Ilovepdf Merged
Ilovepdf Merged
INTRODUCTION
(Computer System Security)
What is • Computer security basically is the
protection of computer systems and
Computer information from harm, theft, and
Security and unauthorized use. It is the process of
preventing and detecting
What to unauthorized use of your computer
Learn ? system.
1. Information security is securing information from unauthorized access,
modification & deletion
• Application Security is securing an application by building security features to
prevent from Cyber Threats such as SQL injection, DoS attacks, data breaches and
etc.
• Computer Security means securing a standalone machine by keeping it updated
and patched
• Network Security is by securing both the software and hardware technologies
2. Cybersecurity is defined as protecting computer systems, which communicate
over the computer networks
• It’s important to understand the distinction between these words, though there
isn’t necessarily a clear consensus on the meanings and the degree to which they
overlap or are interchangeable.
3. Computer security can be defined as controls that are put in place to
provide confidentiality, integrity, and availability for all components of
computer systems. Let’s elaborate the definition.
• Components of computer system
• The components of a computer system that needs to be protected
are:
• Hardware, the physical part of the computer, like the system memory
and disk drive
• Firmware, permanent software that is etched into a hardware
device’s nonvolatile memory and is mostly invisible to the user
• Software, the programming that offers services, like operating system,
word processor, internet browser to the user
The CIA Triad
• 1. In error 404 hacking digital India part 1 chase , the cyber crime and cyber attacks hack
the information of users like bank detail and personal information
• 2. It is real time incident . In this , attacker or hacker creates an attractive video so that
victim gets attracted and plays that video into system .
• 3. When we clicked on video to play then at the time of buffering , hacker can know our
current location and GPS history but also have complete access to our contacts , text
messages , Facebook , Whatsapp and most importantly our bank details , including our
CVV number
• 4. Hackers are creating a kind Trojan file , and android apk files . The apk files that will be
distributed all over the internet . Those who download this file will be hacked easily
• Buffers are memory storage regions that temporarily hold data while it is being
transferred from one location to another. A buffer overflow (or buffer overrun)
occurs when the volume of data exceeds the storage capacity of the memory buffer.
As a result, the program attempting to write the data to the buffer overwrites
adjacent memory locations.
• For example, a buffer for log-in credentials may be designed to expect username
and password inputs of 8 bytes, so if a transaction involves an input of 10 bytes
(that is, 2 bytes more than expected), the program may write the excess data past
the buffer boundary.
• Buffer overflow attacks.
• If a program performs a calculation and the true answer is larger than the
available space, it may result in an integer overflow. These integer overflows
can cause the program to use incorrect numbers and respond in unintended
ways, which can then be exploited by attackers.
• For example, if an integer data type allows integers up to two bytes or 16 bits
in length (or an unsigned number up to decimal 65,535), and two integers are
to be added together that will exceed the value of 65,535, the result will be
integer overflow.
• How can integer overflows be avoided?
• Avoidance. By allocating variables with data types that are large enough to
contain all values that may possibly be computed and stored in them, it is
always possible to avoid overflow.
• Format string attacks.
• The Format String exploit occurs when the submitted data of an input
string is evaluated as a command by the application. In this way, the
attacker could execute code, read the stack, or cause a segmentation
fault in the running application, causing new behaviors that could
compromise the security or the stability of the system.
•Format string Vulnerability.
A format string vulnerability is a bug where user input is passed as the format
argument to printf, scanf, or another function in that family.
The format argument has many different specifies which could allow an attacker
to leak data if they control the format argument to printf. Since printf and
similar are variadic functions, they will continue popping data off of the stack
according to the format.
For example, if we can make the format argument "%x.%x.%x.%x", printf will
pop off four stack values and print them in hexadecimal, potentially leaking
sensitive information.
• In order to prevent data loss, prevent
data theft,minimize employee
downtime, and maximize IT
productivity, businesses need an
Defense Against additional line of preventative
Controle defense that can block attacks that
Hijacking Platform antivirus doesn’t – before any harm is
- Runtime Defense done.An emerging category of
software known as Runtime Malware
Defense offers a promising solution
that works by detecting and blocking
malware and exploits at runtime
• Explain briefly computer security and components
of computer system.
• Explain CIA traits.
• Explain problems related to computer security.
• Discuss various attacks in computer security.
• Discuss error 404 hacking in India part one chase.
Important • Explain control hijacking.
Question • Briefly describe buffer overflow attack.
• What is sample attack. Explain SQL injection attack
and its prevention.
• Discuss session fixation attack.
• Discuss denial of service attack.
Thankyou
Made By – AKTU WALA ( Satyam Sahu )
Confidentiality Policies
UNIT - 2
• A confidentiality policy is a security policy dealing
only with confidentiality.
• Confidentiality is one of the factors of privacy, an
issue recognized in the laws of many government
entities.
• It put constraint on what information can legally be
obtained from individuals. Also it place constraints
Confidentiality on the disclosure and use of that information.
Policies • Unauthorized disclosure can result in penalties that
include jail or fines.
• Confidentiality policies place no trust in objects.
• The policy statement dictates whether that object
can be disclosed. It says nothing about whether the
object should be believed
Goal
• To maintain an outline for the
management and administration of
network.
• To protect an organisation's computing
resources
• To eliminate legal liabilities arising from
workers or third parties.
• To prevent wastage of company's
computing resources
• To prevent unauthorised modifications of
the data .
Discretionary Access Control (DAC)
1. Application rootkits:
• Application rootkits replace legitimate files with infected rootkit files on our computer.
• These rootkits infect stand ard programs like Microsoft Office, Notepad, or Paint.
• Attackers can get access to our computer every time we run those programs.
• Antivirus programs can easily detect them since they both operate on the application layer.
2. Kernel rootkits:
• Attackers use these rootkits to change the functionality of an operating system by inserting malicious code into
it.
• This gives them the opportunity to easily steal personal information.
3. Bootloader rootkits
• The bootloader mechanism is responsible for loading the operating system on a computer.
• These rootkits replace the original bootloader with an infected one. This means that bootloader rootkits are
active even before the operating system is fully loaded.
4. Hardware and firmware rootkits:
• This kind of rootkit can get access to a computer's BIOS system or hard drives as well as routers, memory
chips, and network cards.
5. Virtualized rootkits
• Virtualized rootkits take advantage of virtual machines in order to control operating systems.
• These rootkits create a virtual machine before the operating system loads, and then simply take over
control of our computer.
• Virtualized rootkits operate at a higher level than operating systems, which makes them almost
undetectable.
• How can we prevent rootkits ?
1. Avoid opening suspicious emails.
2. Avoid downloading cracked software.
3. Install software updates:
4. Anti-malware software prevents varieties of malware.
Detour used in Unix user ids and process ids.
• 1 Detour is defined as few words about Unix user IDs and IDs associated with
Unix processes.
• 2. Every user in Unix like operating system is identified by different integer
number, this unique number is called as UserID.
• 3.There are three types of UID defined for a process, which can be dynamically
changed as per the privilege of task.
• The three different types of UIDs defined are
• Real UserID: It is account of owner of this process. It defines which files that this
process has access to.
• Effective UserlD : It is normally same as real User ID, but sometimes it is changed
to enable a non-privileged user to accese files that can only be accessed by root
• Saved UserID: It is used when a process is running with elevated privileges
(generally root) needs to do some under-privileged work, this can be achieved by
temporarily switching to non-privileged account.
Intrusion Detection System (IDS) ?
• An Intrusion Detection System (IDS) is a system that monitors network traffic for
suspicious activity and issues alerts when such activity is discovered. It is a
software application that scans a network or a system for the harmful activity or
policy breaching. Any malicious venture or violation is normally reported either to
an administrator or collected centrally using a security information and event
management (SIEM) system. A SIEM system integrates outputs from multiple
sources and uses alarm filtering techniques to differentiate malicious activity
from false alarms.
• Although intrusion detection systems monitor networks for potentially malicious
activity, they are also disposed to false alarms
Security Hard
• Today in computers and on the internet attack is easier than
defense There are many reasons for this, but the most important is
the complexity of these systems.
• Complexity is the worst enemy of security. The more complex a
system is, the less secure it is
• A hacker typically targets the "attack surface" of a system. The
attack surface of a system contains all the possible points that a
hacker might target.
• A complex system means a large attack surface, and that means a
huge advantage for the hacker.
Access control list
• An access-control list is a list of permissions attached to an object.
• An ACL specifies which users or system processes are granted access to
objects, as well as what operations are allowed on given objects.
• Each entry in a typical ACL specifies a subject and an operation.
Access control technology includes:
1. Access Technology Architectures
2. Communications technologies
3. Authentication technologies
4. Infrastructure technologies
Software Fault Isolation (SFI)
• Goal and solution
• Software Fault Isolation (SFD is an alternative for unsafe languages, example C, where memory safety
is not granted but needs to be enforced at runtime by program instrumentatioon.
• SFI is a program transformation which confines a software component to a memory sandbox. This is
done by pre-fixing every memory access with a carefully designed code sequence which efficiently
ensures that the memory access occurs within the sandbox.
• SFI approach:
• Traditionally, the SFI transformation is performed at the binary level and is followed by an a
posteriori verification by a trusted SFI verifier.
• Because the verifier can assume that the code has undergone the SFI transformation, it can be kept
simple, thereby reducing both verification time and the Trusted Computing Base.
• This approach is a simple instance of Proof Carrying Code where the complier is untrusted and the
binary verifier is either trusted or verified.
• Traditional SFI is well suited for executing binary code from an untrusted origin.
VM Based Isolation
• A VM is an isolated environment with access to a subset of physical resources of
the computer system.
• Each VM appears to be running on the bare hardware, giving the appearance of
multiple instances of the same computer, though all are supported by a single
physical system.
• A process VM is a virtual platform created for an individual process and
destroyed once the process terminates.
• Virtually all operating systems provide a process VM for each one of the
applications running, but the more interesting process VMs are those which
support binaries compiled on a different instruction set.
• A system VM supports an OS together with many user processes. When the VM
runs under the control of a normal OS and provides a platform- independent
host for a single application we have an application VM, for example, Java
Virtual Machine (JVM).
• Made By : - AKTU WALA ( Satyam Sahu )
Secure Architecture Principles
Isolation And Leas
UNIT - 3
Made By :- AKTU WALA ( Satyam Sahu )
W(CC-Sem-3 & 4)
5-2
Internet Infrastructure
PART-1
Internet Infrastructure, Basic
5
UNIT
Internet Infrastructure
Questions-Answers
Long Answer Type and Medium Answer
Security Problems.
Type Questions
CONTENTS Answer
1. Internet infrastructure is the physical hardware, transmission
Part-1 : Internet Infrastructure, . . .
.5-2W to 5-4W
* * * * * * * * * * * * * * *
telephone wires.
3 Broadband ISDN (B-ISDN): transfers data
a. Broadband ISDN is similar in function to ISDN but it
over fiber optic telephone lines, not
normal telephone wires.
Networking) is the physical transport
b. SONET (Synchronous Optical
backbone of B-ISDN.
implemented.
C. Broadband ISDN has not been widely
to as an
DSL is frequently referred
Digital Subscriber Line (DSL): 2-wire copper telephone
uses existing
connection because it
always on" so service is delivered
simultaneously
une connected to the premise
with wired telephone service.
5-1 W(CCSem3 &4)
54 W(CCSem-3 &4)
5-3 W(CC-Sem-3 &4)
Computer System Security Internet Infrastructure
Tt also contains a
C. structure to
the advantages
and disadvantages of in TCPD
CPIP distant networks if required. facilitate the routing of
Que 52 Explain
Since most of the other 'TCP/IP datagrams to
victim's browser runs the seript it makes a new DNS request for the
Long Answer Type and Medium Answer Type Questions domain, and the attacker replies with a new IP address.
0 Por instance, they could reply with an internal IP address or the IP
address ofa target somewhere else on the Internet.
Que 5.7. What do you mean by DNS ? Explain DNS rebinding
attack. u e 5.9. Discuss the features of DNS rebinding attack.
Answer Answer
DNS: Refer Q. 4.38, Page 4-28W, Unit-4. Features of DNS rebinding attacks
DNS rebinding attack : address
the DNS name and IP
ustom DNS server that allows rebinding victim machine's address.
1. DNS rebinding is a form of computer attack. O the attacker's web to the target
server
users
2. In this 2.
pages and
JavaScript code to targeted
attack, malicious web
a TTTP server serves HTML
script that attacks machines page causes visitors to run a de
client-si and to
manage the attacks.
elsewhere on the network.
Computer System Security 5-9 WCC-Sem-3 &4) G-10 W(CC-Sem-3 &4)
Answer e Change: This process involves ending with the use of the key and
starting with the use of another key.
1. DNS rebinding attacks can be prevented by validating the Host HTTP
header on the server-side to only allow a set of whitelisted values. Control: This process refers to the ability to implement
influence over the content and use of the key.
adirecting
set of
2. For services listening on the loopback interface, this whitelisted
host values should only contain localhost and all reserved numeric
Que 5.12. What are the advantages and disadvantages of key
addresses for the loopback interface, including 127.0.0.1 1anagement protocol ?
3 For instance, let's say that a service is listening on address 127.0.0.1,
TCP port 3000. Then, the service should check that all HTTPrequest
Host header values strictly contain "127.0.0.1 :3000" and/or localhost :
Answer
3000". Advantages: stored.
4. If the host header contains anything else, then the request should be
In key management protocol, less than N - 1 keys are
2. It is scalable.
denied.
5. Depending on the application deployment model, we may have to Disadvantages: clearly define any process
and does not
whitelist other or additional addresses such as 127.0.0.2, another reserved 1 ttorlacks authentication process
8. Singularity can bypass some filters in certain conditions, sucn a 5. Fails to sati sty security
requirement
responding with a localhost record when targeting an application v the requirement accessibility.
Google Chrome browser
Computer System Security 5-11 W(CC-Sem-3 &4) 1 2 W(CC-Sem-3&4
Que 5.13. What are the security and operational requirements for IPSec tunnel mode, the
Internet Infrastructure
2.
In
original
Authentication Header (AH) or
IP
Datagram is encapsulated
key management protocol ?
Encapsulating Security
header and additional IP header
an with an
Protocol (ESP)
Answer 3.
Gtie
The traffich between the two VPN
us
(in aa new IP
datagram),Gateways
gateways (in
Security with appears to be from the
and operational requirements for key management
protocol: (in case of ESP)
inside IPSec the original IP datagramtwois
1. Confidentiality: Nodes should not reveal data to any
unintended
packet.
recipients.
2
PART-4
Integrity : Data should not be changed between transmissions due to Laver Connectivily and TCPIIP
Firewall, Intrusion Connectivity,
environment or malicious activity.
3 Data freshness : Old data should not be useu as
Detection. Packet Filtering
new
4. Authentication : Data used in decision making process should originate
from correct source.
5. Robustness : When some nodes are
Questions-Answers
compromised, the entire network Long Answer 1ype and Medium Answer
should not be compromised. Type Questions
6. Self-organization: Nodes should be flexible
enough to be self
organizing (autonomous) and self-healing (failure tolerant).
Que 5.15. Discuss link layer connection in TCP/IP model.
7 Availability : Network should not fail frequently.
8 Time
synchronization:Protocols should not be manipulated to produce
incorrect data.
Answer
1. The link layer in the TCP/IP model is
9. Secure localization:Nodes should be able to
a
descriptive field
networking
accurately and securely protocols that operate only on the local network segment (link) thata
acquire location information. host is connected to. Such protocol packets are not routed w other
10. Accessibility: Intermediate nodes should be able to
networks.
perform data
aggregation by combining data from different nodes. 2. The link layer includes the protocols that define comnunication between
local (on-link) network nodes which fulfill the purpose of maintaining
Que 5.14. Write a short note on VPN and tunnel mode. link states between the local nodes, such as the local network
upolug
and that usually use protocols that are based on the framing of packets
Answer specific to the link ty pes.
3. The
Virtual Private Network (VPN)D core protocols specified by the Internet Engineering Task Porce
(ARP), the
1. A Virtual Private Network
(VPN) is ETF) in this layer are the Address Resolution Protocol
a
technology that creates a safe and everse Address Resolution Protocol (RARP), and the Neighbour
encrypted connection over a less network, such as the internet.
secure
2. It is
Discovery Protocol (NDP).
a
way to extend a private network the
using a public network such as T h e ink layer of the TCP/IP model is often compared direcetly with
internet. the pen
COmbination of the data link layer and the physical layer in
3. The name only stack. Although they are
suggests that it is Virtual private network i.e., user can ystems Interconnection (OSI) protocol are
be the part of local of prools, they
network sitting at a remote location. to some degree in technical coverage
4. gruent
makes use
It of tunneling not identical.
protocols to establish a secure connection. 5. should be avoided,
iecause the
Tunnel mode: strict comparisons is
e r a , direct or criterion and in general
1. In IPSec tunnel principal design
g in TCP/IP is
not a
mode, the original IP
payload) is encapsulated within anotherpacket (IP header and the Data Considered to be harmful
packet. firewal.
e 5.16. Write short note on
CC-Sem-3 &4)
-14
Computer System Security 5-13 W (CC-Sem-3
&4) ateless in Internet Infrastructure
Being nature, they are not
cols. well suited to
Answer application layer
ayer
1. A single choke point that keeps unauthorized
Que
18. Write short note on telnet.
firewall defines
out of the
a
rs
protected network, prohibits potentially vulnerable servica
from entering or the network, and provides
leaving Answer
protection from
various kinds of IP spoofing and routing attacks.
Telnet is a user
ommand and an
2. The use of a single choke point simplifies security management because accessing remote computers. underlying TCP/IP protocol fo
security capabilities are consolidated on a single system or set of systems ough Telnet, an
3. A firewall provides a location for . ministrator or another user can
monitoring
Audits and alarms can be implemented on thesecurity-related events. else's computer remotely. access someone
firewall system.
4. A firewall is a convenient 3. With Telnet, we log on a
as regular user with whatever
platform for several Internet functions that may have been granted
are not security related. These include a
network address
to the
specific application and privileges we
data on that
translator. computer.
which maps local addresses to Internet
addresses, and a network At the Telnet client, a character that is
management function that audits or logs Internet usage. typed on the keyboard is not
5. A firewall can serve as the
platform for IPSec. Using the tunnel
displayed on the monitor, but, instead, is encoded
and transmitted to a remote Telnet server. as an ASCI character
capability, the firewall can be used to implement virtual mode
networks. private . At the server, the ASCII character is
interpreted as if a user had typed
the character on the keyboard of the remote
machine.
Que 5.17, What is packet filtering firewall ? Explain its results in any output, this output is encoded as (ASCII) If the keystroke
text and sent to
and disadvantage.
advantage the Telnet client, which displays it on its
monitor.
6. The output can be just the (echo
Answer of the) typed character or it can be the
output of a command that was executed at the remote Telnet server.
Packet filtering firewall:
Packet filtering firewall is a Que 5.19. Explain briefly fragmentation at network layer.
technique used to control network access by
monitoring outgoing and incoming packets.
2. Answer
Packet filtering firewall allows
packet to pass or halt based on the source
and destination Internet Protocol
(IP) address, protocols and ports. Lragmentation
is
is done bythe network layer when the maximum size of
than maximum size of data that be held frame
Advantages: datagram greater
L.e., it's Maximum Transmission Unit (MTU).
can a
1 They are
simple, since a single rule is
allow or deny the packet.
enough to indicate whether to 2The network layer divides the datagram received from transport layer
into fragmentsso that data flow is not disrupted.
2. They transparent to the users i.e., the users need not know
are
the 3, tis done by network layer at the destination side and is usually done at
existence of packet filters.
3.
routers.
They operate at a fast speed as
compared to other techniques. Source side does not require fragmentation due to segmentaton
4 The client
computers need not at datagram data limit and
be
implementing packet-filtering firewalls. configured specially while ransport layer i.e., the transport layer looks that
rame data limit and does segmentation in such way
a resulting
5. They protecet the IP addresses of ata can easily fit ina frame without the need of fragmentation.
internal hosts from the outside
Disadvantages: network with the identification (16
bits) field in IP
celver identifies the frameframe has same identification
number.
1 They are unable to inspect the der. Each fragment of a offset
thus, cannot restrict access to application layer data in the packets a d Receiver identifies of frames using
the fragment
2. It is
FTP services.
(13 bits) field in IP
sequence
i
difficult task to set up the
a
header header introduced
3. They lack support for packet-filtering rules correctly An overhead at networklayer is present due
to extra
authentication and have alert due
no
mechanisms due to fragmentation.
5-15 W (CC-Sem-3 5-16 W(CC-Sem-3 &4)
Computer System Security
&4)
Internet Infrastructure
9ue5.20. Write short note on proxy firewall. Answer
bytwo ways:
evaluated over some time category, the behaviour of
2. The enhanced security of a proxy firewall is because interval. It can be
do not pass through a proxy. Instead the
information packets a. Threshold detection: achieved
proxy acts as an intermediary
computers make a connection to the prOxy which then initiates a
neu
L In
threshold detection, thresholds
network connection based on the request. group, and the total are defined for all
numbers of events
3. This prevents direct connections and packet transfer the user are measured that are users as a
sides of the firewall, which makes it harder for
between either against these threshold attributed to
intruders to discoverT i. The number of events is values.
where the location of the network is from
packet is most ikely to assumed to round upto a number
information. occur, and if
4. Afirewall proxy provides internet access to
computers on a network number, then intrusion is said tothe event count exceeds that
this
is mostly deployed to but have occurred.
provide safety or security by controlling the b. Profile-based detection:
information going in and out of the network.
5. Firewall proxy servers filter, cache, log, and control
In profile-based detection,
and then matched with profiles for all users are created,
from a client to keep the network secure and requests coming available statistical data to find
free of intruders any unwanted action
viruses. and has been out if
A user profile
performed.
contains several
Que 5.21.Write short note on intrusion detection. in a single parameters. Therefore, change
parameter is not a sign of alert.
2 Rule-based detection: In this category, certain rules are
Answer the actions performed by the users. It is applied on
classified into two types
1.
Intrusion detection refers to the a. Anomaly-based detection
process of identifying attempts to
penetrate a system and gain unauthorized access. i In anomaly-based detection, the
2. An intrusion detection usage patterns of users are
system is a collected, and certain rules are applied to check any deviation
unwanted attempts at accessing ofsoftware/hardware designed to detect from the previous usage
target application or system. patterns.
3. If an intrusion is detected
and ejected from the
quickly enough, the intruder can be identified . The collected patterns are defined by the set of rules that
system before any damage is done or any data are includes past behaviour patterns of users, programs, privileges,
compromised. time-slots, terminals, ete.
4 Even if the detection is not
sooner that the intrusion is
sufficiently time to
preempt the intruder, the i. The current behaviour patterns of the user are matched with
more quickly
detected, the less the amount of damage and the defined set of rules to check whether there is any deviation
recovery can be achieved. in the patterns.
. An effective
intrusion detection system can serve as a . Penetration identification:
intrusions. barrier to
maintained
6. Intrusion detection enables the In penetration identification, an expert system is
collection of information about intrusion that looks for any unwanted attempts.
techniques that
can be used to
used to identify the
facility strengthen the intrusion prevention This system also contains rules
that are
known
that can exploit
Suspicious behaviour and penetrations
ae 5.29 Briefly describe weaknesses.
approaches for intrusion detection.
domain name system and explain what is DNS
W h a t is
cache poisoning? AKTU 2019-20, Marks10
5-17 W(cC-Sem-3 &41
Computer System Security
Answer
Domain name system: and decentralizod
is a hierarchical
Domain Name System (DNS) resources connectel
1. The services, or
other d
computers,
naming system for network.
to the Internet or a private
names assigned to each
information with domain
2. It associates various
entities.
of the participating of websites with their
resolves the names
5 UNIT
Internet Infrastructure
(2 Marks Questions)