CTN 9
CTN 9
The hardware, software and information that constitute computer systems is increasingly
mission-critical. Protecting them can be as important as protecting other valuable assets, such
as money, buildings, or employees. The purpose of implementing security is to protect
computer and network resources through the selection and application of appropriate
safeguards.
Computers are networked to provide networked services. A network is like a public place
where your resources are exposed to the risks that exist there. Therefore, network security
protects computer resources as well as network resources (such as routers/switches, which
are computers with their own operating systems) against the risks and threats that arise as a
result the interconnection. In this lesson, the topic of network security is addressed, and in the
context, the primary technique for privacy - encryption - is also addressed.
Critically review the existing and emerging network security threats and countermeasures
There are three general areas of concern when a trusted network (network that is managed
such as a corporate or campus network) is attached to an untrusted network such as another
network or the Internet:
That inappropriate material will deliberately, or inadvertently, be passed to and from the
untrusted network;
That unauthorised users will be able to gain access to the trusted network from the
untrusted network;
That the operations of the trusted network may be disrupted because of an attack from the
untrusted network.
https://www.youtube.com/watch?v=TisZKt4u-O0
Security measures that minimise the threats} (Cisco 2015) are the three pillars of security
namely confidentiality, integrity, authentication (Figure 9.01). A very important factor in security
is non-repudiation.
https://www.youtube.com/watch?v=CO7kY1jhtP0
Confidentiality:
Integrity:
Availability:
Authentication:
Authentication is where both the sender and receiver need to confirm the identity of the other
party involved in the communication - to confirm that the other party is indeed who or what they
claim to be. Digital signatures and other methods such as passwords and biometrics are used
to authenticate messages and individuals, respectively.
Non-repudiation:
Non-repudiation ensures that a sending party does not deny having sent a message after
having sent it. In a sense, it is about being unable to deny the ownership of a transaction
between two parties. Non-repudiation uses digital signatures.
Cryptography
Cryptography, a word with Greek origins, means "secret writing". However, we use the term to
refer to the science and art of transforming messages to make them secure and immune to
attacks. The original message, before being transformed, is called plaintext. After the message
is transformed, it is called ciphertext. An encryption algorithm transforms the plaintext into
ciphertext; a decryption algorithm transforms the ciphertext back into plaintext. The sender
uses an encryption algorithm, and the receiver uses a decryption algorithm (Figure 9.02).
We refer to encryption and decryption algorithms as ciphers. The term cipher is also used to
A key is a number (or a set of numbers) that the cipher, as an algorithm, operates on. To
encrypt a message, we need an encryption algorithm, an encryption key and the plaintext.
These create the cipher text. To decrypt a message, we need a decryption algorithm, a
decryption key and the ciphertext. These reveal the original plaintext.
We can divide all the cryptography algorithms (ciphers) into two groups: symmetric-key (also
called secret-key) cryptography algorithms and asymmetric-key (also called public-key)
cryptography algorithms.
Commonly, there are three types of keys, the secret key, the public key and the private key.
The first, the secret key, is the shared key used in symmetric-key cryptography. The second
and the third are the public and private keys used in asymmetric-key cryptography.
Read the article titled A Case Study for Usability in Secure Email Communication (Kapadia
2007). Observe the overall role of security in an email system and the various components of
security. How critical is the role of encryption in the context of email?
Critically compare symmetric encryption with asymmetric encryption particularly with respect
to their performance and applications. Mention your findings on the Lesson 9 discussion forum
and compare them with the others.
Explore what type of applications require the two types of encryption. In terms of the time
taken to encrypt a given piece of information, which type takes longer? What would be the
size of the encrypted data for a given size of the information that is encrypted? Refer to this
article (SURFnet 2010) and this paper (Sasi et al. 2014) to get an idea.
A digital signature is a mathematical technique used to validate the authenticity and integrity of
a message, software or digital document. A digital signature is the digital equivalent of a
handwritten signature or stamped seal. It offers more security and it is intended to address
tampering and impersonation of digital information. Digital signatures provide assurances of
evidence to origin, identity and status of an electronic document, transaction or message, as
well as acknowledging informed consent by the signer. Today, digital signatures have the
same legal significance as that of the traditional signatures.
Digital signatures are based on asymmetric cryptography (Figure 9.05). To create a digital
signature, a one-way hash of the electronic data to be signed is first generated. The private
key is then used to encrypt the hash. The encrypted hash, along with other information, such
as the hashing algorithm, is termed the digital signature. The hash value is of a fixed length
and usually much shorter than an average message. Encrypting the hash alone requires less
processing compared to having to encrypt the entire message.
The hash value is always unique to the data. Any modifications to the data will result in a
completely different hash value. When a message with the signature is received, the hash
Read the paper titled Case study: Using digital signatures for the archival of medical records
in hospitals (Sageder, S., Sametinger, J. and Wiesauer, A., 2008) to get an understanding of
the practical use of digital signatures. Are there other means of establishing the integrity of the
medical records?
Discuss the role played by digital signatures in public key encryptions. Refer the article titled
Digital Signature: Application Development Trends in E-Business (Shiralkar & Vijayaraman
2003) to help your discussion and post your thoughts on the discussion board.
Network security
The elements of security in the context of the network are the following:
The information that transits the network must be confidential. Even if the data is tapped by
a malicious user, it must be in an encrypted form to ensure that the data is not useable.
The network must be accessible only to authorised users. Network access must be
provided only after the user and the device are authenticated.
The active devices on the network such as routers and switches must be inherently
secured so that they are not vulnerable to any risks on the network.
The end devices on the network such as PCs, laptops and handheld devices must be
secured against risks on the network.
The types of attacks through the Internet need to be studied to be able to detect and guard
against them. This is termed threat intelligence. Intrusion detection systems are established
based on the types of attacks most commonly used. Network intrusions consist of packets that
are introduced to cause problems for the following reasons:
Apart from cryptographic methods, other network security mechanisms are briefly discussed
below:
Firewall:
An Intrusion Detection System (IDS) is an additional protection measure that helps ward off
computer intrusions. IDS systems can be software and hardware devices used to detect an
attack. IDS products are used to monitor connection in determining whether attacks are being
launched. Some IDS systems just monitor and alert of an attack, whereas others try to block
the attack. Figure 9.07 illustrates how an IDS functions.
Malware Scanners:
Viruses, worms and Trojan horses are all examples of malicious software, or malware for
short. Special anti-malware tools are used to detect them and cure an infected system
The Secure Sockets Layer (SSL) is a suite of protocols that is a standard way to achieve a
good level of security between a web browser and a website. SSL is designed to create a
secure channel, or tunnel, between a web browser and the web server, so that any information
exchanged is protected within the secured tunnel. SSL provides authentication of clients to
server using certificates. Clients present a certificate to the server to prove their identity. SSL
has now been standardised as Transport Layer Security (TLS).
Research the recent advances in network security mechanisms, particularly in the context of
large data centre network infrastructure. Refer to the article titled Deep Security: Protecting
the data centre (Trend Micro 2009) to help your discussion on the Lesson 9 online forum
https://www.youtube.com/watch?v=6KSeMzgSS68
SSL (SSL Corp 2016) (note that SSL evolved into Transport Layer Security - TLS, with
standardisation; the terms are now used synonymously) uses public-key cryptography to
provide authentication, and secret-key cryptography and digital signatures to provide for
privacy and data integrity. The protocol is composed of two layers. At the lowest level, layered
on top of some reliable transport protocol (e.g., TCP), is the SSL record protocol. The SSL
record protocol is used for encapsulation of various higher-level protocols. One such
encapsulated protocol, the SSL handshake protocol, allows the server and client to
authenticate each other and to negotiate an encryption algorithm and cryptographic keys
before the application protocol transmits or receives its first byte of data. One advantage of
SSL is that it is application protocol independent. A higher-level protocol can layer on top of the
SSL protocol transparently. Figure 9.08 illustrates how the SSL layer (in green) supports the
application layer. The enlarged view of the SSL layer shows the handshake layer and the
record layer, along with their functions.
The SSL protocol provides connection security that has three basic properties:
The connection is private. Encryption is used after an initial handshake to define a secret
key. Symmetric cryptography is used for data encryption (e.g., algorithms such as Data
Encryption Standard (DES), 3DES, Rivest Cipher 4 (RC4)).
The connection is reliable. Message transport includes a message integrity check using a
keyed Message Authentication Code (MAC). Secure hash functions (e.g., Secure Hash
Algorithm (SHA), Message Digest 5 (MD5)) are used for MAC computations.
SSL provides privacy of data by encrypting the information transferred between communicating
endpoints. The client machine can authenticate the server by verifying its certificate. This helps
users to verify the certificate of the site they are visiting to ensure that it is indeed a genuine
site.
The use of SSL brought up the need for a certificate based infrastructure and therefore the
relative costs increased. In addition, the use of SSL puts a load on processing and can impact
performance in terms of delays. However, the security that SSL provides far outweighs the
cost and performance delays. Also, the performance delays are likely to affect only very small
computing platforms.
Network-based attacks from untrusted computers, attacks that can result in the denial-of-
service of applications, services, or the network
Data corruption
Data theft
User-credential theft
You can use IPSec to defend against network-based attacks through a combination of host-
based IPSec packet filtering and the enforcement of trusted communications.
IPSec can be used end to end, for example, between a client and a server. IPSec transport
mode can be used for this. However, the most widespread use of IPSec today is between
specific IPSec gateways. Two such gateways are typically endpoints that interconnect to
networks. Effectively, they interconnect two networks across a public network infrastructure. All
traffic that transits the public network will be secure. In this case, tunnel mode is used to tunnel
packets securely from one network to the other. Hosts between these networks can access the
other network transparently and use all services on each other. Such a secure connectivity
interconnecting networks is not feasible using SSL. This is a primary difference between the
two protocols. Figure 9.11 shows both transport mode and tunnel mode with their typical
applications.
https://www.youtube.com/watch?v=K_JomGpvjH4
VPN (ESET 2016) is a means of creating a secure tunnel between a specific end system and a
VPN server. The system then becomes a part of the server’s network. All the data exchanged
between the end system and the VPN server is completely encrypted. All details of what
services the system is using, the end points of its communications such as the websites the
system accesses, etc., are completely confidential.
VPN services are typically used to access an organisation’s intranet from the Internet. The
users typically connect to a VPN server hosted within the organisation and then access the
resources within the organisation. The use of a VPN is recommended whenever there is a
need to access resources using a public Wi-Fi hotspot (Figure 9.12).
Using SSL/TLS to provide the encrypted tunnel between the end points
Using IPSec to provide the encrypted tunnel between the end points.
SSL VPNs are typically designed to provide remote access. Since SSL was primarily designed
for secure web access, remote access is provided as a browser based service. SSL tunnel
VPNs allow access to other applications too, but are limited to user to server connectivity
(Figure 9.13). Notice that while an IPSec VPN terminates typically on a firewall (which hosts
the VPN server), the SSL VPN terminates on an SSL server which is behind the firewall (on
the remote network). The difference between using layer 3 and layer 4 is distinctly seen here.
Unlike a IPSec VPN, SSL VPNs are application dependent.
Client-to-site VPNs, where a user (client) sets up a VPN connection to a VPN server in an
organisation to use the resources of that organisation.
Site-to-site VPN, where two networks at two remote sites are interconnected using an
IPSec VPN. In such cases, routers or firewalls that are capable of deploying VPNs are
used. This provides a secure interconnectivity between the remote networks (Figure 9.14).
Such a capability is not possible by SSL/TLS.
Security attacks
Malicious users can attack the network for various reasons such as gathering or stealing
information and blocking the availability of data or services. These attacks can be active or
passive. In an active attack, the attacker tries to break the existing network protection
mechanisms by the introduction of a malicious code or worm, bypassing system security to
exploit against a network backbone and to disclose or modify the data. A passive attack
monitors the network traffic to capture authentication information. It is difficult to detect passive
attacks because there is no change to the original content of data. Attackers can be from either
inside or outside the network. Like the external attacker, an inside attacker intentionally
eavesdrops, steals, or damages information or denies access to other authorised users. There
are several active and passive network attacks that can impact on the security risks within the
network.
Packet-sniffing attack
A packet sniffer, sometimes referred to as a network monitor, captures all packets of data
passing through a network interface. In a broadcast environment, a packet sniffer can receive
all data frames transmitted by the hosts within the network. Any network host with a network
card can serve as a packet sniffer if the card is set to promiscuous mode in order to receive the
data frames. A legitimate user such as the system administrator uses this program to monitor
and troubleshoot network traffic. However, a malicious intruder also can capture and analyse
all the network traffic passively.
IP spoofing attack
This is a technique used to send messages to a specific target host with an IP address
indicating that the message is coming from a trusted host. The malicious user needs to obtain
the IP address of the trusted host and then modifies the packet so that it appears that the
packets are coming from that host. Spoofing makes it difficult for the victim system to
determine where the computer is transmitting data from due to the difficulties of tracking the
Phishing attack
A phishing attack uses social engineering techniques to solicit personal information from target
users. The attackers may create a fake website that looks exactly like a popular site. The
phishing part of the attack is that the attacker then sends an email message which the user
can see originated from a legitimate organisation or known individual. The email tries to trick
the user into clicking a link that leads to that fake site. The user attempts to log on to the fake
site with their credentials which the hacker records and then uses on the real site to gain the
victim’s access. The fake site may also contain malicious code that affects the user’s system.
Here, the social engineering technique is used as the attacker obtains confidential information
through non-technical means such as sending an email pretending to be from a legitimate
source.
A Distributed Denial-of-Service (DDoS) attack comes from more than one source at the same
time. Multiple systems allow much higher traffic volumes to form a DDoS attack. Therefore, the
severity or impact of a successful DDoS attack on a network is much more devastating when
compared to a DoS attack. The attacker initially gains access to target host computers within
the network by taking advantage of security vulnerabilities. The DDoS attack is referred to as
distributed because the attacker is using multiple hosts to launch the attack at the target victim.
What are the security concerns and challenges in implementing remote access VPN? You
may refer to the article titled Remote Access VPN - Security Concerns and Policy
Enforcement (SANS Institute 2003) to help frame your thoughts.
Summary
https://vimeo.com/251286178/f1b0096f04
Transcript
In addition to the CIA Triad, there are a few other security defence attributes that are part of
best practice such as authentication, non-repudiation and authorisation. Research how these
enable protection against threats. You may refer to the article titled Fundamental Security
Concepts (Cryptome.org 2013) to help your research.
Viewing
APNIC Training, 2013. Network Security Fundamentals. [video, online]. APNIC Training, 23
January 2013. Available from: [Accessed 1 December 2017].
APNIC Training, 2014. IPSec Basics. [video, online]. APNIC Training, 14 April 2014.
Available from: [Accessed 01 December 2017].
Cisco, 2015. Make Network Security Simple. [video, online] Cisco, 3 November 2015.
Available from: [Accessed 01 December 2017].
CISSP Fundamentals, 2016. CIA TRIAD. [video, online] CISSP Fundamentals, 27 August
2016. Available from: [Accessed 01 December 2017].
ESET, 2016. What is VPN and how it works? [video, online] ESET, 15 December 2016.
Available from: [Accessed 01 December 2017].
SSL Corp, 2016. What is SSL? [video, online] SSL Corp, 5 January 2016. Available from:
[Accessed 01 December 2017].
Apple 2015. Finding More Than One Worm in the Apple. Communications of the
ACM [online], 57(7), pp. 58-64, Computers & Applied Sciences Complete, EBSCOhost.
Available from: [Accessed 01 November 2017].
2005. SSL VPNs Simplify Remote User Security. Iseries NEWS [online], 313, pp. 35-38,
Computers & Applied Sciences Complete, EBSCOhost. Available from: [Accessed 01
November 2017].
Hofmann, L., 2016. Finding New Directions in Cryptography. Communications of the ACM
[online], 59(6), pp. 112-111, Computers & Applied Sciences Complete, EBSCOhost.
Available from: [Accessed 01 November 2017].?
.Johns, M., 2014. Real-Time Communications Security on the Web. IEEE Internet
Computing [online], 18(6), pp. 8-10, Computers & Applied Sciences Complete,
EBSCOhost. Available from: [Accessed 01 November 2017].
Ponnapalli, H. & Saxena, A., 2013. A Digital Signature Architecture for Web Apps. IT
Professional [online], 15(2), pp. 42-49, Computers & Applied Sciences Complete,
EBSCOhost. Available from: [Accessed 21 June 2017]
Stuart, S., 2016. The Supercomputers That Are Exploring Quantum Cryptography. PC
Magazine [online], pp. 20-24, Computers & Applied Sciences Complete, EBSCOhost.
Available from: [Accessed 01 November 2017]. ?land, M., 2014. ?
Turner, S., 2014. Transport Layer Security. IEEE Internet Computing [online], 18(6), pp.
60-63, Computers & Applied Sciences Complete, EBSCOhost. Available from: [Accessed
01 November 2017].
References
Kapadia, A., 2007. A case (study) for usability in secure email communication. IEEE
Security & Privacy [online], 5(2). Available from: [Accessed 20 December 2017].
SANS Institute, 2003. Remote Access VPN - Security Concerns and Policy Enforcement.
[online] SANS Institute. Available from: [Accessed 01 November 2017].
Sageder, S., Sametinger, J. and Wiesauer, A., 2008, October. Case study: Using digital
signatures for the archival of medical records in hospitals. In Risks and Security of Internet
and Systems, 2008. CRiSIS'08. Third International Conference on (pp. 213-220). IEEE.
Sasi, S.B., Dixon, D., Wilson, J. and No, P., 2014. A general comparison of symmetric and
asymmetric cryptosystems for WSNs and an overview of location based encryption
technique for improving security. IOSR Journal of Engineering [online], 4(3), p.1. Available
from: [Accessed 01 December 2017].
Trend Micro, 2009. Protecting the Dynamic Datacenter. [online] TrendMicro, August 2009.
Available from: [Accessed 01 December 2017].