Cyber Security
Cyber Security
https://gaia.cs.umass.edu/kurose_ross/ppt.php
What is network security?
confidentiality: only sender, intended receiver should “understand”
message contents
• sender encrypts message
• receiver decrypts message
authentication: sender, receiver want to confirm identity of each
other
message integrity: sender, receiver want to ensure message not
altered (in transit, or afterwards) without detection
access and availability: services must be accessible and available to
users
https://gaia.cs.umass.edu/kurose_ross/ppt.php
Authentication
• Authentication is used by a server when the server needs to
know exactly who is accessing their information, service or site.
source:
https://www.bu.edu/tech/about/security-resources/bestpracti
ce/auth/
Authorization
source: https://www.bu.edu/tech/about/security-resources/bestpractice/auth/
Authorization
• The Secure Shell (SSH) and Socket Layer (SSL) protocols are
usually used in encryption processes. The SSL drives the secure part
of “https://” sites used in e-commerce sites (like E-Bay and
Amazon.com.)
source: https://www.bu.edu/tech/about/security-resources/bestpractice/auth/
What is Private Key?
• This key is shared between the sender and receiver of the encrypted
sensitive information.
source: https://www.tutorialspoint.com/difference-between-private-key-and-public-key#:~:text=Conclusion,freely%20circulated%20among%20multiple%20users.
What is Public Key?
• A public key (which may be known to everyone) and a private key (which is
known only to the owner) make up each pair.
• Cryptographic techniques based on mathematical problems known as
one-way functions are used to generate such key pairs.
• A private key should be kept secret for effective security; a public key can
be freely circulated without jeopardizing security.
source: https://www.tutorialspoint.com/difference-between-private-key-and-public-key#:~:text=Conclusion,freely%20circulated%20among%20multiple%20users.
What is Public Key?
source: https://www.tutorialspoint.com/difference-between-private-key-and-public-key#:~:text=Conclusion,freely%20circulated%20among%20multiple%20users.
Simple encryption scheme
substitution cipher: substituting one thing for another
▪ monoalphabetic cipher: substitute one letter for another
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
m: plaintext message
KA(m): ciphertext, encrypted with key KA
m = KB(KA(m))
https://gaia.cs.umass.edu/kurose_ross/ppt.php
Digital Signature
• A digital signature is an electronic, encrypted, stamp of
authentication on digital information such as email messages,
macros, or electronic documents.
www.pandadoc.com
Digital Signature
• A digital signature is a mathematical scheme for verifying the
authenticity of digital messages or documents.
• A valid digital signature on a message gives a recipient
confidence that the message came from a sender known to the
recipient and that it was not altered/modified in between.
File Sharing
• Back in the pre-cloud days, sharing files involved using file
transfer protocol applications like FTP or else copying files to a
disc and then mailing it or walking it over to a colleague
(affectionately known as ‘sneakernet’).
• Emails could also be sent (and many people still use email as
their main “file-sharing” option), but size limits on attachments
and security concerns discouraged this practice.
File Sharing
• Today’s world of file sharing offers nearly endless options.
• Giants like Dropbox, Box, Google, Microsoft, and Apple, as well as
smaller companies like MediaFire and Tresorit,
• all offer online cloud storage options that include file sharing,
synchronization across multiple devices, and collaboration features.
https://www.ibm.com/topics/phishing
Phishing Attacks
• Phishing is the most common type of social engineering, the practice
of deceiving, pressuring or manipulating people into sending
information or assets to the wrong people.
• Social engineering attacks rely on human error and pressure tactics for
success.
https://www.ibm.com/topics/phishing
Phishing Attacks
• The attacker typically masquerades as a person or organization the
victim trusts—e.g., a coworker, a boss, a company the victim or
victim’s employer does business with—and creates a sense of urgency
that drives the victim to act rashly.
• Hackers and fraudsters use these tactics because it’s easier and less
expensive to trick people than it is to hack into a computer or network.
https://www.ibm.com/topics/phishing
Spoofing
• Spoofing is a broad term for the type of behavior that involves a
cybercriminal masquerading as a trusted entity or device to get
you to do something beneficial to the hacker — and detrimental
to you.
• Any time an online scammer disguises their identity as
something else, it's spoofing.
• In the context of information security, and especially network
security, a spoofing attack is a situation in which a person or
program successfully identifies as another by falsifying data, to
gain an illegitimate advantage.
Secure Socket Layer (SSL)
• Secure Socket Layer (SSL) provides security to the data that is
transferred between web browser and server.
• SSL encrypts the link between a web server and a browser which
ensures that all data passed between them remain private and free from
attack.
https://www.kaspersky.com/resource-center/definitions/what
-is-a-ssl-certificate
Certification authority (CA)
• In cryptography, a certification authority (CA) is an entity that stores, signs,
and issues digital certificates.
https://en.wikipedia.org/wiki/Certificate_authority
Certification authority (CA)
• One particularly common use for certificate authorities is to sign
certificates used in HTTPS, the secure browsing protocol for the
World Wide Web.
• Another common use is in issuing identity cards by national
governments for use in electronically signing documents.
Public key Certification Authorities (CA)
▪ certification authority (CA): binds public key to particular entity, E
▪ entity (person, website, router) registers its public key with CE
provides “proof of identity” to CA
• CA creates certificate binding identity E to E’s public key
• certificate containing E’s public key digitally signed by CA: CA says “this is E’s
public key”
Bob’s digital
public + signature +
key KB (encrypt) KB
CA’s
Bob’s
private
K
- certificate for Bob’s
key
identifying
CA public key, signed by CA
information
https://gaia.cs.umass.edu/kurose_ross/ppt.php
Public key Certification Authorities (CA)
▪ when Alice wants Bob’s public key:
• gets Bob’s certificate (Bob or elsewhere)
• apply CA’s public key to Bob’s certificate, get Bob’s public key
+
digital Bob’s
KB signature + public
(decrypt) KB key
CA’s
public +
key KCA
https://gaia.cs.umass.edu/kurose_ross/ppt.php