Computer Security IBA - Final
Computer Security IBA - Final
SECURITY
CIS 300
Bachelor of Information
Communication Technology
(Hons)
Uditha Landekumbura
Bsc. in Software Engineering
SCQF Level 7,8,9
EQF Level 5,6
Basic Security Concepts 01 06 Public key
Infrastructure
Threats, Vulnerabilities,
Attacks 02 07 Secure Remorte Access
08
Steps Toward Internet What Do We Do? We've
Security 03 Been Hacked!
With the rise in cyber threats such as hacking, phishing, and malware,
securing networks and systems protects this sensitive information
from unauthorized access and misuse.
Information
security = confidentiality + integrity + availability + authentication
Importance of Information Security
Authentication
Authentication in computer security is the process of verifying the
identity of a user, device, or system. It ensures that individuals or
entities attempting to access resources are who they claim to be.
Authentication is a critical component of access control and security
protocols, following identification.
Access Control (Authorization)
Nonrepudiation
Nonrepudiation is a security principle that ensures that a party in a
communication or transaction cannot deny the authenticity of their
signature or the sending of a message. It provides proof of the origin,
integrity, and ownership of data.
02 THREATS, VULNERABILITIES, AND ATTACKS
Protocols
Redirects: Forcing users to another site without their consent, often leading
them to malicious or phishing sites.
Secure Browsing
Secure browsing is the practice of using the internet in a way that
minimizes the risk of data theft, malware infection, and unauthorized
access. This involves taking steps to protect personal information, avoid
malicious websites, and safeguard privacy while online. Secure browsing
helps prevent attackers from intercepting sensitive data, such as
passwords, credit card numbers, and personal details.
Key Tips for Secure Browsing
Use HTTPS: Ensure that the websites you visit use HTTPS (look for a padlock
icon in the URL bar). HTTPS encrypts data between your browser and the
website, preventing eavesdropping.
Use Strong Passwords and a Password Manager: Avoid using the same
passwords on multiple sites and opt for strong, unique passwords. A
password manager can securely store and generate complex passwords.
Use Antivirus Software and Firewalls: These tools can detect and block
malicious downloads and websites, providing an additional layer of
protection.
Avoid Public Wi-Fi or Use a VPN: Public Wi-Fi is insecure and can be easily
exploited. If you must use it, a Virtual Private Network (VPN) encrypts your
connection, protecting your data.
Configure browser
Browser Security Plus offers three different sets of policies to address the
above challenge:
Techniques:
Techniques:
● Enable Safe Browsing: Most browsers can warn about phishing and
malware sites.
● Install Security Extensions: Use add-ons like ad-blockers and VPNs.
● Stay Updated: Ensure your browser has the latest security patches.
When you visit a website, the server sends a cookie to your browser, which
stores it.
On subsequent visits, your browser sends the cookie back to the server,
allowing the website to remember your preferences or session information.
Privacy Concerns:
Cookies can be used for tracking users’ online activities, leading to privacy
issues.
Managing Cookies:
Session Cookies
Persistent Cookies
Third-Party Cookies
● Set by domains other than the one you are visiting, often used for
advertising and tracking purposes.
● Can be used to track users across different sites, leading to privacy
concerns.
04 ALWAYS ON, ALWAYS VULNERABLE
“Always On, Always Vulnerable” describes the risks faced by devices and
systems that are continuously connected to the internet. Constant
connectivity allows for easy access to services and data, but it also
exposes these systems to persistent security threats, such as malware
attacks, unauthorized access, and data breaches.
Risk Sharing: Transferring part of the risk to a third party, such as using
cyber insurance or outsourcing certain functions to a managed security
provider.
The firewall sits between your computer (or network) and the internet,
watching all data that tries to come in or go out.
Data on the internet moves in small pieces called "packets." The firewall
inspects each of these packets to see where it’s from, where it’s going, and
what it contains.
The firewall uses a set of predefined rules to decide what to do with each
packet. These rules might allow, block, or limit certain types of data based on
things like IP addresses, ports, or protocols.
04) Allowing or Blocking Packets:
If a packet meets the firewall’s rules (e.g., it’s from a trusted source), it is
allowed to pass through. If it looks suspicious or doesn’t follow the rules, the
firewall blocks it to protect the network.
Some firewalls can track active connections to remember which devices are
communicating and ensure that only safe, expected responses come back
to trusted devices.
The firewall may log information about what it blocks or allows, which helps
in monitoring security and analyzing potential threats.
05 SECURE YOUR BUSINESS
● Establish Strong Cybersecurity Policies: Set clear rules for data access,
internet use, and security practices among employees.
● Use Firewalls and Antivirus Software: Firewalls block unauthorized access,
while antivirus software detects and removes malware.
● Regular Software Updates and Patching: Keep all systems, applications,
and devices up-to-date to address known vulnerabilities.
● Employee Training: Educate staff on recognizing phishing attempts,
secure password practices, and other security best practices.
● Data Backup and Recovery Plans: Ensure regular data backups and test
recovery plans to quickly restore operations after a security incident.
● Multi-Factor Authentication (MFA): Adding extra layers of
authentication helps protect sensitive accounts from unauthorized
access.
01) Closely Monitor Your Traffic: Regularly check network traffic for unusual
activity or potential threats. Use monitoring tools to detect unauthorized
access attempts or abnormal patterns that could indicate a breach.
02) Stay Up to Date on New Threats: Keep informed about emerging cyber
threats and vulnerabilities by subscribing to security bulletins or industry
news. This awareness helps you adjust your defenses to address the latest
risks.
03) Regularly Update Your Frontline Defense: Ensure that firewalls, antivirus
software, and intrusion detection systems are up-to-date. Frequent updates
strengthen your defense against new types of attacks.
6 steps to secure your network
05) Protect Against Data Loss: Implement data backup solutions and
enforce encryption policies to secure sensitive data, reducing the impact of
potential data breaches or loss incidents.
● Access Control Lists (ACLs): ACLs specify which users or devices can
access certain resources. They act as traffic filters, blocking
unauthorized access while allowing trusted connections.
● Least Privilege Principle: Users are given the minimum access needed
to perform their tasks, reducing the risk of accidental or malicious
misuse of higher access levels.
Monitor traffic
Monitoring Traffic involves continuously observing and analyzing data
moving in and out of a network to detect suspicious or unusual activity. This
proactive security measure helps identify potential threats early and
prevents unauthorized access or data breaches.
Real-Time Alerts: Monitoring tools can send alerts when they detect
abnormal behavior, such as a sudden increase in network traffic, which
might indicate a DDoS attack or data exfiltration attempt.
Analyzing Logs: Traffic logs keep a record of all activity, providing insights
into who accessed what and when. Regular log analysis helps track patterns
and detect trends, highlighting possible security issues.
● Too busy
● Too inexperienced
Public Key Infrastructure (PKI) is a system that manages digital keys and
certificates to enable secure electronic communications. It’s essential for
encrypting data, authenticating users, and ensuring data integrity across
networks.
● Encryption: Public keys are used to encrypt messages, which can only
be decrypted by the corresponding private key.
● Digital Signatures: Private keys create digital signatures, allowing
recipients to verify the sender’s identity with the public key.
01) Key Generation: The first step is generating a key pair (public and
private keys) for each user or device. Keys must be created with strong
cryptographic algorithms to ensure security and must meet certain length
requirements.
02) Key Distribution: The public key is distributed, usually through a digital
certificate issued by a Certificate Authority (CA), while the private key
remains securely stored and confidential.
03) Key Storage: Private keys must be stored in secure locations, often in
hardware security modules (HSMs) or secure software environments.
Security measures protect keys from unauthorized access and potential
breaches.
04) Key Usage: Keys are used for encryption, decryption, signing, and
verification. Organizations define policies that specify the circumstances under
which keys can be used, ensuring keys are only used for their intended purposes.
05) Key Rotation and Renewal: To maintain security, keys should be periodically
rotated or renewed. This process involves generating a new key pair to replace
the old one, which minimizes the risk of a compromised key being reused.
07) Key Expiry and Destruction: Keys have set lifetimes and must be destroyed
securely once they expire or are no longer needed to prevent unauthorized use.
Cryptography
Cryptography is the science of securing information by transforming it into
an unreadable format, accessible only to those who possess the necessary
decryption key. It plays a fundamental role in digital security by ensuring
data privacy, authenticity, and integrity.
During the Middle Ages, ciphers became more sophisticated. The Vigenère
Cipher was developed using polyalphabetic substitution, making it much
harder to decode.
With the rise of computers, symmetric encryption methods like DES (Data
Encryption Standard) and later AES (Advanced Encryption Standard) became
standard.
Public Key Cryptography emerged in the 1970s with the invention of the RSA
algorithm by Rivest, Shamir, and Adleman. This breakthrough enabled secure
communication over public channels without needing a pre-shared key,
revolutionizing digital communication.
Contemporary Cryptography:
How it Works: The sender uses a key to encrypt the data, turning it into
ciphertext. The receiver, who also has the same key, can then decrypt the
ciphertext back into readable data.
Key Management: Both parties must securely share and store the same key,
which can be a challenge, especially over large networks.
Pros:
Cons:
How it Works: The sender uses the recipient’s public key to encrypt the
data. Only the recipient’s private key, which they keep secure, can decrypt
the data. This ensures that even if the public key is widely shared, the data
remains secure.
Key Management: Since the public key can be shared openly, only the
private key needs to be kept secure, simplifying key management.
Pros:
Cons:
Public Key: The public key of the certificate holder, used in encryption and verification.
Owner’s Identity: Information about the certificate holder, such as name and
organization.
Certificate Authority’s Signature: The CA’s digital signature verifies the authenticity of
the certificate.
Use: Digital certificates are widely used in secure web transactions, email encryption,
and network communications to verify that the server or sender is genuine. Examples
include SSL/TLS certificates used by websites.
Digital Signature
A Digital Signature is a cryptographic method used to verify the authenticity and
integrity of digital messages, documents, or software. It acts as a “digital
fingerprint” for a document or message.
Creating the Signature: The sender generates a hash (a unique, fixed-length string)
of the original document. This hash is then encrypted with the sender’s private key,
creating the digital signature.
Verification: The recipient decrypts the digital signature using the sender’s public
key, obtaining the original hash. They then generate a hash from the received
document and compare it to the decrypted hash. If they match, the document is
verified as authentic and untampered.
Uses: Digital signatures are essential in secure email, document signing, and
software distribution, as they confirm both the sender’s identity and the
document’s integrity.
Secure Sockets Layer (SSL)
1. Digital Certificates: SET uses digital certificates to verify the identities of all parties
involved in the transaction: the buyer, merchant, and bank. This ensures that each party
is legitimate and authorized to participate in the transaction.
2. Encryption: All sensitive data, such as credit card information, is encrypted. SET uses
both symmetric and asymmetric encryption to secure information and prevent
unauthorized access.
3. Dual Signature: A unique feature of SET is the dual signature, which separates the
payment information from the order details. This keeps the buyer's credit card details
secure, allowing only the bank to access it, while the merchant can only see the order
details.
4. Authorization and Payment: Once the transaction details are encrypted and signed,
the buyer’s bank authorizes the payment, confirming that sufficient funds are available.
The bank then forwards the transaction to the merchant's bank for settlement.
5. Receipt Confirmation: After authorization, both the buyer and the merchant receive
a transaction confirmation, and the transaction is complete.
Biometrics
Biometrics Types:
● Sensor: Captures the biometric data (e.g., camera for face recognition,
fingerprint scanner).
● Data Processing: Converts the captured biometric data into a digital format
for analysis.
● Storage: Stores biometric data in an encrypted format within a secure
database or on the user’s device.
● Matching Algorithm: Compares new biometric data to stored records to verify
identity.
● Decision-Making Engine: Determines whether the presented data matches an
existing template and grants or denies access accordingly.
Benefits of Biometrics Solutions:
Limitations:
Secure Remote Access refers to the ability for authorized users to access
a network or system remotely, in a secure manner, without compromising
sensitive data or system integrity. It is achieved using technologies like
Virtual Private Networks (VPNs), Secure Shell (SSH), multi-factor
authentication (MFA), and other encryption methods to ensure data is
transmitted securely over public networks.
Who Uses Remote Access?
Employees: Remote access is commonly used by employees working from in
different geographical locations to connect to the company’s network,
systems, and data.
Healthcare Providers: Doctors and medical staff use remote access to view
patient records or provide telemedicine services from off-site locations.
Scalability: Remote access solutions can easily grow with the organization.
02) Site-to-Site VPN: Connects two or more networks (e.g., branch offices)
securely over the internet. It is often used to connect the network of a
company’s headquarters to remote offices.
03) Client-to-Site VPN: This is a type of remote access VPN where a user’s
device (the client) connects to a corporate network through a secure
connection, often using specialized software or VPN client apps.
Black Hat Hackers: Malicious hackers who break the law to steal, damage, or
manipulate data for personal gain or to cause harm.
White Hat Hackers: Ethical hackers who use their skills to help organizations
secure their systems by identifying vulnerabilities before malicious hackers
can exploit them.
Gray Hat Hackers: Hackers who operate in a morally ambiguous area, often
testing systems without permission but without malicious intent, sometimes
reporting vulnerabilities they find.
Hacktivist: A hacker who use hacking to send social, religious, and political,
etc. messages.
Ethical hacking follows legal and ethical guidelines, ensuring the activities do
not cause harm to the system.
Why Ethical Hacking?
● Identify Vulnerabilities: Helps organizations find and fix security
weaknesses before they can be exploited by attackers.
● Prevent Data Breaches: Ethical hackers help protect sensitive data from
being stolen or compromised.
● Improve System Security: Ethical hacking strengthens systems, networks,
and applications by patching vulnerabilities and ensuring stronger
defenses.
● Compliance: Some industries require regular security testing to comply
with regulations and standards like GDPR, HIPAA, or PCI-DSS.
● Proactive Defense: Ethical hacking allows organizations to stay ahead of
cyber threats, rather than reacting to security incidents after they
happen.
● Build Trust: Organizations that employ ethical hacking demonstrate their
commitment to security, building trust with customers and partners.
09 CYBERCRIME
Impact:
● Financial loss
● Damage to reputation
● Legal consequences
● Breach of privacy and data security
Types of Cybercrime: