Advertisement
CamolaZ

Untitled

Apr 16th, 2019
157
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.41 KB | None | 0 0
  1. IT Security//
  2.  
  3. Data security
  4. Software security
  5. Hardware security
  6.  
  7. ---------------------
  8. Physical security measures
  9. Procedural security measures
  10. Technical security measures
  11.  
  12.  
  13. ----------------------------
  14. Attributes of information //
  15.  
  16. Confidentiality
  17. Integrity
  18. Availability
  19. Authenticity/Unrepudability
  20.  
  21. ------------------------
  22. Security mechanism//
  23.  
  24. Encryption
  25. Checksum
  26. Redundancy
  27. Firewall
  28. Authentification
  29. Authorization
  30.  
  31.  
  32.  
  33. Accounting
  34. -------------------
  35. Three ways of providing information
  36.  
  37. Defense
  38. deferrence
  39. detecting
  40. -------------
  41. Identify your information resources
  42. what kind of nsk each of these resources can be exposed?
  43. How high is the risk?
  44. C- I - M
  45. -----------------------
  46. RESOURCE1 H- H - H
  47. ----------------------
  48. RESOURCE1 H- H - H
  49. ----------------------
  50. RESOURCE1 H- L - L
  51. -----------------------
  52.  
  53.  
  54.  
  55. Designing of IT infrastructure Security //
  56. 1st stage: Analysis
  57. resourses &risk
  58. IT infrastructure
  59. functions
  60.  
  61. do not implement functions you are intended ti use
  62. do not install or remove or (at least)stop unneeded services
  63.  
  64. ---------------------
  65. Hardware
  66.  
  67. Computer &servers
  68. Network devices
  69. Network topology
  70. -----------------
  71. Software
  72.  
  73. OS
  74. Service software
  75. Network topology
  76. -------------
  77.  
  78. Personal
  79.  
  80. skill
  81. habits
  82.  
  83. CONCLUSION for the 1st stage
  84. Security Policy
  85. (general ,wide audience)
  86. Operational Documents
  87. (technical, for IT staff, implied by Security Policy)
  88.  
  89.  
  90. 2nd stage: implementation
  91. firewalls
  92. vpns
  93. certification authorities
  94. authentication & authorization
  95. antivirus software
  96. spam filters
  97. courses for the staff
  98.  
  99.  
  100. All of these should form a logical &consisted system
  101. A good practice build onion security architecture
  102.  
  103.  
  104. 3rd stage :Monitoring
  105. review of logs
  106. intrusion Detection/Prevention
  107. Systems(IDS/IPS)
  108.  
  109. You always should log
  110. failed logins
  111. deny access to files/directories
  112.  
  113. 4th stage: Reaction
  114. what to do?
  115. who is responsible for the doc
  116. what repairing actions are to be performed
  117. what prepare for incident investigation
  118. How to say to the public
  119.  
  120. TURN BACK TO STAGE 1
  121.  
  122.  
  123.  
  124.  
  125.  
  126. CRYPROLOGY
  127.  
  128.  
  129. CRYPTOGRAPHY CRYPTOANALYSIS STEGANOGRAPHY(embedding the "real" message in a unsuspicious message)
  130. (secret message sent in clear way) "brute force attack" (clear text in a secret way)
  131. (plain text="real message "cryptanalitic attacks=exploit a vulnerability in the encyption method"
  132. ciphertext=ecrypted message
  133. key="secret" component allowing conversion of ciphertext to plain text(or reverse))
  134.  
  135.  
  136. attacks on encryption algorithms
  137. --attack with a known ciphertext(the weakest method of attack)
  138. --you want tp reveal the plain text
  139. --you want to find the encryption key
  140.  
  141. the attack is easier to perform if the cryptanalyst has more ciphertext encrypted with the same key
  142.  
  143. attack with a known plain text
  144. --known=a number of ciphertext and at least one pair plain text-ciphertext
  145.  
  146. attack with a chosen plain text
  147. --its possible to encrypt a plain text
  148.  
  149. attack with as chosen ciphertext(lunch-time attack)
  150.  
  151. encryption: plain text ->ciphertext
  152. decryption: ciphertext ->plaintext
  153. --------------------------------------------------------------
  154. CRYPTOGRAPHIC ALGORITHMS
  155. TRANSPOSITION(PERMUTATION)
  156.  
  157. s e c u r i
  158. t y o f i t
  159. i n f r a s
  160. t r u c t u
  161. r e x y z w
  162.  
  163. STITREYNRECOFUXUFRCYRIATZITSUW
  164.  
  165. SUBSTITUTION
  166. example: Ceasar cipher (shift any letter by 3)
  167.  
  168. VHFXUL....
  169. improvement:Vigenare cipher
  170.  
  171.  
  172. CIPHER -images of the letter 'A' in consecutive Caesar's ciphers
  173.  
  174. ONE TIME PAD(substitution cipher)
  175. --the key length is as long as the message
  176. --use every key only once
  177. --keys are truly random
  178.  
  179. Unconditionally secure encryption algorithm
  180.  
  181. Conditionally secure encryption algorithms:
  182. --either the time which must be spent on breaking the ciphertext is longer than the time by which the plain text must be kept secret
  183. --or breaking ciphertext is more expensive than the value of plain text message
  184.  
  185. Algorithms are based on S-P(substitution-permutation) networks
  186. example :DES,AES
  187. It should be practically impossible to deduce private key for a given public key.
  188. examples:RSA :RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement