STMIK Pontianak
1.    Cybersecurity Introduction and
      Overview
                                                 Encryption Fundamentals,
2.    Cybersecurity Roles
3.    Cybersecurity Controls
4.    Security Architecture Principles
5.    Encryption Fundamentals, Techniques
                                                 Techniques and Applications
      and Applications
6.    Security of Networks, Systems,
      Applications and Data
7.    Network Security
8.    Intrusion Detection and Prevention
9.    Incident Response
10.   Forensics
11.   Preparing for the Inevitable Incident
12.   Incident Detection and
      Characterization
13.   Security Implications and Adoption of
      Evolving Technology
14.   Mobile Technology – Vulnerabilities,
      Threats an Risk
                                              Copyright © 2015 ISACA . All rights reserved.   1
  Section 3: Security Architecture Principles
                                  Encryption Fundamentals
                                  • Encryption is the process of converting a plaintext
                                    message into a secure-coded form of text, called
                                    ciphertext.
                                  • The ciphertext cannot be understood without
                                    converting back, via decryption—the reverse process
                                    —to plaintext.
                                  • This is done via a mathematical function and a special
                                    encryption/decryption password called the key.
                                  • In many countries, encryption is subject to
                                    governmental laws and regulations that limit the key
                                    size or define what may not be encrypted.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.     2
  Section 3: Security Architecture Principles
                                  Encryption Fundamentals
                                  • Encryption is part of a broader science of secret
                                    languages called cryptography, which is generally
                                    used to:
                                      • Protect information stored on computers from
                                        unauthorized viewing and manipulation
                                      • Protect data in transit over networks from
                                        unauthorized interception and manipulation
                                      • Deter and detect accidental or intentional
                                        alterations of data
                                      • Verify authenticity of a transaction or document
                                  • Encryption is limited in that it cannot prevent the loss of
                                    data.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.          3
  Section 3: Security Architecture Principles
                                  Key Elements of Cryptographic Systems
                                  • Key elements of cryptographic systems include:
                                     • Encryption algorithm—Mathematically based
                                       function or calculation that encrypts or decrypts
                                       data.
                                     • Encryption key—Piece of information similar to a
                                       password that makes the encryption or decryption
                                       process unique. A user needs the correct key to
                                       access or decipher a message, as the wrong key
                                       converts the message into an unreadable form.
                                     • Key length—Predetermined length for the key. The
                                       longer the key, the more difficult it is to
                                       compromise in a brute force attack where all
                                       possible key combinations are tried.
Lecture: Dr. Gat, S.Kom., M.Kom           Copyright © 2015 ISACA . All rights reserved.    4
  Section 3: Security Architecture Principles
                                  Key Elements of Cryptographic Systems
                                  • Effective cryptographic systems depend upon a variety
                                    of factors including:
                                      • Algorithm strength
                                      • Secrecy and difficulty of compromising a key
                                      • Nonexistence of back doors by which an encrypted
                                         file can be decrypted without knowing the key
                                      • Inability to decrypt parts of a ciphertext message
                                         and prevent known plaintext attacks
                                      • Properties of the plaintext known by a perpetrator
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.     5
  Section 3: Security Architecture Principles
                                  Key Systems
                                  • There are two types of cryptographic systems:
                                      • Symmetric Key Systems—These use single,
                                        secret, bidirectional keys that encrypt and decrypt.
                                      • Asymmetric Key Systems—These use pairs of
                                        unidirectional, complementary keys that only
                                        encrypt or decrypt. Typically, one of these keys is
                                        secret, and the other is publicly known.
                                  • Public key systems are asymmetric cryptographic
                                    systems.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.       6
  Section 3: Security Architecture Principles
                                  Encryption Techniques
                                  • Symmetric (Private) Key Encryption
                                  • There are two main advantages to symmetric key
                                    cryptosystems such as DES or AES:
                                      • The user only has to remember/know one key for
                                        both encryption and decryption.
                                      • Symmetric key cryptosystems are generally less
                                        complicated and, therefore, use up less processing
                                        power than asymmetric techniques. They are
                                        ideally suited for bulk data encryption.
                                  • The disadvantages of this approach include:
                                      • Difficulty distributing keys
                                      • Limitations of shared secret
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.     7
  Section 3: Security Architecture Principles
                                  Encryption Techniques
                                  • Asymmetric (Private) Key Encryption
                                     • The key that was used to encrypt the data cannot
                                       be used to decrypt it. Thus, the keys are
                                       asymmetric in that they are inversely related to
                                       each other.
                                     • Asymmetric keys are often used for short
                                       messages such as encrypting DES symmetric
                                       keys or creating digital signatures.
                                     • In theory, a message that has been encrypted
                                       twice, first by the sender’s secret key, and second
                                       by the receiver’s public key, achieves both
                                       authentication and confidentiality objectives, but it
                                       is not commonly used because it could generate
                                       performance issues.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.       8
  Section 3: Security Architecture Principles
                                  Elliptical Curve Cryptography
                                  • Although public key cryptography ensures message
                                    security, the long keys and mathematical problems it
                                    uses tend to be inefficient.
                                  • It is believed that ECC demands less computational
                                    power and therefore offers more security per bit.
                                  • ECC works well on networked computers requiring
                                    strong cryptography.
                                  • However, it has some limitations such as bandwidth
                                    and processing power.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.   9
  Section 3: Security Architecture Principles
                                  Quantum Cryptography
                                  • Quantum cryptography is the next generation of
                                    cryptography that may solve some of the existing
                                    problems associated with current cryptographic
                                    systems, specifically the random generation and
                                    secure distribution of symmetric cryptographic keys.
                                  • t is based on a practical application of the
                                    characteristics of the smallest “grains” of light
                                    (photons) and the physical laws governing their
                                    generation, propagation and detection.
                                  • Initial commercial usage has already started now that
                                    the laboratory research phase has been completed.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.    10
  Section 3: Security Architecture Principles
                                  Advanced Encryption Standard
                                  • AES has replaced the DES as the cryptographic
                                    algorithm standard.
                                  • Rijndael is a symmetric block cipher with variable block
                                    and key length.
                                  • For AES the block length was fixed to 128 bits, and
                                    three different key sizes (128, 192 and 256 bits) were
                                    specified.
                                  • Each round has a 128-bit round key and the result of
                                    the previous round as input.
                                  • Decryption is computed by applying inverse functions
                                    of the round operations.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.       11
  Section 3: Security Architecture Principles
                                  Digital Signature
                                  • A digital signature is an electronic identification of a
                                    person or entity created by using a public key
                                    algorithm.
                                  • To verify the integrity of the data, a cryptographic
                                    hashing algorithm, called a checksum, is computed
                                    against the entire message or electronic document,
                                    which generates a small fixed string message, usually
                                    about 128 bits in length.
                                  • This process, also referred to as a digital signature
                                    algorithm, creates a message digest (i.e., smaller
                                    extrapolated version of the original message).
Lecture: Dr. Gat, S.Kom., M.Kom             Copyright © 2015 ISACA . All rights reserved.      12
  Section 3: Security Architecture Principles
                                  Digital Signature
                                  • Digital signature is a cryptographic method that
                                    ensures:
                                      • Data integrity—Any change to the plaintext
                                        message would result in the recipient failing to
                                        compute the same message hash.
                                      • Authentication—The recipient can ensure that the
                                        message has been sent by the claimed sender
                                        since only the claimed sender has the secret key.
                                      • Nonrepudiation—The claimed sender cannot later
                                        deny generating and sending the message.
                                  • Digital signatures and public key encryption are
                                    vulnerable to man-in-the-middle attacks wherein the
                                    sender’s digital signature private key and public key
                                    may be faked.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.    13
  Section 3: Security Architecture Principles
                                  Virtual Private Network
                                  • A VPN is an example of applied cryptography that
                                    typically exchanges secure data over the Internet.
                                  • Encryption is needed to make the connection virtually
                                    private.
                                  • A popular VPN technology is IPSec, which commonly
                                    uses the DES, Triple DES or AES encryption
                                    algorithms.
                                  • DES uses 56-bit keys, and Triple DES applies the key
                                    three times to achieve an effective key length of 168
                                    bits.
                                  • AES is a new standard adopted in 2001 that uses keys
                                    that can be 128, 192 or 256 bits long and a block size
                                    of 128 bits (vs. 64-bit blocks used in DES).
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.     14
  Section 3: Security Architecture Principles
                                  Wireless Network Protections
                                  • Wireless data transmission is subject to a higher risk of
                                    interception than wired traffic.
                                  • There is no need to manually tap into the connection,
                                    but rather remote tools can be used to intercept the
                                    connection covertly.
                                  • Here are some examples:
                                     • Email can be intercepted and read or changed.
                                     • Hackers can replace a user’s credential with false
                                       information that leads to the destination server
                                       rejecting the user’s access attempts, thereby
                                       causing denial-of-service (DoS).
                                     • An unauthorized person can log on to a wireless
                                       network that is not secure and use its resources,
                                       including free connectivity to the Internet.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.        15
  Section 3: Security Architecture Principles
                                  Stored Data
                                  • Encryption is an effective and increasingly practical
                                    way to restrict access to confidential information while
                                    in storage.
                                  • Encryption can fill the security gap, and it can also
                                    protect data from hackers who, by means of malicious
                                    software, can obtain systems administration rights.
                                  • Encryption also helps to protect data when a computer
                                    or a disk falls into the wrong hands.
                                  • Many email encryption programs can also be applied
                                    to stored data. There are also some encryption
                                    products that focus on file protection for computers
                                    and PDAs.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.       16
  Section 3: Security Architecture Principles
                                  Public Key Infrastructure
                                  • Key elements of the infrastructure are as follows:
                                     • Digital certificates: digital credential is composed
                                       of a public key and identifying information about
                                       the owner of the public key.
                                     • Certificate authority : A certificate authority (CA) is
                                       an authority in a network that issues and manages
                                       security
                                     • credentials and public keys for message signature
                                       verification or encryption
                                     • Registration authority: An RA is an authority in a
                                       network that verifies user requests for a digital
                                       certificate and tells the CA to issue it.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.         17
  Section 3: Security Architecture Principles
                                  Encryption Applications
                                  • The use of cryptosystems by applications, for example
                                    in email and Internet transactions, generally involves a
                                    combination of private/public key pairs, secret keys,
                                    hash functions and digital certificates.
                                  • The purpose of applying these combinations is to
                                    achieve confidentiality, message integrity or
                                    nonrepudiation by either the sender or recipient.
                                  • Using his/her secret key, the sender then will encrypt
                                    the message.
                                  • Secure Sockets Layer (SSL) and Transport Layer
                                    Security (TLS)—These are cryptographic protocols
                                    that provide secure communications on the Internet
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.       18
  Section 3: Security Architecture Principles
                                  Encryption Risk and Key Protection
                                  • The security of encryption methods relies mainly on
                                    the secrecy of keys. In general, the more a key is
                                    used, the more vulnerable it will be to compromise.
                                  • The randomness of key generation is also a significant
                                    factor in the ability to compromise a key.
                                  • When encrypting keys based on passwords, a
                                    password that lacks randomness will diminish a 128-bit
                                    encryption algorithm’s capabilities.
                                  • Therefore, it is essential that effective password syntax
                                    rules are applied and easily guessed passwords are
                                    prohibited.
Lecture: Dr. Gat, S.Kom., M.Kom            Copyright © 2015 ISACA . All rights reserved.        19
  Section 3: Security Architecture Principles
                                  Lecture 5
Lecture: Dr. Gat, S.Kom., M.Kom         Copyright © 2015 ISACA . All rights reserved.   20