Cryptography Module 4
Cryptography Module 4
Phases of SecSDLC
1. Investigation
• Initiated by top management through an Enterprise Information Security Policy (EISP).
• Defines project goals, scope, budget, and constraints.
• Involves assembling a team and conducting an organizational feasibility analysis.
Unique to SecSDLC: Establishing the security policy framework and assessing management commitment.
2. Analysis
• Study documents from investigation phase.
• Review existing security policies, current threats, and controls.
• Evaluate legal and regulatory issues, especially data privacy laws.
• Begin risk management: identify, assess, and evaluate risks.
Unique to SecSDLC: Legal analysis and initiation of risk assessment.
3. Logical Design
• Develop a security blueprint.
• Plan for:
o Business Continuity
o Incident Response
o Disaster Recovery
• Evaluate feasibility of continuing or outsourcing the project.
Unique to SecSDLC: Focus on continuity planning, incident handling, and risk response strategies.
4. Physical Design
• Choose specific technologies and hardware to support the blueprint.
• Consider make or buy decisions for components.
• Design physical security measures.
• Conduct final feasibility analysis and seek approval from stakeholders.
Unique to SecSDLC: Designing both technological and physical controls for security.
5. Implementation
• Acquire or develop security solutions.
• Perform rigorous testing, installation, and training.
• Ensure user awareness and system documentation.
• Present the fully tested system to management.
Unique to SecSDLC: Continuous testing of security-specific features and user security training.
2. Asset:
Anything valuable to an organization that requires protection—data, hardware, software, networks,
personnel, etc.
3. Attack:
An attempt to exploit a system’s vulnerability to breach security, gain unauthorized access, or cause
disruption.
5. Exploit:
A method or technique used to take advantage of a vulnerability to compromise a system.
6. Exposure:
A state where an asset lacks protection, making it more susceptible to threats.
7. Loss:
The damage or negative consequence resulting from a security incident (e.g., financial loss,
reputational harm).
9. Risk:
The possibility of damage or loss when a threat exploits a vulnerability; calculated by likelihood ×
impact.
• Objects: Passive entities (e.g., files, databases) that are acted upon.
11. Threat:
A potential cause of an unwanted incident that may result in harm to a system or asset.
13. Vulnerability:
A weakness in a system that can be exploited by a threat agent to cause harm.
2. Integrity
Assures that information remains accurate and unaltered except by authorized sources.
Example: Hashing, checksums, digital signatures.
3. Availability
Ensures that information and systems are accessible to authorized users when needed.
Example: Redundancy, failover systems, backups.
4. Authenticity
Confirms the source of information is genuine.
Example: Digital certificates, user authentication.
5. Accountability
Ensures actions can be traced to a specific user or system component.
Example: Audit logs, user IDs.
6. Non-repudiation
Prevents a party from denying previous actions or commitments.
Example: Digital signatures, secure logging.
7. Privacy
Protects personal or sensitive data from unauthorized access or disclosure .
Example: Data masking, GDPR compliance.
8. Accuracy
Ensures data is correct, precise, and free from error.
9. Utility
Refers to the usefulness or relevance of the data for a specific purpose.
When any of these characteristics are compromised, the value and trustworthiness of the information
usually decreases. Protecting these characteristics is the foundation of information security.
2. Network-Based Attacks
These attacks target communication over networks:
• Man-in-the-Middle (MitM): The attacker intercepts communication between two parties.
• Denial-of-Service (DoS) / Distributed DoS (DDoS): Overloads a server with traffic, making it
unavailable.
• Session Hijacking: Takes over an active session between a user and a system to gain access.
4. Exploit-Based Attacks
These attacks take advantage of software flaws:
• Zero-Day Exploit: Targets unknown or unpatched vulnerabilities.
• Buffer Overflow: Overloads program memory to crash or run malicious code.
• Privilege Escalation: Gains higher access rights than intended (e.g., becoming an admin)
6. Insider Threats
Not all attacks come from outside—some are internal:
• Malicious Insider: Authorized users misuse their access to steal or harm data.
• Negligent Insider: Careless actions (like weak passwords or losing devices) lead to data exposure.
Espionage or Trespass
This refers to unauthorized access to sensitive or confidential information. It can be either legal
(competitive intelligence) or illegal (industrial espionage).
• Shoulder Surfing: A low-tech method where attackers gather information by observing users in
public settings (e.g., ATMs or phones).
• Trespassing: Virtual or physical entry into systems or premises without authorization, bypassing
authentication and authorization boundaries.
• Hackers:
o Expert Hackers (Elite): Skilled in programming, OS, and networking. They develop tools
used by less skilled hackers.
o Script Kiddies & Packet Monkeys: Use pre-made scripts/tools to conduct attacks like
DoS/DDoS without deep technical knowledge.
• Case Study – Hack PCWeek: A hacker exploited a CGI script vulnerability on a Linux web server
in 1999. Using tools like port scanning, HTTP header tricks, and analysis of exposed web content,
the attacker bypassed controls—not by breaching the OS, but through an insecure add-on script.
Mitigation Strategies:
Since these events are uncontrollable, organizations must:
• Invest in appropriate insurance policies.
• Maintain disaster recovery plans (DRP) and business continuity plans (BCP).
• Implement incident response plans (IRP).
• Design facilities with environmental protections (e.g., surge protectors, clean rooms, waterproofing).
Proper planning and risk assessment are essential to minimizing the impact of natural forces on information
systems.
Missing/Inadequate Controls
• Poorly designed or missing safeguards (e.g., outdated hardware, misconfigured security systems).
• Example: Using SOHO equipment in growing businesses without proper upgrades.
• Solution: Regular audits and control reviews to ensure continuous protection.
Sabotage or Vandalism
• Intentional acts to damage systems or reputations.
• Examples:
o SANS Institute’s site defaced by Fluffi Bunni hackers.
o Cyberactivism (e.g., Greenpeace campaigns, anti-fascist hacktivists).
• Rising Threat: Hacktivism and cyberterrorism aiming to disrupt systems politically or ideologically.
Theft
• Can be physical, electronic, or intellectual.
• Physical theft: Easier to detect and prevent.
• Electronic theft: Harder to detect; can happen without knowledge.
• Prevention: Surveillance, access control, and intrusion detection systems.
What are the various types of force majeure? Which type might be of greatest concern to an
organization in Bangalore? Chennai? Mumbai? Kolkata?
Types of Force Majeure:
• Natural Events: Earthquakes, floods, hurricanes, etc.
• Human Actions: War, terrorism, riots, strikes.
• Government Actions: Changes in laws, embargoes, government shutdowns.
• Industrial or Technological Disasters: Power outages, system failures.
Greatest Concerns:
• Bangalore: Flooding and water-related issues, as well as occasional protests or strikes.
• Chennai: Cyclones and floods are major concerns.
• Mumbai: Flooding during monsoon season, especially due to heavy rains.
• Kolkata: Flooding due to heavy rains, as well as occasional strikes.
What is due care? Why should an organization make sure to exercise due care in its usual course of
operations?
• Due Care: The effort made by an organization to prevent harm by taking necessary precautions and
measures to protect its assets, employees, and stakeholders.
• Importance: Exercising due care helps avoid negligence claims and ensures the organization
complies with legal and ethical standards. It also minimizes risks related to data breaches, accidents,
and other potential liabilities.
What are the three general categories of unethical and illegal behavior?
• Fraud and Theft: Dishonestly taking assets or funds.
• Corruption and Bribery: Offering or receiving bribes to influence decisions or actions.
• Violating Rights: Breaching privacy, intellectual property, or personal rights.
What is intellectual property (IP)? Is it afforded the same protection in every country of the world?
What laws currently protect it in India?
• Intellectual Property (IP): A legal concept that protects the creations of the mind, such as
inventions, designs, trademarks, and copyrights.
• Protection Across Countries: IP protection is not the same in every country. International treaties
like the TRIPS Agreement attempt to standardize IP laws globally, but local regulations vary.
• Laws in India: Key IP laws in India include:
o Patents Act, 1970: Protects inventions.
o Copyright Act, 1957: Protects creative works like literature, music, and art.
o Trade Marks Act, 1999: Protects brand names and logos.
o Designs Act, 2000: Protects the visual design of objects.