Security Framework



Security Framework



 Privacy on Internet
It is the privacy and security level of data published via internet. It is also referred as online privacy. It is necessary to make an online purchase, visit a social networking site, participate in online games or attend forums. If a password is compromised and revealed a victim’s identity maybe fraudulently used or stolen. Privacy of internet helps us to protect the data and secure it while communicating through internet. It is broad term that refers to a varieties of factors, techniques and technologies used to protect sensitive and private data, communication and preferences. Internet privacy risk includesphishing, spyware, malware, pharming.
Some of the measures to minimize internet privacy risks are as follows:
       Always use preventive software applications like antivirus, antimalware, antispam and firewalls
       Avoid accessing and shopping on unreliable websites
       Avoid exposing personal data on website with lower security level
       Clear the browsers cache and browsing history regularly
       Always use very strong passwords consisting of letters, numerals and special characters

 Computer Crime
It refers to crimes or illegal activities performed by a knowledgeable computer user to steal a companies or individual’s private information. Here a computer or a network is the source, tool, target or place of crime. In some cases the person or group of individuals may be malicious and destroy or corrupt data and information present in a computer system while committing such crime.

Cyber Laws: It is a set of rules and laws to be followed by computer user to minimize computer crime. It consists of several protocols to govern the user of computer system and its resources.

Types of Cyber Crime
Ø Hacking
Hacking is the act of intercepting different messages that moves in the network without the knowledge of user.
Ø Identity Theft
It is the act of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, in order to access resources and other benefits in that person’s name.
Ø Computer Viruses
It is a type of malware that replicates by inserting copies of itself into other computer programs, data files or boot sector showing various negative effects in the performance of computer system.
Ø Phishing
It is a technique of fraudulently obtaining private information. Typically a phisher sends an email that appears to come from legitimate business, a bank or credit card company requesting verification of information and warning a some consequences if not provided.
Ø Cyber Stalking
It is the act of making an individual or a group of individual or an organization stalk or harassed. It may include the making of false statements of fact, making threats, identity theft, damage to data or equipment or gathering information that may be used to harass.
Ø Intellectual Property Infringement
It is an violation of an intellectual property rights like copyrights, patents and trademarks.
Ø Cyber Terrorism
Hacking, threats and blackmailing towards a business or person.
Ø Denial of Service (DoS) Attack
Overloading a system with so many request so that it cannot serve normal request.
Ø Pornography
Making or distributing porn videos and contents in an illegal way.
Ø Salami Slicing
Stealing tiny amount of money from each transaction.

 Threats
A computer is threats is a possibility of a danger that might have computer and its components and breach the security to cause damage. It can have an intentional cause like hacking or an accidental cause of natural disaster or computer malfunction. Anyone with the capability, technology, opportunity and intent to harm the computer system can create threats. There are several types of threats which are:
a)   Intellectual Property Threats
Use of existing material found on the internet without owners permission.
b)   Client Computer Threats
Trojan Horse, Viruses, Active Contents
c)    Communication Channel Threats
Sniffier programs, sniffer program, spoofing and DoS
d)   Server Threats
(Privilege Setting Threats, Server-Side Include(SSI), Common Gateway Interface (CGI), File Transfer, Spamming)

Privacy Software
Privacy software is built to protect the privacy of its user. The software typically works in conjunction with internet uses to control or limit the amount of information made available to third parties. The software can apply encryption or filtering process. A privacy software can be referred to two types of protection:
a)    Protecting a user internet privacy from the world wide web. There are software products that will mask or hide users IP address from the outside world to protect from identity theft.
b)    Hiding or deleting user internet traces that are left on their PC after surfing the internet.

 Computer Virus
It is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. It can damage, destroy data making the system malfunction. When a system is infected by a virus, the following signs and symptoms are observed:
a)    Functions gets slower than normal.
b)    A system response slowly and hangs on.
c)    Restart itself regularly.
d)    Uncommon error messages, menus and dialog box can be noticed.
e)    Size of files may increase.

Q)What viruses do?
→Can damage files, can show messages, can slow system, can take control

Q) How Virus spreads?
  A virus copies a copy of itself to another important file. When these files opened or executed, it gets advantages and starts showing its effects. Some virus appears as interesting program which when clicked shows its effect. Some viruses may also spread through e-mail and computer network.

 Virus Protection
The technique used to protect computer the folder and its data from viruses is called
virus protection. Way to protect computer from viruses are as follows:
a)    Use and update antiviruses software
b)     
c)    Backup important files and ensure that they can be restored
d)    Change the computer boot sequence to ‘always start the PC from its hard–drive’
e)    Don’t use pirated disk
f)     Scan external storage device before using it
g)    Don’t access unknown websites and avoid downloading files from unknown sources

 Encryption & Decryption
Encryption: The process of translating the plain text data (plain text) something that appears to be random and meaningless (cipher text) is called encryption. The process of converting data into a non-understandable format for its protection of is called encryption.

Cipher Text

Plain Text
                                                        Encryption
 


Decryption: It is the process of converting the cipher text into back to the plain text. It helps to extract the original data from the converted one.

Cipher Text

Plain Text
                                                        Decryption

.
.
.
.
.
 Public Key Encryption
The type of encryption which has different keys for encryption and decryption. It uses public key to encrypt data whereas a private key is used by a receiver to decrypt data. In this method encryption and decryption algorithm are not the inverse of each other.




RSA
It is a public key encryption and the algorithm developed by Ron Rivest, Adi Shamir and Len Adelmen in 1997. It is the most popular asymmetric key cryptography algorithm. It may be used to provide both secrecy and digital signature. It uses prime number to generate public and the private key based on mathematical fact and multiplying large numbers together. It uses the block size data in which plain text and cipher text are between zero and for some n values. The size of n is considered 1024 bits or 309 decimal digits. Here two different keys are used to encrypt and decrypt. A sender knows the encryption key and the receiver knows the decryption key.

Differences between DES and RSA
Features
DES
RSA
Key Used
Same Key used for used for encryption and decryption.
Different key used for used for encryption and decryption.
Scalability
It is scalable due to varying the key size and block size
No scalability occurs
Power Consumption
Low
High
Confidentiality
High
Low
Security
Not Secure enough
Least secure
Rounds
16
1

 Authorization and Authentication
Authentication
a)    It is the process of verifying the identity of user.
b)    It always proceeds to authorization.
c)    It has two separate levels because all the request coming through the IIS before it is handled.
d)    They have additional schemes like windows authentication, forms authentication and passport authentication.
Example: use of passwords, bio-metric identification system etc.
Authorization
a)    It is the process of checking whether the user has access rights to the systems.
b)    It is the process of allowing and authenticated user to access the resources.
c)    It allows two ways to authorize the access to a given resources.
d)    The two ways are URL authorization and file authorization.
Example: Privilege given to an authenticate user to access the resources like update/modify database or read only.

Firewalls
Firewalls are software or hardware based security system that controls the traffic that comes and goes on the network. They are essentially a barrier between trusted networks and untrusted and less trusted network. Simply a firewall only permits traffic from sources that are defined within the firewall. Firewall can be either software or hardware based.
a)   Software Based Firewall
It is a program installed in the computer that protect computer from traffic from the computer. It is useful if a virus or other threats make its way on to the networks. It can block them from infecting the computer. It also allows the blocking of applications.
b)   Hardware Based Firewall
It is a firewall located on the network router, standing as a barrier between the internet and the entire network. It helps to protect the network from hackers and other unwanted traffic coming to the network.

Digital Signature
Digital signature is a way to ensure that an electronic document (e-mail, spreadsheet, text-file etc.) is authentic. Authentic means that you know created a document and you know that it has not been altered in any way since that person created it. Digital signature relies on certain type of encryption to ensure authentication.
How Digital Signature works?
Digital Signature, like hand written signatures are unique to each signer. A digital signature follows a specific protocol and uses mathematical algorithms to generate two long numbers called keys. One key is public and one is private.
When a signer electronically signs a document, the signature is created using signer’s private key, which is kept securely by the signers. The mathematical algorithm acts like a cipher, creating data matching the signed document called a hash (#) and encrypting that data. The resulting encrypted data is the digital signature. He signature is also marked with the time when it was signed. If the document changes after signing, the digital signature is invalidated.

Comments