Internet Protocol - Information Security

Internet Protocol (IP) Security


  • Image Not Found
  • Protocols
    • Authentication Header (AH)
      • Authentication Algorithm
        • Integrity
        • Example => MD5, SHA
    • Encapsulating Security Protocol (ESP)
      • Confidentiality
      • Encryption Algorithm
        • Example => DES, AES
  • Domain of Interpretation (DOI)
    • Identifiers for all the approved encryption and authentication algorithms
    • About size and lifetime of keys
  • Key Management
    • Manual
      • ipseckey
    • Automatic
      • Internet Key Exchange (IKE) protocol
  • Security Association
    • Relationship between two entities that are communicating
      • Describes how security services should be utilized for secure communication
    • Security Parameter Index
      • Uniquely identify a security association
    • Security Protocol Identifier
      • Identify the protocol used
    • Sequence number counter
      • 0 to 232-1
      • Initially 0 then incremented
    • AH information
      • Information about algorithm
      • Key size, lifetime
      • Architecture
        • Image Not Found
        • Next Header
          • Type of header immediately following this header
        • Payload length
          • Defines the length of the authentication header in 4-byte multiples
        • Reserved
          • For future use
        • SPI
          • Which security association this belongs to
        • Authentication data (Variable)
          • Contains Integrity Check Value (ICV) that tells if any undesired modification has been performed
      • Modes of Operation
        • Transport Mode
          • Image Not Found
        • Tunnel Mode
          • Image Not Found
    • ESP information
      • Information about algorithm
      • Keys used for encryption, size, lifetime
      • With & Without Authentication
        • Image Not Found
        • Payload data
          • Normal data in encrypted form
        • Padding (0 to 255 Bytes)
          • Extra bytes required to make block for encryption algorithm
        • Pad Length
          • Bytes used for padding
        • Next header
          • Type of data present in payload
        • Authentication data (optional)
      • Modes of Operation
        • Transport Mode
          • Image Not Found
          • ESP authentication is never encrypted
        • Tunnel Mode
          • Image Not Found
    • Life time of SA
      • Generate > Initiate > Terminate
    • Ipsec Protocol mode
      • Transport mode
        • Payload is encrypted but not IP header
        • End to end communication
        • Image Not Found
      • Tunnel mode
        • Payload and IP header is encrypted
        • Gateway to Gateway communication
  • Secure Socket Layer (SSL)
    • Acts in between Application and Transport Layer
    • Working
      • Data given to SSL, encrypts it and add its header (SSL header) and sends this packet to receiver
      • For decrypting it first removes SSL header then applies decryption algorithm to gives it to application layer
    • SSL Protocol Stack
      • Image Not Found
      • SSL Handshake Protocol
        • Establish connection and Authenticate entities
        • Image Not Found
        • Phase 1
          • SSL Version
          • Session ID
          • Cipher Suite
          • Compression Me
        • Phase 4
          • Change cipher specification sends information about current status
      • SSL change cipher spec protocol
        • Consist of one message of 1 byte of value 1
        • Gets pending state to current state
      • SSL Alert protocol
        • Warning, Filter, Error messages
        • Image Not Found
        • Alert Message => Description
          • Close_notify => No more message sender
          • Unexpected_message => Incorrect message received
          • bad_record_mac => Wrong mac received
          • bad_certificate => Received a corrupted certificate
          • Certificate expired
      • SSL Record Protocol
        • Provides confidentiality using encryption and integrity using MAC (Message Authentication Code)
        • Image Not Found
        • Data divided into equal size fragments > Plain text size should be less than 214
        • Compress plain text using lossless methods > Compute MAC and append it
        • Encrypt this and add Record Header in the front

Notions of Security Protocol


  • Identity and Access Management (IdAM)
    • Basic
      • IAM is also called identity management (IdM)
      • A way to tell who user is and what they are allowed to do
      • Managing a given set of users' digital identities, and the privileges associated with each identity
      • To verify identity, a computer system will assess a user for characteristics that are specific to them, These characteristics are known as "authentication factors"
    • The three most widely used authentication factors are
      • Something the user knows
        • Some knowledge of user
      • Something the user has
        • This factor refers to possession of a physical token that is issued to authorized users
      • Something the user is
        • This refers to a physical property of one's body
  • Access management
    • "Access" refers to what data a user can see and what actions they can perform once they log in
  • Firewall
    • Basic
      • Hardware or software device that protects a computer network from unauthorized access
      • Firewalls filters the information coming through the Internet connection into a user private network
      • Most home network routers have built in firewall
      • A firewall works with the proxy server making request on behalf of workstation users
    • To control traffic in and out of the network firewalls one or more of the three methods are used including
      • Packet filtering
      • Proxy service
      • Stateful inspection
  • Ethical Hacking
    • Basic
      • Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network
      • Ethical hackersĀ aim to investigate the system or network for weak points that malicious hackers can exploit or destroy
    • They check for key vulnerabilities include but are not limited to
      • Injection attacks
      • Changes in security settings
      • Exposure of sensitive data
      • Breach in authentication protocols
      • Components used in the system or network that may be used as access points
    • Type of Hackers
      • White Hat hackers
      • Black Hat hackers
    • Ethical Hacker Roles and Responsibilities
      • An ethical hacker must seek authorization from the organization that owns the system. Hackers should obtain complete approval before performing any security assessment on the system or network
      • Report any security breaches and vulnerabilities found in the system or network
      • Keep their discoveries confidential. As their purpose is to secure the system or network, ethical hackers should agree to and respect their non-disclosure agreement
Share: