Nis Unit 1 PDF
Nis Unit 1 PDF
    1. Confidentiality:
      Definition: Ensuring that sensitive information is only accessible to
    authorized individuals or systems.
      Methods: Encryption, access controls, and secure communication protocols.
    2. Integrity:
      Definition: Protecting data from unauthorized modification or tampering.
      Methods: Hash functions, digital signatures, and integrity checks.
    3. Availability:
      Definition: Ensuring that computer systems and resources are available and
    accessible when needed.
      Methods: Redundancy, fault tolerance, and disaster recovery planning.
    4. Authentication:
      Definition: Verifying the identity of users or systems attempting to access
      resources.
      Methods: Passwords, multi-factor authentication, biometrics, and digital
      certificates.
    5. Authorization:
      Definition: Granting or restricting access rights based on authenticated
      identities.
      Methods: Access control lists, role-based access control, and least privilege
      principles.
• Security Basics:
    In computer security, security basics refer to fundamental principles and concepts that
    form the foundation for safeguarding computer systems, networks, and data. These basics
    provide a framework for designing, implementing, and managing effective security
    measures.
    1. Confidentiality:
    The assurance that information is only accessible to authorized individuals, preventing
    unauthorized disclosure.
    Methods: Encryption, access controls, and secure communication protocols.
    2. Integrity:
    Ensures that data remains accurate and unaltered during storage, transmission, or
    processing.
    Methods: Hash functions, digital signatures, and integrity checks help detect and prevent
    unauthorized changes.
    3. Availability:
    Ensures that computer systems and resources are accessible and operational when needed.
    Methods: Redundancy, fault tolerance, and disaster recovery planning minimize
    downtime and ensure continuous service.
    4. Accountability:
    Establishes responsibility for actions and ensures that individuals are traceable for their
    activities.
    Methods: User authentication, audit trails, and logging mechanisms help track and
    attribute actions to specific users.
    5. Non-Repudiation:
    Prevents individuals from denying their involvement in a transaction or action.
    Methods: Digital signatures and cryptographic techniques provide evidence that a specific
    user performed a particular action.
    6. Reliability:
    Ensures consistent and dependable operation of computer systems and processes.
    Methods: Redundancy, error-checking mechanisms, and regular maintenance contribute
    to system reliability.
• The risk and threat analysis process typically involves the following steps:
   Identification: Identify and classify assets, vulnerabilities, and potential threats.
   Assessment: Evaluate the likelihood and impact of threats exploiting vulnerabilities to
   determine the level of risk.
   Monitoring: Continuously monitor the security posture, update risk assessments, and
   adjust countermeasures as needed.
   •   The payload is executed, and the malicious intent of the virus is carried out.
   •   Common payloads: data theft, file deletion, system corruption, backdoor creation, DDoS,
       ransomware encryption, etc.
   •   This is the phase where damage occurs.
   3. Macro Viruses:
     - Macro viruses infect applications that use macros, such as Microsoft Word
   or Excel. They attach themselves to documents and spreadsheets and can be
   spread through email attachments.
   4. Polymorphic Viruses:
     - These viruses change their code or appearance each time they infect a new
   file or system. This makes them more challenging to detect by antivirus
   programs.
   5. Metamorphic Viruses:
     - Similar to polymorphic viruses, metamorphic viruses go a step further by
   completely rewriting their own code. This makes them even more resistant to
   detection.
   6. Resident Viruses:
     - Resident viruses embed themselves in the computer's memory and can infect
   files as the computer runs. They are harder to detect because they stay active
   in the background.
    7. Non-Resident Viruses:
     - Unlike resident viruses, non-resident viruses do not stay in the computer's memory.
   Instead, they infect files and then leave the memory.
   • Trojan Horse:
    The name of the Trojan Horse is taken from a classical story of the Trojan War. It is a code
    that is malicious in nature and has the capacity to take control of the computer. It is designed
    to steal, damage, or do some harmful actions on the computer. It tries to deceive the user to
    load and execute the files on the device. After it executes, this allows cybercriminals to
    perform many actions on the user’s computer like deleting data from files, modifying data
    from files, and more.
    Types: Backdoor Trojan, Ransom Trojan, Trojan Banker, Trojan Downloader…etc.
   • Intruders:
     Intruders are the attackers who attempt to breach the security of a network. They attack
     the network in order to get unauthorized access. Intruders are of three types, namely,
     masquerader, misfeasor and clandestine user.
    Misfeasor: Legitimate user who makes unauthorized accesses or misuses his privileges
    (inside)
    Clandestine user: Seizes supervisory control to evade auditing and access controls or
    suppress audit collection (inside / outside)
    Insiders:
    Insiders in network and information security are individuals with legitimate access to
    systems or data, such as employees. They pose a security risk as they may intentionally or
    unintentionally misuse their privileges, potentially causing harm.
           • Passive Attacks:
     Passive attacks are characterized by the unauthorized monitoring and interception of data
     without altering the original information. The goal of passive attacks is typically to gain
     information without being detected. Here are some common types of passive attacks:
     There are different variations of DoS attacks, and they can be categorized based on
     various characteristics. Here's an in-depth explanation of Denial of Service attacks:
   b. Amplification:
   Exploits amplification mechanisms in protocols to magnify the impact of an attack with
   minimal effort.
   Example: DNS amplification and NTP amplification attacks.
   c. Exploiting Vulnerabilities:
   Takes advantage of weaknesses in network protocols, operating systems, or
   applications to disrupt services.
   Example: Exploiting vulnerabilities in network devices or servers.
   4. Preventive Measures:
   a. Regular Security Audits:
   Conduct regular audits to identify and address vulnerabilities in the network.
   b. Network Redundancy:
   Implement redundant network paths and services to ensure continuity in the event of an
   attack.
       2. Amplification Techniques:
       DDoS attackers often use amplification techniques to increase the volume of malicious
       traffic, making the attack more potent.
       Example: DNS amplification, where small DNS queries result in larger responses, thus
       amplifying the amount of traffic sent to the target.
       2. Protocol Attacks:
       Exploits vulnerabilities in network protocols to consume server resources or disrupt
       communication.
       Example: SYN/ACK flood, Ping of Death, and fragmented packet attacks.
                  DoS                                             DDoS
 DoS Stands for Denial of service attack.      DDoS Stands for Distributed Denial of
                                               service attack.
 In Dos attack single system targets the       In DDoS multiple systems attack the
 victim system.                                victim’s system.
 Victim’s PC is loaded from the packet of      Victim PC is loaded from the packet of data
 data sent from a single location.             sent from Multiple locations.
 Dos attack is slower as compared to           A DDoS attack is faster than Dos Attack.
 DDoS.
 Can be blocked easily as only one system      It is difficult to block this attack as multiple
 is used.                                      devices are sending packets and attacking
                                               from multiple locations.
 In DOS Attack only a single device is         In a DDoS attack, The volumeBots are used
 used with DOS Attack tools.                   to attack at the same time.
 DOS Attacks are Easy to trace.                DDOS Attacks are Difficult to trace.
 Types of DOS Attacks are:                     Types of DDOS Attacks are:
 1. Buffer overflow attacks                    Volumetric Attacks
  2. Ping of Death or ICMP flood               Fragmentation Attacks
 3. Teardrop Attack                            Application Layer Attacks
 4. Flooding Attack                            Protocol Attack.
   Backdoors:
   A backdoor is a secret or hidden method of bypassing normal authentication or encryption
   to gain unauthorized access to a system. Backdoors can be intentionally created by software
   developers for legitimate reasons, such as providing remote access for system maintenance
   or troubleshooting. However, they become security risks when discovered or exploited by
   malicious actors. Here are key aspects of backdoors:
   1. Intentional Backdoors:
   Developers may create intentional backdoors during the development process for
   debugging, maintenance, or administrative purposes.
   Risk: If these intentional backdoors are not properly secured or if their existence is not
   documented, they can become potential entry points for attackers.
   2. Malicious Backdoors:
   Backdoors can also be introduced maliciously by attackers to provide unauthorized access
   to a system, often after compromising it through vulnerabilities or exploiting weak security
   measures.
   Risk: Malicious backdoors can be used by attackers to maintain persistent access to a
   system, exfiltrate data, or launch further attacks.
      Prevention: Regular security updates, access controls, and encryption help prevent the
      installation and exploitation of backdoors. Employing intrusion detection and prevention
      systems can also aid in detecting suspicious activities.
      Trapdoors:
      A trapdoor, in the context of security, is a hidden entry point into a system that is
      intentionally inserted for authorized access. Unlike a backdoor, a trapdoor is typically
      known to a limited group of individuals, such as system administrators or developers, and
      is intended for specific, legitimate purposes. Here are key aspects of trapdoors:
      1. Intentional Design:
      Trapdoors are intentionally designed and implemented by system developers for specific,
      authorized access purposes.
      Examples: A software developer might include a trapdoor to allow access for
      troubleshooting or debugging without requiring full authentication.
      2. Limited Access:
      Trapdoors are meant for authorized personnel and are not intended for general or malicious
      use.
      Risk: If knowledge of a trapdoor falls into the wrong hands, it can be exploited for
      unauthorized access, turning it into a potential security threat.
4 Sniffing:
     In the context of network and information security, "sniffing" refers to the unauthorized
     interception and monitoring of network traffic, with the goal of capturing and analyzing
     data as it passes through the network. Sniffing can be a significant security threat because
     it allows attackers to gather sensitive information, such as usernames, passwords, and other
     confidential data, by eavesdropping on the communication between devices.
Here are the key aspects of sniffing in network and information security:
      1. Packet Sniffing:
      Sniffers are tools or devices that capture and analyze packets of data as they travel over a
      network. Packet sniffing can be performed using hardware or software-based solutions.
      Goals: Attackers use packet sniffing to extract sensitive information, gain insights into
      network behavior, or identify vulnerabilities.
      2. Methods of Sniffing:
      Passive Sniffing:
      The sniffer passively captures and analyzes data without actively sending any packets on
      the network.
      Example: Monitoring network traffic using tools like Wireshark without actively injecting
      new packets.
      Active Sniffing:
      The sniffer actively injects packets into the network to gain additional information or
      manipulate ongoing communication.
      Example: Address Resolution Protocol (ARP) spoofing to redirect traffic through the
      attacker's system.
5 Spoofing:
     Spoofing in network and information security refers to the act of falsifying information to
     deceive systems, devices, or users. This manipulation often involves creating fake identities
     or altering data to appear legitimate, with the goal of gaining unauthorized access,
     bypassing security measures, or conducting fraudulent activities. Spoofing attacks can
     target various layers of the network, from the physical layer to the application layer.
     Here are some common types of spoofing attacks:
      1. IP Spoofing:
      IP spoofing involves manipulating the source address in the header of an IP packet to make
      it appear as if it comes from a trusted source.
      Goals: Attackers use IP spoofing to bypass access controls, launch DoS attacks, or conduct
   2. Email Spoofing:
   Email spoofing involves forging the sender's address in an email to make it appear as if it
   comes from a trustworthy source.
   Goals: Attackers may use email spoofing for phishing attacks, spreading malware, or
   tricking recipients into divulging sensitive information.
   3. DNS Spoofing:
   DNS spoofing (or DNS cache poisoning) involves corrupting or injecting false DNS data
   into the cache of a DNS resolver.
   Goals: Attackers can redirect users to malicious websites, intercept communication, or
   conduct man-in-the-middle attacks.
   5. Caller ID Spoofing:
   Caller ID spoofing involves falsifying the information displayed on a recipient's caller ID
   display.
   Goals: Often used in voice phishing (vishing) attacks, where attackers pretend to be
   someone else to trick individuals into revealing sensitive information.
      7. SMS Spoofing:
      SMS spoofing involves falsifying the sender's information in a text message to appear as if
      it comes from a different source.
      Goals: Attackers may use SMS spoofing for social engineering, spreading malware via
      links, or conducting phishing attacks.
Mitigation Strategies:
      1. Use of Encryption:
      Encrypting communication channels helps protect against data interception and man-in-
      the-middle attacks, making it harder for attackers to spoof data.
      2. Authentication Mechanisms:
      Implement strong authentication methods, such as two-factor authentication (2FA), to
      verify the identity of users and devices.
   3. Data Tampering:
   In some MitM attacks, the attacker may modify the data being transmitted between the
   parties.
   Goals: Data tampering can lead to the manipulation of information, potentially causing
   harm or facilitating fraudulent activities.
   2. DNS Spoofing:
   The attacker manipulates the DNS (Domain Name System) responses to redirect users to
   malicious websites by providing false IP address mappings.
   Goals: Redirects users to phishing sites or malicious servers controlled by the attacker.
   3. SSL Stripping:
   The attacker downgrades a secure HTTPS connection to an unsecured HTTP connection,
   allowing them to intercept and view the unencrypted traffic.
   Goals: Enables the interception of sensitive data, such as login credentials.
   4. Session Hijacking:
   The attacker steals or hijacks an established session between two parties, gaining
   unauthorized access.
   Goals: Allows the attacker to impersonate a legitimate user and perform actions on their
   behalf.
7 Replay:
    A replay attack is a type of cyber attack in network and information security where an
    attacker intercepts and maliciously retransmits data that was previously captured during a
    legitimate communication session. The term "replay" indicates that the attacker replays the
    intercepted data to gain unauthorized access or achieve some malicious objective. Replay
    attacks can occur in various contexts, including network protocols, authentication systems,
    and cryptographic protocols. The primary goal of a replay attack is to reuse valid data to
    deceive a system, application, or user.
      2. Malicious Repetition:
      The attacker replays the captured data at a later time or in a different context.
      Goals: Use the replayed data to deceive the target system into accepting the repeated
      information as if it were a legitimate request.
TCP/IP Hacking:
      c. SYN/ACK Spoofing:
      Attackers send forged SYN/ACK packets to establish a fake connection with a server.
      Goals: SYN/ACK spoofing can be used to manipulate TCP connections, leading to
      unauthorized access or denial of service.
    • Encryption Attacks:
      Encryption is a fundamental aspect of network and information security, used to protect
      sensitive data from unauthorized access by converting it into a format that is difficult to
      decipher without the appropriate decryption key. However, encryption, like any security
      measure, is not immune to attacks. Encryption attacks aim to undermine the confidentiality
      and integrity provided by encryption mechanisms, and attackers employ various techniques
      to achieve this. Here are some common encryption attacks in network and information
      security:
   User Authorization:
   Enforce the principle of least privilege, ensuring that users have the minimum necessary
   permissions to perform their tasks. Regularly review and audit user access rights to prevent
   unauthorized access.
   2. Access Controls:
   Implement access controls at the file system, registry, and network levels to restrict access
   to sensitive resources.
   Use role-based access control (RBAC) to manage and assign permissions based on job roles
   and responsibilities.
   3. Patch Management:
   Regularly update and apply security patches to the operating system to address known
   vulnerabilities and mitigate the risk of exploitation.
   Establish a formal patch management process to ensure timely and systematic updates.
   4. Security Configurations:
   Configure the operating system securely by disabling unnecessary services, limiting
   network ports, and removing or disabling unnecessary user accounts.
   Follow security best practices and guidelines provided by the operating system vendor.
   6. Encryption:
   Use encryption to protect sensitive data at rest and in transit. Full disk encryption helps
   safeguard data in case of physical theft or unauthorized access.
   Implement protocols like HTTPS for secure communication over the network.
   8. Firewalls:
   Enable and configure firewalls to control incoming and outgoing network traffic,
   preventing unauthorized access and protecting against network-based attacks.
   Regularly review and update firewall rules to align with security policies.
   1. Hotfix:
   A hotfix is a small, targeted update designed to address a specific problem or issue in the
   operating system. It is typically released quickly to resolve urgent matters without requiring
   a full system update.
   Purpose: Urgent Fixes, Minimal Disruption
   2. Patch:
   A patch is a broader update that includes fixes for multiple issues, addressing
   vulnerabilities, bugs, and improving overall system performance. Patches are more
   comprehensive than hotfixes but are still smaller than service packs.
   Purpose: Bug Fixes, Enhancements, Regular Maintenance
   3. Service Pack:
   A service pack is a more significant and comprehensive update that integrates a collection
   of hotfixes, patches, security updates, and new features. Service packs are less frequent but
   more substantial than hotfixes or patches.
   Purpose: Cumulative Updates, Feature Additions, Stability and Reliability
   1. Testing: Before applying updates, especially service packs, it's essential to test them in
   a controlled environment to ensure compatibility with existing applications and hardware.
   2. Backup: Always perform a complete backup of critical data before applying updates to
   mitigate the risk of data loss or system instability.
   3. Rollback Plans: Have a rollback plan in place in case an update causes unexpected
   issues. This plan may involve reverting to a previous system state or uninstalling specific
   updates.
   4. Vendor Guidance: Follow the guidance provided by the operating system vendor for
   applying updates. Vendors often provide documentation on the update process and any
   considerations specific to their software.
   5. Security Policies: Ensure that the organization's security policies mandate the timely
   application of updates to address security vulnerabilities and maintain a secure computing
   environment.
1.6 Information:
    In the context of network and information security, "information" refers to data that is
    processed, stored, transmitted, or communicated within an information system. This data
    can take various forms, including text, images, audio, video, and more. Information is a
    fundamental asset for organizations, and protecting it is a central focus of security
    measures. The three main aspects associated with information in the context of network
    and information security are:
   3. Availability:
   Availability ensures that information is accessible and usable by authorized individuals or
   systems when needed.
   1. Sensitive Information: Certain types of information are considered sensitive due to their
   nature or potential impact if compromised. This may include personal identifiable
   information (PII), financial data, intellectual property, or classified information.
   4. Access Controls: Access controls restrict and manage the permissions granted to
   individuals or systems, ensuring that only authorized users have the right level of access to
   specific information.
   5. Data Loss Prevention (DLP): DLP solutions are designed to prevent unauthorized
   access, sharing, or transmission of sensitive information outside the organization, helping
   to maintain confidentiality.
   6. Data Backup and Recovery: Regularly backing up information and having a robust
   recovery plan in place ensures that data can be restored in case of accidental deletion,
   corruption, or other incidents, supporting the principles of integrity and availability.
   1. Confidentiality:
   Need: Information often includes sensitive data such as personal, financial, or proprietary
   information. Protecting the confidentiality of this data is essential to prevent unauthorized
   access and disclosure.
   Importance: Breaches of confidentiality can lead to financial losses, reputational damage,
   legal consequences, and loss of trust from customers and partners.
   2. Integrity:
   Need: Ensuring the integrity of information is crucial to prevent unauthorized
   modifications, alterations, or tampering of data. Reliable and accurate information is vital
   for decision-making processes.
   Importance: Compromised integrity can lead to misinformation, financial fraud, and
   operational disruptions, impacting the overall trustworthiness of the information.
   3. Availability:
   Need: Information needs to be accessible and usable when required. Denial of access,
   disruptions, or downtime can have severe consequences on business operations.
   Importance: Ensuring the availability of information is critical for maintaining operational
   continuity, providing services to customers, and supporting business processes.
   6. Business Continuity:
   Need: Information security is vital for ensuring the continuity of business operations.
   Unforeseen events, such as cyberattacks or natural disasters, can disrupt services.
   Importance: Robust information security measures help organizations prepare for and
   respond to disruptions, minimizing downtime and ensuring business continuity.
    4. Access Controls: Examine the access requirements for the information. Classify data
    based on who should have access, enforcing the principle of least privilege.
    5. Data Ownership: Identify the business units or individuals responsible for the data.
    Classify information according to ownership, which helps define accountability and
    responsibility.
    6. Data Lifecycle: Consider where the data resides in its lifecycle (creation, storage,
    transmission, disposal). Different stages may require different classification levels,
    ensuring consistent protection throughout the data's lifecycle.
 • Security:
   Security in network and information security involves implementing measures to safeguard
   data, systems, and communication channels from unauthorized access, disclosure,
   alteration, and destruction. It encompasses technologies, policies, and practices to protect
   against cyber threats, ensuring the confidentiality, integrity, and availability of information
   in digital environments.
    Need of Security:
    1. Confidentiality
    2. Integrity
    3. Availability
    4. Protection Against Cyber Threats
    5. Compliance and Legal Obligations
    6. Business Continuity
    7. User Trust and Confidence
    8. Innovation and Research
      1. Confidentiality:
         The main essence of this feature lies in the fact that only the authorized personnel should
         be allowed the access to the data and system. The unauthorized individuals must be kept
         away from the information. This is ensured by checking the authorization of every
         individual who tries to access the database. For e.g. An organization’s administration
         must not be allowed to access the private information of the employees.
      2. Integrity:
         Integrity is ensured when the presented data is untouched or rather, is not altered by any
         unauthorized power. The information thus can be referred with the eyes closed. The
         integrity of the information can be altered in either unintentional or intentional ways.
         Intentionally, information can be passed through malicious content by any individual.
         Rather, unintentionally, any authorized individual might himself hamper the information
         for example, he might delete any specific important part of information.
      3. Availability:
         This feature means that the information can be accessed and modified by any authorized
         personnel within a given time frame. The point here to be noted is that the accessibility
         of the information is limited. The time frame within which it can be accessed is different
         for every organization.