SlideShare a Scribd company logo
CSC8 – NETWORK
SECURITY
KABUL EDUCATION UNIVERSITY
C O M P U T E R S C I E N C E D E P A R T M E N T
L E C T U R E R : I S L A H U D D I N J A L A L
M A S T E R I N C Y B E R S E C U R I T Y
9/16/2017 KABUL EDUCATION UNIVERSITY 1
Second week course outlines
Overview of network security
◦ Security Concerns of authentication
◦ Access Control
◦ Identification
◦ Authentication
◦ Authorization
◦ Identity Management
◦ Password and password management
◦ Kerberos
9/16/2017 KABUL EDUCATION UNIVERSITY 2
Class Policy
A student must reach the class-room in time. Late comers may join the class but are not entitled
to be marked present.
Attendance shall be marked at the start of the class and students failing to secure 75%
attendance will not be allowed to sit in final exam.
The assignment submission deadline must be observed. In case of late submission, ten percent
may be deducted from each day.
Those who are absent on the announcement date of the assignment/test. Must get the
topic/chapter of test/assignment confirmed through their peers.
Mobile phones must be switched-off in the class-rooms.
9/16/2017 KABUL EDUCATION UNIVERSITY 3
Grading Evaluation for Network Security
Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%
9/16/2017 KABUL EDUCATION UNIVERSITY 4
SECURITY CONCERNS
Key concerns are confidentiality and timeliness
◦ Prevent unauthorized access
◦ ensure freshness of data
To provide confidentiality, one must encrypt identification and session key
information
◦ This requires the use of previously shared private or public keys
Need timeliness to prevent replay attacks
◦ by using sequence numbers or timestamps or challenge/response
9/16/2017 KABUL EDUCATION UNIVERSITY 5
ACCESS CONTROLS
Security features that control how users and systems communicate and interact
with other systems and resources
Protect the systems and resources from unauthorized access, and monitor the
activities through:
◦ identification, authentication, authorization and accountability
Subject: Is an active entity that requests access to an object or the data within
an object
Object: A passive entity that contains information
Access: Is the flow of information between a subject and an object
9/16/2017 KABUL EDUCATION UNIVERSITY 6
IDENTIFICATION, AUTHENTICATION AND
AUTHORIZATION
• Identification
– Ensure that a subject (user, program, or process) is the entity it claims to be
– Identification can be provided with the use of a username or account number
• Authentication
– The subject is usually required to provide another method of credentials such as:
password, passphrase, cryptographic key, personal identification number (PIN),
biometrics, or token
9/16/2017 KABUL EDUCATION UNIVERSITY 7
IDENTIFICATION, AUTHENTICATION AND
AUTHORIZATION
•Authorization
–A process that grants or denies subject access to object
• Subject needs to be held accountable for the actions taken within
a system or domain. The only way to ensure accountability is
that, if the subject can be uniquely identified and the subject’s
actions are recorded
• Technical/logical access controls are tools used for identification,
authentication, authorization, and accountability
9/16/2017 KABUL EDUCATION UNIVERSITY 8
IDENTIFICATION AND AUTHENTICATION
Three general factors for authentication:
◦ Something a person knows: A password, PIN, mother’s maiden name, or
combination to a lock
◦ Something a person has: A key, swipe card, access card, or badge
◦ Something a person is: Unique physical attribute (biometrics)
Two-factor authentication
◦ Strong authentication contains more than one of these three methods
9/16/2017 KABUL EDUCATION UNIVERSITY 9
IDENTIFICATION AND AUTHENTICATION
Identification Requirements
◦ Each value should be unique, for user accountability
◦ A standard naming scheme should be followed
◦ The value should be non-descriptive of the user’s position or tasks
◦ The value should not be shared between users
9/16/2017 KABUL EDUCATION UNIVERSITY 10
IDENTITY MANAGEMENT
Automated products to identify, authenticate, and authorize subject
To manage individuals, their authentication, authorization, and privileges within
or across systems.
The objective is to increase security and productivity and decrease cost,
downtime and redundant tasks
E.g Lastpass, keepass, Password Safe (password manager) etc.
9/16/2017 KABUL EDUCATION UNIVERSITY 11
IDENTITY MANAGEMENT
Examples of technologies, services and terms related to identity management:
◦ Active Directory, Service Providers, Identity Providers, Web Services, Access control,
Digital Identities, Password Managers, Single Sign-on, Security Tokens, Security Token
Services (STS), Workflows, OpenID, WS-Security, WS-Trust, SAML 2.0, OAuth and RBAC
Common services provided
◦ Password synchronization and resetting
◦ Delegation of administrative tasks
◦ Centralized auditing and reporting
◦ Integrated workflow and increase in business productivity
◦ Regulatory compliance
9/16/2017 KABUL EDUCATION UNIVERSITY 12
PASSWORDS
A password is something the user knows
Passwords are one of the most used authentication mechanisms
It is important that the passwords are strong and properly managed
However, it is also the weakest security mechanisms
9/16/2017 KABUL EDUCATION UNIVERSITY 13
PASSWORD MANAGEMENT
System generated password should create uncomplicated, pronounceable, non-
dictionary words to help users remember them so that they aren’t tempted to
write them down
User generated password should contain a certain number of characters,
unrelated to the user ID, include special characters, include upper- and
lowercase letters, and not be easily guessable
Forced to change their passwords periodically
9/16/2017 KABUL EDUCATION UNIVERSITY 14
PASSWORD MANAGEMENT
•As a precaution to the users:
– A message can be presented to a user indicating the date and time of the last
successful logon, the location of this logon, and if there were any unsuccessful logon
attempts
– Certain number of failed logon attempts (clipping level) to be accepted before a user is
locked out
•Audit trail can also be used to track password usage and successful and
unsuccessful logon attempts
9/16/2017 KABUL EDUCATION UNIVERSITY 15
PASSWORD MANAGEMENT
Password attack techniques
◦ Electronic monitoring
◦ Listening to network traffics to capture information. The password can be
copied and reused by the attacker at another time, which is called a replay
attack
◦ Access to the password file
◦ Usually done at the authentication server. This file should be protected with
access control mechanisms and encryption
9/16/2017 KABUL EDUCATION UNIVERSITY 16
PASSWORD MANAGEMENT
Password attack techniques
◦ Brute force attacks
◦ Performed with tools that cycle through many possible character, number,
and symbol combinations to uncover a password.
◦ Dictionary attacks
◦ Files of thousands of words are used to compare to the user’s password
until a match is found
◦ Social engineering
◦ An attacker falsely convinces an individual that he/she has the necessary
authorization to access specific resources
9/16/2017 KABUL EDUCATION UNIVERSITY 17
PASSWORD CHECKERS
Test the strength of user-chosen passwords using tools that perform dictionary
and/or brute force attacks to detect the weak passwords
You need to obtain management’s approval before attempting the test
Password cracker: it is usually the same tool use by hackers to obtain password
9/16/2017 KABUL EDUCATION UNIVERSITY 18
PASSWORD HASHING AND ENCRYPTION
When password is sent to the network, it should not be sent in cleartext
Password should be hashed or encrypted before using
9/16/2017 KABUL EDUCATION UNIVERSITY 19
Picture Source: RAHUL THADANI
COGNITIVE PASSWORDS
A user is enrolled by answering several questions based on her life experiences
that she is not likely to forget
User answer the questions, instead of having to remember a password
This authentication process is best for a service the user does not use on a daily
basis because it takes longer than other authentication mechanisms
9/16/2017 KABUL EDUCATION UNIVERSITY 20
ONE-TIME PASSWORDS
Also called a dynamic password
Used for authentication purposes and is only used once (cannot be reused)
E.g.: Token device
◦ usually a handheld device that has an LCD display and possibly a keypad
◦ This hardware is separated from the computer that the user want to access
◦ Generate a one-time password to be entered by user when logging onto a
computer
9/16/2017 KABUL EDUCATION UNIVERSITY 21
ONE-TIME PASSWORDS
Two types of token device
◦ Synchronous token device
◦ Asynchronous token device
9/16/2017 KABUL EDUCATION UNIVERSITY 22
ONE-TIME PASSWORDS
•Synchronous Token Device:
– Usually requires a hardware called a security token, given to each user to generate a
one-time password.
– for e.g. a small calculator or a dongle with an LCD display that shows random numbers.
Inside the token is an accurate clock that has been synchronized with the clock on the
proprietary authentication server.
– the generation of new passwords is based on the current time
9/16/2017 KABUL EDUCATION UNIVERSITY 23
ONE-TIME PASSWORDS
Asynchronous Token Device:
9/16/2017 KABUL EDUCATION UNIVERSITY 24
Source: Certified Information Systems Security Professional
Token Device
ONE-TIME PASSWORDS
Both token systems can fall prey to masquerading if a user shares his
identification information (ID or username), or the token device is shared or
stolen
The token device can also have battery failure or other malfunctions
However, this type of system is not vulnerable to electronic eavesdropping,
sniffing, or password guessing
Two factors authentication is use:
• The user has to enter a password or PIN into the token device before it provides a
one-time password: Something the user knows (PIN) and something the user has
(the token device)
9/16/2017 KABUL EDUCATION UNIVERSITY 25
CRYPTOGRAPHIC KEYS
Use a private key or generate a digital signature
Private keys and digital signatures have higher security protection than
passwords
A private key is a secret value that should be in the possession of one person,
and one person only and it should never be disclosed to an outside party
A digital signature is a technology that uses a private key to encrypt a hash value
(message digest)
9/16/2017 KABUL EDUCATION UNIVERSITY 26
PASSPHRASE
•A sequence of characters that is longer than a password (thus a “phrase”), used
as password during an authentication process
•Passphrase is transform into a virtual password, with length and format that are
required for authentication
•Passphrase is more secure than a password because it is longer and likely to
remember than password
•E.g:
– “Gran Hewad Afghanistan"
– “Nangarhar hamesha Bahar”
9/16/2017 KABUL EDUCATION UNIVERSITY 27
ACCESS CRITERIA
Granting access rights to subjects based on the level of trust a company has in a
subject and the subject’s need to know
Five different access criteria
1. Roles
– An efficient way to assign rights to a subject who performs a certain task that is based
on a job assignment or function
2. Group
– Users that require the same access to resource are grouped and then assigning rights
and permissions to that group
– Easier to manage than assigning rights and permissions to each and every individual
separately
9/16/2017 KABUL EDUCATION UNIVERSITY 28
ACCESS CRITERIA
3. Physical or logical location
– Control object access for a subject that logs on interactively (locally) or remotely
4. Time of day
– Defining the time and duration where object access are available to subject (e.g. office
hour/off hour)
5. Transaction-type
– Access criteria can be used to control what object is accessed during certain types of
functions and what commands can be carried out on the object
9/16/2017 KABUL EDUCATION UNIVERSITY 29
DEFAULT: NO ACCESS
Access control mechanisms should default to no access, to provide the necessary
level of security and ensure that no security holes go unnoticed
If access is not explicitly allowed, it should be completely denied
9/16/2017 KABUL EDUCATION UNIVERSITY 30
NEED TO KNOW
Need-to-know principle is similar to the least-privilege principle
The concept that individuals should be given access only to the information that
they absolutely need in order to perform their job duties
Grant the least amount of privileges, but just enough for that individual to be
productive when carrying out tasks
9/16/2017 KABUL EDUCATION UNIVERSITY 31
ACCESS CONTROL PRACTICES
Regular tasks to ensure that security stays at a satisfactory level
◦ Deny access to systems by undefined users or anonymous accounts
◦ Limit and monitor the usage of administrator and other powerful accounts
◦ Suspend or delay access capability after a specific number of unsuccessful logon attempts
◦ Remove obsolete user accounts as soon as the user leaves the company
◦ Suspend inactive accounts after 30 to 60 days
◦ Enforce strict access criteria
◦ Enforce the need-to-know and least-privilege practices
◦ Disable unneeded system features, services, and ports
9/16/2017 KABUL EDUCATION UNIVERSITY 32
ACCESS CONTROL PRACTICES
◦ Replace default password settings on accounts
◦ Limit and monitor global access rules
◦ Ensure that logon IDs are non-descriptive of job function
◦ Remove redundant user IDs, accounts, and role-based accounts from resource access
lists
◦ Enforce password requirements (length, contents, lifetime, distribution, storage, and
transmission)
◦ Audit system and user events and actions and review reports periodically
◦ Protect audit logs
9/16/2017 KABUL EDUCATION UNIVERSITY 33
• Regular tasks to ensure that security stays at a satisfactory level
UNAUTHORIZED DISCLOSURE OF INFORMATION
Object reuse
◦ Reassigning to a subject, media that previously contained one or more objects
◦ Hard drive, floppy disk, or tape, it should be cleared from any residual information that
was on it previously
◦ Objects that are reused by computer processes, such as memory locations, variables,
and registers
◦ Storage media should be security label by owner, procedures of the media life cycle
should be define
9/16/2017 KABUL EDUCATION UNIVERSITY 34
UNAUTHORIZED DISCLOSURE OF INFORMATION
Emanation Security
◦ All electronic devices emit electrical signals, these signal can be captured by attacker using
proper devices and at proper positions as data transmitted or processed
◦ Tempest: codename referring to spying on information systems through leaking
emanations, including unintentional radio or electrical signals, sounds, and vibrations.
◦ Shielding standards
◦ Standard that outlines how to develop countermeasures that control spurious electrical
signals that are emitted by electrical equipment by DOD
◦ Tempest equipment is implemented to prevent intruders from picking up information
through the airwaves with listening devices
9/16/2017 KABUL EDUCATION UNIVERSITY 35
UNAUTHORIZED DISCLOSURE OF INFORMATION
White noise
◦ Is a uniform spectrum of random electrical signals, so that
intruder is not able to decipher real information
Control zone
◦ Facilities use material in their walls to contain electrical signals
9/16/2017 KABUL EDUCATION UNIVERSITY 36
ACCESS CONTROL MONITORING
Method of keeping track of who attempts to access specific network
resources
It is an important detection mechanism
e,.g. Intrusion detection system (IDS)
◦ The process of detecting an unauthorized use of, or attack upon a computer,
network, or telecommunications infrastructure
◦ To spot something suspicious/abnormal happening on the network and sound an
alarm by flashing a message on a network manager’s screen
◦ Can look for sequences of data bits that might indicate a questionable action or
event, or monitor system log and activity recording files
◦ The sensors collect traffic and user activity data and send it to an analyzer, which
looks for suspicious activity and sends an alert to the administrator’s interface on
any suspicious activity
9/16/2017 KABUL EDUCATION UNIVERSITY 37
KERBEROS
Kerberos: In Greek mythology, a many headed dog; the
guardian of the entrance of Hades
9/16/2017 KABUL EDUCATION UNIVERSITY 38
Image Source: MIT Kerberos
Kerberos
Network Authentication Protocol
Invented at M.I.T in the late 1980’s
Trusted Third Party key distribution system
Provides centralized third-party authentication in a distributed network
Allows users access to services distributed throughout network
Uses a key distribution Center (KDC)
9/16/2017 KABUL EDUCATION UNIVERSITY 39
KERBEROS
Users wish to access services on servers
Three threats exist:
◦ User pretend to be another user.
◦ User alter the network address of a workstation.
◦ User eavesdrop on exchanges and use a replay attack.
9/16/2017 KABUL EDUCATION UNIVERSITY 40
KERBEROS
S: Authentication Server
A: User machine
B: a server that hosted services
Kas and Kbs are examples of
session keys shared by the
entities A and B with S
9/16/2017 KABUL EDUCATION UNIVERSITY 41
S
A B
Kas
Kbs
• Basically, A wants to talk to B, with permission from S.
Kerberos
1. User A sends request to an Authentication Server S, asking to sign on to a service on a server B.
2. S checks that it knows the user A;
• S generates: (1) a session key Kab and
(2) a ticket for B //later on will be given to B;
9/16/2017 KABUL EDUCATION UNIVERSITY 42
Note: the password is never sent to S. S generates the secret key by
hashing the password of the user found at the database
),,,(,ticket BLnKE AabKB as
),,(ticket LAKE abKB bs

Note: Kbs is a secret key shared by B and S
• S sends the Kab to A, encrypted under the key Kas, which is derived from
the user’s password.
• S sends to A:
L=lifetime or
timestamp
Kerberos
A has:
3. A decrypts its part of the reply, and checks the nonce; Then sends ticket and
authenticator to B:
• Decrypt and get Kab and nonce,
• Compute Authenticator:
• A sends to B:
9/16/2017 KABUL EDUCATION UNIVERSITY 43
),,,(,ticket BLnKE AabKB as
),(torauthentica
),,(ticket
AK
abKB
TAE
LAKE
ab
bs


LnKBLnKD AabAabKas
,,),,,( 
),(torauthentica AK TAE ab

Kerberos
B has:
4. B decrypts the ticket with Kbs and obtains the session key Kab;
B checks that the identifiers, which is A in ticket and authenticator match,
that the ticket has not expired and that the time stamp is valid.
5. B returns time stamp TA encrypted under the session key Kab to client.
9/16/2017 KABUL EDUCATION UNIVERSITY 44
),(torauthentica
),,(ticket
AK
abKB
TAE
LAKE
ab
bs


Kerberos
Validity period for time stamps must consider the skew between the local clocks
of client and server.
Traditionally, Kerberos is deployed using ticket granting servers in conjunction
with an authentication server
S = KAS, TGS, A, B
◦ KAS authenticate principals at logon and issues tickets, which are valid for one login
session and enable principals to obtain other tickets from ticket granting server.
◦ KAS is sometimes called KDS, for key distribution centre
◦ A user first contacts an authentication server (KAS) to get a ticket granting ticket (TGT)
from a Ticket Granting Server (TGS).
9/16/2017 KABUL EDUCATION UNIVERSITY 45
Ticket Granting Servers
1. Request ticket granting
ticket
2. TGT is granted
3. Request server ticket
4. Server ticket
5. Service request
9/16/2017 KABUL EDUCATION UNIVERSITY 46
KAS
A B
TGS
1
2 3
4
5
DIFFERENCE BETWEEN VERSION 4 AND 5
9/16/2017 KABUL EDUCATION UNIVERSITY 47
• Encryption system dependence
– v4 requires DES algorithm
– v5 allows many encryption techniques
– Cipher text is tagged with encryption type id.
• Internet protocol dependence
– v4 requires the use of IP
– v5 allows other network protocols
DIFFERENCE BETWEEN VERSION 4 AND 5
9/16/2017 KABUL EDUCATION UNIVERSITY 48
• Ticket lifetime
– v4 encodes it in 8 bit quantity
– v5 allows explicit start and end times.
• Authentication forwarding
– v4 does not allow credentials issued to one client
– to be forwarded to other host for use by some other clients.
– v5 allows it.
KERBEROS – IN PRACTICE
9/16/2017 KABUL EDUCATION UNIVERSITY 49
• Currently have two Kerberos versions:
– v4 : restricted to a single realm
– v5 : allows inter-realm authentication, in beta test
– Kerberos v5 is an Internet standard
– specified in RFC1510, and used by many utilities
• Requirements to use Kerberos:
– need to have a KDC on your network
– need to have Kerberised applications running on all participating
systems
– major problem: US export restrictions, where Kerberos cannot be
directly distributed outside the US in source format (& binary
versions must obscure crypto routine entry points and have no
encryption)
– Alternatively, crypto libraries must be re-implemented locally
END
Thanks for hearing…………………….
9/16/2017 KABUL EDUCATION UNIVERSITY 50

More Related Content

What's hot

Lukas - Ancaman E-Health Security
Lukas - Ancaman E-Health SecurityLukas - Ancaman E-Health Security
Lukas - Ancaman E-Health Security
Indonesia Honeynet Chapter
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
Information Technology
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
Ethical hacking
Ethical hacking Ethical hacking
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
XEventsHospitality
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Topic11
Topic11Topic11
Topic11
Anne Starr
 
06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 

What's hot (20)

Lukas - Ancaman E-Health Security
Lukas - Ancaman E-Health SecurityLukas - Ancaman E-Health Security
Lukas - Ancaman E-Health Security
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Security tools
Security toolsSecurity tools
Security tools
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Data security
Data securityData security
Data security
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Topic11
Topic11Topic11
Topic11
 
06. security concept
06. security concept06. security concept
06. security concept
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 

Similar to Network security # Lecture 2

Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
Setiya Nugroho
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
Jigisha Aryya
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
Kabul Education University
 
ppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technologyppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technology
PrasadJagtap26
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
Puskar Bhandari
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
Hai Nguyen
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Peter Choi
 
Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1
Course Glue - Increase Student Retention
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
ijtsrd
 
BeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapBeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence Gap
Ivan Dwyer
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET Journal
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
Ivan Dwyer
 
55994241 cissp-cram
55994241 cissp-cram55994241 cissp-cram
55994241 cissp-cram
bsnl007
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
IOSR Journals
 
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapBeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence Gap
Ivan Dwyer
 
BeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence GapBeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence Gap
Ivan Dwyer
 
C02
C02C02

Similar to Network security # Lecture 2 (20)

Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
ppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technologyppt based upon e certificate isssue using blockchain technology
ppt based upon e certificate isssue using blockchain technology
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
BeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapBeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence Gap
 
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
55994241 cissp-cram
55994241 cissp-cram55994241 cissp-cram
55994241 cissp-cram
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
 
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence GapBeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp New York Meetup: Closing the Adherence Gap
 
BeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence GapBeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence Gap
 
C02
C02C02
C02
 

More from Kabul Education University

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
Kabul Education University
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
Kabul Education University
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
Kabul Education University
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
Kabul Education University
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
Kabul Education University
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
Kabul Education University
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
Kabul Education University
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
Kabul Education University
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
Kabul Education University
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
Kabul Education University
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
Kabul Education University
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
Kabul Education University
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
Kabul Education University
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
Kabul Education University
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
Kabul Education University
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
Kabul Education University
 

More from Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 

Network security # Lecture 2

  • 1. CSC8 – NETWORK SECURITY KABUL EDUCATION UNIVERSITY C O M P U T E R S C I E N C E D E P A R T M E N T L E C T U R E R : I S L A H U D D I N J A L A L M A S T E R I N C Y B E R S E C U R I T Y 9/16/2017 KABUL EDUCATION UNIVERSITY 1
  • 2. Second week course outlines Overview of network security ◦ Security Concerns of authentication ◦ Access Control ◦ Identification ◦ Authentication ◦ Authorization ◦ Identity Management ◦ Password and password management ◦ Kerberos 9/16/2017 KABUL EDUCATION UNIVERSITY 2
  • 3. Class Policy A student must reach the class-room in time. Late comers may join the class but are not entitled to be marked present. Attendance shall be marked at the start of the class and students failing to secure 75% attendance will not be allowed to sit in final exam. The assignment submission deadline must be observed. In case of late submission, ten percent may be deducted from each day. Those who are absent on the announcement date of the assignment/test. Must get the topic/chapter of test/assignment confirmed through their peers. Mobile phones must be switched-off in the class-rooms. 9/16/2017 KABUL EDUCATION UNIVERSITY 3
  • 4. Grading Evaluation for Network Security Internal Evaluation Midterm Exam 20% Attendance 5% Assignment/Presentations 5% Quizzes/Tests 10% Total Internal Evaluation 40% Final-term Examination Final-term Exam 60% Total Marks 100% 9/16/2017 KABUL EDUCATION UNIVERSITY 4
  • 5. SECURITY CONCERNS Key concerns are confidentiality and timeliness ◦ Prevent unauthorized access ◦ ensure freshness of data To provide confidentiality, one must encrypt identification and session key information ◦ This requires the use of previously shared private or public keys Need timeliness to prevent replay attacks ◦ by using sequence numbers or timestamps or challenge/response 9/16/2017 KABUL EDUCATION UNIVERSITY 5
  • 6. ACCESS CONTROLS Security features that control how users and systems communicate and interact with other systems and resources Protect the systems and resources from unauthorized access, and monitor the activities through: ◦ identification, authentication, authorization and accountability Subject: Is an active entity that requests access to an object or the data within an object Object: A passive entity that contains information Access: Is the flow of information between a subject and an object 9/16/2017 KABUL EDUCATION UNIVERSITY 6
  • 7. IDENTIFICATION, AUTHENTICATION AND AUTHORIZATION • Identification – Ensure that a subject (user, program, or process) is the entity it claims to be – Identification can be provided with the use of a username or account number • Authentication – The subject is usually required to provide another method of credentials such as: password, passphrase, cryptographic key, personal identification number (PIN), biometrics, or token 9/16/2017 KABUL EDUCATION UNIVERSITY 7
  • 8. IDENTIFICATION, AUTHENTICATION AND AUTHORIZATION •Authorization –A process that grants or denies subject access to object • Subject needs to be held accountable for the actions taken within a system or domain. The only way to ensure accountability is that, if the subject can be uniquely identified and the subject’s actions are recorded • Technical/logical access controls are tools used for identification, authentication, authorization, and accountability 9/16/2017 KABUL EDUCATION UNIVERSITY 8
  • 9. IDENTIFICATION AND AUTHENTICATION Three general factors for authentication: ◦ Something a person knows: A password, PIN, mother’s maiden name, or combination to a lock ◦ Something a person has: A key, swipe card, access card, or badge ◦ Something a person is: Unique physical attribute (biometrics) Two-factor authentication ◦ Strong authentication contains more than one of these three methods 9/16/2017 KABUL EDUCATION UNIVERSITY 9
  • 10. IDENTIFICATION AND AUTHENTICATION Identification Requirements ◦ Each value should be unique, for user accountability ◦ A standard naming scheme should be followed ◦ The value should be non-descriptive of the user’s position or tasks ◦ The value should not be shared between users 9/16/2017 KABUL EDUCATION UNIVERSITY 10
  • 11. IDENTITY MANAGEMENT Automated products to identify, authenticate, and authorize subject To manage individuals, their authentication, authorization, and privileges within or across systems. The objective is to increase security and productivity and decrease cost, downtime and redundant tasks E.g Lastpass, keepass, Password Safe (password manager) etc. 9/16/2017 KABUL EDUCATION UNIVERSITY 11
  • 12. IDENTITY MANAGEMENT Examples of technologies, services and terms related to identity management: ◦ Active Directory, Service Providers, Identity Providers, Web Services, Access control, Digital Identities, Password Managers, Single Sign-on, Security Tokens, Security Token Services (STS), Workflows, OpenID, WS-Security, WS-Trust, SAML 2.0, OAuth and RBAC Common services provided ◦ Password synchronization and resetting ◦ Delegation of administrative tasks ◦ Centralized auditing and reporting ◦ Integrated workflow and increase in business productivity ◦ Regulatory compliance 9/16/2017 KABUL EDUCATION UNIVERSITY 12
  • 13. PASSWORDS A password is something the user knows Passwords are one of the most used authentication mechanisms It is important that the passwords are strong and properly managed However, it is also the weakest security mechanisms 9/16/2017 KABUL EDUCATION UNIVERSITY 13
  • 14. PASSWORD MANAGEMENT System generated password should create uncomplicated, pronounceable, non- dictionary words to help users remember them so that they aren’t tempted to write them down User generated password should contain a certain number of characters, unrelated to the user ID, include special characters, include upper- and lowercase letters, and not be easily guessable Forced to change their passwords periodically 9/16/2017 KABUL EDUCATION UNIVERSITY 14
  • 15. PASSWORD MANAGEMENT •As a precaution to the users: – A message can be presented to a user indicating the date and time of the last successful logon, the location of this logon, and if there were any unsuccessful logon attempts – Certain number of failed logon attempts (clipping level) to be accepted before a user is locked out •Audit trail can also be used to track password usage and successful and unsuccessful logon attempts 9/16/2017 KABUL EDUCATION UNIVERSITY 15
  • 16. PASSWORD MANAGEMENT Password attack techniques ◦ Electronic monitoring ◦ Listening to network traffics to capture information. The password can be copied and reused by the attacker at another time, which is called a replay attack ◦ Access to the password file ◦ Usually done at the authentication server. This file should be protected with access control mechanisms and encryption 9/16/2017 KABUL EDUCATION UNIVERSITY 16
  • 17. PASSWORD MANAGEMENT Password attack techniques ◦ Brute force attacks ◦ Performed with tools that cycle through many possible character, number, and symbol combinations to uncover a password. ◦ Dictionary attacks ◦ Files of thousands of words are used to compare to the user’s password until a match is found ◦ Social engineering ◦ An attacker falsely convinces an individual that he/she has the necessary authorization to access specific resources 9/16/2017 KABUL EDUCATION UNIVERSITY 17
  • 18. PASSWORD CHECKERS Test the strength of user-chosen passwords using tools that perform dictionary and/or brute force attacks to detect the weak passwords You need to obtain management’s approval before attempting the test Password cracker: it is usually the same tool use by hackers to obtain password 9/16/2017 KABUL EDUCATION UNIVERSITY 18
  • 19. PASSWORD HASHING AND ENCRYPTION When password is sent to the network, it should not be sent in cleartext Password should be hashed or encrypted before using 9/16/2017 KABUL EDUCATION UNIVERSITY 19 Picture Source: RAHUL THADANI
  • 20. COGNITIVE PASSWORDS A user is enrolled by answering several questions based on her life experiences that she is not likely to forget User answer the questions, instead of having to remember a password This authentication process is best for a service the user does not use on a daily basis because it takes longer than other authentication mechanisms 9/16/2017 KABUL EDUCATION UNIVERSITY 20
  • 21. ONE-TIME PASSWORDS Also called a dynamic password Used for authentication purposes and is only used once (cannot be reused) E.g.: Token device ◦ usually a handheld device that has an LCD display and possibly a keypad ◦ This hardware is separated from the computer that the user want to access ◦ Generate a one-time password to be entered by user when logging onto a computer 9/16/2017 KABUL EDUCATION UNIVERSITY 21
  • 22. ONE-TIME PASSWORDS Two types of token device ◦ Synchronous token device ◦ Asynchronous token device 9/16/2017 KABUL EDUCATION UNIVERSITY 22
  • 23. ONE-TIME PASSWORDS •Synchronous Token Device: – Usually requires a hardware called a security token, given to each user to generate a one-time password. – for e.g. a small calculator or a dongle with an LCD display that shows random numbers. Inside the token is an accurate clock that has been synchronized with the clock on the proprietary authentication server. – the generation of new passwords is based on the current time 9/16/2017 KABUL EDUCATION UNIVERSITY 23
  • 24. ONE-TIME PASSWORDS Asynchronous Token Device: 9/16/2017 KABUL EDUCATION UNIVERSITY 24 Source: Certified Information Systems Security Professional Token Device
  • 25. ONE-TIME PASSWORDS Both token systems can fall prey to masquerading if a user shares his identification information (ID or username), or the token device is shared or stolen The token device can also have battery failure or other malfunctions However, this type of system is not vulnerable to electronic eavesdropping, sniffing, or password guessing Two factors authentication is use: • The user has to enter a password or PIN into the token device before it provides a one-time password: Something the user knows (PIN) and something the user has (the token device) 9/16/2017 KABUL EDUCATION UNIVERSITY 25
  • 26. CRYPTOGRAPHIC KEYS Use a private key or generate a digital signature Private keys and digital signatures have higher security protection than passwords A private key is a secret value that should be in the possession of one person, and one person only and it should never be disclosed to an outside party A digital signature is a technology that uses a private key to encrypt a hash value (message digest) 9/16/2017 KABUL EDUCATION UNIVERSITY 26
  • 27. PASSPHRASE •A sequence of characters that is longer than a password (thus a “phrase”), used as password during an authentication process •Passphrase is transform into a virtual password, with length and format that are required for authentication •Passphrase is more secure than a password because it is longer and likely to remember than password •E.g: – “Gran Hewad Afghanistan" – “Nangarhar hamesha Bahar” 9/16/2017 KABUL EDUCATION UNIVERSITY 27
  • 28. ACCESS CRITERIA Granting access rights to subjects based on the level of trust a company has in a subject and the subject’s need to know Five different access criteria 1. Roles – An efficient way to assign rights to a subject who performs a certain task that is based on a job assignment or function 2. Group – Users that require the same access to resource are grouped and then assigning rights and permissions to that group – Easier to manage than assigning rights and permissions to each and every individual separately 9/16/2017 KABUL EDUCATION UNIVERSITY 28
  • 29. ACCESS CRITERIA 3. Physical or logical location – Control object access for a subject that logs on interactively (locally) or remotely 4. Time of day – Defining the time and duration where object access are available to subject (e.g. office hour/off hour) 5. Transaction-type – Access criteria can be used to control what object is accessed during certain types of functions and what commands can be carried out on the object 9/16/2017 KABUL EDUCATION UNIVERSITY 29
  • 30. DEFAULT: NO ACCESS Access control mechanisms should default to no access, to provide the necessary level of security and ensure that no security holes go unnoticed If access is not explicitly allowed, it should be completely denied 9/16/2017 KABUL EDUCATION UNIVERSITY 30
  • 31. NEED TO KNOW Need-to-know principle is similar to the least-privilege principle The concept that individuals should be given access only to the information that they absolutely need in order to perform their job duties Grant the least amount of privileges, but just enough for that individual to be productive when carrying out tasks 9/16/2017 KABUL EDUCATION UNIVERSITY 31
  • 32. ACCESS CONTROL PRACTICES Regular tasks to ensure that security stays at a satisfactory level ◦ Deny access to systems by undefined users or anonymous accounts ◦ Limit and monitor the usage of administrator and other powerful accounts ◦ Suspend or delay access capability after a specific number of unsuccessful logon attempts ◦ Remove obsolete user accounts as soon as the user leaves the company ◦ Suspend inactive accounts after 30 to 60 days ◦ Enforce strict access criteria ◦ Enforce the need-to-know and least-privilege practices ◦ Disable unneeded system features, services, and ports 9/16/2017 KABUL EDUCATION UNIVERSITY 32
  • 33. ACCESS CONTROL PRACTICES ◦ Replace default password settings on accounts ◦ Limit and monitor global access rules ◦ Ensure that logon IDs are non-descriptive of job function ◦ Remove redundant user IDs, accounts, and role-based accounts from resource access lists ◦ Enforce password requirements (length, contents, lifetime, distribution, storage, and transmission) ◦ Audit system and user events and actions and review reports periodically ◦ Protect audit logs 9/16/2017 KABUL EDUCATION UNIVERSITY 33 • Regular tasks to ensure that security stays at a satisfactory level
  • 34. UNAUTHORIZED DISCLOSURE OF INFORMATION Object reuse ◦ Reassigning to a subject, media that previously contained one or more objects ◦ Hard drive, floppy disk, or tape, it should be cleared from any residual information that was on it previously ◦ Objects that are reused by computer processes, such as memory locations, variables, and registers ◦ Storage media should be security label by owner, procedures of the media life cycle should be define 9/16/2017 KABUL EDUCATION UNIVERSITY 34
  • 35. UNAUTHORIZED DISCLOSURE OF INFORMATION Emanation Security ◦ All electronic devices emit electrical signals, these signal can be captured by attacker using proper devices and at proper positions as data transmitted or processed ◦ Tempest: codename referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. ◦ Shielding standards ◦ Standard that outlines how to develop countermeasures that control spurious electrical signals that are emitted by electrical equipment by DOD ◦ Tempest equipment is implemented to prevent intruders from picking up information through the airwaves with listening devices 9/16/2017 KABUL EDUCATION UNIVERSITY 35
  • 36. UNAUTHORIZED DISCLOSURE OF INFORMATION White noise ◦ Is a uniform spectrum of random electrical signals, so that intruder is not able to decipher real information Control zone ◦ Facilities use material in their walls to contain electrical signals 9/16/2017 KABUL EDUCATION UNIVERSITY 36
  • 37. ACCESS CONTROL MONITORING Method of keeping track of who attempts to access specific network resources It is an important detection mechanism e,.g. Intrusion detection system (IDS) ◦ The process of detecting an unauthorized use of, or attack upon a computer, network, or telecommunications infrastructure ◦ To spot something suspicious/abnormal happening on the network and sound an alarm by flashing a message on a network manager’s screen ◦ Can look for sequences of data bits that might indicate a questionable action or event, or monitor system log and activity recording files ◦ The sensors collect traffic and user activity data and send it to an analyzer, which looks for suspicious activity and sends an alert to the administrator’s interface on any suspicious activity 9/16/2017 KABUL EDUCATION UNIVERSITY 37
  • 38. KERBEROS Kerberos: In Greek mythology, a many headed dog; the guardian of the entrance of Hades 9/16/2017 KABUL EDUCATION UNIVERSITY 38 Image Source: MIT Kerberos
  • 39. Kerberos Network Authentication Protocol Invented at M.I.T in the late 1980’s Trusted Third Party key distribution system Provides centralized third-party authentication in a distributed network Allows users access to services distributed throughout network Uses a key distribution Center (KDC) 9/16/2017 KABUL EDUCATION UNIVERSITY 39
  • 40. KERBEROS Users wish to access services on servers Three threats exist: ◦ User pretend to be another user. ◦ User alter the network address of a workstation. ◦ User eavesdrop on exchanges and use a replay attack. 9/16/2017 KABUL EDUCATION UNIVERSITY 40
  • 41. KERBEROS S: Authentication Server A: User machine B: a server that hosted services Kas and Kbs are examples of session keys shared by the entities A and B with S 9/16/2017 KABUL EDUCATION UNIVERSITY 41 S A B Kas Kbs • Basically, A wants to talk to B, with permission from S.
  • 42. Kerberos 1. User A sends request to an Authentication Server S, asking to sign on to a service on a server B. 2. S checks that it knows the user A; • S generates: (1) a session key Kab and (2) a ticket for B //later on will be given to B; 9/16/2017 KABUL EDUCATION UNIVERSITY 42 Note: the password is never sent to S. S generates the secret key by hashing the password of the user found at the database ),,,(,ticket BLnKE AabKB as ),,(ticket LAKE abKB bs  Note: Kbs is a secret key shared by B and S • S sends the Kab to A, encrypted under the key Kas, which is derived from the user’s password. • S sends to A: L=lifetime or timestamp
  • 43. Kerberos A has: 3. A decrypts its part of the reply, and checks the nonce; Then sends ticket and authenticator to B: • Decrypt and get Kab and nonce, • Compute Authenticator: • A sends to B: 9/16/2017 KABUL EDUCATION UNIVERSITY 43 ),,,(,ticket BLnKE AabKB as ),(torauthentica ),,(ticket AK abKB TAE LAKE ab bs   LnKBLnKD AabAabKas ,,),,,(  ),(torauthentica AK TAE ab 
  • 44. Kerberos B has: 4. B decrypts the ticket with Kbs and obtains the session key Kab; B checks that the identifiers, which is A in ticket and authenticator match, that the ticket has not expired and that the time stamp is valid. 5. B returns time stamp TA encrypted under the session key Kab to client. 9/16/2017 KABUL EDUCATION UNIVERSITY 44 ),(torauthentica ),,(ticket AK abKB TAE LAKE ab bs  
  • 45. Kerberos Validity period for time stamps must consider the skew between the local clocks of client and server. Traditionally, Kerberos is deployed using ticket granting servers in conjunction with an authentication server S = KAS, TGS, A, B ◦ KAS authenticate principals at logon and issues tickets, which are valid for one login session and enable principals to obtain other tickets from ticket granting server. ◦ KAS is sometimes called KDS, for key distribution centre ◦ A user first contacts an authentication server (KAS) to get a ticket granting ticket (TGT) from a Ticket Granting Server (TGS). 9/16/2017 KABUL EDUCATION UNIVERSITY 45
  • 46. Ticket Granting Servers 1. Request ticket granting ticket 2. TGT is granted 3. Request server ticket 4. Server ticket 5. Service request 9/16/2017 KABUL EDUCATION UNIVERSITY 46 KAS A B TGS 1 2 3 4 5
  • 47. DIFFERENCE BETWEEN VERSION 4 AND 5 9/16/2017 KABUL EDUCATION UNIVERSITY 47 • Encryption system dependence – v4 requires DES algorithm – v5 allows many encryption techniques – Cipher text is tagged with encryption type id. • Internet protocol dependence – v4 requires the use of IP – v5 allows other network protocols
  • 48. DIFFERENCE BETWEEN VERSION 4 AND 5 9/16/2017 KABUL EDUCATION UNIVERSITY 48 • Ticket lifetime – v4 encodes it in 8 bit quantity – v5 allows explicit start and end times. • Authentication forwarding – v4 does not allow credentials issued to one client – to be forwarded to other host for use by some other clients. – v5 allows it.
  • 49. KERBEROS – IN PRACTICE 9/16/2017 KABUL EDUCATION UNIVERSITY 49 • Currently have two Kerberos versions: – v4 : restricted to a single realm – v5 : allows inter-realm authentication, in beta test – Kerberos v5 is an Internet standard – specified in RFC1510, and used by many utilities • Requirements to use Kerberos: – need to have a KDC on your network – need to have Kerberised applications running on all participating systems – major problem: US export restrictions, where Kerberos cannot be directly distributed outside the US in source format (& binary versions must obscure crypto routine entry points and have no encryption) – Alternatively, crypto libraries must be re-implemented locally

Editor's Notes

  1. Timeliness- ensure freshness of data
  2. Something that emitted/emmitting
  3. Nonce is a random number used in a ticket that it should not be reused