Chapter 1 Software Security-converted (5)
Chapter 1 Software Security-converted (5)
1. Infection Methods
2. Malware Actions
Malware on the basis of Infection Method are following:
Modification of messages –
It means that some portion of a message is altered or that message is delayed or
reordered to produce an unauthorized effect. Modification is an attack on the
integrity of the original data. It basically means that unauthorized parties not only
gain access to data but also spoof the data by triggering denial-of-service attacks,
such as altering transmitted data packets or flooding the network with fake data.
Manufacturing is an attack on authentication. For example, a message meaning
“Allow JOHN to read confidential file X” is modified as “Allow Smith to read
confidential file X”.
Modification of messages
Repudiation –
This attack occurs when the network is not completely secured or the login control
has been tampered with. With this attack, the author’s information can be changed
by actions of a malicious user in order to save false data in log files, up to the
general manipulation of data on behalf of others, similar to the spoofing of e-mail
messages.
Replay –
It involves the passive capture of a message and its subsequent transmission to
produce an authorized effect. In this attack, the basic aim of the attacker is to save
a copy of the data originally present on that particular network and later on use
this data for personal uses. Once the data is corrupted or leaked it is insecure and
unsafe for the users.
Replay
Denial of Service –
It prevents the normal use of communication facilities. This attack may have a
specific target. For example, an entity may suppress all messages directed to a
particular destination. Another form of service denial is the disruption of an entire
network either by disabling the network or by overloading it with messages so as
to degrade performance.
Denial of Service
Passive attacks: A Passive attack attempts to learn or make use of information
from the system but does not affect system resources. Passive Attacks are in the
nature of eavesdropping on or monitoring transmission. The goal of the opponent
is to obtain information that is being transmitted. Types of Passive attacks are as
follows:
• The release of message content
• Traffic analysis
The release of message content –
Telephonic conversation, an electronic mail message, or a transferred file may
contain sensitive or confidential information. We would like to prevent an
opponent from learning the contents of these transmissions.
Passive attack
Traffic analysis –
Suppose that we had a way of masking (encryption) information, so that the
attacker even if captured the message could not extract any information from the
message.
The opponent could determine the location and identity of communicating host
and could observe the frequency and length of messages being exchanged. This
information might be useful in guessing the nature of the communication that was
taking place.
The most useful protection against traffic analysis is encryption of SIP traffic. To
do this, an attacker would have to access the SIP proxy (or its call log) to determine
who made the call.
Computer Security and its Challenges
There are three main objectives of computer security, which are also referred
has CIA triads.
1. Confidentiality
2. Integrity
3. Availability
1. Confidentiality :
• Data confidentiality –
It is a property which ensures that any private information that can be
harmful if it is disclosed to any unauthorized person should only be
disclosed to a legit authorization so that no one can take advantage of
someone’s personal information.
• Privacy –
It is the property of the digital world that ensures that one can have the
right that any information which is related to them should be stored by
whomsoever they want and no other person should look through their
information of share their without their consent. If information is
shared without consent it is a breach of privacy which is a punishable
offence.
2. Integrity :
• Data integrity –
It ensures that the system and information is changed in the way that
user want and it is not breached by any third party with an intent to
harm.
• System integrity –
This ensures that the system should work in the manner as it is
designed to perform and its performance is not manipulated by anyone
else, that is any third party which manipulated the system to work
according to their wishes rather than the users.
3. Availability :
This ensures that system should work fine and should denied access to an
authorized user.
Computer Security Challenges :
1. Security is not simple it requires a lot of research and money
2. Potential attacks on the security features need to be considered.
3. Procedures used to provide particular services are often counter-
intuitive.
4. It is necessary to decide where to use the various security mechanisms.
5. Requires constant monitoring.
6. Security mechanisms typically involve more than a particular algorithm
or protocol.
7. Security is essentially a battle of wits between a perpetrator and the
designer.
8. Little benefit from security investment is perceived until a security
failure occurs.
9. Strong security is often viewed as an impediment to efficient and user-
friendly operation.
A Network Security Model exhibits how the security service has been designed over
the network to prevent the opponent from causing a threat to the confidentiality or
authenticity of the information that is being transmitted through the network.
In this section, we will be discussing the general ‘network security model’ where we
will study how messages are shared between the sender and receiver securely over the
network. And we will also discuss the ‘network access security model’ which is
designed to secure your system from unwanted access through the network
For a message to be sent or receive there must be a sender and a receiver. Both the
sender and receiver must also be mutually agreeing to the sharing of the message. Now,
the transmission of a message from sender to receiver needs a medium
i.e. Information channel which is an Internet service.
A logical route is defined through the network (Internet), from sender to the receiver
and using the communication protocols both the sender and the receiver
established communication.
Well, we are concerned about the security of the message over the network when the
message has some confidential or authentic information which has a threat from an
opponent present at the information channel. Any security service would have the three
components discussed below:
1. Transformation of the information which has to be sent to the receiver. So, that
any opponent present at the information channel is unable to read the message. This
indicates the encryption of the message.
It also includes the addition of code during the transformation of the information which
will be used in verifying the identity of the authentic receiver.
2. Sharing of the secret information between sender and receiver of which the
opponent must not any clue. Yes, we are talking of the encryption key which is used
during the encryption of the message at the sender’s end and also during the decryption
of message at receiver’s end.
3. There must be a trusted third party which should take the responsibility
of distributing the secret information (key) to both the communicating parties and
also prevent it from any opponent.
Now we will study a general network security model with the help of the figure given
below:
The network security model presents the two communicating
parties sender and receiver who mutually agrees to exchange the information. The
sender has information to share with the receiver.
But sender cannot send the message on the information cannel in the readable form as it
will have a threat of being attacked by the opponent. So, before sending the message
through the information channel, it should be transformed into an unreadable format.
Secret information is used while transforming the message which will also be
required when the message will be retransformed at the recipient side. That’s why a
trusted third party is required which would take the responsibility of distributing this
secret information to both the parties involved in communication.
So, considering this general model of network security, one must consider the following
four tasks while designing the security model.
2. Next, the network security model designer is concerned about the generation of
the secret information which is known as a key.
This secret information is used in conjunction with the security algorithm in order to
transform the message.
3. Now, the secret information is required at both the ends, sender’s end and receiver’s
end. At sender’s end, it is used to encrypt or transform the message into unreadable
form and at the receiver’s end, it is used to decrypt or retransform the message into
readable form.
So, there must be a trusted third party which will distribute the secret information to
both sender and receiver. While designing the network security model designer must
also concentrate on developing the methods to distribute the key to the sender and
receiver.
An appropriate methodology must be used to deliver the secret information to the
communicating parties without the interference of the opponent.
It is also taken care that the communication protocols that are used by the
communicating parties should be supporting the security algorithm and the secret key
in order to achieve the security service.
Till now we have discussed the security of the information or message over the
network. Now, we will discuss the network access security model which is designed
to secure the information system which can be accessed by the attacker through the
network.
You are well aware of the attackers who attack your system that is accessible through the
internet. These attackers fall into two categories:
1. Hacker: The one who is only interested in penetrating into your system. They do not
cause any harm to your system they only get satisfied by getting access to your system.
2. Intruders: These attackers intend to do damage to your system or try to obtain the
information from the system which can be used to attain financial gain.
The attacker can place a logical program on your system through the network which can
affect the software on your system. This leads to two kinds of risks:
a. Information threat: This kind of threats modifies data on the user’s behalf to
which actually user should not access. Like enabling some crucial permission in the
system.
b. Service threat: This kind of threat disables the user from accessing data on the
system.
Well, these kinds of threats can be introduced by launching worms and viruses and may
more like this on your system. Attack with worms and viruses are the software attack
that can be introduced to your system through the internet.
The network security model to secure your system is shown in the figure below:
There are two ways to secure your system from attacker of which the first is to introduce
the gatekeeper function. Introducing gatekeeper function means introducing login-
id and passwords which would keep away the unwanted access.
In case the unwanted user gets access to the system the second way to secure your
system is introducing internal control which would detect the unwanted user trying
to access the system by analyzing system activities. This second method we call
as antivirus which we install on our system to prevent the unwanted user from
accessing your computer system through the internet.
So, this is all about the network security model. We have discussed two network security
model. One, securing your information over the network during information
transmission. Second, securing your information system which can be accessed by the
hacker through the network or internet.
such that it continues to function correctly under malicious attack. Software security
and reduce vulnerabilities within software and the environment in which it runs.
cyber attacks. Software security also attempts to identify, protect against, and create
solutions for vulnerabilities that are not the result of malicious attacks but are
nonetheless harmful.
Software security looks to increase the integrity of software by testing and fortifying
software at the various stages and environments it moves through during the software
information; whereas application security is only one domain within the whole process.
• User authentication
• IP filtering