Cyber Security Notes
Cyber Security Notes
UNIT-I
Cyber security is the application of technologies, processes and controls to protect systems,
networks, programs, devices and data from cyber attacks.
It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of
systems, networks and technologies.
Who needs cyber security?
Everyone who is connected to the Internet needs cyber security. This is because most cyber
attacks are automated and aim to exploit common vulnerabilities rather than specific websites
or organisations.
Types of cyber threats
Common cyber threats include:
Malware, such as ransom ware, botnet software, RATs (remote access Trojans),
rootkits and bootkits, spyware, Trojans, viruses and worms.
Backdoors, which allow remote access.
Form jacking, which inserts malicious code into online forms.
Cryptojacking, which installs illicit crypto currency mining software.
DDoS (distributed denial-of-service) attacks, which flood servers, systems and
networks with traffic to knock them offline.
DNS (domain name system) poisoning attacks, which compromise the DNS to
redirect traffic to malicious sites.
What are the 5 types of cyber security?
1. Critical infrastructure cyber security
Critical infrastructure organisations are often more vulnerable to attack than others because
SCADA (supervisory control and data acquisition) systems often rely on older software.
Operators of essential services in the UK‘s energy, transport, health, water and digital
infrastructure sectors, and digital service providers are bound by the NIS Regulations
(Network and Information Systems Regulations 2018).
Among other provisions, the Regulations require organisations to implement appropriate
technical and organisational measures to manage their security risks.
2. Network security
Network security involves addressing vulnerabilities affecting our operating systems and
network architecture, including servers and hosts, firewalls and wireless access points, and
network protocols.
3. Cloud security
Cloud security is concerned with securing data, applications and infrastructure in the Cloud.
4. IoT (Internet of Things) security
1
IoT security involves securing smart devices and networks that are connected to the IoT. IoT
devices include things that connect to the Internet without human intervention, such as smart
fire alarms, lights, thermostats and other appliances.
5. Application security
Application security involves addressing vulnerabilities resulting from insecure development
processes in the design, coding and publishing of software or a website.
Cyber security vs information security
Cyber security is often confused with information security.
Cyber security focuses on protecting computer systems from unauthorised access or
being otherwise damaged or made inaccessible.
Information security is a broader category that protects all information assets, whether
in hard copy or digital form.
What is internet governance?
A) Internet governance refers to the rules, policies, standards and practices
that coordinate and shape global cyberspace. The Internet is a vast network of independently-
managed networks, woven together by globally standardized data communication protocols
(primarily, Internet Protocol, TCP, UDP, DNS and BGP). The common adoption and use of
these protocols unified the world of information and communications like never before.
Millions of digital devices and massive amounts of data, software applications, and electronic
services became compatible and interoperable. The Internet created a new environment, a
complex and dynamic ―cyberspace.‖
While Internet connectivity generated innovative new services, capabilities and
unprecedented forms of sharing and cooperation, it also created new forms of crime, abuse,
surveillance and social conflict. Internet governance is the process whereby cyberspace
participants resolve conflicts over these problems and develop a workable order.
The challenges of Internet governance
Cyber Threats:
the word ―cyber‖ referred to cybernetics – the science of understanding the control and
movement of machines and animals. This was followed by ―cyber‖ standing for
―computerized.‖
A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or
disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial
of Service (DoS) attacks, and other attack vectors.
Cyberwarfare:
cyberwarfare is the use of cyber attacks against a nation-state, causing it significant harm, up
to and including physical warfare, disruption of vital computer systems and loss of life.
Types of cyberwarfare attacks
The threat of cyberwarfare attacks grows as a nation's critical systems are increasingly
connected to the internet. Even if these systems can be properly secured, they can still be
hacked by perpetrators recruited by nation-states to find weaknesses and exploit them.
Major types of cyberwarfare attacks include the following.
Destabilization
In recent years, cybercriminals have been attacking governments through critical
infrastructure, including such entities as transportation systems, banking systems, power
grids, water supplies, dams and hospitals. The adoption of the internet of things makes the
manufacturing industry increasingly susceptible to outside threats.
2
From a national security perspective, destabilizing critical digital infrastructure inflicts
damage on vital modern services or processes.
For example, an attack on the energy grid could have massive consequences for the
industrial, commercial and private sectors.
Sabotage
Cyber attacks that sabotage government computer systems can be used to support
conventional warfare efforts. Such attacks can block official government communications,
contaminate digital systems, enable the theft of vital intelligence and threaten national
security. State-sponsored or military-sponsored attacks,
for example, may target military databases to get information on troop locations, weapons
and equipment being used.
Data theft
Cybercriminals hack computer systems to steal data that can be used for intelligence, held for
ransom, sold, used to incite scandals and chaos, or even destroyed.
Cyber Crime
The crime that involves and uses computer devices and Internet, is known as cybercrime.
Cybercrime can be committed against an individual or a group; it can also be committed
against government and private organizations. It may be intended to harm someone‘s
reputation, physical harm, or even mental harm.
Cybercrime can cause direct harm or indirect harm to whoever the victim is. However, the
largest threat of cybercrime is on the financial security of an individual as well as the
government.
Types of Cybercrime
Hacking
It is an illegal practice by which a hacker breaches the computer‘s security
system of someone for personal interest.
Unwarranted mass-surveillance
Mass surveillance means surveillance of a substantial fraction of a group of people by the
authority especially for the security purpose, but if someone does it for personal interest, it is
considered as cybercrime.
Child pornography
It is one of the most heinous crimes that is brazenly practiced across the world. Children are
sexually abused and videos are being made and uploaded on the Internet.
Child grooming
It is the practice of establishing an emotional connection with a child especially for the
purpose of child-trafficking and child prostitution.
Copyright infringement
If someone infringes someone‘s protected copyright without permission and publishes that
with his own name, is known as copyright infringement.
Money laundering
Illegal possession of money by an individual or an organization is known as money
laundering. It typically involves transfers of money through foreign banks and/or legitimate
business. In other words, it is the practice of transforming illegitimately earned money into
the legitimate financial system.
Cyber terrorism:
Cyber terrorism can be explained as internet terrorism. With the advent of the internet,
individuals and groups are misusing the anonymity to threaten individuals, certain groups,
3
religions, ethnicities or beliefs. Cyberterrorism can be broadly categorized under three major
categories:
Simple: This consists of basic attacks including the hacking of an individual system.
Advanced: These are more sophisticated attacks and can involve hacking multiple systems
and/or networks.
Complex: These are coordinated attacks that can have a large-scale impact and make use of
sophisticated tools.
Cyber Espionage
Cyber espionage, or cyber spying, is a type of cyber attack in which an unauthorized user
attempts to access sensitive or classified data or intellectual property (IP) for economic gain,
competitive advantage or political reasons.
Cyber espionage attacks can be motivated by monetary gain; they may also be deployed in
conjunction with military operations or as an act of cyber terrorism or cyber warfare. The
impact of cyber espionage, particularly when it is part of a broader military or political
campaign, can lead to disruption of public services and infrastructure, as well as loss of life.
Need for a Comprehensive Cyber Security Policy
Security policies are a formal set of rules which is issued by an organization to ensure that the
user who are authorized to access company technology and information assets comply with
rules and guidelines related to the security of information. It is a written document in the
organization which is responsible for how to protect the organizations from threats and how
to handles them when they will occur. A security policy also considered to be a "living
document" which means that the document is never finished, but it is continuously updated as
requirements of the technology and employee changes.
Need of Security policies-
1) It increases efficiency.
The best thing about having a policy is being able to increase the level of consistency which
saves time, money and resources. The policy should inform the employees about their
individual duties, and telling them what they can do and what they cannot do with the
organization sensitive information.
2) It upholds discipline and accountability
When any human mistake will occur, and system security is compromised, then the security
policy of the organization will back up any disciplinary action
and also supporting a case in a court of law. The organization policies act as a contract which
proves that an organization has taken steps to protect its intellectual property, as well as its
customers and clients.
3) It can make or break a business deal
It is not necessary for companies to provide a copy of their information security policy to
other vendors during a business deal that involves the transference of their sensitive
information. It is true in a case of bigger businesses which ensures their own security interests
are protected when dealing with smaller businesses which have less high-end security
systems in place.
4) It helps to educate employees on security literacy
A well-written security policy can also be seen as an educational document which informs the
readers about their importance of responsibility in protecting the organization sensitive data.
It involves on choosing the right passwords, to providing guidelines for file transfers and data
storage which increases employee's overall awareness of security and how it can be
strengthened.
4
Need for a Nodal Authority:
What is nodal authority?
Nodal Officer means an officer of the Company nominated by the Board to receive protected
disclosures from whistle blowers, maintaining records thereof, placing the same before the
Audit Committee for its disposal and informing the whistle blower the result thereof.
CERT-In is the national nodal agency for responding to computer security incidents as and
when they occur. CERT-In has been designated to serve as the national agency to perform the
following functions in the area of cyber security: Collection, analysis and dissemination of
information on cyber incidents.
Need for an International convention on Cyberspace.
The need to create a universal and transparent global framework to ensure the effective
security and utilization of cyberspace ―for the economic and social advancement of all
peoples‖ has become paramount.
Cyber Security Vulnerabilities: Overview
What is Vulnerability in Cyber Security?
A vulnerability in cyber security refers to any weakness in an information system, system
processes, or internal controls of an organization. These vulnerabilities are targets for lurking
cybercrimes and open to exploitation through the points of vulnerability.
These hackers are able to gain illegal access to the systems and data and cause severe
damage. Therefore, cyber security vulnerabilities are extremely important to monitor for the
overall security posture as gaps in a network can result in a full-scale breach of systems in an
organization.
Examples of Vulnerabilities
A weakness in a firewall that can lead to malicious hackers getting into a computer network
Lack of security cameras
Unlocked doors at businesses.
vulnerabilities in software
A software vulnerability is a defect in software that could allow an attacker to gain control of
a system. These defects can be because of the way the software is designed, or because of a
flaw in the way that it‘s coded.
How Does a Software Vulnerability Work?
An attacker first finds out if a system has a software vulnerability by scanning it. The scan
can tell the attacker what types of software are on the system, are they up to date, and
whether any of the software packages are vulnerable.
When the attacker finds that out, he or she will have a better idea of what types of attacks to
launch against the system. A successful attack would result in the attacker being able to run
malicious commands on the target system.
System administration
A security systems administrator is someone who gives expert advice to companies regarding
their internal security procedures and can also help to detect any weaknesses in a
company's computer network that may make them vulnerable to cyber attacks. Security
systems administrators are a company‘s first step in monitoring suspicious activity either
within the local network or from outside internet traffic.
Security systems administrators are in charge of the daily operation of security systems, and
can handle things like systems monitoring and running regular backups; setting up, deleting
and maintaining individual user accounts; and developing organizational security procedures.
5
Complex Network Architectures:
Cybersecurity architecture, also known as ―network security architecture‖, is a framework
that specifies the organizational structure, standards, policies and functional behavior of a
computer network, including both security and network features. Cybersecurity architecture
is also the manner in which various components of our cyber or computer system are
organized, synced and integrated.
The components listed below are part of an effective and carefully planned security
architecture:
Direction in the area of incident response to threats, disaster recovery, systems configuration,
account creation and management, and cybersecurity monitoring.
Identity management.
Decided inclusion and exclusion of those subject to the domain of the
security architecture.
Access and border control.
Validation and adjustment of the architecture.
Training.
Poor Cyber Security Awareness:
While many businesses use strong security practices to reduce the risks to our
information, it‘s up to everyone to make these methods stronger. After all, we wouldn‘t
leave our car unlocked when we‘re heading off to the mall for the day. Companies will
do what they can to protect our information, but we should also do what we can to keep
it safe as well.
1. Outdated Software
Websites are not the only ways we can be hacked, either. Operating systems on our
computer, mobile devices or even software running our wireless network at home are easy to
compromise for hackers.
2. Not Understanding the Threat
One of the most common reasons why cyber attacks cause so much damage is because
of the lack of proper understanding. A lot of people believe themselves to be immune
from threats and don‘t really put thought into how dangerous attacks can become.
Even something as simple as a web browser can lead to all kinds of problems in work
and personal lifestyles
3. Lack of Proper Protection
One of the leading causes to how hackers gain a foothold in our systems is due to
improper protection.
Remember the comment earlier about not locking our door at night? Essentially, a lack
of security software on our computer or website would be like removing that door
entirely.
3. Effects of Ransomware
Ransomware has been around for quite some time, but it has grown exponentially since
2015. Essentially, this is when someone gains control of a database or computer system
and blocks its use until a ―ransom‖ is paid.
Keep firewalls online and updates current. If we come across suspicious emails or
programming, run anti-malware applications or seek professional help. Unfortunately,
some attacks may require far more attention than what software can give.
4. Evolving Software
6
Some forms of attacks are extremely difficult to track down and stop, even for
high-end software.
For example, a polymorphic virus delivers a new payload every time it expands.
This means it essentially mutates each time making it very difficult to spot.
Update all of our applications regularly. Even things we don‘t use that often, such
as Adobe Flash or Java Runtime, can have vulnerabilities. This is why companies
will often send out update requests to computers running those apps.
5. Carelessness through Email
One of the most common forms of attacks from hackers is that of using email.
Messages that may look legitimate are often points for the criminal element to steal
information. This is called, ―phishing.‖ In many cases, these messages are almost
impossible to discern from the real thing.
Attachments are another common way that hackers infiltrate computer systems through
email. Even the most innocent of files can become weapons against we. Many of these
file types include ZIP, EXE and XLS extensions.
Never open unknown or suspicious attachments in our email. If we didn‘t specifically
ask for the file to be sent to we, there is a good chance that it‘s a form of an attack we
want to avoid.
6. Unprotected Home Networks
A common problem that affects many people every year is an unprotected home
network. Update firmware on our devices when it becomes available. Also, keep our
Wi-Fi networks protected with high-encryption methods and MAC address
authentication if it‘s available. And don‘t underestimate the value of hiding our SSID.
Older wireless networks are just as sensitive to new attacks as older pieces of software. It
may be worth the money to upgrade our system.
8. Social Media Behavior
Even our activity on social media can become a target for hackers. Most of the time,
this is through gaining access to an account.
Always be on the lookout for suspicious links from friends and family. We may also want to
be mindful about what applications we allow to have access to our social media accounts.
We could be handing someone over the keys to our proverbial front door in the cyber world.
9. Lack of Recovery
Another dangerous aspect to cyber threats is the inability to recover from a disaster.
invest in a system that delivers regular backups and an easy recovery system. Even if a
hacker does destroy our information, we can easily replace it all with the right platform.
In some instances, this can all be done automatically or with a drag-and-drop platform.
Cyber security safeguards overview
Cyber security is the application of technologies, processes and controls to protect systems,
networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber
attacks and protect against the unauthorised exploitation of systems, networks and
technologies. Boost our cyber defences with these must-have security measures:
1. Staff awareness training
Human error is the leading cause of data breaches. It is therefore essential that we equip staff
with the knowledge to deal with the threats they face.
Staff awareness training will show employees how security threats affect them and help them
apply best-practice advice to real-world situations.
7
2. Application security
Web application vulnerabilities are a common point of intrusion for cyber criminals.
As applications play an increasingly critical role in business, it is vital to focus on web
application security.
3. Network security
Network security is the process of protecting the usability and integrity of our network and data.
This is achieved by conducting a network penetration test, which assesses our network for
vulnerabilities and security issues.
4. Leadership commitment
Leadership commitment is key to cyber resilience. Without it, it is tough to establish or enforce
effective processes. Top management must be prepared to invest in appropriate cyber security
resources, such as awareness training.
5. Password management
Almost half of the UK population uses ‗password‘, ‗123456‘ or ‗qwerty‘ as their password. We
should implement a password management policy that provides guidance to ensure staff create
strong passwords and keep them secure.
6.Access control:
Access control is a data security process that enables organizations to manage who is
authorized to access corporate data and resources. Secure access control uses policies that
verify users are who they claim to be and ensures appropriate control access levels are
granted to users.
Access control is managed through several components:
7.Authentication
Authentication is the initial process of establishing the identity of a user. For example, when
a user signs in to their email service or online banking account with a username and password
combination, their identity has been authenticated. However, authentication alone is not
sufficient to protect organizations‘ data.
8.Authorization
Authorization adds an extra layer of security to the authentication process. It specifies access
rights and privileges to resources to determine whether the user should be granted access to
data or make a specific transaction.
For example, an email service or online bank account can require users to provide two-factor
authentication (2FA), which is typically a combination of something they know (such as a
password), something they possess (such as a token), or something they are (like a biometric
verification). This information can also be verified through a 2FA mobile app or a thumbprint
scan on a smartphone.
9.Access
Once a user has completed the authentication and authorization steps, their identity will be
verified. This grants them access to the resource they are attempting to log in to.
8
10.Manage
Organizations can manage their access control system by adding and removing the
authentication and authorization of their users and systems. Managing these systems can
become complex in modern IT environments that comprise cloud services and on-premises
systems.
11.Audit
Organizations can enforce the principle of least privilege through the access control audit
process. This enables them to gather data around user activity and analyze that information to
discover potential access violations.
12.Biometrics:
Biometrics scanners are hardware used to capture the biometric for verification of identity.
These scans match against the saved database to approve or deny access to the system. In other
words, biometric security means our body becomes the ―key‖ to unlock our access.
13.cryptography
Cryptography is the study of secure communications techniques that allow only the sender and
intended recipient of a message to view its contents. The term is derived from the Greek
word kryptos, which means hidden. It is closely associated to encryption, which is the act of
scrambling ordinary text into what's known as ciphertext and then back again upon arrival. In
addition, cryptography also covers the obfuscation of information in images using techniques
such as microdots or merging. Ancient Egyptians were known to use these methods in complex
hieroglyphics, and Roman Emperor Julius Caesar is credited with using one of the first modern
ciphers.
14.Deception:
Deception technology is a cybersecurity defense practice that aims to deceive attackers by
distributing a collection of traps and decoys across a system's infrastructure to imitate genuine
assets.
Denial of Service Filters
15]Ethical Hacking
Ethical Hacking is an authorized practice of bypassing system security to identify potential
data breaches and threats in a network. The company that owns the system or network
9
allows Cyber Security engineers to perform such activities in order to test the system‘s
defenses. Thus, unlike malicious hacking, this process is planned, approved, and more
importantly, legal.
Ethical hackers aim to investigate the system or network for weak points that malicious
hackers can exploit or destroy. They collect and analyze the information to figure out ways to
strengthen the security of the system/network/applications. By doing so, they can improve
the security footprint so that it can better withstand attacks or divert them.
Ethical hackers are hired by organizations to look into the vulnerabilities of their systems and
networks and develop solutions to prevent data breaches. Consider it a high-tech permutation
of the old saying ―It takes a thief to catch a thief.‖
They check for key vulnerabilities include but are not limited to:
Injection attacks
Changes in security settings
Exposure of sensitive data
Breach in authentication protocols
Components used in the system or network that may be used as access points
16]Firewalls: A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization‘s previously established security policies.
At its most basic, a firewall is essentially the barrier that sits between a private internal
network and the public Internet. A firewall‘s main purpose is to allow non-threatening traffic
in and to keep dangerous traffic out.
17]Intrusion Detection Systems:An Intrusion Detection System (IDS) is a monitoring
system that detects suspicious activities and generates alerts when they are detected.
Based upon these alerts, a security operations center (SOC) analyst or incident responder can
investigate the issue and take the appropriate actions to remediate the threat.
18]Response:Incident response (IR) is a set of information security policies and procedures
that we can use to identify, contain, and eliminate cyberattacks. The goal of incident response
is to enable an organization to quickly detect and halt attacks, minimizing damage and
preventing future attacks of the same type
19]Scanning:Scanning is a set of procedures for identifying live hosts, ports, and services,
discovering Operating system and architecture of target system, Identifying vulnerabilities
and threats in the network.
20]Security policy:A cybersecurity policy sets the standards of behavior for activities such
as the encryption of email attachments and restrictions on the use of social media.
Cybersecurity policies are important because cyberattacks and data breaches are potentially
costly. For large organizations or those in regulated industries, a cybersecurity policy is often
dozens of pages long. For small organizations, however, a security policy might be only a
few pages and cover basic safety practices. Such practices might include:
10
Rules for using email encryption
Steps for accessing work applications remotely
Guidelines for creating and safeguarding passwords
Rules on use of social media
Type of Hackers
The practice of ethical hacking is called ―White Hat” hacking, and those who perform it are
called White Hat hackers. In contrast to Ethical Hacking, “Black Hat‖ hacking describes
practices involving security violations. The Black Hat hackers use illegal techniques to
compromise the system or destroy information.
Unlike White Hat hackers, ―Grey Hat” hackers don‘t ask for permission before getting into
our system. But Grey Hats are also different from Black Hats because they don‘t perform
hacking for any personal or third-party benefit. These hackers do not have any malicious
intention and hack systems for fun or various other reasons, usually informing the owner
about any threats they find. Grey Hat and Black Hat hacking are both illegal as they both
constitute an unauthorized system breach, even though the intentions of both types of hackers
differ.
11
Threat Management.
Most security teams face information fragmentation, which can lead to blind spots in security
operations. And wherever they exist, blind spots compromise a team‘s ability to identify,
protect against and respond to security threats promptly.
Today‘s dangers now include mutating software, advanced persistent threats (APT), insider
threats, and vulnerabilities around cloud-based computing services — more than antivirus
software can handle.
How threat management works
Many modern threat management systems use the cybersecurity framework established by
the National Institute of Standards and Technology (NIST). NIST provides comprehensive
guidance to improve information security and cybersecurity risk management for private
sector organizations. One of their guides, the NIST Cybersecurity Framework (NIST CF),
consists of standards and best practices. Five primary functions make up its core structure.
They are to identify, protect, detect, respond and recover.
12
UNIT-II
Introduction
Web application security, as the name suggests, is the process of securing websites, web
applications, and other internet-based services from cyber-attacks, breaches, and security
threats that leverage loopholes, misconfigurations, and vulnerabilities in these applications or
their codes.
13
Web Server Working
Web server respond to the client request in either of the following two ways:
Sending the file to the client associated with the requested URL.
Generating response by invoking a script and communicating with database
14
HTTP Request Methods
The HTTP protocol defines a number of HTTP request methods (sometimes also referred to
as verbs), which are used within HTTP requests to indicate to the server the desired action for
a particular resource.
Method Description
TRACE The TRACE method is used to echo back anything sent by the client. This
HTTP method is typically abused for reflected Cross-site Scripting attacks.
HEAD The HEAD method is used to retrieve a resource identical to that of a GET
request, but without the response body.
OPTIONS The OPTIONS method is used to describe the supported HTTP methods for a
resource.
CONNECT The CONNECT method is used to establish a tunnel to the server specified by
the target resource (used by HTTP proxies and HTTPS).
HTTP Responses
On the server-side, an HTTP server listening on port 80 sends back an HTTP response to the
client for what it has requested.
The HTTP response will contain a status line as the first line in the response, followed by the
response. The status line indicates the version of the protocol, the status code (200 in the
below example), and, usually, a description of that status code.
Response Status Codes
HTTP response status codes are issued by the server within an HTTP response to let the
client know what the status of the request is. Status codes are organized in the following
categories.
15
Status code group Description
1xx Informational
2xx Success
3xx Redirection
In a standard HTTPS communication between the client and the server, the following steps
take place
1. The client sends a request to the server via the client certificate. When the server sees
the client certificate, it makes a note in its cache system so that it knows the response
should only go back to this client.
2. The server then authenticates itself to the client by sending its certificate. This ensures
that the client is communicating with the right server.
3. All communication thereafter between the client and server is encrypted. This ensures
that if any other users try to break the security and get the required data, they would
not be able to read it because it would be encrypted.
Basic Security for SOAP Services
WS Security is a standard that addresses security when data is exchanged as part of a Web
service. This is a key feature in SOAP that makes it very popular for creating web services.
There can come a time when the client can talk to multiple servers. An example given below
shows a client talking to both a database and a web server at a time. In such cases, not all
information can pass through the https protocol.
This is where SOAP comes in action to overcome such obstacles by having the WS Security
specification in place. With this specification, all security related data is defined in the SOAP
header element.
The header element can contain the below-mentioned information
16
1. If the message within the SOAP body has been signed with any security key, that key
can be defined in the header element.
2. If any element within the SOAP Body is encrypted, the header would contain the
necessary encryptions keys so that the message can be decrypted when it reaches the
destination.
In a multiple server environments, the above technique of SOAP authentication helps in the
following way.
Since the SOAP body is encrypted, it will only be able to be decrypted by the web
server that hosts the web service. This is because of how the SOAP protocol is
designed.
Suppose if the message is passed to the database server in an HTTP request, it cannot
be decrypted because the database does not have right mechanisms to do so.
Only when the request actually reaches the Web server as a SOAP protocol, it will be
able to decipher the message and send the appropriate response back to the client.
Below are the steps which take place in the above workflow
1. A request can be sent from the Web service client to Security Token Service. This
service can be an intermediate web service which is specifically built to supply
usernames/passwords or certificates to the actual SOAP web service.
2. The security token is then passed to the Web service client.
3. The Web service client then called the web service, but, this time, ensuring that the
security token is embedded in the SOAP message.
4. The Web service then understands the SOAP message with the authentication token
and can then contact the Security Token service to see if the security token is
authentic or not.
Identity Management and Web Services
Identity management (IdM), also known as identity and access management (IAM) ensures
that authorized people – and only authorized people – have access to the technology
resources they need to perform their job functions. It includes polices and technologies that
encompass an organization-wide process to properly identify, authenticate, and authorize
people, groups of people, or software applications through attributes including user access
rights and restrictions based on their identities.
An identity management system prevents unauthorized access to systems and resources, helps
prevent exfiltration of enterprise or protected data, and raises alerts and alarms when access
17
attempts are made by unauthorized personnel or programs, whether from inside or outside the
enterprise perimeter.
Identity management solutions not only protect software and data access, they also protect the
hardware resources in an enterprise, such as servers, networks, and storage devices from
unauthorized access which could lead to a ransomware attack. Identity management has
gained importance over the past decade due to the growing number of global regulatory,
compliance, and governance mandates that seek to protect sensitive data from exposure of
any kind.
How does Identity Management Work?
As part of an overall IAM framework which covers access management and identity
management, enterprises typically utilize both user management component and a central
directory component such as Active Directory for Windows or Apache Directory Studio or
Open LDAP for Linux systems.
The user management component handles delegation of admin authority, tracking roles and
responsibilities for each user and group, provisioning and de-provisioning user accounts, and
password management. Some or all of these functions, such as password reset, are typically
self-service to reduce the burden on IT staff.
The central directory is a repository off all user and group data for the enterprise. As such, a
major role of this component is to synchronize the directory or repository across the
enterprise, which can span on-premises and public or private cloud components. This enables
a single view of the users and their permissions at anytime, anywhere in a hybrid
cloud or multi-cloud infrastructure.
Need for identity management?
A recent (ISC)² study found that 80% of breaches were due to identity access issues, namely
weak or mismanaged credentials. If proper controls are not in place – or procedures and
processes for IAM not properly followed, passwords could become compromised, phishing
attacks enabled, and breaches or ransomware attacks become a reality. Fortunately, modern
IAM platforms offer automation of many of the functions to help ensure controls are utilized,
such as removing a user from the directory when the HR system indicated an employee has
left the organization.
Since new privacy and data secrecy legislation is so frequently created, IAM can play another
important role, that of helping the organization stay in compliance with the myriad of
regulatory and governance mandates in effect, ensuringthat only authorized users have access
to data, but that the data itself is where it should be. In the end, IT security is largely about
access, so a solid IAM strategy is a critical component of overall IT security and offers a first
line of protection to any threat, whether from outside or inside the firewall.
18
Identity and access management has become the foundation for all of these business benefits
and continues to protect the enterprise from threats that could lead to data theft, malicious
attacks, or exposing sensitive customer, patient, or legal information.
Authorization Patterns
The Authorization pattern is a Structural Security Pattern. Authorization provides a
structure that facilitates access control to resources. Many systems need to restrict access to
their resources according to certain criteria
Patterns capture the experience of experts about good or best practices and document these
nuggets of wisdom in a format that is easy to understand. The use of patterns raises the level
of awareness and discourse in a discipline.
1977 Christopher Alexander – A Pattern Language timeless wisdom in architecture & town
design – 1978 Trygve Reenskaug – Model View Controller
– 1987 Cunningham & Beck – OOPSLA paper
– 1994 Gamma, Helm, Johnson, Vlissides - GoF
– 1997 Yoder & Barclaw – security patterns
– 2006 Eduardo B. Fernandez – book(s) estimated 400 security related patterns exist today
A pattern is self-contained
Synopsis
• Context where applies
• Example problem
• Problem
• Forces
• Solution
• Solution structure
• Solution dynamics
• Example solution
• Variations
• Known uses
• Consequences
Different kinds of patterns
Traditional patterns
Design
• Architecture
• Analysis
• Organizational
• Management
• Anti-patterns
19
– Useable in arbitrary groups and ordering
– Searchable, downloadable, write our own
• Patterns raise the level of discourse
– Each pattern represents a higher level solution
– Each pattern becomes a term in the vocabulary
Security Considerations
The Internet is an open forum, with millions of users availing a variety of services with a high
level of trust. They often fail to see the poor level of security the internet has and the potential
threats they may have to encounter.
With security becoming a huge concern in the digital world, companies are scrutinizing their
data security to prevent solicited access from outsiders. let us learn about data security
considerations:
What is Data Security?
Data Security is a process of protecting databases and sensitive information on the network
from unauthorized access and corruption throughout its lifecycle.
The set of techniques and applications strengthens the physical arrangements and software
checks of an organization. This helps in tightening the security parameters of the company
and reduce the risk.
Data security consideration entails the security of data and system resources against
unauthorized access, disclosure, or corruption. Data breaches may be intentional or
unintentional but ultimately cause huge losses to the organization hence need to be taken
seriously.
Data Security Considerations
Backing up Data
The purpose of data backup is to create extra copies of important files in a separate storage
location to act as a backup during any failure.
Various factors like human carelessness, malicious attack, or system faults trigger failure in
an infrastructure. Physical storage or cloud storage stores the backed-up data.
20
to enter after the determination of a particular estate, made before the remainderman or
reversioner has entered.
Types of Intruders:
INTRODUCTION TO INTRUDERS: A person with criminal intention who attempts to
violate security and steals credentials of authorized user to damage the system /data is
considered as in intruder. Malicious activity directed at a computer system / services as
viruses, unauthorized access, bug exploitation, violence of a feature, snooping to gather
information, or a physical hardware attacks are the errands of intruders.
TYPES OF INTRUDERS
Group of Attackers (External Penetrator who have no direct access also called as Hackers)
Masquerader: Outsiders have gained access to the system ( using others id password)
Misfeasor: Legitimate user abusing the privileges (violate security policies)
Clandestine user: Legitimate user with supervisory privileges (misusing the system)
Masquerader
User with no authority to use the system
Mostly an External user
An unauthorized individual who penetrates a system to exploit a legitimate user
account
Penetrates the security system as a legitimate user
Misfeasor: type of intruders basically divided in two types
Generally an insider with limited access
Legitimate user who misuses privileges
1.Legitimate user with no permission to access a application in the controlled area
(example access of internet)
Clandestine
Can be and internal or external user who try to steal and use the credentials of their
supervisor.Individual who seizes supervisory control to evade auditing and access controls or
to suppress audit collection.
A,B legitimate users (A –Admin B with limited access privileges)
A is the supervisor of B
B doing illegal activity with a credentials
A is punished in the auditing
21
PHYSICAL THREAT: An adversary gaining physical access over a system or device
through theft of the item is considered as physical theft. Acquiring the possession of a system
or device to trigger number of unique attacks which are executed with an extended
timeframe and resulting with huge financial, data and life lose.
Standard protection system to secure sensitive information usually fails in case of physical
theft as the adversary has physical access over the system with enough time to trigger the
attack.
Devices prone for physical theft:
Digital/ Communication devices (Laptop, Computers, Mobile phones)
Removable Storage Media.(USB Drives)
The value of the equipment or storage media.
Loss/theft of data.
Software theft.
Access to networks
Loss of productivity.
22
Unintentionally privilege extensions create the risk in security controls as:
Misuse of privilege: insider using legitimate permissions to launch malicious
activities.
Creating unintentional threats: Sharing the password or credentials may lead to
unnecessary actions.
Escalation of privileges: when an insider deliberately raises his or her level of
permissions to get more access rights
UNAUTHORIZED ACCESS
Gaining entry to a computer network/ system and accessing the applications, software, data,
or other resources without permission is unauthorized access. In simple words any access to
an information system or network that violates the owner or operator's stated security policy
is considered unauthorized access.
Voilating the protocols and accessing website, program, server, service, or other system with
legitimate credientials by attackers is the attempt of unauthorized access. Example: guessing
a password or username for others account until they gained access. Attackers access an area
of a system they should not be accessing, may denied access and possibly see an
unauthorized access message contribute to a more security-focused environment.
MALWARE INFECTION
Malicious software specially designed to damage the system data is termed as malware. This
software disrupt computer operation, gather confidential information and gain unauthorized
access to protected network area. A malicious code hidden in the computer system, often
installed without the knowledge of the owner. This type of infection is spread by emails,
operating system, portable storage media and global network. Some of the dangerous
malware‘s are: viruses, spyware, worms, rootkits and Trojan horses.
A virus is a piece of software that duplicates itself and spreads from one computer to another.
A worm spread on its own, to infect the other computer or programs. Trojan horse contain a
malicious code but look benign(normal) but causes damage to the system and provide access
to attacker.Adware is an unintensional add with malicious feed. Spyware constantly monitors
the system activity, to trigger attack at the right time.
Types of Malware
23
Example of the procedure to implement Malicious attack.
An attacker send a malicious email to the victim
A victim open the mail and click the attachment
Unintentionally a file is download which has malicious content
The file has droppers which are decrypts the content
The malicious data is injected into the browser window with additional extension
Finally it sends the commands or forward the same to given CC address.
INTRUSION DETECTION AND PREVENTION TECHNIQUES
Denning, D. E. in 1986 defined that " Intrusion-detection expert system aims to detect a wide
range of security violations ranging from attempted break-ins by outsiders to system
penetrations and abuses by insiders". Increasing internet threat creates a hazard for the digital
user which are not easily identified by regular firewall protection, a special detection system
is needed which can identify the attack that inexorably enters the host or break the network
even with high-level security protection. IDS is an emerging security tool to protect the
system from intrusion attempts, this is implemented in two forms one to identify malicious
activity and abort the process from taking actions, and the other to record and store the
information about the attacks and handle it by comparing with regular actives in future
The above figure explains the working methodology of IDS which is established after the
firewall, and connected to the host devices, the detection model is depended on two
24
principles: one anomaly detection (behavior deviation), and second signature detection
(pattern deviation) once the rules are matched with existing patters or the behavior, an alert is
raised by sending the report to the security officer. The result is measured with four unique
states as true-positive: Rules matching and the attack present, Legitimate attack which trigger
IDS and raise alarm, False-positive: Rules matched but no attack found, IDS triggered with
alarm but no attack, True-Negative: Rules have not matched any attack raised. False-
Negative: Rules are not matched but attack present, failure of IDS to detect an actual attack.
AVANTAGES OF IDS:
Identification of suspicious invasion by continuous monitoring of network traffic,
activities, behavior, and transactions.
Effectively prevents network damage by matching the attack with the previous attack.
Categorizes the difference between baseline behavior and ongoing activity.
It provides a user-friendly interface that allows easy security management systems.
Potential to detect previously unknown types of attacks.
Alterations to data files are easily detected and reported.
DISADVANTAGE OF IDS:
IDS is used as a second choice
Failure in detecting the source of the attack results in blocking the whole network.
Swayed to false positives, heavy processing overhead,
Not effective in categorizing new attacks.
Difficult to train in highly dynamic environments
Hard to identify an unknown attack.
Intermediate actions cannot be performed.
More vulnerable to network security evasion techniques.
CLASSIFICATION OF INTRUSION DETECTION SYSTEM
IDS physical structure is discussed in the previous session, the procedure of implementation
is classified based on technique, this session focus on how the IDS detect and analyze the
suspicious activities and further prevent it for securing the system. Many new procedures are
been introduced based on these techniques with the integration of intelligent systems. The
basic categories are: anomaly-based detection, signature-based detection under techniques,
Network and host based detection under architecture. The detailed taxonomy of IDS is given
below:
25
Classification of Intrusion Detection Systems
Intrusion detection systems are designed to be deployed in different environments. And like
many cybersecurity solutions, an IDS can either be host-based or network-based.
Beyond their deployment location, IDS solutions also differ in how they identify potential
intrusions:
26
are generated based upon detection of known-malicious content. However, a signature-based
IDS is limited to detecting known threats and is blind to zero-day vulnerabilities.
Anomaly Detection: Anomaly-based IDS solutions build a model of the ―normal‖ behavior
of the protected system. All future behavior is compared to this model, and any anomalies are
labeled as potential threats and generate alerts. While this approach can detect novel or zero-
day threats, the difficulty of building an accurate model of ―normal‖ behavior means that
these systems must balance false positives (incorrect alerts) with false negatives (missed
detections).
Hybrid Detection: A hybrid IDS uses both signature-based and anomaly-based detection.
This enables it to detect more potential attacks with a lower error rate than using either
system in isolation.
27
procedure components are connected. number of components.
28
IDS AND IPS
Non- Observe the Store the proof Record the traffic Necessary for
repudiation regular records of data transfer information and all IDS
29
of data transfer include sender report to audit (As methods to
to identify the and receiver sender and receiver first check this
general pattern. information to IP address, method information
avoid of sharing,
nonrepudiation protocols used,
pattern analyzed)
Auditing Try to manifest Obligatory to generate a report after an All the
the audit data attack and update the audit database to Methods of
by showing control such in future IDS check the
themselves as audit database
legitimate users to match
(leads for the (Signatures,
generation of patters,
false positive behaviours)
alerts) and report
abnormal
activity.
30
The regular functions are carried out by this system are continuous checking of each packet
entering the network. Sniffing, matching and analyzing against the known profiles, and
trigger the alarm when unnormal activity is observed. NIDS setup at a selected point as
subnet within the network to examine and match all passing traffic, analyze the activity and
report an alert if violated, These Sensors have interfaces for managing, controlling, and
receiving alerts and send to the central server. NIDS application attached to network medium
ethernet functions with two interfaces, one to just monitor the network conversation and the
other to control and report the activity.
NIDS countermeasure: various measures implemented to avoid the Network breakdown
are:
Shunning – filtering a suspicious host at a network gateway by interacting with
network devices and prevent from intrusion of a malicious host to target. Session
Sniping –Interruption of communication (sending packets) with a target host.
Non-blocking –Minimizing of an attack impact by triggering customized actions.
31
Re-direction –divert an attacker to a controlled environment.
Counterattacks – A reverse attack on a malicious host (neutralize the ability)
Filtering – Categorize and remove suspected activities on network traffic, also
considered as NIPS(network intrusion prevention system.
Some of the advantages of NIDS are: having good network design and placement of NIDS
can be used to monitor a wide subnet, because of the passive nature it can be deployed into
existing networks, Some drawbacks of NIDS as overwhelmed by network volume resulting
in recognition failures of the attacks, causing difficulty to process all packets in a busy
network. Accessibility to be given for all traffic to be monitored, analyzing encrypted packets
is no possible. Fragmented packet attacks are not easily discerned by NIDS, hard to identify
traffic which does not cross the network area, discrepancies between the sensor and target
viewpoint, regular updates of the new profile are challenging, inefficient to find the latest
exploits.
32
remove or replace any suspicious data after the attack form files by repackaging, deleting
header and attachment information..
HOST BASED INTRUSION DETECTION SYSTEM (HIDS):
An intelligent detection system resides on a host to inspect continuously and report for
suspicious activity is considered as HIDS, this is an agent that monitors a computer system
(host) by residing on it, with incessant observation of dynamic behavior, state of the system
(storage area), Internal configuration, network packets targeted, program executed, resource
accessed are some of the function of HIDS. This analyzes log files available on the host
(kernel, system, server, and network) and monitors file access and configuration changes in
runtime, then analyses by comparing with previous attacks stored in the server .
Work on configuration or change management principles and the working procedure of HIDS
is explained in Figure 6. HIDS is a complementary solution to network-based IDS programs,
to provides host-level detection and improve the control over the operating system and file
structure by installing agent applications on the host. A centralized server is established to
control the agent software with HIDS administrator used to configure, maintain, and collect
events from agents. Events are collected from the connected host and compared with
33
available log data of predefined signatures for any suspicious activity and report to the
security officer with an alert message and store the new signatures to log the program for
further analysis.
The next is analyzing the code: Host Agent can track by comparing the record of
calling and called by the application, the process implemented, a task performed on
the host, and drivers to prevent rootkits attacks by monitoring regularly and restrict
unauthorized library applications and versions.
Configuration monitoring: monitoring both wired, wireless, public, and private
network configuration and the modem of host device identification additional network
protocols used as TCP/UDP [17]. The major operation of HIDS depends on the traces
left by an intruder after the activity, an intruder to own the hacked system, install
software and access various activities like theft of identify, spamming the data
content, repeated keystroke monitoring, etc.
The main target of the intruder is the dynamic objects of the host system; HIDS fails
in monitoring this because of dynamic nature which is not suitable for the checksum
34
technique. HIDS is installed on server/endpoint devices functions based on audit trails
to secure from intruders.
35
typically influenced by organization's needs, objectives, security requirements, size, and
processes. An ISMS includes and lends to effective risk management and mitigation
strategies. Additionally, an organization's adoption of an ISMS largely indicates that it is
systematically identifying, assessing, and managing information security risks and "will be
capable of successfully addressing information confidentiality, integrity, and availability
requirements
INFORMATION SECURITY MANAGEMENT LIFE CYCLE
The information security program lifecycle helps prioritize our IT systems and analyze our
needs through a step-by-step procedure, positioning our company to take advantage of
1.Identify
6.Monitor 2. Assess
Information
Security
Life
Cycle
5. Protect 3. Design
4.Implement
36
Step 4: Implement
Develop a change plan: When possible, they focus on the most important areas first, then
work down toward the least vulnerable areas. The change plan should also account for any
personnel training needed to implement new procedures or policies.
Step 5: Protect
The mitigation phase, used to validate security measures to ensure systems match and
established security policies and standards, security levels and implementation verification .
Step 6: Monitor
The team monitors the system and any changes put in place. While security measures
implemented may protect against vulnerabilities, there is no guarantee that they will remain
secure in the future. The goal of the monitoring phase is twofold: to ensure that strengthened
security remains in place and to identify new vulnerabilities as they arise.
The Importance of Information Security Management
The average organization collects a great deal of data. This includes sensitive customer data,
intellectual property, and other data that is vital to an organization‘s competitive advantage
and ability to operate.
The value of this data means that it is under constant threat of being stolen by cybercriminals
or encrypted by ransomware. An effective security management architecture is vital because
organizations need to take steps to secure this data to protect themselves and their customers.
Objectives of Information Security Management
The objective of information security management is to protect data:
Confidentiality: Protecting data confidentiality requires restricting access to data to only
authorized users. Data breaches are a breach of confidentiality.
Integrity: Ensuring data integrity requires the ability to ensure that data is accurate and
complete. A cyber threat actor that corrupts data in an organization‘s databases is a breach of
data integrity.
Availability: Data and the services that rely upon it must be available to authorized users,
whether inside or outside of the company. A Distributed Denial of Service (DDoS) attack is
an example of a threat against the availability of an organization‘s data and services.
The confidentiality, integrity, and availability of an organization‘s data can be threatened in
various ways. Information security management involves identifying the potential risks to an
organization, assessing their likelihood and potential impact, and developing and
implementing remediation strategies designed to decrease risk as much as possible with
available resources.
37
Benefits of Information Security Management
In addition to improving an organization‘s data security, an infosec management program can
provide the following benefits:
Streamlined Data Security: An information security management program creates a
framework and process for assessing data security risks and remediating them. Adopting such
a program can make data security more efficient and effective by enabling an organization to
optimize its security architecture and eliminate unnecessary and overlapping solutions.
Improved Security Culture: Often, infosec is owned by the IT or security department, and it
is difficult to spread and enforce across the organization. Educating employees about the
company‘s information security management program can improve security and create a
more positive security culture.
Brand Image: Data breaches and other security incidents can harm an organization‘s brand
image. Demonstrated compliance with security best practices can help an organization‘s
reputation and improve relationships with customers and partners.
Continuous monitoring solution help to understand the network performance and minimize
the attack surface and enhance security controls by improving the resource management
techniques. It‘s important to consider the data source of the network and the monitoring tools
to analyse the flow of data from devices like routers and packets and data prone to span
mirror ports and network Traps.
Benefits of NTA:
38
Improved visibility into devices connecting to our network (e.g. IoT devices,
healthcare visitors)
Meet compliance requirements
Troubleshoot operational and security issues
Respond to investigations faster with rich detail and additional network context
Main goal of NTA to ensure the right source for data collection and control the flow of
data in traffic volumes and mapping the journey of the network packet from the start to
destination points. This help in detecting unauthorized WAN traffic and attempted
networks with the resources used, but lack in collecting detailed information which
create security issues.
Use cases for analyzing and monitoring network traffic include:
• Detection of ransomware activity
• Monitoring data exfiltration/internet activity
• Monitor access to files on file servers or MSSQL databases
• Track a user‘s activity on the network, though User Forensics reporting
• Provide an inventory of what devices, servers and services are running on the network
• Highlight and identity root cause of bandwidth peaks on the network
• Provide real-time dashboards focusing on network and user activity
• Generate network activity reports for management and auditors for any time period
39
state that is expected by the users. Although the security program cannot improve the
accuracy of the data that is put into the system by users. It can help ensure that any changes
are intended and correctly applied. An additional element of integrity is the need to protect
the process or program used to manipulate the data from unauthorized modification.
A critical requirement of both commercial and government data processing is to ensure the
integrity of data to prevent fraud and errors. It is imperative, therefore, no user be able to
modify data in a way that might corrupt or lose assets or financial records or render decision
making information unreliable.
Need-to-know access: User should be granted access only on to those files and
programs that they need in order to perform their assigned jobs functions.
Separation of duties: To ensure that no single employee has control of a transaction
from beginning to end, two or more people should be responsible for performing it.
Rotation of duties: Job assignment should be changed periodically so that it becomes
more difficult for the users to collaborate to exercise complete control of a transaction
and subvert it for fraudulent purposes.
UNIT-IV
40
Secure Communication refers to the scenario where the message or data shared between
two parties can‘t be accessed by an adversary. In Cryptography, an Adversary is a
malicious entity, which aims to retrieve precious information or data thereby undermining
the principles of information security.
Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core
principles of modern-day cryptography.
1. Confidentiality refers to certain rules and guidelines usually executed under
confidentiality agreements which ensure that the information is restricted to
certain people or places.
2. Data integrity refers to maintaining and making sure that the data stays accurate
and consistent over its entire life cycle.
3. Authentication is the process of making sure that the piece of data being
claimed by the user belongs to it.
4. Non-repudiation refers to ability to make sure that a person or a party
associated with a contract or a communication cannot deny the authenticity of
their signature over their document or the sending of a message.
Terminologies
A message is plaintext (sometimes called cleartext). The process of disguising a message in
such a way as to hide its substance is encryption. An encrypted message is ciphertext. The
process of turning ciphertext back into plaintext is decryption.
Data Encryption
Data encryption translates data into another form, or code, so that only people with access to
a secret key (formally called a decryption key) or password can read it. Encrypted data
is commonly referred to as ciphertext, while unencrypted data is called plaintext.
The purpose of data encryption is to protect digital data confidentiality as it is stored on
computer systems and transmitted using the internet or other computer networks.
ENCRYPTION
41
Encryption is the process in which a sender converts the original information to another form
and sends the resulting unintelligible message out over the network. The sender requires an
encryption algorithm and a key to transform the plaintext (original message) into a ciphertext
(encrypted message). It is also known as enciphering. The original information is called
Plaintext and the encrypted information is called the Cipher Text.
DECRYPTION
Decryption inverts the encryption process in order to convert the message back to its real
form. The receiver uses a decryption algorithm and a key to transform the ciphertext back to
original plaintext, it is also known as eciphering.
A mathematical process utilized for decryption is known as Decryption algorithm. This
process is the reverse process of the encryption algorithm
42
Symmetric key Cryptography
Symmetric Key Cryptography also known as Symmetric Encryption is when a secret key is
leveraged for both encryption and decryption functions.
Symmetric key encryption algorithm uses same cryptographic keys for both encryption and
decryption of cipher text.
Both sender and receiver uses a common key to encrypt and decrypt the message.
This secret key is known only to the sender and to the receiver.
It is also called as secret key cryptography.
Before starting the communication, sender and receiver shares the secret key.
This secret key is shared through some external means.
At sender side, sender encrypts the message using his copy of the key.
The cipher text is then sent to the receiver over the communication channel.
At receiver side, receiver decrypts the cipher text using his copy of the key.
After decryption, the message converts back into readable format.
Advanced Encryption Standard (AES)
43
Data Encryption Standard (DES)
Advantages-
At sender side,
Sender encrypts the message using receiver‘s public key.
The public key of receiver is publicly available and known to everyone.
Encryption converts the message into a cipher text.
This cipher text can be decrypted only using the receiver‘s private key.
The cipher text is sent to the receiver over the communication channel.
44
At receiver side,
Receiver decrypts the cipher text using his private key.
The private key of the receiver is known only to the receiver.
Using the public key, it is not possible for anyone to determine the receiver‘s private
key.
After decryption, cipher text converts back into a readable format.
Advantages-
Message Authentication
Message authentication can be provided using the cryptographic techniques that use secret
keys as done in case of encryption.
Message authentication ensures that the message has been sent by a genuine identity and not
by an imposter.
• The service used to provide message authentication is a Message Authentication Code
(MAC).
The sender uses some publicly known MAC algorithm, inputs the message and the
secret key K and produces a MAC value.
Similar to hash, MAC function also compresses an arbitrary long input into a fixed
length output. The major difference between hash and MAC is that MAC uses secret
key during the compression.
The sender forwards the message along with the MAC. Here, we assume that the
message is sent in the clear, as we are concerned of providing message origin
authentication, not confidentiality. If confidentiality is required then the message
needs encryption.
On receipt of the message and the MAC, the receiver feeds the received message and
the shared secret key K into the MAC algorithm and re-computes the MAC value.
The receiver now checks equality of freshly computed MAC with the MAC received
from the sender. If they match, then the receiver accepts the message and assures
himself that the message has been sent by the intended sender.
If the computed MAC does not match the MAC sent by the sender, the receiver
cannot determine whether it is the message that has been altered or it is the origin
45
that has been falsified. As a bottom-line, a receiver safely assumes that the message
is not the genuine.
Limitations of MAC
There are two major limitations of MAC, both due to its symmetric nature of operation −
Establishment of Shared Secret.
It can provide message authentication among pre-decided legitimate users
who have shared key.
This requires establishment of shared secret prior to use of MAC.
Inability to Provide Non-Repudiation
Non-repudiation is the assurance that a message originator cannot deny any
previously sent messages and commitments or actions.
MAC technique does not provide a non-repudiation service. If the sender and
receiver get involved in a dispute over message origination, MACs cannot
provide a proof that a message was indeed sent by the sender.
Though no third party can compute the MAC, still sender could deny having
sent the message and claim that the receiver forged it, as it is impossible to
determine which of the two parties computed the MAC.
Digital Signatures
A digital signature is a mathematical technique used to validate the authenticity and integrity
of a message, software or digital document. It's the digital equivalent of a handwritten
signature or stamped seal, but it offers far more inherent security.
A digital signature is basically a way to ensure that an electronic document (e-mail, spread
sheet, text file, etc.) is authentic. Authentic means that we know who created the document
and we know that it has not been altered in any way since that person created it.
Digital signatures use a certificate-based digital ID issued by an accredited Certificate
Authority (CA) or Trust Service Provider (TSP) so when we digitally sign a document, our
identity is uniquely linked to we, the signature is bound to the document with encryption, and
everything can be verified using underlying technology known as Public Key Infrastructure
(PKI).
46
What are the benefits of digital signatures?
Security is the main benefit of digital signatures. Security capabilities embedded in digital
signatures ensure a document is not altered and signatures are legitimate. Security features
and methods used in digital signatures include the following:
Personal identification numbers (PINs), passwords and codes. Used to
authenticate and verify a signer's identity and approve their signature. Email,
username and password are the most common methods used.
Asymmetric cryptography. Employs a public key algorithm that includes private
and public key encryption and authentication.
Checksum. A long string of letters and numbers that represents the sum of the
correct digits in a piece of digital data, against which comparisons can be made to
detect errors or changes. A checksum acts as a data fingerprint.
Cyclic redundancy check (CRC). An error-detecting code and verification
feature used in digital networks and storage devices to detect changes to raw data.
Certificate authority (CA) validation. CAs issue digital signatures and act as
trusted third parties by accepting, authenticating, issuing and maintaining digital
certificates. The use of CAs helps avoid the creation of fake digital certificates.
47
Trust service provider (TSP) validation. A TSP is a person or legal entity that
performs validation of a digital signature on a company's behalf and offers
signature validation reports.
Applications of Cryptography
wherein cryptocurrencies are traded over the internet. Top cryptocurrencies like
Bitcoin, Ethereum, and Ripple have been developed and traded over time.
With cashless economies emerging, digital currencies have grabbed the attention of
upcoming future.
2. E-commerce: These transactions are encrypted and perhaps cannot be altered by any
third party. Moreover, the passwords we set for such sites are also protected under keys
to ensure that no hacker gets access to our e-commerce details for harmful purposes.
Military operations have also derived great use from cryptography for a long time.
convert the real communication characters so that the enemies cannot come to know
Simply put, cryptography safely transmits messages from one end to the other without
letting the enemy forces intercept the real meaning. This is a very important application
On the large scale, it can be widely used for declaring wars and sending crucial messages
without the involvement of a messenger. Unlike traditional times, this technology can be
precisely used to enhance the military strength of a nation.
Secure communications
The most obvious use of cryptography, and the one that all of us use frequently, is encrypting
communications between us and another system. This is most commonly used for
communicating between a client program and a server. Examples are a web browser and web
48
server, or email client and email server. When the internet was developed it was a small
academic and government community, and misuse was rare. Most systems communicated in
the clear (without encryption), so anyone who intercepted network traffic could capture
communications and passwords. Modern switched networks make interception harder, but
some cases – for example, public wifi – still allow it. To make the internet more secure, most
communication protocols have adopted encryption. Many older protocols have been dropped
in favour of newer, encrypted replacements.
End-to-end Encryption
Email is one area where encryption is not widely in use. When email moves from server to
server, and from server to we, it is encrypted. On the mail server and on our system, however,
an administrator can read it. There are options to implement ―end-to-end‖ encryption for
email (I use PGP) but email systems are complex and these options are complex. Truly secure
messaging systems – where only the sender and receiver can read the message – are those
where encryption has been built in from the start. Whatsapp is good; Signal is better.
Storing Data
We all store a large amount of data, and any data is valuable to at least the person who
generated it. Every operating system uses encryption in some of the core components to keep
passwords secret, conceal some parts of the system, and make sure that updates and patches
are really from the maker of the system.
Storing Passwords
One of the main uses of this is to store passwords. It is very risky to store passwords in an
accessible way. If stored in plaintext on a system, anyone who has access to the system –
legitimate or malicious – can read the password. Encryption is only a partial answer to storing
passwords. If someone has access to the system storing the encrypted passwords, they will
probably have access to the encryption key to decrypt the password. Hashing, on the other
hand, produces a relatively useless value for the attacker. A system will take the password on
login, hash it, and compare to the hashed value. At no point will the system – or an attacker –
have access to the plaintext password.
Overview of Firewalls
49
Accept : allow the traffic
Reject : block the traffic but reply with an ―unreachable error‖
Drop : block the traffic with no reply
50
source address and destination address. Also, TCP and UDP have port numbers. ICMP
uses type code instead of port number which identifies purpose of that packet.
Generation of Firewall
Firewalls can be categorized based on its generation.
1. First Generation- Packet Filtering Firewall : Packet filtering firewall is used
to control network access by monitoring outgoing and incoming packet and
allowing them to pass or stop based on source and destination IP address,
protocols and ports. It analyses traffic at the transport protocol layer (but mainly
uses first 3 layers).
Packet firewalls treat each packet in isolation. They have no ability to tell
whether a packet is part of an existing stream of traffic. Only It can allow or
deny the packets based on unique packet headers.
2. Second Generation- Stateful Inspection Firewall : Stateful firewalls (performs
Stateful Packet Inspection) are able to determine the connection state of packet,
unlike Packet filtering firewall, which makes it more efficient. It keeps track of the
state of networks connection travelling across it, such as TCP streams. So the
filtering decisions would not only be based on defined rules, but also on packet‘s
history in the state table.
3. Third Generation- Application Layer Firewall : Application layer firewall can
inspect and filter the packets on any OSI layer, up to the application layer. It has the
ability to block specific content, also recognize when certain application and
protocols (like HTTP, FTP) are being misused.
In other words, Application layer firewalls are hosts that run proxy servers. A proxy
firewall prevents the direct connection between either side of the firewall, each
packet has to pass through the proxy. It can allow or block the traffic based on
predefined rules.
4. Next Generation Firewalls (NGFW) : Next Generation Firewalls are being
deployed these days to stop modern security breaches like advance malware attacks
and application-layer attacks. NGFW consists of Deep Packet Inspection,
Application Inspection, SSL/SSH inspection and many functionalities to protect the
network from these modern threats.
Types of Firewalls
51
HTTP services. These are cheap, but require a bit of configuration, and they don‘t
examine entire packets.
4. Stateful Filtering: This type of firewall still uses packet filtering, but now it also
considers the connection state of a device. Initially the firewall inspects packets at the
application layer, once a connection is established, the inspection on the application
layer is no longer needed. It performs most of its examinations between the Physical
and Transport layers of the OSI model. Note that these can be vulnerable to man-in-
the-middle attacks (IP spoofing).
5. Application Layer Firewalls: Application layer firewalls filter by process instead of
by port. They are useful in preventing attacks on processes like HTTP and SMTP,
guarding against SQL injection, DDoS attacks, and more. These actually filter
application level commands and fully inspect the packet. Of course, vendors need to
keep pushing out updates for new protocols, and there may be some delay in this
support, which could lead to potential exploits.
6. Circuit Level Gateway: These work on the Session layer of the OSI model to
confirm that TCP handshakes between packets are legit. This acts as a circuit for a
proxy server and internal clients; and ensures that an external client doesn‘t have any
actual information about the server. There is potential for harmful information to get
through to the proxy to the Internal client because these do not examine packet
contents.
7. Stateful Multilayer Inspection: These are a combination of packet filtering, circuit
level gateways, and application layer firewalls. These are fairly complex, and could
actually be more insecure than a simple firewall if we don‘t have an admin who is
knowledgeable about proper configuration.
User Management
User management (UM) is defined as the effective management of users and their accounts,
giving them access to various IT resources like devices, applications, systems, networks,
SaaS services, storage systems, and more.
User management enables administrators to grant access and manage user access and
control user accounts. A user management system forms an integral part of identity and
access management (IAM) and serves as a basic form of security.
User management describes the ability for administrators to manage user access to various IT
resources like systems, devices, applications, storage systems, networks, SaaS services, and
more. User management is a core part to any identity and access management (IAM)
solution, in particular directory services tools. Controlling and managing user access to IT
resources is a fundamental security essential for any organization. User management enables
admins to control user access and on-board and off-board users to and from IT resources.
Subsequently a directory service will then authenticate, authorize, and audit user access to IT
resources based on what the IT admin had dictated.
52
access to internal financial systems and vice versa, a finance employee isn‘t requiring access
to Salesforce or Market. User management enables IT administrators to manage resources
and provision users based on need and role while keeping their digital assets secure. For end
users, the tasks of user management are often invisible to them, but the results are not.
53
VPN Security protocols
VPN stands for Virtual Private Network (VPN), that allows a user to connect to a private
network over the Internet securely and privately. VPN creates an encrypted connection that
is called VPN tunnel, and all Internet traffic and communication is passed through this
secure tunnel.
Virtual Private Network (VPN) is basically of 2 types:
1. Remote Access VPN:
Remote Access VPN permits a user to connect to a private network and access
all its services and resources remotely. The connection between the user and the
private network occurs through the Internet and the connection is secure and
private. Remote Access VPN is useful for home users and business users both.
2. Site to Site VPN:
A Site-to-Site VPN is also called as Router-to-Router VPN and is commonly
used in the large companies. Companies or organizations, with branch offices in
different locations, use Site-to-site VPN to connect the network of one office
location to the network at another office location.
Intranet based VPN: When several offices of the same company are connected
using Site-to-Site VPN type, it is called as Intranet based VPN.
Extranet based VPN: When companies use Site-to-site VPN type to connect to
the office of another company, it is called as Extranet based VPN.
Types of Virtual Private Network (VPN) Protocols:
1. Internet Protocol Security (IPSec):
Internet Protocol Security, known as IPSec, is used to secure Internet
communication across an IP network. IPSec secures Internet Protocol
communication by verifying the session and encrypts each data packet during
the connection.
IPSec runs in 2 modes:
(i) Transport mode
(ii) Tunneling mode
The work of transport mode is to encrypt the message in the data packet and the
tunneling mode encrypts the whole data packet. IPSec can also be used with
other security protocols to improve the security system.
1. Layer 2 Tunneling Protocol (L2TP):
L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is often
combined with another VPN security protocol like IPSec to establish a highly
secure VPN connection. L2TP generates a tunnel between two L2TP connection
points and IPSec protocol encrypts the data and maintains secure communication
between the tunnel.
54
specific applications instead of entire network. Online shopping websites commonly
uses SSL and TLS protocol. It is easy to switch to SSL by web browsers and with
almost no action required from the user as web browsers come integrated with SSL
and TLS. SSL connections have ―https‖ in the initial of the URL instead of ―http‖.
4. OpenVPN:
OpenVPN is an open source VPN that is commonly used for creating Point-to-Point
and Site-to-Site connections. It uses a traditional security protocol based on SSL and
TLS protocol.
5. Secure Shell (SSH):
Secure Shell or SSH generates the VPN tunnel through which the data transfer
occurs and also ensures that the tunnel is encrypted. SSH connections are generated
by a SSH client and data is transferred from a local port on to the remote server
through the encrypted tunnel.
Security Protocols
Various business services are now provided online even though client-server applications.
The most popular forms are web application and In each applications, the client
communicates to the specific server and obtains services.
While using a provider from any server application, the patron and server change numerous
information on the underlying intranet or internet. we are aware of fact that these data
transactions are vulnerable to numerous attacks.
Network security entails securing information against assaults even as it is in transit on a
network. To attain this purpose, many real-time security protocols were designed. Such
protocol needs to offer at least the following primary goals −
The parties can negotiate interactively to authenticate each different.
Establish a secret session key before changing data on network.
Change the data in encrypted form.
55
E-mail Security
Nowadays, e-mail has become very extensively used network application. let‘s briefly
discuss e-mail infrastructure before proceeding to recognize about e-mail security protocols.
E-mail Infrastructure
The best way of sending an e-mail might be sending a message directly from the sender‘s
machine to the recipient‘s device. In this case, it is important for each the machines to be
running on the network simultaneously. but, this setup is impractical as users can also
occasionally connect their machines to the network.
Hence, the concept of setting up e-mail servers arrived. On this setup, the e-mail is sent to a e
mail server which is completely available at the network. when the recipient‘s machine
connects to the network, it reads the the e-mail from the e mail server.
In general, e-mail infrastructure includes a mesh of electronic mail servers, also termed
as Message Transfer Agents (MTAs) and consumer machines running an e-mail program
comprising of user Agent (UA) and local MTA.
Typically, an e-mail message gets forwarded from its UA, goes through the mesh of MTAs
and finally reaches the UA at the recipient‘s machine.
MIME
Basic internet E-Mail preferred became written in 1982 and it describes the lawet of E-Mail
message exchanged on the net. It mainly helps E-Mail message written as text in basic
Roman alphabet.
56
By 1992, the want became felt to improve the equal. hence, a further general Multipurpose
internet Mail Extensions (MIME) became defined. it is a set of extensions to the basic net E-
Mail standard. MIME gives an ability to send E-Mail using characters other than those of the
simple Roman alphabet including Cyrillic alphabet (used in Russian), the Greek alphabet, or
even the ideographic characters of chinese.
Another want fulfilled through MIME is to send non-text contents, including images or video
clips. due to this features, the MIME popular became widely followed with SMTP for E-Mail
communication.
57
Let‘s assume a sender wants to send a personal E-Mail to a recipient. the provision of privacy
in this situation is performed as follows −
The sender and receiver have their private-public keys as (SPVT, SPUB) and
(RPVT, RPUB) respectively.
The sender generates a secret symmetric key, KS for encryption. though the sender
should have used RPUB for encryption, a symmetric key is used to obtain faster
encryption and decryption.
The sender encrypts message with key KS and also encrypts KS with public key of
the recipient, RPUB.
The sender sends encrypted message and encrypted KS to the recipient.
The recipient first obtains KS through decrypting encoded KS using his private key,
RPVT.
The recipient then decrypts message using the symmetric key, KS.
If message integrity, authentication, and non-repudiation services also are needed in this
scenario, the following steps are introduced to the above method.
The sender produces hash of message and digitally signs this hash with his private
key, SPVT.
The sender sends this signed hash to the recipient together with other components.
58
PGP
Pretty Good Privacy (PGP) is an e-mail encryption scheme. It has become the de-facto
preferred for providing security services for e-mail communication.
As mentioned above, it uses public key cryptography, symmetric key cryptography, hash
feature, and digital signature. It provides −
Privacy
Sender Authentication
Message Integrity
Non-repudiation
Along with those security services, it also presents records compression and key control help.
PGP uses present cryptographic algorithms along with RSA, concept, MD5, etc., instead of
inventing the new ones.
Working of PGP
59
S / MIME
S/MIME stands for secure Multipurpose net Mail Extension. S/MIME is a secure e-mail
preferred. it is based on an earlier non-at ease e-e-mailing popular known as MIME.
Working of S/MIME
S/MIME method is just like PGP. It also uses public key cryptography, symmetric key
cryptography, hash functions, and digital signatures. It presents similar protection services as
PGP for e-mail communication.
The most common symmetric ciphers used in S/MIME are RC2 and TripleDES. the usual
public key technique is RSA, and the hashing algorithm is SHA-1 or MD5.
S/MIME specifies the additional MIME type, including ―application/pkcs7-mime‖, for
information enveloping after encrypting. The entire MIME entity is encrypted and packed
into an object. S/MIME has standardized cryptographic message formats (specific from
PGP). In reality, MIME is extended with a few keywords to identify the encrypted and/or
signed components in the message.
Employability of S/MIME
Due to the requirement of a certificates from certification authority for implementation, not
all users can take advantage of S/MIME, as some may wish to encrypt a message, with a
public/private key pair. for example, without the involvement or administrative overhead of
certificates.
60
In practice, although most e-e-mailing programs implement S/MIME, the certificates
enrollment method is complex. instead PGP guide usually requires adding a plug-in and that
plug-in comes with all this is needed to manage keys. The web of trust isn't actually used.
people exchange their public keys over another medium. as soon as received, they preserve a
copy of public keys of those with whom e-emails are usually exchanged.
Implementation layer in network architecture for PGP and S/MIME schemes is proven in the
following image. each these schemes offer application level security of for e-mail
communication.
One of the schemes, both PGP or S/MIME, is used depending on the environment. A secure
e-e-mail communication in a captive network can be provided by adapting to PGP. For e-mail
security over internet, where e-mails are exchanged with new unknown users very often,
S/MIME is considered as a great option.
The security at this layer is mostly used to secure HTTP based web transactions on a
network. However, it can be employed by any application running over TCP.
Philosophy of TLS Design
Transport Layer Security (TLS) protocols operate above the TCP layer. Design of these
protocols use popular Application Program Interfaces (API) to TCP, called ―sockets" for
interfacing with TCP layer.
Applications are now interfaced to Transport Security Layer instead of TCP directly.
Transport Security Layer provides a simple API with sockets, which is similar and
analogous to TCP's API.
61
In the above diagram, although TLS technically resides between application and transport
layer, from the common perspective it is a transport protocol that acts as TCP layer
enhanced with security services.
TLS is designed to operate over TCP, the reliable layer 4 protocol (not on UDP protocol), to
make design of TLS much simpler, because it doesn't have to worry about ‗timing out‘ and
‗retransmitting lost data‘. The TCP layer continues doing that as usual which serves the need
of TLS.
Why TLS is Popular?
The reason for popularity of using a security at Transport Layer is simplicity. Design and
deployment of security at this layer does not require any change in TCP/IP protocols that are
implemented in an operating system. Only user processes and applications needs to be
designed/modified which is less complex.
Secure Socket Layer (SSL)
In this section, we discuss the family of protocols designed for TLS. The family includes
SSL versions 2 and 3 and TLS protocol. SSLv2 has been now replaced by SSLv3, so we will
focus on SSL v3 and TLS.
62
place of patented RSA crypto used in SSL. But due to expiry of RSA patent in 2000, there
existed no strong reasons for users to shift away from the widely deployed SSLv3 to TLS.
Salient Features of SSL
The salient features of SSL protocol are as follows −
SSL provides network connection security through −
Confidentiality − Information is exchanged in an encrypted form.
Authentication − Communication entities identify each other through the use
of digital certificates. Web-server authentication is mandatory whereas client
authentication is kept optional.
Reliability − Maintains message integrity checks.
SSL is available for all TCP applications.
Supported by almost all web browsers.
Provides ease in doing business with new online entities.
Developed primarily for Web e-commerce.
Architecture of SSL
SSL is specific to TCP and it does not work with UDP. SSL provides Application
Programming Interface (API) to applications. C and Java SSL libraries/classes are readily
available.
SSL protocol is designed to interwork between application and transport layer as shown in
the following image −
SSL itself is not a single layer protocol as depicted in the image; in fact it is composed of
two sub-layers.
Lower sub-layer comprises of the one component of SSL protocol called as SSL
Record Protocol. This component provides integrity and confidentiality services.
Upper sub-layer comprises of three SSL-related protocol components and an
application protocol. Application component provides the information transfer
service between client/server interactions. Technically, it can operate on top of SSL
layer as well. Three SSL related protocol components are −
SSL Handshake Protocol
Change Cipher Spec Protocol
Alert Protocol.
These three protocols manage all of SSL message exchanges and are discussed later
in this section.
63
Functions of SSL Protocol Components
The four sub-components of the SSL protocol handle various tasks for secure
communication between the client machine and the server.
Record Protocol
The record layer formats the upper layer protocol messages.
It fragments the data into manageable blocks (max length 16 KB). It
optionally compresses the data.
Encrypts the data.
Provides a header for each message and a hash (Message Authentication Code
(MAC)) at the end.
Hands over the formatted blocks to TCP layer for transmission.
64
Multiple secure TCP connections between a client and a server can share the same
session.
Handshake protocol actions through four phases. These are discussed in the next
section.
Server sends certificate. Client software comes configured with public keys of
various ―trusted‖ organizations (CAs) to check certificate.
65
Server sends chosen cipher suite.
Server may request client certificate. Usually it is not done.
Server indicates end of Server_hello.
Phase 3 − Client authentication and key exchange.
Client and server send Change_cipher_spec messages to each other to cause the
pending cipher state to be copied into the current state.
From now on, all data is encrypted and integrity protected.
Message ―Finished‖ from each end verifies that the key exchange and authentication
processes were successful.
66
SSL Session Keys
We have seen that during Phase 3 of SSL session establishment, a pre-master secret is sent
by the client to the server encrypted using server‘s public key. The master secret and various
session keys are generated as follows −
The master secret is generated (via pseudo random number generator) using −
The pre-master secret.
Two nonces (RA and RB) exchanged in the client_hello and server_hello
messages.
Six secret values are then derived from this master secret as −
Secret key used with MAC (for data sent by server)
Secret key used with MAC (for data sent by client)
Secret key and IV used for encryption (by server)
Secret key and IV used for encryption (by client)
TLS Protocol
In order to provide an open Internet standard of SSL, IETF released The Transport Layer
Security (TLS) protocol in January 1999. TLS is defined as a proposed Internet Standard in
RFC 5246.
Salient Features
TLS protocol has same objectives as SSL.
It enables client/server applications to communicate in a secure manner by
authenticating, preventing eavesdropping and resisting message modification.
TLS protocol sits above the reliable connection-oriented transport TCP layer in the
networking layers stack.
The architecture of TLS protocol is similar to SSLv3 protocol. It has two sub
protocols: the TLS Record protocol and the TLS Handshake protocol.
Though SSLv3 and TLS protocol have similar architecture, several changes were
made in architecture and functioning particularly for the handshake protocol.
Comparison of TLS and SSL Protocols
There are main eight differences between TLS and SSLv3 protocols. These are as follows −
Protocol Version − The header of TLS protocol segment carries the version number
3.1 to differentiate between number 3 carried by SSL protocol segment header.
Message Authentication − TLS employs a keyed-hash message authentication code
(H-MAC). Benefit is that H-MAC operates with any hash function, not just MD5 or
SHA, as explicitly stated by the SSL protocol.
Session Key Generation − There are two differences between TLS and SSL protocol
for generation of key material.
Method of computing pre-master and master secrets is similar. But in TLS
protocol, computation of master secret uses the HMAC standard and
pseudorandom function (PRF) output instead of ad-hoc MAC.
The algorithm for computing session keys and initiation values (IV) is
different in TLS than SSL protocol.
Alert Protocol Message −
TLS protocol supports all the messages used by the Alert protocol of SSL,
except No certificate alert message being made redundant. The client sends
empty certificate in case client authentication is not required.
Many additional Alert messages are included in TLS protocol for other error
conditions such as record_overflow, decode_error etc.
Supported Cipher Suites − SSL supports RSA, Diffie-Hellman and Fortezza cipher
suites. TLS protocol supports all suits except Fortezza.
67
Client Certificate Types − TLS defines certificate types to be requested in
a certificate_request message. SSLv3 support all of these. Additionally, SSL support
certain other types of certificate such as Fortezza.
CertificateVerify and Finished Messages −
o In SSL, complex message procedure is used for
the certificate_verify message. With TLS, the verified information is
contained in the handshake messages itself thus avoiding this complex
procedure.
UNIT-V
Cyberspace has many merits for the human race. It can be said to be a virtual library where
one can easily access the required information on any subject they are looking for. With a
proper internet connection, this can be done at any time of the day. In addition,
communication has become a lot easier and cheap due to Cyberspace. One can simply call the
other person or use other services like messages and e-mail. Cyberspace has become a huge
place for endless entertainment where a user can find songs to listen to or movies to watch or
play games. Most importantly, Cyberspace allows the users to get opportunities like a job
which can help the user tremendously.
Cyberspace can be a place for many illegal activities which need proper supervision so that
the security of the users is tightened and they feel safe. For this reason, governments of all
countries have introduced many Cyber laws including India. Practices like money laundering,
68
identity theft, illegal trade occur through Cyberspace and the Cyber laws take the legal
actions that need to be taken to curb such practices. The IT or Information Technology Act
was enacted by the Indian Government in 2000 which the main purpose was for the
protection of online banking and commerce as well as punishments for Cyber Crimes.
It is not as distinct as the Property Law or other such laws since it covers many areas the law and
regulation. It encompasses the legal, statutory, and constitutional provisions which affect
computers and networks.
Currently, there are two main statutes which ensure cyber security:
69
It captures all activities on the Internet.
Areas involving in Cyber Laws
These laws deal with multiple activities and areas that occur online and serve several
purposes. Some laws are formed to describe the policies for using the Internet and the
computer in an organization, and some are formed to offer people security from unauthorized
users and malicious activities. There are various broad categories that come under cyber laws;
some are as follows:
Fraud
Cyber laws are formed to prevent financial crimes such as identity theft, credit card theft and
other that occurring online. A person may face confederate or state criminal charges if he
commits any type of identity theft. These laws have explained strict policies to prosecute and
defend against allegations of using the internet.
Copyrighting Issues
The Internet is the source that contains different types of data, which can be accessed
anytime, anywhere. But it is the authority of anyone to copy the content of any other person.
The strict rules are defined in the cyber laws if anyone goes against copyright that protects
the creative work of individuals and companies.
Scam/ Treachery
There are different frauds and scams available on the Internet that can be personally harmful
to any company or an individual. Cyber laws offer many ways to protect people and prevent
any identity theft and financial crimes that happen online.
International law structures relations among states and other international stakeholders (most
notably international organizations) through various prohibitions, requirements, and
permissions. As such, it has provided a path for regulating global governance issues from
arms control to trade to the environment. As states give increased attention to the
governance of cyberspace (the technical architecture that allows the global internet to
function) and governance in cyberspace (how states, industry, and users may use this
technology), the role of international law in the cyber context has gained increasing
prominence.
70
international law does not have tailor-made rules for regulating cyberspace. Moreover, the
technology is both novel and dynamic. Thus, for several years, there were open questions
about whether existing international law applied to cyberspace at all. Today, most states and
several international organizations, including the UN General Assembly‘s First Committee
on Disarmament and International Security, the G20, the European Union, ASEAN, and
the OAS have affirmed that existing international law applies to the use of information and
communication technologies (ICTs) by states. As such, the current discourse centers not on
whether international law applies, but rather how it does so.
Existential Disagreements: Among those states that have taken positions on international
law‘s application to cyberspace, there are a number of ―existential‖ disagreements—
competing claims that a particular international legal rule or regime is entirely included or
excluded from cyberspace. In the UN context, for example, a few states have challenged the
availability of international humanitarian law, the right of self-defense, the duty of due
diligence, and the right to take countermeasures with respect to online activity. The existence
(or absence) of one or more of these legal frameworks from cyberspace has significant
implications for international law‘s application, impacting how states conduct their cyber
operations in armed conflicts, their ability to respond to malicious cyber activity conducted
by other states, and what actions they must take to protect the rights of third states from
harms originating in their own territories.
Interpretative Questions: Even where states accept that a particular international legal rule or
regime applies in cyberspace, substantial interpretative questions often remain open to
debate. International legal regimes like nonintervention, sovereignty, and human rights
encounter much ambiguity in their applications to cyberspace. The duty of nonintervention,
for example, protects a states‘ international and external affairs from ―coercive‖ intervention
by other states. Yet, there‘s no consensus on which ―affairs‖ the duty protects, let alone what
differentiates coercive from noncoercive cyber activity. Similarly, sovereignty is undoubtedly
one of the core architectural features of the international legal order. States appear to diverge,
however, on whether sovereignty merely is a foundational principle on which other
international legal rules (like non-intervention) rest, or if it is an independent rule that can be
breached by certain foreign state cyber operations directly.
Attribution: International law only regulates its subjects of international law (for example,
states). It does not usually direct the behavior of ICT companies or individuals (who are
usually subject to one or more domestic legal orders). To apply international law in
cyberspace, therefore, it is necessary to know the identity of whoever is responsible for the
71
activity in question: is it a state or state-sponsored actor subject to international law or is it an
individual(s) engaged in behavior outside international law‘s ambit? Such identifications are,
however, difficult in cyberspace given well-known challenges in technical attribution—
identifying the origins of malicious cyber behavior is often difficult and time-consuming.
Moreover, where states employ proxies, attribution is further complicated by the need
to show evidence of state ―control‖ over the proxy actor (international law has yet to fully
resolve how much control is required or what evidence must be shown to demonstrate it).
Cyber security has evolved into a central board topic and a core business concern. Gone are
the days where cyber risk management was avoidable. Today, companies are more informed
security buyers, looking for efficient and effective investments rather than mere silver bullets.
In a constantly-evolving world of cyber threat, what is the role of the private sector? A panel
of experts addressed the topic at the US Chamber of Commerce 5th Annual Cybersecurity
Summit in Washington, DC. The panel agreed that businesses of all sizes must take on the
challenges of ransomware, third party risk, and security complacency. They must also
recognize the increasing attention regulators are placing on private sector cyber practices and
safeguards, according to panelist Natalie Lehr, Vice President of Analytics at Secure Halo.
Cyber Now A Board Responsibility
While board members have always held a traditional role of fiduciary responsibility, cyber
security risks now fit within this realm. Having become more proactively engaged, boards
demand better cyber insights than basic, one-size-fits-all checklists. Cyber research indicates
that reactive and uncoordinated governance of risk functions ultimately leaves staff members
unprepared to stem losses – corporate harm is therefore dictated by the capability of the
attacker rather than the strength of a safeguard.
Proactive Defense Requires Going on the Offense
As the number and sophistication of threats has increased over time, the conversation around
cybersecurity has changed from educating business leaders on why it‘s important, to
identifying their priority security needs and providing them with solutions that offer the
greatest return on their security investment dollar.
Lehr recommended four ways to start.
1. Harmonize Technology, Processes and People
Security is neither a single act, nor sensor. Technology is crucial to any risk management
discussion, but it cannot be relied upon at the expense of other considerations, such as
developing a mature cybersecurity culture and synchronizing third party vendor security. In
its years of performing Enterprise Risk Assessments on organizations of varying sizes and
72
sectors, TSC has found that those that invest in complementary cyber security efforts across
their enterprise are more resilient when confronting a cyber attack or breach.
2. Transfer Risk!
Since there is no technical silver bullet that eliminates economic risks in an increasingly
digital ecosystem, corporate risk strategies leveraging cyber insurance can help businesses
assure their operational integrity, maintain customer privacy and defend corporate value. The
potential benefits of cyber insurance were noted by other Chamber conference speakers, such
as General Michael Hayden, USAF (Ret.) and Chris Inglis, former Deputy Director, National
Security Agency. Hayden suggested insurance could be a good motivator for improving
private sector cybersecurity, likening pre- or post-binding insurance assessments to requiring
a physical. As breaches continue to abound, insurers are placing more emphasis on
assessment performed by independent security firms, which review the maturity of a
company‘s practices, the security of vendors, sensitivity of corporate data, and ability to
maintain business continuity and recover from an attack.
3. Share Information
The Federal Bureau of Investigations (FBI) and the U.S. Department of Homeland Security
(DHS) both have robust threat intelligence sharing and public/private sector outreach
programs covering critical infrastructure, white-collar crime, economic espionage, terrorism
and more. These additional resources should be included as part of our organization‘s cyber
toolkit. Depending on our specific industry, there are also numerous member-driven
Information Sharing and Analysis Centers (ISACs) which collect, analyze and share threat
information. Join one to maintain sector-specific situational-awareness.
4. Get Back to Basics
Surprisingly, some enterprises overlook basic security controls such as complex passwords,
multi-factor authentication, and use of a virtual private network (VPN), but basics should go
beyond that. Secure Halo has found that only half of the organizations it has assessed had
fully documented external crisis communication plans for disasters or breaches, and very few
organizations have identified, classified, and monitored their critical and valuable
assets. While this is not an easy undertaking, it makes the job of protecting those assets
virtually impossible if we are unaware of what exists or where the assets are located.
Cyber Security Standards
To make cybersecurity measures explicit, the written norms are required. These norms are
known as cybersecurity standards: the generic sets of prescriptions for an ideal execution of
certain measures. The standards may involve methods, guidelines, reference frameworks, etc.
It ensures efficiency of security, facilitates integration and interoperability, enables
meaningful comparison of measures, reduces complexity, and provide the structure for new
developments.
1. ISO
ISO stands for International Organization for Standardization. International Standards make
things to work. These standards provide a world-class specification for products, services and
computers, to ensure quality, safety and efficiency. They are instrumental in facilitating
international trade.
73
The need of ISO 27000 series arises because of the risk of cyber-attacks which the
organization face. The cyber-attacks are growing day by day making hackers a constant threat
to any industry that uses technology.
The ISO 27000 series can be categorized into many types. They are-
ISO 27001- This standard allows us to prove the clients and stakeholders of any organization
to managing the best security of their confidential data and information. This standard
involves a process-based approach for establishing, implementing, operating, monitoring,
maintaining, and improving our ISMS.
ISO 27000- This standard provides an explanation of terminologies used in ISO 27001.
ISO 27002- This standard provides guidelines for organizational information security
standards and information security management practices. It includes the selection,
implementation, operating and management of controls taking into consideration the
organization's information security risk environment(s).
ISO 27005- This standard supports the general concepts specified in 27001. It is designed to
provide the guidelines for implementation of information security based on a risk
management approach. To completely understand the ISO/IEC 27005, the knowledge of the
concepts, models, processes, and terminologies described in ISO/IEC 27001 and ISO/IEC
27002 is required. This standard is capable for all kind of organizations such as non-
government organization, government agencies, and commercial enterprises.
ISO 27032- It is the international Standard which focuses explicitly on cybersecurity. This
Standard includes guidelines for protecting the information beyond the borders of an
organization such as in collaborations, partnerships or other information sharing
arrangements with clients and suppliers.
2. IT Act
The Information Technology Act also known as ITA-2000, or the IT Act main aims is to
provide the legal infrastructure in India which deal with cybercrime and e-commerce. The IT
Act is based on the United Nations Model Law on E-Commerce 1996 recommended by the
General Assembly of United Nations. This act is also used to check misuse of cyber network
and computer in India. It was officially passed in 2000 and amended in 2008. It has been
designed to give the boost to Electronic commerce, e-transactions and related activities
associated with commerce and trade. It also facilitate electronic governance by means of
reliable electronic records.
3. Copyright Act
The Copyright Act 1957 amended by the Copyright Amendment Act 2012 governs the
subject of copyright law in India. This Act is applicable from 21 January 1958. Copyright is a
legal term which describes the ownership of control of the rights to the authors of "original
works of authorship" that are fixed in a tangible form of expression. An original work of
authorship is a distribution of certain works of creative expression including books, video,
movies, music, and computer programs. The copyright law has been enacted to balance the
use and reuse of creative works against the desire of the creators of art, literature, music and
monetize their work by controlling who can make and sell copies of the work.
The copyright act covers the following-
Rights of copyright owners
Works eligible for protection
Duration of copyright
74
Who can claim copyright
The copyright act does not covers the following-
Ideas, procedures, methods, processes, concepts, systems, principles, or discoveries
Works that are not fixed in a tangible form (such as a choreographic work that has not
been notated or recorded or an improvisational speech that has not been written down)
Familiar symbols or designs
Titles, names, short phrases, and slogans
Mere variations of typographic ornamentation, lettering, or coloring
4. Patent Law
Patent law is a law that deals with new inventions. Traditional patent law protect tangible
scientific inventions, such as circuit boards, heating coils, car engines, or zippers. As time
increases patent law have been used to protect a broader variety of inventions such as
business practices, coding algorithms, or genetically modified organisms. It is the right to
exclude others from making, using, selling, importing, inducing others to infringe, and
offering a product specially adapted for practice of the patent.
In general, a patent is a right that can be granted if an invention is:
Not a natural object or process
New
Useful
Not obvious.
5. IPR
Intellectual property rights is a right that allow creators, or owners of patents, trademarks or
copyrighted works to benefit from their own plans, ideas, or other intangible assets or
investment in a creation. These IPR rights are outlined in the Article 27 of the Universal
Declaration of Human Rights. It provides for the right to benefit from the protection of moral
and material interests resulting from authorship of scientific, literary or artistic productions.
These property rights allow the holder to exercise a monopoly on the use of the item for a
specified period.
Indian cyberspace was born in 1975 with the establishment of National Informatics Centre
(NIC) with an aim to provide govt with IT solutions. Three networks (NWs) were set up
between 1986 and 1988 to connect various agencies of govt. These NWs were, INDONET
which connected the IBM mainframe installations that made up India‘s computer
infrastructure, NICNET (the NIC NW) a nationwide very small aperture terminal (VSAT)
NW for public sector organisations as well as to connect the central govt with the state govts
and district administrations, the third NW setup was ERNET (the Education and Research
Network), to serve the academic and research communities.
Indian Economy Going the e-Way
Post liberalization in 1991, India witnessed steady economic growth, benefiting from
globalization and information revolution. IT revolution has played a crucial role in
75
transforming country‘s GDP growth rate. As per recent Boston Consulting Group report3 the
Internet economy of India in 2010 amounted to USD 70 billion (4.1% of GDP) and is
estimated to reach USD 242 billion (5.6% of GDP) in 2016. IT is contributing in India‘s
development in following ways:-
(a) Development of Infrastructure. Airports, metros, highways and augmentation of existing
infrastructure which include power generation, financial services, telecom, transportation,
defence, etc. Nation‘s critical infrastructure are driven and controlled by ICT and it is getting
increasingly dependent on IT this includes power grids, air traffic controller, industrial
systems, stock exchanges, banking, telecom among others.
(b) e-Governance. Govt is undertaking projects driven by IT to address social, economic and
development challenges in the country. Using IT, the govt intends to improve governance by
increasing transparency, curbing corruption, time bound delivery of govt services and
ensuring financial inclusion. The National e-Governance Plan (NeGP) is designed to take a
holistic view of e-Governance initiatives across the country. (c) Aadhaar. The Aadhaar
number provides unique identity, which will become acceptable across India. The project
promises to eliminate duplicate and fake identities through effective verification and
authentication. Many of the govt‘s social benefit programs are envisaged to be linked with
the Aadhaar number.
(d) e-Commerce. e-Commerce industry is witnessing phenomenal growth and expected to
touch USD 10 billion, an increase of 47% from 20105. e-payments in India account for
35.3% of the total transactions in terms of volume and 88.3% in terms of value6, card
circulation both credit and debit was around 200 million in 20107.
( e) IT/BPO sector. India is emerging as the IT knowledge hub of the world with many global
companies opening their R&D and innovation centres in India. The industry has provided job
opportunities to over 10 million people and accounts for 6.4% of India‘s GDP. It aims to
grow revenues to USD 225 billion by 202012 out of which USD 175 billion will be on
account of export of software and services. Cloud Computing is a huge opportunity for India
as the next wave of growth for the Indian IT industry.
(f) Modernization of Police and Defence. Defence forces & Police agencies are making
strategic use of technology to modernize. Projects such as Crime and Criminal Tracking
Network and Systems (CCTNS) and National Intelligence Grid (NATGRID) are flagship
projects for modernization of police. CCTNS will connect 14,000 police stations and 6,000
police officers to a centralized database. The goal of CCTNS is to facilitate collection,
storage, retrieval, analysis, transfer and sharing of data and information at the police station
and between the police station and the State Headquarters and the Central Police
Organizations.‘13 Indian Army has also taken similar initiatives which include creation of an
Army Wide Area Network
76
(g) Social Media. Social media is emerging as a very powerful phenomenon in Indian
cyberspace with around 45 million16 Indians using the social media and the number is
increasing every day. It is revolutionizing the way society interacts. Personal Information is
becoming the economic commodity on which social networking is thriving. Businesses, Non-
Governmental Organizations (NGOs) and even the governments are using this platform for
variety of reasons which include communication, marketing, branding, awareness, etc. The
social media has also caught the attention of the governments and the regulators worldwide
(for wrong reasons) including the Indian govt and there is an on going debate on regulating
the social media17
IT Act (Amendment) 2008. Information Technology Act (IT Act) was enacted in year 2000
to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication. To establish a robust cyber
security and data protection regime in the country, the IT Act was amended in year 2008. It
provides a comprehensive definition of the computer system & tries to ascertain liability
based on the type of cyber crime committed ( Hacking, spamming, tampering, identity theft,
impersonation, cyber terrorism, pornography, child pornography). The act introduces the
concept of ‗sensitive personal information‘ and fixes liability of the ‗body corporate‘ to
protect the same through implementation of ‗reasonable security practices‘. In case a body
corporate fails to do so, it can be fined upto Rs. 5 crore (approx. USD 1.2 million) by the
Adjudicating Officer and civil court can fine amount greater than Rs. 5 crore.
Policy Initiatives. The draft version of National Cyber Security Policy was released by the
DIT in March 2011 for public consultation. The draft policy has been aimed to enable secure
computing environment and adequate trust and confidence in electronic transactions. The
draft policy tries to lawet the cyber security ecosystem for the country. It covers the
following:-
(a) Based on the key policy considerations and threat landscape, the draft policy identifies
priority areas for action.
(b) Identifies PPP as a key component.
(c) Identifies key actions to reduce security threats and vulnerabilities
(d) Establishment of National Cyber Alert System for early watch and warning, information
exchange, responding to national level cyber incidents and facilitating restoration.
(e) Defines role of sectorial CERTs and establishment of local incident response teams for
each critical sector organization.
77
(f) Implementation of best practices in critical information and government infrastructure
protection through creation, establishment and operation of Information Security Assurance
Framework.
(g) Establishes framework for Crisis Management Plan for Countering Cyber Attacks and
Cyber Terrorism.
(h) Identifies priorities for action for legal framework and law enforcement capability
development.
(j) Defines priorities for international cooperation for information sharing.
(k) Identifies indigenous Research & Development as an essential component of cyber
security and enlists thrust areas for R&D.
(l) Identifies major actions and initiatives for user awareness, education, and training
(capacity building).
(m) Defines responsible actions for network service providers, large corporates and
small/medium & home users to secure information and systems.
(n) Identifies various stakeholders (ministries and government departments only) in cyber
security and their responsibilities.
(b) To harness the power and capability of India in ICT to meet global demand
Cyber Security Initiatives. Govt and IT industry have taken various initiatives in cyber
security. However, much more needs to be done in this area. Major initiatives are
summarized below:-
(a) CERT-In. In 2003, Govt set up a the Indian Computer Emergency Response Team
(CERT-In) under DIT, MCIT as a nodal agency for responding to cyber security incidents.
The IT (Amendment) Act, 2008, recognizes CERT-In as a nodal agency for security incident
management and provides it the authority to call for information on security incidents from
78
organizations. CERT-In charter involves collection, analysis, dissemination of information on
cyber security incidents through a dedicated infrastructure. It monitors and investigates
threats that affect computer systems and forecasts and generates alerts for cyber security
incidents.
(b) Information Security Education and Awareness. To make up the shortfall of cyber
security professionals in the country, DIT initiated the Information Security Education
Awareness (ISEA) program in 2005. To spread awareness on cyber security in the country,
ISEA program aims at capacity building by introducing information security courses at
graduate, post-graduate and doctoral levels, establishing education exchange programs,
training system administrators and government officers.
(c) LEA Capacity Building Programs. To address the challenges that Indian LEAs face in
handling cyber crimes such as poor knowledge of technology and cyber crime investigation
techniques/ tools and cyber forensics, lack of state-of-the-art technical infrastructure,
insufficient training facilities & forensics labs in the country. Govt has taken some key
initiatives.
(d) Security in e-Governance projects. The National e-Governance Division (NeGD), under
DIT, is the Program Management Office of NeGP. Among its various activities, including
facilitating implementation of NeGP by various Ministries and State governments, the agency
is also responsible for issuing cyber security and data security standards and guidelines for all
the e-Governance projects under NeGP. For securing e-Governance projects, Standardization
Testing and Quality Certification Directorate (STQC) has developed e-Governance Security
Assurance Framework (e-SAFE), which provides list of security controls based on the risk
categorization of particular assets.
(e) Common Criteria Certification Scheme. This scheme has been set up by DIT to evaluate
and certify IT Security Products and Protection Profiles against the requirements of Common
Criteria Standards ver 3.1 R2, at Evaluation Assurance Levels EAL 1 through 4. Presently,
the scheme provides national certification. The scheme would also provide a framework for
international certification through the National Mutual Recognition Arrangement with the
other member countries of Common Criteria Recognition Arrangement (CCRA). Along with
24 other countries, India has already become a member of CCRA as a certificate consuming
nation and soon will be recognized as a certificate producing nation. STQC is a certification
body of the country with STQC IT, Kolkata centre as the Common Criteria Test Lab23.
(f) Sectoral Security. Critical sectors such as banking and telecommunication are strongly
regulated through Reserve Bank of India (RBI) and Department of Telecommunications
(DoT)/ Telecom Regulatory Authority of India (TRAI) respectively. The regulators keep
issuing security guidelines, mandating the companies to implement the same.
National Cyber Security Policy 2013.
79
What is the National Cyber Security Policy
National Cyber Security Policy is a policy framework by Department of Electronics and
Information Technology (DeitY) It aims at protecting the public and private infrastructure
from cyber attacks. The policy also intends to safeguard ―information, such as personal
information (of web users), financial and banking information and sovereign data‖. Ministry
of Communications and Information Technology (India) defines Cyberspace as a complex
environment consisting of interactions between people, software services supported by
worldwide distribution of information and communication technology.
With an aim to monitor and protect information and strengthen defences from cyber
attacks, the National Cyber Security Policy 2013 was released on July 2, 2013 by the
Government of India. The purpose of this framework document is to ensure a secure and
resilient cyberspace for citizens, businesses and the government. With rapid information
flow and transactions occurring via cyberspace, a national policy was much needed.
The document highlights the significance of Information Technology (IT) in driving the
economic growth of the country. It endorses the fact that IT has played a significant role
in transforming India‘s image to that of a global player in providing IT solutions of the
highest standards.
The Cyber Security Policy aims at protection of information infrastructure in cyberspace,
reduce vulnerabilities, build capabilities to prevent and respond to cyber threats an d
minimize damage from cyber incidents through a combination of institutional structures,
people, process, technology and cooperation. The objective of this policy in broad terms
is to create a secure cyberspace ecosystem and strengthen the regulatory fram ework. A
National and sectoral 24X7 mechanism has been envisaged to deal with cyber threats
through National Critical Information Infrastructure Protection Centre (NCIIPC).
Computer Emergency Response Team (CERT-In) has been designated to act as a nodal
agency for coordination of crisis management efforts. CERT-In will also act as umbrella
organization for coordination actions and operationalization of sectoral CERTs. A
mechanism is proposed to be evolved for obtaining strategic information regarding
threats to information and communication technology (ICT) infrastructure, creating
scenarios of response, resolution and crisis management through effective predictive,
prevention, response and recovery action.
Need for a cybersecurity policy
Before 2013, India did not have a cybersecurity policy. The need for it was felt during
the NSA spying issue that surfaced in 2013.
Information empowers people and there is a need to create a distinction between
information that can run freely between systems and those that need to be secured.
This could be personal information, banking and financial details, security
information which when passed onto the wrong hands can put the country‘s safety in
jeopardy.
This Policy has been drafted in consultation with all the stakeholders.
In order to digitise the economy and promote more digital transactions, the
government must be able to generate trust in people in the Information and
Communications Technology systems that govern financial transactions.
A strong integrated and coherent policy on cybersecurity is also needed to curb the
menace of cyber terrorism.
National Cyber Security Policy Objectives
Encouraging the adoption of IT in all sectors of the economy by creating adequate
trust in IT systems by the creation of a secure cyber ecosystem.
80
Creating an assurance framework for the design of security policies and for the
promotion and enabling actions for compliance with global security standards and
best practices through conformity assessment.
Bolstering the regulatory framework for ensuring a secure cyberspace ecosystem.
Enhancing and developing national and sectoral level 24 x 7 mechanisms for
obtaining strategic information concerning threats to ICT infrastructure, creating
scenarios for response, resolution and crisis management through effective predictive,
preventive, protective, response and recovery actions.
Operating a 24×7 National Critical Information Infrastructure Protection Centre
(NCIIPC) to improve the protection and resilience of the country‘s critical
infrastructure information.
Developing suitable indigenous security technologies to address requirements in this
field.
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic
devices) while following proper investigation rules to nab the culprit by presenting the
evidence to the court. Cyber forensics is also known as computer forensics. The main aim
of cyber forensics is to maintain the thread of evidence and documentation to find out who
did the crime digitally. Cyber forensics can do the following:
81
Identification: The first step of cyber forensics experts are to identify what
evidence is present, where it is stored, and in which format it is stored.
Preservation: After identifying the data the next step is to safely preserve the
data and not allow other people to use that device so that no one can tamper
data.
Analysis: After getting the data, the next step is to analyze the data or system.
Here the expert recovers the deleted files and verifies the recovered data and
finds the evidence that the criminal tried to erase by deleting secret files. This
process might take several iterations to reach the final conclusion.
Documentation: Now after analyzing data a record is created. This record
contains all the recovered and available(not deleted) data which helps in
recreating the crime scene and reviewing it.
Presentation: This is the final step in which the analyzed data is presented in
front of the court to solve cases.
Network forensics: This involves monitoring and analyzing the network traffic
to and from the criminal‘s network. The tools used here are network intrusion
detection systems and other automated tools.
Email forensics: In this type of forensics, the experts check the email of the
criminal and recover deleted email threads to extract out crucial information
related to the case.
Malware forensics: This branch of forensics involves hacking related crimes.
Here, the forensics expert examines the malware, trojans to identify the hacker
involved behind this.
Memory forensics: This branch of forensics deals with collecting data from the
memory(like cache, RAM, etc.) in raw and then retrieve information from that
data.
Mobile Phone forensics: This branch of forensics generally deals with mobile
phones. They examine and analyze data from the mobile phone.
Database forensics: This branch of forensics examines and analyzes the data
from databases and their related metadata.
Disk forensics: This branch of forensics extracts data from storage media by
searching modified, active, or deleted files.
Techniques that cyber forensic investigators use
Cyber forensic investigators use various techniques and tools to examine the data and some
of the commonly used techniques are:
82
Cross-drive analysis: In this process, the information found on multiple
computer drives is correlated and cross-references to analyze and preserve
information that is relevant to the investigation.
Live analysis: In this technique, the computer of criminals is analyzed from
within the OS in running mode. It aims at the volatile data of RAM to get some
valuable information.
Deleted file recovery: This includes searching for memory to find fragments of
a partially deleted file in order to recover it for evidence purposes.
Advantages
Cyber forensics ensures the integrity of the computer.
Through cyber forensics, many people, companies, etc get to know about such
crimes, thus taking proper measures to avoid them.
Cyber forensics find evidence from digital devices and then present them in
court, which can lead to the punishment of the culprit.
They efficiently track down the culprit anywhere in the world.
They help people or organizations to protect their money and time.
The relevant data can be made trending and be used in making the public aware
of it.
What are the required set of skills needed to be a cyber forensic expert?
The following skills are required to be a cyber forensic expert:
As we know, cyber forensic based on technology. So, knowledge of various
technologies, computers, mobile phones, network hacks, security breaches, etc.
is required.
The expert should be very attentive while examining a large amount of data to
identify proof/evidence.
The expert must be aware of criminal laws, a criminal investigation, etc.
As we know, over time technology always changes, so the experts must be
updated with the latest technology.
Cyber forensic experts must be able to analyse the data, derive conclusions from
it and make proper interpretations.
The communication skill of the expert must be good so that while presenting
evidence in front of the court, everyone understands each detail with clarity.
The expert must have strong knowledge of basic cyber security.
Cybersecurity and forensics have another essential terminology that is often used in this field
- incident handling. Computer security incidents are some real or suspected offensive events
related to cybercrime and cybersecurity and computer networks. Forensics investigators or
internal cybersecurity professionals are hired in organizations to handle such events and
incidents, known as incident handlers.
Incidents are categorized into three types:
Low-level incidents: where the impact of cybercrime is low.
Mid-level incidents: The impact of cybercrime is comparatively high and needs
security professionals to handle the situations.
High-level events: where the impact of cybercrime is the most serious and needs
security professionals, and forensic investigators to handle the situations and analyze
the scenario, respectively.
83
Policy and Procedure Development
Whether related to malicious cyber activity, criminal conspiracy or the intent to commit a
crime, digital evidence can be delicate and highly sensitive. Cybersecurity professionals
understand the value of this information and respect the fact that it can be easily
compromised if not properly handled and protected. For this reason, it is critical to establish
and follow strict guidelines and procedures for activities related to computer forensic
investigations. Such procedures can include detailed instructions about when computer
forensics investigators are authorized to recover potential digital evidence, how to properly
prepare systems for evidence retrieval, where to store any retrieved evidence, and how to
document these activities to help ensure the authenticity of the data.
Evidence Assessment
A key component of the investigative process involves the assessment of potential evidence
in a cyber crime. Central to the effective processing of evidence is a clear understanding of
the details of the case at hand and thus, the classification of cyber crime in question. For
instance, if an agency seeks to prove that an individual has committed crimes related to
identity theft, computer forensics investigators use sophisticated methods to sift through hard
drives, email accounts, social networking sites, and other digital archives to retrieve and
assess any information that can serve as viable evidence of the crime. This is, of course, true
for other crimes, such as engaging in online criminal behavior like posting fake products on
eBay or Craigslist intended to lure victims into sharing credit card information.
Evidence Acquisition
Perhaps the most critical facet of successful computer forensic investigation is a rigorous,
detailed plan for acquiring evidence. Extensive documentation is needed prior to, during, and
after the acquisition process; detailed information must be recorded and preserved, including
all hardware and software specifications, any systems used in the investigation process, and
the systems being investigated. This step is where policies related to preserving the integrity
of potential evidence are most applicable. General guidelines for preserving evidence include
the physical removal of storage devices, using controlled boot discs to retrieve sensitive data
and ensure functionality, and taking appropriate steps to copy and transfer evidence to the
investigator‘s system.
Evidence Examination
In order to effectively investigate potential evidence, procedures must be in place for
retrieving, copying, and storing evidence within appropriate databases. Investigators typically
examine data from designated archives, using a variety of methods and approaches to analyze
information; these could include utilizing analysis software to search massive archives of data
for specific keywords or file types, as well as procedures for retrieving files that have been
recently deleted. Data tagged with times and dates is particularly useful to investigators, as
are suspicious files or programs that have been encrypted or intentionally hidden.
84
evidence. Not only does this demonstrate how the integrity of user data has been preserved,
but it also ensures proper policies and procedures have been adhered to by all parties. As the
purpose of the entire process is to acquire data that can be presented as evidence in a court of
law, an investigator‘s failure to accurately document his or her process could compromise the
validity of that evidence and ultimately, the case itself.
Controlling an Investigation
1. Securely acquire and store raw log data for as long as possible from as many
disparate devices as possible while providing search and restore capabilities of
these logs for analysis.
2. Monitor interesting events coming from all important devices, systems, and
applications in as near real time as possible.
3. Run regular vulnerability scans on our hosts and devices; and, correlate these
vulnerabilities to intrusion detection alerts or other interesting events,
identifying high-priority attacks as they happen, and minimizing false
positives. SIEM and log management solutions in general can assist in security
information monitoring (see Figure 1.21); as well as, regulatory compliance
and incident response.
4. Aggregate and normalize event data from unrelated network devices, security
devices, and application servers into usable information.
5. Analyze and correlate information from various sources such as vulnerability
scanners, IDS/IPS, firewalls, servers, and so on, to identify attacks as soon as
possible and help respond to intrusions more quickly.
6. Conduct network forensic analysis on historical or real-time events through
visualization and replay of events.
2. Create customized reports for better visualization of our organizational security
posture.
3. Increase the value and performance of existing security devices by providing a
consolidated event management and analysis platform.
4. Improve the effectiveness and help focus IT risk management personnel on the events
that are important.
85
5. Meet regulatory compliance and forensics requirements by securely storing all event
data on a network for long-term retention and enabling instant accessibility to
archived data.
Disk forensics is the science of extracting forensic information from digital storage media
like Hard disk, USB devices, Firewire devices, CD, DVD, Flash drives, Floppy disks etc..
The process of Disk Forensics are
1. Identify digital evidence
2. Seize & Acquire the evidence
3. Authenticate the evidence
4. Preserve the evidence
5. Analyze the evidence
6. Report the findings
7. Documenting
First step in Disk Forensics is identification of storage devices at the scene of crime like hard
disks with IDE/SATA/SCSI interfaces, CD, DVD, Floppy disk, Mobiles, PDAs, flash cards,
SIM, USB/ Fire wire disks, Magnetic Tapes, Zip drives, Jazz drives etc. These are some of
the sources of digital evidence.
Next step is seizing the storage media for digital evidence collection. This step is performed
at the scene of crime. In this step, a hash value of the storage media to be seized is computed
using appropriate cyber forensics tool. Hash value is a unique signature generated by a
mathematical hashing algorithm based on the content of the storage media. After computing
the hash value, the storage media is securely sealed and taken for further processing.
One of the cardinal rules of Cyber Forensics is ―Never work on original evidence‖. To ensure
this rule, an exact copy of the original evidence is to be created for analysis and digital
evidence collection. Acquisition is the process of creating this exact copy, where original
storage media will be write protected and bit stream copying is made to ensure complete data
is copied into the destination media. Acquisition of source media is usually done in a Cyber
Forensics laboratory.
Authentication of the evidence is carried out in Cyber Forensics laboratory. Hash values of
both source and destination media will be compared to make sure that both the values are
same, which ensures that the content of destination media is an exact copy of the source
media.
86
Electronic evidences might be altered or tampered without trace. Once the acquisition and
authentication have been done, the original evidence should be placed in secure storage
keeping away from highly magnetic and radiation sources. One more copy of image should
be taken and it needs to be stored into appropriate media or reliable mass storage. Optical
media can be used as the mass storage. It is reliable, fast, longer life span and reusable.
Case analysis report should be prepared based on the nature of examination requested by a
court or investigation agency. It should contain nature of the case, details of examination
requested, details of material objects and hash values, result of evidence verification, details
of analysis conducted and digital evidence collected, observations of the examiner and
conclusion. Presentation of the report should be in simple terms and precise way so that non-
technical persons should be able to understand the content of the report.
Documentation
Documentation is very important in every step of the Cyber Forensics process. Everything
should be appropriately documented to make a case admissible in a court of law.
Documentation should be started from the planning of case investigation and continue
through searching in scene of crime, seizure of material objects, chain of custody,
authentication and acquisition of evidence, verification and analysis of evidence, collection of
digital evidence and reporting, preservation of material objects and up to the closing of a
case.
Investigating Information-hiding
Steganography Steganography is the way to provide the security when data is transferred in
the network. Steganography word came out from Greek, literally means covered writing . It is
an art of hiding information in the way to prevent the detection of hidden messages. In this
way we hide the information through some multimedia files. These multimedia files can be
audio, image or video. The purpose of Steganography is to covert communication to hide the
confidential information from unauthorized user or the third party. In this process if the
feature is visible, the point of attack is evident thus the goal here is always to give chances to
the very existence of embedded data.
Technical Steganography
In this technique, we use invisible ink or microdots and other sizes reduction methods. This is
a scientific method to hide data .Technical Steganography is used in the following technique:-
87
a) Video Steganography: In this technique, we can easily hide large data file in the video
Steganography. Video file is generally a collection of images and sounds. Any small but
otherwise noticeable distortion might go by unobserved by humans because of the continuous
flow of information.
b)Audio Steganography: In this technique, secret messages are embedding in digital sound.
The secret message is embedded by slightly altering the binary sequence of a sound file.
Existing audio Steganography software can embed messages in WAV, AU and even MP3
sound files.
c)Text Steganography: In text Steganography the message is hidden in the text and we use
the different method to hide the message in text by changing the last bit of the message.
Sometime one sentence in ten times and use blank space in alphabet terms is used.
d) Image Steganography: In this technique, hide information; straight message insertion
may encode every bit of information in the image. The messages may also be scattered
randomly throughout the images. A number of ways exist to hide information in digital
media.
e) Protocol Steganography: In this technique, Steganography can be used in the layer of
OSI network model and cover channels protocols. Steganography is referred to the
techniques of embedding information within messages and network control protocol used in
network transmission. The information is adding in TCP/IP header and sends in the network.
Linguistic Steganography
This technique hides the message within the carrier in some non-obvious ways. It is
categorized Into two ways:-
a) Semagrams: Semagrams use some symbols and signs to hide the information .it is further
categorized into two ways:
i)Visual Semagrams: A visual semagram uses innocent-looking or everyday physical
objects to convey a message, such as doodles or the positioning of the items on a web site.
ii).Text Semagrams: This hides a message by modifying the appearance of the carrier text,
such as subtle changes in font size or type, adding extra space, or different flourished in
letters or handwritten text
b)Open Code: This hide a message within a legitimate carrier message in the ways that are
not obvious to an unsuspecting observer.
i) Jargon: This is one type of language which is meaningless to other but can be understood
by group of people. Only Jargon codes include symbols used to indicate the presence and
type of wireless network signal, underground terminology, or an innocent conversation that
conveys special meaning because of the facts that are known to the speakers only. A subset of
jargon codes are cue codes, where certain prearranged phrases convey meaning.
ii)Covered Cipher: Covered or concealed ciphers hide a message openly in the carrier
medium so that it can be recovered by anyone who knows the secret for how it was
concealed.
- Null Cipher A null cipher hides the message according to some prearranged set of rules,
such as "read every fifth word" or "look at the third character in every word."
- Grille Cipher A grille cipher employs a template that is used to cover the carrier message;
the words that appear in the openings of the template are the hidden message.
Watermarking
In watermarking applications, the message contains information such as owner identification
and a digital time stamp, which is usually applied for copyright protection. This is
categorized into two parts
88
Fragile watermark:
Fragile watermark is watermark that is readily altered when the host image is modified
thorough a liner or non-liner transformation. It is used to the authentication of image. This is
used to verify the image.
Robust Watermarking:
Robust watermarks are used in copy protection applications to carry copy and no access
control information to form correct order and get the digital water marking. A digital
watermark is called perceptible if its presence in the marked signal is noticeable. It is
categorized into three parts:-
i) Fingerprint: In Fingerprint, the owner of the data set embeds a serial number that
uniquely identifies the user of the data set. This adds to copyright information to make it
possible to trace any unauthorized use of the data set back to the user.
ii)Imperceptible: A digital watermark is called imperceptible if the original cover signal and
the marked signal are perceptually indistinguishable.
iii)Visible: In this visible digital watermarking, the information is visible in the picture or
video. The image on the right has a visible watermark. When a television broadcaster adds its
logo to the corner of transmitted video, this is also a visible watermark.
Steganalysis
Steganalysis is simply the detection of steganography by a third party. This is a relatively
new field, since the new technology behind steganography is just becoming popular. There
are two main types of steganalysis:
visual analysis and statistical (algorithmic) analysis. Visual analysis tries to reveal the
presence of hidden information through inspection with the naked eye or with the assistance
of a computer, which can separate the image into bit planes for further analysis. Statistical
analysis is more powerful and successful, because it reveals the smallest alterations in an
image‟s statistical behavior. There are several statistical tests which can be run on an image:
average bytes, variations of the bytes, skew, kurtosis, average deviation and differential
values.
Cryptography
Cryptography is the process of transforming plain text or original information into an
unintelligible form (cipher text) so that it may be sent over unsafe channels or
communications. The transformer process is controlled by a data string (key). Anyone getting
hold of the cipher text while it is on the unsafe channel would need to have the appropriate
key to be able to get to the original information. The authorized receiver is assumed to have
that key. cryptography is study of methods of sending message in disguised form so that only
the intended recipients can remove the disguised message. It is the art of converting message
into different form, such that no one can read them without having access to „key‟. the
message may be converted Using „code‟ or a „cipher‟. Cryptology is the science underlying
cryptography.
89
Investigation
analysis Nowadays the computer crime and cybercrime are big challenges. The criminal hide
the message and data in images then it is difficult to recognize. Then the digital forensics is
an investigation the crime in the organization which is done by the criminal. Digital forensics
is used to investigation of Steganography slack points. Its examiners are very familiar with
data that remains in the file slack or unallocated space as the remnants of previous files,
programs can be written that can access slack unallocated space directly. Sometimes small
amount of data can also be hidden in unused portion of file headers . Digital forensics does
investigation on network channel like as TCP/IP protocol because this pass the messages and
causes some crimes like criminal communications, fraud, hacking electronic payments,
gambling and pornography, harassment, viruses, pedophilia.
Scrutinizing E-mail
Email security is a term for describing different procedures and techniques for protecting
email accounts, content, and communication against unauthorized access, loss or
compromise. Email is often used to spread malware, spam and phishing attacks. Attackers
use deceptive messages to entice recipients to part with sensitive information, open
attachments or click on hyperlinks that install malware on the victim‘s device. Email is also a
common entry point for attackers looking to gain a foothold in an enterprise network and
obtain valuable company data.
An email header is more than the to, from, date, and subject section that precedes an
email body. Headers also play an essential role in recording an email‘s route since every
email message has an email header.
When an email is sent from one address to another, the message will go through mail
transfer agents (MTA). So, email headers will show If the email was sent to other
addresses before reaching the final destination. If the header information looks
suspicious, users can avoid engaging with the email.
we can see the authentication results for SPF, DKIM and DMARC. It is important to note
that, in order for an email to pass DMARC, it must pass either SPF or DKIM. It does not
have to pass both.
SPF headers
The criterion that is checked for SPF is whether the server that originated the email is an
authorized sender. We may see a field in the email header labeled ‗Received SPF‘ which will
show whether the email passed or failed this test. We will also see text that shows the IP
address of the originating server and whether the sending domain lists that IP address as an
authorized sender
90
Here is how some large email providers represent this information. Note: These headers were
copied from a real email, though I‘ve replaced the actual domain and IP addresses with
generic values:
Google and Yahoo!:
Received-SPF: pass (google.com: domain of example.com designates 10.1.2.3 as permitted
sender)
Microsoft (Hotmail):
CMM-Authentication-Results: hotmail.com; spf=pass (sender IP is 10.1.2.3; identity
alignment result is pass and alignment mode is relaxed)
DKIM headers
There may be multiple DKIM records in an email header. The results of the DKIM evaluation
will also show the domain that was evaluated.To make sure we are looking at the proper
result, look for the one that matches the domain in the From address for the email.
Here is how some large email providers show we the results of DKIM validation. As we can
see, each uses a different label for the domain that was validated (In each case, the evaluated
domain below is example.com)
Google:
dkim=pass [email protected]
Yahoo!:
from=example.com; dkim=pass (ok)
Microsoft (Hotmail):
dkim=pass (identity alignment result is pass and alignment mode is relaxed)
header.d=example.com
DMARC headers
Unfortunately, not all email receivers show DMARC results in the header. Of the big three,
Google is the only one that does. Other receivers, like Microsoft, will be adding this in the
future. (And unfortunately, until they do, there‘s no way to check the DMARC status of a
message.)
For those that do include it, the DMARC results are fairly easy to read. The results will show
whether or not the email passed DMARC. The example below is extracted from the ‗From‘
field in the header.
Google:
dmarc=pass (p=REJECT dis=NONE) header.from=example.com
91
In this case, the email has passed DMARC (dmarc=pass). In this case we can also see the
DMARC policy for the domain (p=REJECT) and the disposition (dis=NONE) which will
show what action the receiver took with the email (NONE, QUARANTINE, REJECT).
Note that the receiver may choose to override results of DMARC results. This could happen
where the email receiver has a trusted relationship with the sender and will allow emails from
that sender, even if DMARC authentication fails for those messages.
Tracing is a process that follows the Internet activity backwards, from the recipient to the
user. As well, a user's Internet activity on web sites can also be tracked on the recipient site
(i.e., what sites are visited and how often, the activity at a particular site). Sometimes this
tracking and tracing ability is used to generate e-mail to the user, promoting a product that is
related to the sites visited. User information, however, can also be gathered covertly.
a. Using the search engine again, locate five businesses with a web server, which are located
in a country different from our own.
b. Write the names of the five business web sites.
c. Using the search engine again, locate a business in our own country that has a web site
that is accessible.
d. Write the URL of the web site. An example URL is www.cisco.com
92
a. Using the software we have downloaded and installed, use the tool to determine the path
which the packet takes to reach one of the remote country destinations. Each tool normally
allows we to type a URL. The program should either list or visually display the path taken by
the packet.
b. How many hops does the packet take to get from our computer to the destination
computer?
c. If our tool also provides time information, write down how long it took for the packet to
reach the first hop?
d. Use the tool to determine the path to another foreign country site. e. How many hops does
the packet take to get from our computer to the destination computer? f. Use the tool to
determine the path to a web site in our own country.
a. Click the Start button, click the Run option, type cmd, and press Enter. An alternate way
to get to the command prompt is to click Start > All Programs > Accessories > Command
Prompt.
b. From the command prompt, type tracert and press Enter. Options that can be used with the
tracert command are shown. Items shown in square brackets [ ] are optional. For example, the
first option that can be used with the tracert command is –d. If someone was to type tracert –d
www.cisco.com, then the command issued to the computer is to trace the route to
www.cisco.com, but do not try to resolve IP addresses to names. The target_name parameter
is mandatory (it does not have brackets around it) and it is replaced with the destination
network. In the previous example of tracert –d www.cisco.com, www.cisco.com is the
target_name.
c. Which tracert option would be used to designate that only 5 hops could be used to search
for the device address on the destination network?
d. Write the full command that would be typed to trace a route to www.cisco.com and
instruct the computer to not search for it after seven hops.
e. Using one of the remote country destination addresses (use the same address as the one we
used with the visual tool if possible) use the tracert command to determine how many hops it
takes to reach the remote web server. Write the number of hops and the destination.
f. The tracert command uses Internet Control Message Protocol (ICMP) echo request
messages to determine the path to the final destination. The path displayed is a list of IP
addresses assigned to routers that connect to one another to form the path. The ICMP packets
contain a value called Time To Live (TTL). The TTL value is 30 by default on a Microsoft-
based PC and each router through which the packet passes, decrements that value by 1 before
sending the packet on to the next router in the path. When the TTL value reaches 0, the router
that has the packet sends an ICMP time exceeded message back to the source. The tracert
command determines the path by sending the first ICMP echo request message with a TTL of
1 and then increases that TTL value by 1 until the target responds or the maximum number of
hops is reached. The path is determined by examining the ICMP time exceed messages that
are sent back by routers along the way and by the ICMP echo reply message that is returned
from the destination. Routers that do not return the ICMP time exceed messages are shown
by a row of asterisks (*).
93
a. A similar command that can be used on a Windows XP computer is pathping. This
command combines the abilities of the tracert command with the ping command. From the
command prompt, use the pathping command to determine the IP addresses of the routers
used to create the packet path to an other foreign country address. An example of the
pathping command used to trace the path to Cisco is pathping www.cisco.com.
b. How many hops did the pathping command display to our remote destination?
c. When do we think that we would ever use a tool like pathping or tracert?
a. Some of the freeware tools include an option to perform a whois function. Whois is a
separate program or integrated with a tool similar to tracert or pathping. It displays (and
sometimes has a link) who owns the web link of either the destination URL (such as
cisco.com) or any of the links along the path. Explore the freeware tool that we have
downloaded and installed and determine if it has a whois function. If it does, use it to
determine who owns the domain name of one of the previous destinations used.
b. Why would we want to use the whois function?
Answer all the redmarked questions, write the our answers in a Word-document and send it to
our teacher.
Often it‘s necessary to trace memory usage of the system in order to determine the program
that consumes all CPU resources or the program that is responsible to slowing down the
activities of the CPU. Tracing memory usage also becomes necessary to determine the load
on the server. Parsing the usage data enables the servers to be able to balance the load and
serve the user‘s request without slowing down the system.
1. free Displays the amount of memory which is currently available and used by
the system(both physical and swapped). free command gathers this data by
parsing /proc/meminfo. By default, the amount of memory is display in
kilobytes.
94
1. According to the image above, there is a total of 2000 MB of RAM and 1196
MB of swap space allotted to Linux system. Out of this 2000 MB of RAM, 834
MB is currently used where as 590 MB is free. Similarly for swap space, out of
1196 MB, 0 MB is use and 1196 MB is free currently in the system.
2. vmstat vmstat command is used to display virtual memory statistics of the
system. This command reports data about the memory, paging, disk and CPU
activities, etc. The first use of this command returns the data averages since the
last reboot. Further uses returns the data based on sampling periods of length
delays.
95
top top command displays all the currently running process in the system. This command
displays the list of processes and thread currently being handled by the kernel. top
command can also be used to monitor the total amount of memory usage.
96
option, a summation of all thread in each process is displayed.
/proc/meminfo This file contains all the data about the memory usage. It provides the
current memory usage details rather than old stored values.
97
htop htop is an interactive process viewer. This command is similar to top command except
that it allows to scroll vertically and horizontally to allows users to view all processes
running on the system, along with their full command line as well as viewing them as a
process tree, selecting multiple processes and acting on them all at once.
working of htop command in UNIX:
There are varying options to monitor the CPU and memory usage. This can be done through
different methods.
98
Externally with Measurement & Automation Explorer (MAX) (Memory only):
1. Open MAX. We can do this by selecting Start»Programs»National
Instruments»Measurement & Automation.
99
2. Expand Remote Systems in the Configuration window.
3. Select our real-time controller.
4. In the main window, select the System Settings tab. This tab includes the total and
available memory, as well as the total disk space and the amount of free space on the
disk.
Externally with the NI Distributed System Manager (DSM) (LabVIEW 2009 or later):
1. Open Distributed System Manager. We can do this from Windows
by selecting Start»Programs»National Instruments»Distributed System
Manager, or from LabVIEW clicking Tools»Distributed System Manager.
2. Expand Network Items in the Configuration window.
3. Select our real-time controller's IP Address.
4. Select the CPU/Memory tab and view the memory usage in the Auto View.
100
We can also select the individual Shared Variable that holds the Free Memory value to view
the available memory.
101
102