WNS Unit-2
WNS Unit-2
FUD
Fear, Uncertainty, and Doubt are the most motivating factors to change behavior. FUD is generally
a strategic attempt to influence public perception by disseminating negative and dubious/false
information designed to undermine the credibility of their beliefs. FUD is an intended tactic of
rhetoric and error, which was initially used in sales and marketing, especially in advanced
technologies to discourage customers to consider competition products
The F.U.D. [fear, uncertainty and doubts] is based on disinformation used, among others, in sales,
marketing, politics, or broadly understood propaganda. The goal of the strategy is to influence
perception by distributing negative ones and questionable or false information about the
competition / opponent, etc.
OSI MODEL
The OSI Model or the Open Systems Interconnection Model is a conceptual framework which
describes the functions of a networking system. It is used for the transfer of data over which
In the 1970s the OSI Model was proposed and in the year 1984, it was published by the
International Organisation of Standardization (ISO)
Using this model, troubleshooting has become easier as the error can be detected at
different levels
This also helps in understanding the relationship and function of the software and
hardware of a computer network
The concept that the OSI Model should be a seven-layer structure, was proposed by
Charles Bachman at Honeywell Information Systems
The model initially did gain much popularity as it could not support the Internet protocol
suite which was not acceptable to a lot of IT Companies
The seven layers of the structure are divided into two part: the upper layer or the host
layer and lower layer or the media layer
l
The OSI model is divided into two layers: upper layers and lower layers.
The upper layer of the OSI model mainly deals with the application related issues, and they
are implemented only in the software. The application layer is closest to the end user. Both
the end user and the application layer interact with the software applications. An upper
layer refers to the layer just above another layer.
The lower layer of the OSI model deals with the data transport issues. The data link layer
and the physical layer are implemented in hardware and software. The physical layer is the
lowest layer of the OSI model and is closest to the physical medium. The physical layer is
mainly responsible for placing the information on the physical medium.
There are the seven OSI layers. Each layer has different functions. A list of seven layers are given
below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Physical Layer
It is the bottom-most or the first layer of the OSI Model
It comprises the raw data which is further transmitted to the higher layers of the structure
Preparing the physical devices in the network and accepting the received data for
transmission
The termination of connection between two nodes of a network also takes place at this
stage
This layer converts the digital bits into electrical, radio, or optical signals
2. Data Link Layer
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that no
data get corrupted. It ensures that the transmitting station such as a server with higher
processing speed does not exceed the receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.
3. Network Layer
It manages the flow of data, segmentation and desegmentation and error control
There are five classes of the transport protocol, starting from 0 and continuing till 4 (TP0 to
TP4)
Fragmentation and reassembly of data packets occur that this stage
The connection between the computers connected in a network is managed at this layer
Establishment, management and termination between the remote and local application
takes place here
Authentication and authorisation happen at this layer
This layer can also terminate or end any session or transmission which is complete
6. Presentation Layer
The data is converted into the syntax or semantics which an application understands
Before passing on the data any further, the data is formatted at this stage
Functions including compression, encryption, compatible character code set, etc. are also
done at this layer of the model
It serves as a data translator for the network
The interaction with the user or the user application takes place at this stage
When identifying communication partners, the application layer determines the identity and
availability of communication partners for an application with data to transmit
INTERNET MODEL
The Internet model is that independent networks connect to one another and, all together, provide
the global Internet. All these independent networks interoperate and form an Internet by
participating in a global routing system, subject only to technical standards and agreements with
neighbors (the technical terms here are peering and transit). The magic of the Internet is that in
order to communicate between a mobile phone connected to a broadband provider in the
Netherlands and a server in a data center in Kenya, the two networks at either end of the
connection do not need a relationship with each other. The magic of the Internet is that you only
need to connect to one other network that is already connected to the Internet to become part of
the global Internet. There is no center to the Internet, nor is there a central authority forcing the
independent networks to behave in certain ways. The Internet works because the independent
networks choose to internetwork by adhering to interoperable specifications and shared
convention, and they choose to do that because the value of the sum is much greater than the
sum of the parts. Network communication adheres to a layered architecture, which is commonly
described using the Internet model.
Home and enterprise networks connect through local ISPs and the Internet backbone
The five layers of Internet communication
The application layer consists of the logical endpoints of the communication within applications;
for instance, a web browser operating at the application layer at one end may establish a
connection to a web server running in the application layer at the other endpoint. The applications
at the two hosts cannot directly communicate. Instead, the application opens a socket, the
software endpoint for the connection. Sockets can be considered a form of message passing IPC
that is primarily used for network communication; at either end, the processes write to and read
from the socket using system calls.
The sockets provide the process with an interface to the transport layer, which is typically
implemented in the OS. The transport layer provides some key services that make the network
communication more usable to the application layer. The transport layer breaks application layer
messages—which may be large—into fixed-size data segments for delivery. The transport layer
then provides a multiplexing service, allowing all processes on a single host to share a single
network connection. Multiplexing and demultiplexing are achieved through the use of a port
number, which is an integer associated with a particular process; at each host, only a single
process can be assigned to a particular port number at a time. the amount of data sent by
applications increases, networks can experience, when there is too much traffic on a network,
often leading to delays and dropped packets. o address this problem, some transport layer
protocols, such as Transmission Control Protocol (TCP), also provide flow control and reliable
transport services. TCP is also a connection-oriented protocol, which means that the two hosts
store persistent state information between messages.
When the transport layer needs to send or receive packets, the transport layer protocol contacts
the Internet layer. The Internet layer provides the logical structure of the connections between
hosts. That is, while the transport layer provides end-to-end communication for processes on the
two hosts, the Internet layer provides point-to-point communication between the hosts and
routers.The Internet Protocol (IP) operates at this layer, associating a logical identifier—known as
an IP address—with a host or router connected to the network. Network-layer protocols define
the routing path that packets will traverse through the Internet. the router examines the intended
destination IP address and sends the packet to another router, guess for the shortest path.
The lowest layers of this model are the link and physical layers, which are typically designed and
implemented together in the hardware devices. A desktop or server may be using
the Ethernet suite of protocols to send pulses of light over a fiber optic cable. Link layer protocols
can only send packets to other devices within the same network, as they are tied closely to the
physical connection. the purpose of Ethernet is to transmit bits between two devices that are
physically connected by a cable. Thus, what looks like a single connection or hop between routers
in the Internet layer may require traversing several point-to-point links between switches in the
link layer.
WPA2
WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected Access wireless
security protocol. WPA2 standard was ratified by IEEE in 2004 as 802.11i. WPA2 ensures that data
sent or received over your wireless network is encrypted, and only people with your network
password have access to it. WPA2 replaces TKIP with two stronger encryption and authentication
mechanisms:
1. Advanced Encryption Standard (AES), an encryption mechanism; and
2. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), an
authentication mechanism.
Unfortunately, like it’s predecessor, WPA2-enabled access points (usually routers) are vulnerable
to attacks through WEP.
WPA2
Pros:
Addresses many security flaws of its predecessors
Uses the strongest encryption method: AES
Required by the Wi-Fi Alliance for use on all Wi-Fi certified products
256-bit key for encryption
Cons:
Still contains some security vulnerabilities
Requires the most processing power.
WPA3
WPA3 (Wi-Fi Protected Access 3) is the newest wireless security protocol designed to encrypt data
using a frequent and automatic encryption type called Perfect Forward Secrecy. In 2018, Wi-Fi
Alliance began certification for WPA3, the most recent wireless security standard and the one
experts now consider the most secure. WPA3 mandates the adoption of Protected Management
Frames, which help guard against eavesdropping and forging. WPA3-Personal uses CCMP-128 and
AES-128. WPA3 addresses WPA2's KRACK vulnerability with a more secure cryptographic
handshake, replacing the PSK four-way handshake with Simultaneous Authentication of Equals
(SAE), a version of the Internet Engineering Task Force's dragonfly handshake. SAE also
eliminates the reuse of encryption keys, requiring a new code with every interaction. SAE limits
users to active, on-site authentication attempts -- flagging anyone who has exceeded a certain
number of password guesses. This capability should make the typical Wi-Fi network more resistant
to offline dictionary attacks. Wi-Fi Alliance also introduced a new protocol called Wi-Fi Easy
Connect, which simplifies the onboarding process for IoT devices that don't have visual
configuration interfaces via a mechanism such as a QR code scan. Finally, an additional feature
called Wi-Fi Enhanced Open makes connecting to public Wi-Fi networks safer by automatically
encrypting information between each client and AP using a new unique key.
CRYPTOGRAPHY
Encryption and Decryption:
Cryptography involves two phases at its most fundamental level: Encryption and Decryption.
Encryption uses a cipher to encrypt and transform the plaintext into ciphertext. On the other hand,
decryption transforms the ciphertext into plaintext by employing the same cipher.
The most popular application of cryptography when sending electronic data is encrypting and
decrypting emails and other plaintext messages. The simplest method is the " secret key" or
symmetric approach.
The secret key is used to encrypt data, and after decoding, the secret key and encoded message
are sent to the recipient. What is the problem, then? A third party is all they need to decode and
analyze the message if it is intercepted.
Cryptologists developed the asymmetric or "public key" approach to solve this issue. Each user, in
this case, has two keys: a private key and a public key. Senders request the recipient's public key
before encrypting and sending the message.
Purpose of Cryptography
Cryptography is a method of protecting information and communications through the use of codes,
so that only those for whom the information is intended can read and process it. "Crypto" indicates
"hidden," and "graphy" indicates "writing," respectively. The techniques used in cryptography to
secure data are based on mathematical principles and a set of rule-based calculations known as
algorithms . These algorithms generate cryptographic keys, create digital signatures, safeguard
data privacy, enable online browsing on the Internet.
Cryptography aims to keep data and messages private and inaccessible to possible threats or bad
actors. It frequently works invisibly to encrypt and decrypt the data you send through email, social
media, applications, and website interactions.
The process where an ordinary plain text is converted to cipher text which is the text made such
that intended receiver of the text can only decode it and hence this process is known as
encryption. The process of conversion of cipher text to plain text this is known as decryption.
Features Of Cryptography:
1. Confidentiality: Information can only be accessed by the person for whom it is intended
and no other person except him can access it.
2. Integrity: Information cannot be modified in storage or transition between sender and
intended receiver without any addition to information being detected.
3. Non-repudiation: The creator/sender of information cannot deny his intention to send
information at later stage.
4. Authentication: The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.
Types of Cryptography
Symmetric key Cryptography: With the encryption technique, the sender and the recipient use
the same shared key to encrypt and decrypt messages.Although symmetric key systems are
quicker and easier to use, they have the drawback of requiring a secure key exchange between
the sender and the receiver. Data Encryption System (DES) is the most widely used symmetric key
encryption method.
Hash Functions: In this algorithm, no key is used. The plain text is used to produce a hash value
that has a fixed length, making it challenging to retrieve the plain text's information. Hash
functions are widely used by operating systems to encrypt passwords.
Asymmetric Key Cryptography: This approach uses a set of keys to encrypt and decrypt data.
Public keys are used for encryption, whereas private keys are used for decryption. The Public Key
and Private Key are different from one another. Even if everyone knows the public key, only the
intended recipient may decode the message since only he can access the private key.
Cryptographic Algorithms
Cryptosystems encrypt and decrypt information using cryptographic algorithms, or ciphers, to
secure communications between computer systems, devices, and applications.
A cipher suite uses three different algorithms: one for encryption, message authentication, and key
exchange. This process, integrated into protocols and developed using software that runs on
operating systems (OS) and networked computer systems, involves:
o Data encryption and decryption using the production of public and private keys
o To authenticate messages, use digital signature and verification
o Key exchange
o
Advantages
Access Management: Access control can use cryptography to guarantee that only individuals
with the appropriate authorizations are granted access to a resource. The resource is encrypted
and can only be accessed by those with the proper decryption key.
Secure Communication: Cryptography is essential for private communication over the Internet.
It provides safe methods for sending sensitive data like bank account numbers, passwords, and
other private information over the Internet.
Protection against attacks: Attacks like replay and man-in-the-middle attacks can be defended
against with the help of cryptography. It provides techniques for identifying and preventing these
assaults.
Compliance with legal requirements: Businesses can use cryptography to help them deal with
several legal obligations, such as data protection and privacy laws.
Applications of Cryptography
Computer passwords: Cryptography is frequently used in computer security, especially when
creating and managing passwords. When users log in, their password is hashed and contrasted
with the previously saved hash. To store them, passwords are first hashed and encrypted. This
method encrypts the passwords so that even if hackers can access the password database, they
can't comprehend the passwords.
Digital Currencies: Cryptography is also used by digital currencies like Bitcoin to secure
transactions and prevent fraud. Since advanced algorithms and cryptographic keys safeguard
transactions, tampering with or creating fake transactions is practically impossible.
Secure web browsing: Cryptography protects users from eavesdropping in on their
conversations and man-in-the-middle attacks and provides online browsing security. The Secure
Sockets Layer (SSL) and Transport Layer Security (TLS) protocols use public key cryptography to
encrypt data between the web server and the client, creating a secure communication channel.
Digital signatures: Digital signatures are used to sign papers and act as the handwritten
signature's digital copy. Cryptography is used to create digital signatures, and public key
cryptography is used to verify them. Digital signatures are becoming more widely used, and many
countries have laws that make them legally binding.
Authentication: When logging into a computer, cryptography is employed as the authentication
method, for example, a bank account or a secure network. The authentication protocols use
cryptographic techniques to validate the user's identity and possession of the necessary access
privileges to the resource.
Cryptocurrencies: Cryptocurrencies like Bitcoin and Ethereum largely rely on cryptography to
protect transactions, prevent fraud, and uphold the integrity of the network. Transactions are
protected by complicated algorithms and cryptographic keys, making it nearly impossible to tamper
with or fake transactions.
End-to-End Encryption: Email, instant messages, and video chats are all examples of two-way
communications protected by end-to-end encryption. Even if a message is encrypted, this
guarantees that only the intended recipients can decode it. End-to-end encryption is frequently
employed in messaging apps like WhatsApp and Signal, offering users high protection and
anonymity.
TLS/SSL
SSL and TLS are both cryptographic protocols used to increase security by encrypting
communication over computer networks. SSL stands for Secure Sockets Layer.TLS stands for
Transport Layer Security. TLS is the successor of SSL 3.0. While the term SSL is still dominant,
most people actually mean TLS when they talk about SSL because the public versions of SSL have
long been deprecated. So today there is no longer just one SSL certificate or one TLS certificate. In
fact, all "SSL certificates" are actually SSL TLS certificates. SSL TLS can be used for a variety of
applications including securing data over:
HTTPS,
FTPS,
SMTP, etc.
A cryptographic protocol must adhere to certain requirements in order to be deemed secure.
SSL and TLS properties:
1. Client Hello. The client sends information along with a set of options to the server
regarding SSL communication (SSL version number, cipher settings, etc).
2. Server Hello. The server makes a decision and provides it back to the client based on the
options provided.
3. Server Key Exchange. The server provides information to the client regarding the
session key as well as its public key.
4. Client Key Exchange. The client authenticates the server's certificate and confirms the
server's selected encryption algorithm.
5. Client/Server Begin Secure Communications. Both the client and server confirm that
all subsequent communications will be encrypted.
SSL TLS
1
SSL stands for Secure Socket Layer. TLS stands for Transport Layer Security.
2 SSL (Secure Socket Layer) supports TLS (Transport Layer Security) does not
the Fortezza algorithm. support the Fortezza algorithm.
7 SSL (Secure Socket Layer) is less secured as TLS (Transport Layer Security) provides high
compared to TLS(Transport Layer Security). security.
9
SSL has been depreciated. TLS is still widely used.
2. After SSH:
Use of SSH Protocol:
1. It offers users safe access and automates procedures.
2. It is a simple and safe method of transferring files from one machine to another over an
unsecured network.
3. It also gives users remote instructions.
4. It assists users in managing network infrastructure as well as other important system
components.
5. It is used to log in to shell on a remote system (Host), replacing Telnet and rlogin, and to run a
single command on the host, replacing rsh.
6. It works in tandem with the rsync software to backup, copy, and mirror files securely and
efficiently.
7. It is capable of forwarding a port.
8. We can use SSH to automate the login to a remote server, such as OpenSSH.
9. We can safely access the web using the SSH client’s encrypted proxy connection, which
supports the SOCKS protocol.
Working of SSH:
The SSH protocol operates on a client-server basis, which means it links a secure shell client
programme (End where the session is shown) to the SSH server (End where session executes). It
was designed to replace insecure login protocols such as Telnet and rlogin, and so fulfils the same
job.
The command used to initiate an SSH connection is: ssh username@sshserver.com
The architecture of SSH Protocol
The SSH architecture is made-up of three well-separated layers. These layers are:
1. Transport Layer
2. User-authentication layer
3. Connection Layer
The SSH protocol architecture is an open architecture; hence it provides great flexibility and
enables SSH use for many other purposes instead of only a secure shell. In the architecture, the
transport layer is similar to the transport layer security (TLS). The User-authentication layer can be
used with the custom authentication methods, and the connection layer allows multiplexing
different secondary sessions into a single SSH connection.
Transport Layer
The transport layer is the top layer of the TCP/IP protocol suite. For SSH-2, this layer is responsible
for handling initial key exchange, server authentication, set up encryption, compression, and
integrity verification. It works as an interface for sending and receiving plaintext packets with sizes
up to 32, 768bytes.
User authentication Layer
As its name suggests, the user authentication layer is responsible for handling client authentication
and provides various authentication methods. The authentication is done at the client-side; hence
when a prompt occurs for a password, it usually for an SSH client rather than a server, and the
server responds to these authentications.
This layer includes various methods of authentication; these methods are:
o Password: Password authentication is a straightforward way of authentication. It includes
the feature to change the password for easy access. But it is not used by all the
applications.
o Public-key: The public-key is a public key-based authentication method, which supports
DSA, ECDSA, or RSA keypairs.
o Keyboard-interactive: It is one of the versatile authentication methods. In this, the
server sends a prompt to enter information & the client sends it back with keyed-in
responses by the user. It is used to provide a one-time password or OTP authentication.
o GSSAPI: In this method, the authentication is performed by external methods such as
Kerberos 5 or NTLM, which provide the single sign-on capability to SSH sessions.
Connection Layer
The connection layer defines various channels through which SSH services are provided. It defines
the concept of channels, channel requests, and global requests. One SSH connection can host
different channels simultaneously and can also transfer data in both directions simultaneously.
Channel requests are used in the connection layer to relay out-of-band channel-specific data, for
example, the altered size of a terminal window or the exit code of a server-side process. The
standard channel types of connection layer are:
o shell: It is used for terminal shells, SFTP, and exec requests.
o direct-tcpip: It is used for the client-to-server forwarded connections.
o forwarded-tcpip: It is used for the server-to-client forwarded connections.
Generally, Terminal is any device that terminates a communication channel. The terminal is the
device you use to interact with your computer system. In computer terminology, a terminal is an
input/output (I/O) device, usually consisting of a keyboard and monitor, that acts as a front end
for a mainframe, terminal server, or other back-end processing device.