Main Ideas
Network Security Requirements
Network security aims to protect the confidentiality, integrity, and availability of data:
Confidentiality: Ensures that information is accessible only to authorized users. Achieved through encryption and access control mechanisms.
Integrity: Guarantees that data is accurate and unaltered during transmission or storage. Ensured using cryptographic hash functions and digital signatures.
Availability: Ensures that data and systems are accessible to authorized users when needed. Protected through redundancy, failover systems, and mitigation of denial-of-service (DoS) attacks.
Symmetric Cryptography
Symmetric cryptography uses a single key for both encryption and decryption:
Data Encryption Standard (DES): An older algorithm with a 56-bit key. Considered insecure due to vulnerabilities to brute-force attacks.
Advanced Encryption Standard (AES): A widely used algorithm with key sizes of 128, 192, or 256 bits. AES is highly secure and efficient for encrypting data.
Asymmetric Cryptography
Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption:
RSA: Based on the difficulty of factoring large prime numbers. Used for secure data transmission and digital signatures.
Diffie-Hellman: Enables secure key exchange over an insecure channel. Does not directly encrypt data.
Elliptic Curve Cryptography (ECC): Provides the same level of security as RSA with smaller key sizes, making it efficient for resource-constrained systems.
Cryptographic Hash Functions
Hash functions convert data into a fixed-size hash value and are essential for verifying data integrity:
SHA-1: Produces a 160-bit hash value. Considered insecure due to vulnerabilities to collision attacks.
MD5: Produces a 128-bit hash value. Also considered insecure due to susceptibility to collisions.
Modern Alternatives: Use SHA-256 or SHA-3 for enhanced security.
Remote User Authentication
Techniques for verifying the identity of users over a network:
Kerberos: Uses symmetric key cryptography and tickets for secure authentication. A trusted third party (Key Distribution Center) mediates authentication.
Web Security Threats and Approaches
Common threats include:
SQL Injection: Attackers manipulate database queries to gain unauthorized access.
Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages viewed by others.
Cross-Site Request Forgery (CSRF): Forces users to perform unwanted actions.
Mitigation techniques:
Input validation and sanitization.
Secure coding practices.
Implementation of Content Security Policies (CSPs).
Secure Socket Layer (SSL)/Transport Layer Security (TLS)
Protocols that secure data transmission over the internet.
Use encryption to protect confidentiality and integrity.
Utilize certificates to verify the identity of servers and clients.
TLS is the successor to SSL and provides enhanced security features.
Pretty Good Privacy (PGP)
A cryptographic system for secure email communication.
Combines symmetric encryption (for data confidentiality) and public-key encryption (for key exchange).
Uses digital signatures for authenticity and integrity.
Risk Analysis and Management
Key steps include:
Risk Identification: Identify potential security threats.
Risk Assessment: Evaluate the likelihood and impact of risks.
Risk Mitigation: Implement controls to reduce risks.
Monitoring: Continuously monitor and reassess risks.
Digital Forensics
The process of investigating digital evidence to uncover security incidents.
Involves:
Data acquisition: Collecting data while maintaining its integrity.
Analysis: Examining data for evidence of breaches.
Reporting: Documenting findings for legal or organizational use.
Legal and Regulatory Issues
Organizations must comply with laws and regulations related to cybersecurity, such as:
General Data Protection Regulation (GDPR): Protects personal data in the EU.
Health Insurance Portability and Accountability Act (HIPAA): Secures healthcare data in the US.
Payment Card Industry Data Security Standard (PCI DSS): Ensures the security of payment card transactions.
Understanding these frameworks helps organizations avoid legal penalties and maintain trust.