Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cyber Security Notes, Lecture notes of Computer Science

Covers Some topics of Cyber security

Typology: Lecture notes

2019/2020

Uploaded on 12/17/2020

aalok-srivastava
aalok-srivastava 🇮🇳

4.7

(3)

1 document

1 / 145

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Computer System Architecture Dept. of Info. Of Computer.Chap. 12 Memory Organization
12-1
Cryptography & Network Security
Cryptography : A word in Greek origin means “ Secret writing”
Cryptography (Basic definition)
It is the science and art of transforming messages to make them
secure and immune to attacks.
Different types of Cryptography
Symmetric Key Cryptography : Same key will be used for encryption
& decryption.
Asymmetric Key Cryptography: One key will be used for encryption
and another key will be used for decryption.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63
pf64

Partial preview of the text

Download Cyber Security Notes and more Lecture notes Computer Science in PDF only on Docsity!

Cryptography & Network Security

Cryptography : A word in Greek origin means “ Secret writing”

Cryptography (Basic definition)

◆ It is the science and art of transforming messages to make them

secure and immune to attacks.

Different types of Cryptography

◆ Symmetric Key Cryptography : Same key will be used for encryption

& decryption.

◆ Asymmetric Key Cryptography: One key will be used for encryption

and another key will be used for decryption.

Goals of Network Security

Privacy or Confidentiality:

◆ It is used to protect data from disclosure attack.

Authentication:

◆ It is used to provide authentication of the party at either end of the

line.

Integrity:

◆ It is used to protect data from modification, insertion, deletion etc.

Non-Repudiation:

◆ This service protects against repudiation either by sender or the

receiver.

Public-Key/Asymmetric Key cryptosystem

Main ingredients of Public Key Cryptosystem:

◆ Plaintext

◆ Encryption algorithm

◆ Public and private key

◆ Ciphertext

◆ Decryption algorithm

Asymmetric Key cryptosystem

General idea of asymmetric-key cryptosystem

12 - 7 1 3 . 7

Digital Signature

Digital signature process

Adding key to the digital signature process

A digital signature needs a public-key system.

The signer signs with her private key; the verifier

verifies with the signer’s public key.

Note

Digital Signature

Malicious Programs

Trapdoors

Secret entry point into a program.

Allows those who know access bypassing usual security procedures.

Have been commonly used by developers.

Threat when left in production programs, allowing exploited by attackers

Requires good s/w development & update.

Trojan Horse

Program with hidden side-effects.

Which is usually superficially attractive

◆ eg game, ZIP software etc.

When run performs some additional tasks

◆ allows attacker to indirectly gain access they do not have directly

Often used to propagate a virus/worm or install a backdoor or to destroy

data.

Zombie

Program which secretly takes over another networked computer then

uses it to indirectly launch attacks.

Often used to launch distributed denial of service (DDoS) attacks.

Types of Viruses

Parasitic virus: The traditional and still most common form of virus. A parasitic virus attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. Memory-resident virus: Lodges in main memory as part of a resident system program. From that point on, the virus infects every program that executes. Boot sector virus: Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.

Types of Viruses

Stealth virus: A form of virus explicitly designed to hide itself from

detection by antivirus software. For ex: Using compression to hide

increased file size due to infection.

Polymorphic virus: A virus that mutates with every infection, making

detection by the "signature" of the virus impossible. For ex: To insert

superfluous instructions or change the order of independent instructions.

Macro-virus

Macro code attached to some data file

Interpreted by program using file

◆ ex: Word/Excel macros

◆ ex: Using auto command & command macros

Code is platform independent

A macro virus is platform independent. Virtually all of the macro viruses

infect Microsoft Word documents. Any hardware platform and operating

system that supports Word can be infected.

Worms

A worm is a program that can replicate itself and send copies from computer to computer across network connections. Upon arrival, the worm may be activated to replicate and propagate. Also, the worm usually performs some unwanted function. An e-mail virus has some of the characteristics of a worm, however, we can still classify it as a virus because it requires a human to move it forward. To replicate itself, a network worm uses some sort of network vehicle. For ex. : Electronic mail facility, Remote login capability etc. The new copy of the worm program is then run on the remote system continues to spread in the same fashion. Ex: Stuxnet, used to disturb Iranian nuclear program.