SlideShare a Scribd company logo
Security
Framework
Paras Maharjan
Acme Engineering College
B.E. Computer
Security Framework
1
Definition
• Series of documented process.
• Used to define policies and procedures.
• For implementation and management information
security.
• Basically blueprints.
• For building information security program.
• To manage risks and vulnerabilities.
Security Framework
2
Computer Virus
• A program or
piece of code.
• Loaded into
computer
• Without your
knowledge
• Runs against your
wishes.
• Erases files, slow
down PC’s,
Format HDD and
crash your
system.
Security Framework
3
Types of Virus
• Boot Viruses
• Polymorphic Viruses
• Macro Viruses
• Worms
• Trojans
• Spywares
Security Framework
4
Types of Virus
• Boot Viruses:
• Copies virus code in boot sector of disk
• This ensures that it is always executed and loaded in the
memory when system starts.
• Polymorphic Viruses:
• Infects the system and change its signature before infecting
the next system.
• Macro Viruses:
• A macro having the virus code is executed
• Infects the files on the system.
Security Framework
5
Types of Virus
• Worms:
• Programs that replicate and spread to other system.
• Reside in system memory and affects e-mail system.
• Trojans:
• Program file that claims to do something but does
something that is not required.
• Allows hackers to gain unauthorized access to your
system.
Security Framework
6
Types of Virus
• Spywares:
• Stores personal information and surfing details.
• Send them to its website without informing users.
• Automatically installed as a free download while installing
an application.
• Symptoms of Spyware:
• Unwanted ads pop-ups when not connected to the web.
• Web browsers settings are changed automatically.
• Unable to remove unwanted toolbar from browser.
Security Framework
7
How it Spreads?
• Major source is unsecure internet.
• Attaching themselves to other computer program files.
• When sharing a file or drives containing virus.
Security Framework
8
Virus Protection
• Using Antiviruses.
• Avoiding spam mails.
• Avoid opening email attachment files from unknown
senders.
• Try to avoid downloading and installing cracked software
from web.
• Using only registered copies of software on the system.
Security Framework
9
Encryption & Decryption
• Encryption:
• Process of converting Plaintext(readable data) into
a form which hides its content, called Cypher-text.
• Decryption:
• Reverse process of encryption.
• With cypher-text converted back into
corresponding plaintext.
Security Framework
10
Encryption & Decryption
Security Framework
11
Cryptography
• Science of using mathematics to encrypt and decrypt
data.
• Enables you to store sensitive information.
• Transmit it across insecure network so that it can’t be
read by anyone except intended recipient.
Security Framework
12
Secret Key Cryptography
• Also called private-key or symmetric encryption.
• Involves using the same key for encryption and
decryption.
• Encryption involves applying an algorithm to the
data to be encrypted using the private key to make
them unintelligible.
Security Framework
13
Secret Key Cryptography
• Disadvantages:
• Based on the exchange of a secret (Keys).
• More damaged if compromised.
• Can decrypt everything encrypted with that key.
Security Framework
14
Data Encryption Standard (DES)
• Symmetric algorithm.
• Works using same key to encrypt and decrypt
message.
• Both sender and receiver must know and use the
same private key.
• Is a block cipher, meaning a cryptographic key and
algorithm are applied to a block of data
simultaneously rather than one bit at a time.
• Groups plaintext into 64 bit blocks.
Security Framework
15
Public Key Encryption
• Also known as Asymmetric-key encryption.
• Uses two different keys at once.
• A combination of a private key and a public key.
• Private Key:
• Known only to your computer
• Public Key:
• Given by your computer to any computer that wants to
communicate securely.
Security Framework
16
Public Key Encryption
Security Framework
17
Security Framework
18
Fig: Process Involved in Public Key Encryption.
Rivest-Shamir-Adleman (RSA)
• Asymmetric algorithm.
• Use two different but mathematically linked keys-
public and private.
• Public key- shared with everyone, whereas private
key must be kept secret.
• In RSA cryptography, both the public and private
keys can encrypt a message.
• Opposite key from the one used to encrypt a message
is used to decrypt it.
Security Framework
19
Authorization & Authentication
• Authentication:
• Process of verifying the identity of a user by obtaining some
sort of credentials and using credentials to verify that user’s
identity.
• If credentials are valid, authorization process starts.
• Authorization:
• Process of allowing an authenticated users to access the
resources by checking whether the user has access rights to
the system.
• Helps you to control access rights by granting or denying
permissions to authenticated users.
Security Framework
20
Firewall
• Is a hardware/software
designed to permit or deny
network transmission.
• Based upon set of rules.
• Frequently used to protect
networks from unauthorized
access.
Security Framework
21
Digital Signature
Security Framework
22
• Type of electronic signature that encrypts documents
with digital codes that are particularly difficult to
duplicate.
• Mathematical scheme for demonstrating the authenticity
of digital message or document
• Takes the concept of traditional paper-based signing and
turns it into an electronic “Fingerprint”.
• This fingerprint or coded message is unique to both the
document and the signer and binds them together.
Security Framework
23
Attributes of digital
signature
Security Framework
24
• Authentication:
• Means act of proving who you say you are.
• Means that you know who created and sent the message.
• Digital signature is used to authenticate the source of message.
• Integrity
• Ensures that when a message is sent over a n/w, the data that arrives is the
same as the data that was sent.
• Is the assurance that the information is trustworthy and accurate.
• Non-repudiation:
• Important criteria of digital signature.
• Ensures the authentication of message, so the sender can’t repudiate it later.
• At the same time it also ensures the identity of the receiver, so the receiver
can’t repudiate it later.
Paper signature V/s
Digital signature
Security Framework
25
Parameter Paper Electronic
Authenticity May be forget Cannot be copied
Integrity Signature independent
of document
Signature depends on
the contents of the
document
Non-repudiation • Handwriting expert
needed
• Error prone
• Any computer user
• Error free
How it works?
• Message is hashed
using algorithms.
• Hash provides
integrity.
• Hash of message is
encrypted with
sender’s private key.
• Encrypted hash can
only be decrypted
with senders public
key.
• Providing
authentication and
non-repudiation.
Security Framework
26
Security Framework
27
Why Digital Signature?
https://www.youtube.com/watch?v=VIcBpRp
iBoc
Security Framework
28
References
• http://searchsecurity.techtarget.com/definition/RSA
• http://science.opposingviews.com/advantages-
disadvantages-symmetric-key-encryption-2609.html
• http://computer.howstuffworks.com/encryption3.htm
• http://searchsecurity.techtarget.com/definition/private-
key
• http://ccm.net/contents/130-private-key-or-secret-key-
cryptography
• http://net-informations.com/faq/asp/authentication.htm
• https://www.youtube.com/watch?v=VIcBpRpiBoc
Security Framework
29
Thank You
ANY
QUERIES?
Security Framework
30

More Related Content

PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
PDF
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
PPT
Ch08 Authentication
PPTX
Network security & cryptography
PPTX
Cyber security
PPTX
Key distribution code.ppt
PDF
week 12
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Ch08 Authentication
Network security & cryptography
Cyber security
Key distribution code.ppt
week 12

What's hot (20)

PPTX
Network security
PPT
Ch06 Wireless Network Security
PPTX
Internet Security
PDF
Network Security & Attacks
PPT
Network Security Chapter 7
PPTX
Basics of Network Security
PPTX
Encrytion ppt
PDF
NTXISSACSC4 - Security for a New World
PDF
Security in computer systems fundamentals
PDF
What is Network Security?
PPT
A+ Update Endpoint Encryption
PDF
Essential Guide to Protect Your Data [Key Management Techniques]
PPT
key distribution in network security
PPTX
Network security - Defense in Depth
PDF
Network Security - Defense Through Layered Information Security
PDF
Network Security Presentation
PPT
Ch05 Network Defenses
PDF
Incident response, Hacker Techniques and Countermeasures
PDF
Webinar: Hunting maturity through cyber deception
Network security
Ch06 Wireless Network Security
Internet Security
Network Security & Attacks
Network Security Chapter 7
Basics of Network Security
Encrytion ppt
NTXISSACSC4 - Security for a New World
Security in computer systems fundamentals
What is Network Security?
A+ Update Endpoint Encryption
Essential Guide to Protect Your Data [Key Management Techniques]
key distribution in network security
Network security - Defense in Depth
Network Security - Defense Through Layered Information Security
Network Security Presentation
Ch05 Network Defenses
Incident response, Hacker Techniques and Countermeasures
Webinar: Hunting maturity through cyber deception
Ad

Viewers also liked (14)

PPT
Digital Security Slide Show
PPTX
Home Security Systems - Your First Defense
PPTX
Digital security presentation
PPTX
Digital security
PPT
Ethical Hacking
PPTX
Security as an Enabler for the Digital World - CISO Perspective
PPTX
Digital Security
PDF
PSFK Presents the Future of Digital Safety & Security
PPTX
The ‘Data Driven Video Business’
PPTX
Video is Changing the World
PPTX
Cctv presentation
PPT
PPT FOR SECURITY
PPTX
Getting to Equal 2017
PPT
My PPT
Digital Security Slide Show
Home Security Systems - Your First Defense
Digital security presentation
Digital security
Ethical Hacking
Security as an Enabler for the Digital World - CISO Perspective
Digital Security
PSFK Presents the Future of Digital Safety & Security
The ‘Data Driven Video Business’
Video is Changing the World
Cctv presentation
PPT FOR SECURITY
Getting to Equal 2017
My PPT
Ad

Similar to Security framework (20)

PPT
ISDD Security Precautions
PPT
Chapter 15 - Security
PPTX
Secrity project keyvan
PPTX
6 security
PDF
Comptia Security+ Exam Notes
PPTX
L4 internet security
PPT
security
PPT
E-COMMERCE SECURITY (2).ppt
PPT
E-COMMERCE SECURITY (1).ppt VI6R7UTGT6T5FRKDLKUTY
PPT
E-COMMERCE SECURITY , e bussines nvjfffbjurgrujgkmdgnfblguisrljkfbbjsreio[q3g...
PPT
Electronic commerce security seventh annual edition
PDF
Basics of Data Security and Cryptographic techniques
PPTX
PDF
ch15.pdf
PPTX
Cryptographic Tools Week#11 Lecture #01,02.pptx
PPT
Data Security
PDF
Electronic Document & Electronic Signatures
PPTX
Network security & cryptography
PPTX
INTERNETSECURITY with the different threats
PPT
Network Security
ISDD Security Precautions
Chapter 15 - Security
Secrity project keyvan
6 security
Comptia Security+ Exam Notes
L4 internet security
security
E-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (1).ppt VI6R7UTGT6T5FRKDLKUTY
E-COMMERCE SECURITY , e bussines nvjfffbjurgrujgkmdgnfblguisrljkfbbjsreio[q3g...
Electronic commerce security seventh annual edition
Basics of Data Security and Cryptographic techniques
ch15.pdf
Cryptographic Tools Week#11 Lecture #01,02.pptx
Data Security
Electronic Document & Electronic Signatures
Network security & cryptography
INTERNETSECURITY with the different threats
Network Security

Recently uploaded (20)

PDF
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
PPTX
Shizophrnia ppt for clinical psychology students of AS
PPTX
Literatura en Star Wars (Legends y Canon)
PPTX
Lesson-7-Gas. -Exchange_074636.pptx
PPTX
Knowledge Knockout ( General Knowledge Quiz )
PPTX
CAPE CARIBBEAN STUDIES- Integration-1.pptx
PPTX
PurpoaiveCommunication for students 02.pptx
PPTX
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
PPTX
Module_4_Updated_Presentation CORRUPTION AND GRAFT IN THE PHILIPPINES.pptx
PDF
_Nature and dynamics of communities and community development .pdf
PPTX
NORMAN_RESEARCH_PRESENTATION.in education
PPTX
Sustainable Forest Management ..SFM.pptx
PPTX
Unit 8#Concept of teaching and learning.pptx
PPTX
CASEWORK Power Point Presentation - pointers
PPTX
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
DOC
EVC毕业证学历认证,北密歇根大学毕业证留学硕士毕业证
PPT
Lessons from Presentation Zen_ how to craft your story visually
PPTX
Research Process - Research Methods course
PDF
Unnecessary information is required for the
PPTX
ANICK 6 BIRTHDAY....................................................
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
Shizophrnia ppt for clinical psychology students of AS
Literatura en Star Wars (Legends y Canon)
Lesson-7-Gas. -Exchange_074636.pptx
Knowledge Knockout ( General Knowledge Quiz )
CAPE CARIBBEAN STUDIES- Integration-1.pptx
PurpoaiveCommunication for students 02.pptx
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
Module_4_Updated_Presentation CORRUPTION AND GRAFT IN THE PHILIPPINES.pptx
_Nature and dynamics of communities and community development .pdf
NORMAN_RESEARCH_PRESENTATION.in education
Sustainable Forest Management ..SFM.pptx
Unit 8#Concept of teaching and learning.pptx
CASEWORK Power Point Presentation - pointers
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
EVC毕业证学历认证,北密歇根大学毕业证留学硕士毕业证
Lessons from Presentation Zen_ how to craft your story visually
Research Process - Research Methods course
Unnecessary information is required for the
ANICK 6 BIRTHDAY....................................................

Security framework

  • 1. Security Framework Paras Maharjan Acme Engineering College B.E. Computer Security Framework 1
  • 2. Definition • Series of documented process. • Used to define policies and procedures. • For implementation and management information security. • Basically blueprints. • For building information security program. • To manage risks and vulnerabilities. Security Framework 2
  • 3. Computer Virus • A program or piece of code. • Loaded into computer • Without your knowledge • Runs against your wishes. • Erases files, slow down PC’s, Format HDD and crash your system. Security Framework 3
  • 4. Types of Virus • Boot Viruses • Polymorphic Viruses • Macro Viruses • Worms • Trojans • Spywares Security Framework 4
  • 5. Types of Virus • Boot Viruses: • Copies virus code in boot sector of disk • This ensures that it is always executed and loaded in the memory when system starts. • Polymorphic Viruses: • Infects the system and change its signature before infecting the next system. • Macro Viruses: • A macro having the virus code is executed • Infects the files on the system. Security Framework 5
  • 6. Types of Virus • Worms: • Programs that replicate and spread to other system. • Reside in system memory and affects e-mail system. • Trojans: • Program file that claims to do something but does something that is not required. • Allows hackers to gain unauthorized access to your system. Security Framework 6
  • 7. Types of Virus • Spywares: • Stores personal information and surfing details. • Send them to its website without informing users. • Automatically installed as a free download while installing an application. • Symptoms of Spyware: • Unwanted ads pop-ups when not connected to the web. • Web browsers settings are changed automatically. • Unable to remove unwanted toolbar from browser. Security Framework 7
  • 8. How it Spreads? • Major source is unsecure internet. • Attaching themselves to other computer program files. • When sharing a file or drives containing virus. Security Framework 8
  • 9. Virus Protection • Using Antiviruses. • Avoiding spam mails. • Avoid opening email attachment files from unknown senders. • Try to avoid downloading and installing cracked software from web. • Using only registered copies of software on the system. Security Framework 9
  • 10. Encryption & Decryption • Encryption: • Process of converting Plaintext(readable data) into a form which hides its content, called Cypher-text. • Decryption: • Reverse process of encryption. • With cypher-text converted back into corresponding plaintext. Security Framework 10
  • 12. Cryptography • Science of using mathematics to encrypt and decrypt data. • Enables you to store sensitive information. • Transmit it across insecure network so that it can’t be read by anyone except intended recipient. Security Framework 12
  • 13. Secret Key Cryptography • Also called private-key or symmetric encryption. • Involves using the same key for encryption and decryption. • Encryption involves applying an algorithm to the data to be encrypted using the private key to make them unintelligible. Security Framework 13
  • 14. Secret Key Cryptography • Disadvantages: • Based on the exchange of a secret (Keys). • More damaged if compromised. • Can decrypt everything encrypted with that key. Security Framework 14
  • 15. Data Encryption Standard (DES) • Symmetric algorithm. • Works using same key to encrypt and decrypt message. • Both sender and receiver must know and use the same private key. • Is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time. • Groups plaintext into 64 bit blocks. Security Framework 15
  • 16. Public Key Encryption • Also known as Asymmetric-key encryption. • Uses two different keys at once. • A combination of a private key and a public key. • Private Key: • Known only to your computer • Public Key: • Given by your computer to any computer that wants to communicate securely. Security Framework 16
  • 18. Security Framework 18 Fig: Process Involved in Public Key Encryption.
  • 19. Rivest-Shamir-Adleman (RSA) • Asymmetric algorithm. • Use two different but mathematically linked keys- public and private. • Public key- shared with everyone, whereas private key must be kept secret. • In RSA cryptography, both the public and private keys can encrypt a message. • Opposite key from the one used to encrypt a message is used to decrypt it. Security Framework 19
  • 20. Authorization & Authentication • Authentication: • Process of verifying the identity of a user by obtaining some sort of credentials and using credentials to verify that user’s identity. • If credentials are valid, authorization process starts. • Authorization: • Process of allowing an authenticated users to access the resources by checking whether the user has access rights to the system. • Helps you to control access rights by granting or denying permissions to authenticated users. Security Framework 20
  • 21. Firewall • Is a hardware/software designed to permit or deny network transmission. • Based upon set of rules. • Frequently used to protect networks from unauthorized access. Security Framework 21
  • 22. Digital Signature Security Framework 22 • Type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate. • Mathematical scheme for demonstrating the authenticity of digital message or document • Takes the concept of traditional paper-based signing and turns it into an electronic “Fingerprint”. • This fingerprint or coded message is unique to both the document and the signer and binds them together.
  • 24. Attributes of digital signature Security Framework 24 • Authentication: • Means act of proving who you say you are. • Means that you know who created and sent the message. • Digital signature is used to authenticate the source of message. • Integrity • Ensures that when a message is sent over a n/w, the data that arrives is the same as the data that was sent. • Is the assurance that the information is trustworthy and accurate. • Non-repudiation: • Important criteria of digital signature. • Ensures the authentication of message, so the sender can’t repudiate it later. • At the same time it also ensures the identity of the receiver, so the receiver can’t repudiate it later.
  • 25. Paper signature V/s Digital signature Security Framework 25 Parameter Paper Electronic Authenticity May be forget Cannot be copied Integrity Signature independent of document Signature depends on the contents of the document Non-repudiation • Handwriting expert needed • Error prone • Any computer user • Error free
  • 26. How it works? • Message is hashed using algorithms. • Hash provides integrity. • Hash of message is encrypted with sender’s private key. • Encrypted hash can only be decrypted with senders public key. • Providing authentication and non-repudiation. Security Framework 26
  • 29. References • http://searchsecurity.techtarget.com/definition/RSA • http://science.opposingviews.com/advantages- disadvantages-symmetric-key-encryption-2609.html • http://computer.howstuffworks.com/encryption3.htm • http://searchsecurity.techtarget.com/definition/private- key • http://ccm.net/contents/130-private-key-or-secret-key- cryptography • http://net-informations.com/faq/asp/authentication.htm • https://www.youtube.com/watch?v=VIcBpRpiBoc Security Framework 29