Introduction to cyber security 2.ppt.pdf

AarifS1 1 views 55 slides Nov 01, 2025
Slide 1
Slide 1 of 55
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55

About This Presentation

Cyber security


Slide Content

Module 4
System and Application Security

Chapter 2 - System Security

System Security
•We discuss
–Desktop Security
–email security: PGP and SMIME 3
–Database Security
– Web Security: web authentication, SSL and SET 4

Email Security
(Pretty Good Privacy (PGP),S/MIME)

•Email is one of the most heavily used
network-based application.
•There are two widely used schemes for
providing authentication and confidentiality
for email security, PGP and S/MIME.

SMTP

•Internet email is originally based on
SMPT-protocol (Simple Mail Transfer Protocol)
•SMPT transfers a message consisting of header
lines and a body (all ASCII) using a packet relay
network.
•SMPT does not have any security services. The
messages can easily be read or modified. Also
the senders address of routing information is
easy to change.

MIME

•”Multipurpose Internet Mail Extensions” is an
extension to solve many limitations of using
text-based messages and SMPT.
•MIME does not have security sercvices either.

Database Security

•Definition - What does Database
Security mean?
–Database security refers to the collective
measures used to protect and secure a database
or database management software from
illegitimate use and malicious threats and attacks.
–It is a broad term that includes a multitude of
processes, tools and methodologies that ensure
security within a database environment.

Techopedia explains Database
Security

•Database security covers and enforces security on all aspects
and components of databases. This includes:
•Data stored in database ,Database server
•Database management system (DBMS)
•Other database workflow applications
•Database security is generally planned, implemented and
maintained by a database administrator and or other
information security professional.

•Some of the ways database security is analyzed and
implemented include:

1. Restricting unauthorized access and use by implementing
strong and multifactor access and data management controls

2. Load/stress testing and capacity testing of a database to
ensure it does not crash in a distributed denial of service
(DDoS) attack or user overload

3. Physical security of the database server and backup
equipment from theft and natural disasters

4. Reviewing existing system for any known or unknown
vulnerabilities and defining and implementing a road
map/plan to mitigate them

Web Security
•Web application security, is a branch
of Information Security that deals specifically
with security of websites, web
applications and web services.

Security Threats
•With the emergence of Web 2.0, increased
information sharing through social
networking and increasing business adoption
of the Web as a means of doing business and
delivering service, websites are often attacked
directly.
•Hackers either seek to compromise the
corporate network or the end-users accessing
the website by subjecting them to drive-by
downloading.

•as a result, industry is paying increased attention to the
security of the web applications themselves in addition
to the security of the underlying computer
network and operating systems.
•The majority of web application attacks occur
through cross-site scripting (XSS) and SQL
injection attacks which typically result from flawed
coding, and failure to sanitize input to and output from
the web application.
•Phishing is another common threat to the Web
application and global losses from this type of attack in
2012 were estimated at $1.5 billion.

Security Threats

Web Security

Secure Electronic Transaction(SET)
•Developed by Visa and MasterCard
•Designed to protect credit card transactions
•Confidentiality: all messages encrypted
•Trust: all parties must have digital certificates
•Privacy: information made available only when and where necessary
•Confidentiality of payment and order information
–Encryption
•Integrity of all data (digital signatures)
•Authentication of cardholder & account (certificates)
•Authentication of merchant (certificates)
•No reliance on secure transport protocols (uses TCP/IP)
•Interoperability between SET software and network
–Standardized message formats
•SET is a payment protocol
–Messages relate to various steps in a credit card transaction

SSL (Secure Sockets Layer)
•NOT a payment protocol -can be used for any secure
communications, like credit card numbers
•SSL is a secure data exchange protocol providing
–Privacy between two Internet applications
–Authentication of server (authentication of browser optional)
•Uses enveloping: RSA used to exchange DES keys
•SSL Handshake Protocol
–Negotiates symmetric encryption protocol, authenticates
•SSL Record Protocol
–Packs/unpacks records, performs encryption/decryption
•Does not provide non-repudiation
•Layered on top of TCP/IP but below the application layer.
(Requires reliable transport to operate.)
•SSL is increasing in importance for Internet security

Thank You
Tags