TE IT Week2 FCSDF L4-L6
TE IT Week2 FCSDF L4-L6
Module: 1 & 2
2
Module 1:
Lecture 4: A Comprehensive IT
Security Policy
A Comprehensive IT Security Policy
• To ensure that you are effectively protecting your data, you need something
that works to prevent breaches, detect potential threats, analyze suspicious
activity, and provide remediation in the event that something does occur.
• E-Mail Policy: Email security may be a term for describing different procedures
and techniques for shielding email accounts, content, and communication
against unauthorized access, loss, or compromise. Email is usually wont to
spread malware, spam, and phishing attacks.
• Security Incident Management Policy: This policy defines the need for
reporting and responding to incidents associated with the company’s
information systems and operations.
• Web Policy: The reason for this policy is to set up the guidelines for the
utilization of the organization’s Internet for access to the Internet or the
Intranet.
• Network Security And VPN Acceptable Use Policy: The purpose of this policy
is to define standards for connecting to the company’s network from any host.
• Password Policy: The purpose of this policy is to determine a typical for the
creation of strong passwords, the protection of these passwords, and therefore
the frequency of change password must be followed.
• Cloud Computing Adoption: The purpose of this policy is to make sure that the
corporate can potentially make appropriate cloud adoption decisions and at an
equivalent time doesn’t use, or allow the utilization of, inappropriate cloud
service practices.
• Server Security Policy: The purpose of this policy is to define standards and
restrictions for the bottom configuration of internal server equipment owned
and/or operated by or on the company’s internal network(s) or related
technology resources via any channel.
• Systems Monitoring And Auditing Policy: System monitoring and auditing are
employed to work out if inappropriate actions have occurred within a data
system. System monitoring is employed to seem for these actions in real-time
while system auditing looks for them after the very fact.
Lecture 5: Introduction to
Cryptography
CLASSICAL ENCRYPTION TECHNIQUES
Lecture 5: CLASSICAL
12
ENCRYPTION TECHNIQUES
SYMMETRIC CIPHER MODEL
Caesar Cipher:
•Earliest known substitution cipher
•Invented by Julius Caesar
•Each letter is replaced by the letter three positions further down the alphabet.
• Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z
• Cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
•Example: ohio state RKLR VWDWH
19 Lecture 5- Monoalphabetic
Polyalphabetic Substitution Ciphers
•A sequence of monoalphabetic ciphers (M1, M2, M3, ..., Mk) is used in turn to encrypt
letters.
•A key determines which sequence of ciphers to use.
•Each plaintext letter has multiple corresponding ciphertext letters.
•This makes cryptanalysis harder since the letter frequency distribution will be
flatter.
•Not even the large number of keys in a monoalphabetic cipher provides security.
•
Where,
25 Lecture 6- Cryptanalysis
CRYPTANALYTIC ATTACKS
26 Lecture 6- Cryptanalysis
Ciphertext-only attack
Given: a ciphertext c
Q: what is the plaintext m?
An encryption scheme is completely insecure if it cannot resist ciphertext-only
attacks.
27 Lecture 6- Cryptanalysis
Known-plaintext attack
28 Lecture 6- Cryptanalysis
Chosen-plaintext attack
Given: (m1,c1), (m2,c2), …, (mk,ck), where m1, m2, …, mk are chosen by the adversary;
and a new ciphertext c.
29 Lecture 6- Cryptanalysis
Chosen-ciphertext attack
Given: (m1,c1), (m2,c2), …, (mk,ck), where c1, c2, …, ck are chosen by the adversary; and
a new ciphertext c.
30 Lecture 6- Cryptanalysis
Chosen-ciphertext attack
31 Lecture 6- Cryptanalysis
Modern Block Ciphers
•n sequential rounds
•A substitution on the left half Li
•1. Apply a round function F to the right half Ri and
•2. Take XOR of the output of (1) and Li
•The round function is parameterized by the subkey Ki
•Ki are derived from the overall key K
•Block size
•Increasing size improves security, but slows cipher
•Key size
•Increasing size improves security, makes exhaustive key searching
harder, but may slow cipher
•Number of rounds
•Increasing number improves security, but slows cipher
•Subkey generation
•Greater complexity can make analysis harder, but slows cipher
•Round function
•Greater complexity can make analysis harder, but slows cipher
•Fast software en/decryption & ease of analysis
•Are more recent concerns for practical use and testing