UNIT-5 NIS
UNIT-5 NIS
on
Network And Information
Security
(22620)
By
Ms.Pritee H. Raut
(Assistante Professor)
(MARKS-14)
kerbero
s
Kerberos is a network authentication protocol designed to provide strong authentication
for client/server applications by means of secret-key cryptography. Kerberos ensures the
highest level of security to network resources.
Here are the principal entities involved in the typical Kerberos workflow: (2m)
1. Client. The client acts on behalf of the user and initiates communication for a service
request
2. Server. The server hosts the service the user wants to access
3. Authentication Server (AS). The AS performs the desired client authentication. If the
authentication happens successfully, the AS issues the client a ticket called TGT (Ticket
Granting Ticket).
4. Key Distribution Center (KDC). In a Kerberos environment, the authentication server
logically separated into three parts: A database (db), the Authentication Server (AS), and
the Ticket Granting Server (TGS). These three parts, in turn, exist in a single server
called the Key Distribution Center
5. Ticket Granting Server (TGS). The TGS is an application server that issues ticket for the
server
working of
kerberos
Step-1:
User login and request services on the host. Thus user requests for. ticket-granting service(TGS)
Step-2:
Authentication Server verifies user’s access right using database and timestamp is created (time
stamp tells the expiration date and time of encrypted key , default expiration time is 8 hours for time
stamp) and then gives ticket-granting-ticket(TGT) and session key.
Step-3:
then client submit this ticket-granting-ticket(TGT) to ticket-granting service(TGS) for authentication.
Step-4:
If the TGS can authenticate the client, it sends credentials and a service ticket to access the
requested service to the client.
Step-5:
The client sends a request to access the Application server(AP). This request includes the service
ticket received in step 4. If the application server can authenticate this request, the client can access
the server.
Step-6:
IPSec provides:
Confidentiality
Authentication
Integrity
IP Security
Architecture:
1. Architecture:
Architecture or IP Security Architecture covers the general concepts, definitions, protocols,
algorithms and security requirements of IP Security technology.
2. ESP Protocol:
ESP(Encapsulation Security Payload) provide the confidentiality service. Encapsulation
Security Payload is implemented in either two ways:
3. Encryption algorithm:
Encryption algorithm is the document that describes various encryption algorithm used for
Encapsulation Security Payload.
4. AH Protocol:
AH (Authentication Header) Protocol provides both Authentication and Integrity service.
Authentication Header is implemented in one way only: Authentication along with Integrity.
5. Authentication Algorithm:
Authentication Algorithm contains the set of the documents that describe authentication algorithm
used for AH and for the authentication option of ESP.
DOI is the identifier(approved encryption algorithm, authentication algorithm) which support both AH
and ESP protocols. It contains values needed for documentation related to each other.
7. Key Management:
Key Management contains the document that describes how the keys are exchanged between sender
and receiver.
Simple Mail Transfer
SMTP isProtocol-
short for Simple Mail Transfer Protocol.
It is an application layer protocol.
It is used for sending the emails efficiently and reliably over the internet.
Working-
NOTE-
Characteristics of SMTP-
• SMTP can only handle the messages containing 7 bit ASCII text.
• SMTP can not transfer other types of data like images, video, audio etc.
• SMTP can not transfer executable files and binary objects.
• SMTP can not transfer the text data of other languages like French, Japanese, Chinese etc.
• If an email is asked to be sent twice, then SMTP server resends it without saying that the email has
already been sent.
This is because-
This is because-
Authentication-
sender authentication allow user to verify that the PEM message which he has received is truly from
the person who claims to have sent it
Confidentiality –
Confidentiality refers to the act of preventing unauthorized access to the information hence
protecting it. The confidentiality is obtained in PEM by encrypting the messages by using various
standard algorithms such as Data Encryption Standard (DES). DES in cipher block chaining mode is
being currently used by PEM.
Integrity –
Data integrity refers to the consistency of data through out its life cycle. This is obtained by using a
unique concept called as message digest where message digest is a hash function which converts
the message into an image called digest on taking the message as input.
Working of
PEM
The PEM works
1.Canonical Conversion – basically in 4 main
This step involves the conversion of the message into a standard format that is independent
steps.
of the computer architecture and the operation system of the sender and the receiver. If the
sender and receiver has different computer architecture or operating system. It may lead to
generation of different message digest due to difference in their interpretation because of
syntactical difference from one operating system to an other.
2. Digital signature-
In this step, the digital signature is generated by encrypting the message digest of an email
message with the sender’s private key.
3.Encryption
The encrypted message is generated by encrypting the original message and digital
signature together along with the symmetric key as shown in the figure below. This step
is very crucial in order to obtain the confidentiality.
4. Base-64 Encoding –
This is the last step where the binary output is transformed into character output.
1.Canonical Conversion –
There is a possibility that the sender and the receiver of email messages use a computer that has a different
operating system and architecture. This is because the internet works on any computer that has a TCP/IP stack,
regardless of its architecture or operating system, so there is a possibility that the same thing is represented
differently in these different computers. For example, a new line in the case of the Microsoft DOS operating
system is represented by two characters, while in a Unix operating system, the same is represented by a single
character. These can create problems while creating a message Digest; hence digital signature comes into the
picture. For example, the message Digest of the email message created in the Microsoft DOS operating system
can differ from the message digest of the email message created in the Unix operating system. This is because
the input used for creating message Digest is not the same in both cases.
Step #3 – Encryption
In this step, the original email message and the digital signature created in step 2 are encrypted using a
symmetric key. For the Encryption process, DES or DES-3 algorithm is used.
4. Base-64 Encoding –
This is the last step where the binary output is transformed into character output.
Pretty Good Privacy
(PGP)
PGP stands for Pretty Good Privacy (PGP) which is invented by Phil Zimmermann.
PGP was designed to provide all four aspects of security, i.e., privacy, integrity,
authentication, and non-repudiation in the sending of email.
PGP uses a digital signature (a combination of hashing and public key encryption) to
provide integrity, authentication, and non-repudiation.
PGP uses a combination of secret key encryption and public key encryption to provide
privacy. Therefore, we can say that the digital signature uses one hash function, one
secret key, and two private-public key pairs.
PGP at the Sender site (A)
Following are the steps taken by PGP to create secure
e-mail at the sender site:
1. The receiver receives the combination of encrypted secret key and message digest
is received.
2. The encrypted secret key is decrypted by using the receiver's private key to get
the one-time secret key.
3. The secret key is then used to decrypt the combination of message and digest.
4. The digest is decrypted by using the sender's public key, and the original message
is hashed by using a hash function to create a digest.
5. Both the digests are compared if both of them are equal means that all the aspects
of security are preserved.
Public Key Infrastructure(6m)
Public key infrastructure or PKI is the governing body behind issuing digital
certificates. It helps to protect confidential data and gives unique identities to users
and systems. Thus, it ensures security in communications.
The public key infrastructure uses a pair of keys: the public key and the private key
to achieve security. The public keys are prone to attacks and thus an intact
infrastructure is needed to maintain them.
COMPONENT OF PKI
(sample)
Digital Certificates:
Certificate Authority:
Registration Authority
Digital
Certificate
Digital certificate is issued by a trusted third party which proves sender's identity to the
receiver and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the identity
of the certificate holder. The CA issues an encrypted digital certificate containing the
applicant’s public key and a variety of other identification information. Digital certificate is
used to attach public key with a particular individual or an entity.
Issuing CA - The name of the certificate authority which issued the certificate.
CA Digital Signature - The digital signature of the issuing certificate authority.
Version Number - Specifies the version of X.509 to which the certificate conforms (at time of writing the
current version is 3). The version number is important because it defines which other fields are necessary
in the certificate.
Serial Number - A unique number identifying the specific certificate issued by a particular CA.
Subject/Owner - The owner of the certificate. Possible values include a person, company, department,
network device, application etc.
Owner's Public Key - The public key associated with the certificate and corresponding to the certificate
owner's private key.
Validity Period - The dates during which the certificate is deemed to be valid.
Certificate Usage - Specifies the approved uses of the certificate.
Signature Algorithm - The hashing and digital signature algorithms used in the creation of the certificate.
What is
Cybercrime is criminalcybercrime?
activity that either targets or uses a computer, a computer
network or a networked device.
Most, but not all, cybercrime is committed by cybercriminals or hackers who want to
make money. Cybercrime is carried out by individuals or organizations.
Cybercrime that stops users using a machine or network, or prevents a business
providing a software service to its customers, is called a Denial-of-Service (DoS) attack.
Types of cybercrime(2m)
Here are some specific examples of the different types of cybercrime:
Email and internet fraud.
Identity fraud (where personal information is stolen and used).
Theft of financial or card payment data.
Theft and sale of corporate data.
Cyberextortion (demanding money to prevent a threatened attack).
Ransomware attacks (a type of cyberextortion).
Cyberespionage (where hackers access government or company data).
What is COBIT Framework?
The COBIT Framework (Control Objectives for Information and Related
Technologies) is a comprehensive set of guidelines and best practices designed
to help organizations manage and govern their IT (Information Technology)
systems effectively. It provides a structured approach to ensuring that IT aligns
with business goals, delivers value, manages risks, and complies with laws and
regulations.
Principles of COBIT
Framework(6M)
1- Meeting Stakeholder Needs
The first important principle of COBIT is “Meeting Stakeholder Needs”. This principle
focuses on ensuring that IT governance and management align with the needs and
expectations of all stakeholders involved with the organization. basically, giving them
what they need or expect from the IT resources in the company.
This means that IT governance and management should not focus only on specific IT
systems or departments but should cover the entire organization—from top to bottom,
across all processes, departments, and functions. Every part of the business should
benefit from proper IT management and oversight.
Covering the entire enterprise helps identify and manage risks more effectively, as every
aspect of the business is included in the IT governance plan.
3- Applying a Single Integrated Framework
his means using one framework (COBIT, in this case) to manage all aspects of IT governance. Instead
of having different frameworks for different areas (like security, risk management, or performance
management), COBIT combines everything into one, making it easier to manage and monitor.
the latest relevant frameworks and standards are CMMI, PMBOK/Prince2, TOGAF, ISO 27000 series, ITIL,
ISO 38500, ISO 31000, ISO 9000, COSO ERM, COSO, etc.
COBIT can be used as a management and governance framework integrator. It means that it can be
integrated with any of these frameworks and standards to make your business achieve new goals.
Holistic refers to looking at the big picture rather than focusing on individual parts. In the context of
COBIT, it means considering all aspects of IT governance and management—such as people,
processes, technology, and information—together as a whole to ensure everything works well together.
This ensures better alignment, risk management, performance, and decision-making across the
organization.
5- Separating Governance from Management
Who is a Hacker?
A Hacker is a person who finds and exploits the weakness in computer systems
and/or networks to gain access. Hackers are usually skilled computer programmers
with knowledge of computer security.
Types of
Hackers
Hackers are classified according to the intent of their actions. The following list classifies
types of hackers according to their intent:
1.White hat hacker or Ethical Hacker (White hat): A security hacker who gains access to
systems with a view to fix the identified weaknesses. They may also perform penetration Testing and
vulnerability assessments.
2. Black hat hacker or Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate privacy rights,
transfer funds from bank accounts etc.
Types of Hackers
3. Grey hat hacker Grey hat: A hacker who is in between ethical and black hat
hackers. He/she breaks into computer systems without authority with a view to
identify weaknesses and reveal them to the system owner.
4. Script kiddies: A non-skilled person who gains access to computer systems using already
made tools.
Types of
Hackers
5. Hacktivist : A hacker who use hacking to send social, religious, and political, etc.
messages. This is usually done by hijacking websites and leaving the message on the
hijacked website.
Cyber pornography is banned in many countries but legalized in some. Cyber Pornography is neither
banned nor legalised under the IT Act, 2000. The IT Act prohibits the production and distribution of
cyber pornography but does not prohibit the viewing or downloading of pornographic content if it is
not child pornography.
SECTION 67
section 67 of the Information Technology Act, 2000 makes the following acts punishable with
imprisonment up to 3 years and a fine up to 5 lakhs:
Section 67A of the Information Technology Act makes publication, transmission and causing to be
transmitted and published any material containing sexually explicit act or conduct punishable with
imprisonment up to 5 years and a fine up to ₹10 lakhs.
1. Viewing Cyber pornography is legal in India. Merely downloading and viewing such content does
not amount to an offence.
4. Transmitting cyber pornography via instant messaging, emails or any other mode of digital
transmission is an offence.
Child Pornography
Section 67B of the IT Act, 2000 makes it publishing, transmitting, viewing or downloading child
pornography illegal. The fact that the internet has made child pornography more accessible to
the distributors, as well as the collectors, cannot be denied.
According to Section 67B, any person who has not attained the age of 18 years is a child. It
further states that child pornography can be committed in the following five ways:
Ex- international cyber terrorist accessing and disabling or modifying the signal
that control military technology.
Cyber
defamation
Defamation can be understood as the wrongful and intentional publication of
something either in the written or oral form about a person to harm his reputation in
the society.
Cyber defamation involves defaming a person through a new and far more effective
method such as the use of modern Electronic devices.
If a person publishes any kind of defamatory statement against any other person on a
website or sends E-mails containing defamatory material to that person to whom the
statement has been made would amount to Cyber defamation.
Cyber law
Cyber law is like any other legal rule or policy that should be followed in our day to day
life to stay out of any kind of trouble. These laws are formed by keeping several issues
into consideration such as our society, morals, computer ethics, etc. The only
difference is that cyber law is applied to the internet and internet-related technologies
only.
Cyber law is formed to maintain discipline and justice in the cyber world. This area in the
legal system is introduced because the crime related to computers and other technology
was increasing rapidly.
These types of crimes were not falling under the category of any existing legal category
therefore a separate section was formed named Cyber Law.
Cyber laws help to reduce or prevent people from cybercriminal activities on a large scale
with the help of protecting information access from unauthorized people, freedom of
speech related to the use of the Internet, privacy, communications, email, websites,
intellectual property, hardware and software, such as data storage devices.
Need of cyber
Like any law, a cyber lawlaw
is created to help protect people and organizations on the
Internet from malicious people on the Internet and help maintain order. If someone breaks
a cyber law or rule, it allows another person or organization to take action against that
person or have them sentenced to a punishment.
ISO 27001 uses a top-down, risk-based approach and is technology-neutral. The specification defines a six-part
planning process:
1. Define a security policy.
2. Define the scope of the ISMS.
3. Conduct a risk assessment.
4. Manage identified risks.
5. Select control objectives and controls to be implemented.
6. Prepare a statement of applicability.
Why is ISO 27001 important?
Not only does the standard provide companies with the necessary know-how for protecting their
most valuable information, but a company can also get certified against ISO 27001 and, in this
way, prove to its customers and partners that it safeguards their data.
What is an ISMS?
• An Information Security Management System (ISMS) is a set of rules that a company needs to
establish in order to:
• identify stakeholders and their expectations of the company in terms of information security
• identify which risks exist for the information
• define controls (safeguards) and other mitigation methods to meet the identified expectations
and handle risks
• set clear objectives on what needs to be achieved with information security
• implement all the controls and other risk treatment methods
• continuously measure if the implemented controls perform as expected
• make continuous improvement to make the whole ISMS work better
ISO 20000
The PPT shows that ISO 20000 is the international standard for IT
Service Management (ITSM), published by ISO (the International
Organization for Standardization), and ICE (the International
Electoral Commission).The standard describes a set of
management processes designed to help you deliver more
effective IT services
The information technology service management system
complies with the requirements mentioned in the clauses of ISO
20000-1:2018 . ISO 20000 gives you the methodology and the
framework to help you manage your ITSM, while allowing you to
prove your company follows best practice. With the requirements
of the standard you will achieve best practice, helping to improve
your delivery of IT services. What is ISO 20000 ?