Main Ideas

Network Security Requirements

Network security aims to protect the confidentiality, integrity, and availability of data:

  • Confidentiality: Ensures that information is accessible only to authorized users. Achieved through encryption and access control mechanisms.

  • Integrity: Guarantees that data is accurate and unaltered during transmission or storage. Ensured using cryptographic hash functions and digital signatures.

  • Availability: Ensures that data and systems are accessible to authorized users when needed. Protected through redundancy, failover systems, and mitigation of denial-of-service (DoS) attacks.


Symmetric Cryptography

Symmetric cryptography uses a single key for both encryption and decryption:

  • Data Encryption Standard (DES): An older algorithm with a 56-bit key. Considered insecure due to vulnerabilities to brute-force attacks.

  • Advanced Encryption Standard (AES): A widely used algorithm with key sizes of 128, 192, or 256 bits. AES is highly secure and efficient for encrypting data.


Asymmetric Cryptography

Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption:

  • RSA: Based on the difficulty of factoring large prime numbers. Used for secure data transmission and digital signatures.

  • Diffie-Hellman: Enables secure key exchange over an insecure channel. Does not directly encrypt data.

  • Elliptic Curve Cryptography (ECC): Provides the same level of security as RSA with smaller key sizes, making it efficient for resource-constrained systems.


Cryptographic Hash Functions

Hash functions convert data into a fixed-size hash value and are essential for verifying data integrity:

  • SHA-1: Produces a 160-bit hash value. Considered insecure due to vulnerabilities to collision attacks.

  • MD5: Produces a 128-bit hash value. Also considered insecure due to susceptibility to collisions.

  • Modern Alternatives: Use SHA-256 or SHA-3 for enhanced security.


Remote User Authentication

Techniques for verifying the identity of users over a network:

  • Kerberos: Uses symmetric key cryptography and tickets for secure authentication. A trusted third party (Key Distribution Center) mediates authentication.


Web Security Threats and Approaches

Common threats include:

  • SQL Injection: Attackers manipulate database queries to gain unauthorized access.

  • Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages viewed by others.

  • Cross-Site Request Forgery (CSRF): Forces users to perform unwanted actions.

Mitigation techniques:

  • Input validation and sanitization.

  • Secure coding practices.

  • Implementation of Content Security Policies (CSPs).


Secure Socket Layer (SSL)/Transport Layer Security (TLS)

  • Protocols that secure data transmission over the internet.

  • Use encryption to protect confidentiality and integrity.

  • Utilize certificates to verify the identity of servers and clients.

  • TLS is the successor to SSL and provides enhanced security features.


Pretty Good Privacy (PGP)

  • A cryptographic system for secure email communication.

  • Combines symmetric encryption (for data confidentiality) and public-key encryption (for key exchange).

  • Uses digital signatures for authenticity and integrity.


Risk Analysis and Management

Key steps include:

  1. Risk Identification: Identify potential security threats.

  2. Risk Assessment: Evaluate the likelihood and impact of risks.

  3. Risk Mitigation: Implement controls to reduce risks.

  4. Monitoring: Continuously monitor and reassess risks.


Digital Forensics

  • The process of investigating digital evidence to uncover security incidents.

  • Involves:

    • Data acquisition: Collecting data while maintaining its integrity.

    • Analysis: Examining data for evidence of breaches.

    • Reporting: Documenting findings for legal or organizational use.


Legal and Regulatory Issues

  • Organizations must comply with laws and regulations related to cybersecurity, such as:

    • General Data Protection Regulation (GDPR): Protects personal data in the EU.

    • Health Insurance Portability and Accountability Act (HIPAA): Secures healthcare data in the US.

    • Payment Card Industry Data Security Standard (PCI DSS): Ensures the security of payment card transactions.

  • Understanding these frameworks helps organizations avoid legal penalties and maintain trust.