: Technologies that can be used to mask the identity of
users online.
Password Cracking: Methods used to guess or brute force passwords.
Keyloggers and Spyware: Software that records user keystrokes or monitors system
activity.
The Indian IT Act
• Challenges:
o Evolving nature of cybercrime
o Difficulty in enforcing international laws
o Lack of awareness among users
• Amendments:
o The IT Act has been amended several times to address emerging cyber
threats.
• Challenges to Indian Law and Cybercrime Scenario in India:
o Cross-border nature of cybercrime
o Lack of skilled cybersecurity professionals
o Inadequate infrastructure for digital forensics.
The Indian IT Act provides a legal framework to address cybercrime in India, but it faces
challenges in keeping up with the rapid evolution of cyber threats.