Question

In: Computer Science

Suppose you need to transfer some data ensuring integrity and authentication and confidentiality of data. Explain...

Suppose you need to transfer some data ensuring integrity and authentication and confidentiality of data. Explain the steps.

Please don't provide handwritten solution for this question.

Solutions

Expert Solution

To ensure the security of your data in transit across a public network, you need more than an encrypted connection. You need a secure file transfer client that can preserve data integrity. Data integrity means that information sent from one end of a file transfer operation arrives intact at the other. Data integrity may be compromised through a man-in-the-middle attack, a hack that involves an attacker making independent connections with a client and host and relaying messages between them so that users at each end believe they are communicating over a private connection.

There are a number of things to consider when improving the security of data transfer procedures, these include:

  • User Authentication – FTP has traditionally used clear text passwords. This weakens the security as someone can pick up the password that is used and use it later to get access to the data.
  • Remote system identification verification to prevent hijacking of the packets by a system as the destination.
  • Data privacy (encryption) so that no intermediate system can use the data.
  • Data security (integrity or tamper prevention) to prevent modification to the data while it is in transit.
  • Preservation of data format. Different operating systems may store data in different formats. It is desirable to have a defined interchange format when this is the case. FTP has traditionally done a very good job of performing data interchange between systems.
  • Ease of use. A mechanism that requires extra steps or is not easy to use will encourage users to take short cuts that may not preserve the desired security when they are in a hurry.

The diffrent mechanisma iused for data transmission are

  • Encryption
  • SFTP (Secure Shell File Transfer Program)
  • FTP over Secure Shell (SSH)
  • IPSec,
  • Virtual Private Networks,
  • FTP over Transport Layer Security (TLS).

Encryption :

Encryption of the data by a separate program before performing the transfer was probably the first method used to solve this problem. Though this method is readily available, it doesn’t solve all of the problems. This method doesn’t protect the user’s password, so someone spying on the transmission could get access to the data after it has been decrypted unless a separate mechanism is used to limit the reusability of passwords.The requirement for manual encryption could cause problems when the user is in a hurry or discovers that there is a file that is needed that wasn’t encrypted before the transfer session was started. When the source and destination systems run different operating systems, it is possible that the data also needs to be converted either before or after it is encrypted. While this may be taken care of by the encryption program it is something to take in account when evaluating this method. Separate encryption may not provide data integrity. There are no mechanisms for the server to certify that it is the intended system in this method. This is the weakest method.

Separate Encryption before using FTP

Encryption of the data by a separate program before performing the transfer was probably the first method used to solve this problem. Though this method is readily available, it doesn’t solve all of the problems. This method doesn’t protect the user’s password, so someone spying on the transmission could get access to the data after it has been decrypted unless a separate mechanism is used to limit the reusability of passwords.

SFTP (SSH File Transfer Program)

SFTP is widely available for a number of platforms and it solves the problems of securing the user’s password and provides data encryption and integrity on the fly. SSH (which SFTP uses as an authentication and data transport mechanism) also authenticates the server involved though the exchange of keys. SSH keys are privately maintained and require external acceptance upon first use or prior transfer through an alternate method.

FTP over SSH

SSH can be used to create a secure tunnel between two systems. It is possible to have one end of this tunnel point to an FTP server and provide a secure channel for FTP transfers. Some SSH servers and clients recognize the FTP PORT and PASV commands and replies and can provide protection for the data channel as well. To use this method an SSH connection must be established between the two systems before the FTP connection is established, which adds inconvenience or uses resources even when there are no transfers being done. With this method SSH provides data privacy and integrity, server identification verification and privacy for the user password. FTP provides any data format conversion that is necessary between the two systems.

IPSec (and FTP)

IP Security (IPSec) provides secure communications (authentication, integrity, confidentiality) over IP-based networks between systems. Not all systems have IPSec available. Even when systems have it available, configuring differing types of systems to work together can be a challenge. Since this needs to be configured on a per system basis it may lack flexibility when destinations or sources change frequently.

Virtual Private Networks (and FTP)

A Virtual Private Network uses encryption to provide secure communication between two systems. It may do it at network layer 2, by creating a logical wire between the two systems. In this case all network traffic passes over this logical wire, whether or not is destined for the system on the other end. Or it may create it at network layer 3 by encrypting and encapsulating packets that traverse a particular route. A VPN can also be created with external (router) hardware being configured to encrypt the data between specified addresses.

FTP over TLS (

Transport Layer Security is commonly used to secure data transferred between web browsers and servers (https). TLS is also known as Secure Socket Layer (SSL). FTP over TLS is specified by RFC 4217 and uses TLS to add password privacy and server verification to FTP. It also makes privacy for data transfers available. The command channel is protected during the user authentication procedure and may be set to clear after setting file transfer protection requirements to let firewalls and NAT devices learn about the FTP data channel and open the necessary ports to allow the data to be exchanged. The data channel may be set to private, which provides both data security and integrity. FTP was designed to properly handle ASCII and binary file transfers so it does well when different system types are involved.


Related Solutions

Define the following terms and security objectives and give examples: Confidentiality Integrity Availability Authentication Authorization
Define the following terms and security objectives and give examples: Confidentiality Integrity Availability Authentication Authorization
(TCO 8) Malicious data modification or tampering is an attack against data confidentiality. data integrity. data...
(TCO 8) Malicious data modification or tampering is an attack against data confidentiality. data integrity. data availability. data accountability. Question 105 pts (TCO 9) A threat assessment is a(n) identification of types of threats an organization might be exposed to. systematic rating of threats based upon level of risk and probability. potential level of impact. likelihood of a threat materializing. Question 115 pts (TCO 10) When it comes to HIPAA, which of the following does PHI stand for? Public health...
Question 7: Explain how public key encryption ensure both Confidentiality and Authentication.
Question 7: Explain how public key encryption ensure both Confidentiality and Authentication.
Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in...
Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel.
1-Explain professional ethics in the accounting field. Be sure to include and explain competence, confidentiality, integrity...
1-Explain professional ethics in the accounting field. Be sure to include and explain competence, confidentiality, integrity and credibility. 2-Explain cost vs. benefits as it relates to accumulating, analyzing and providing accounting information 3- Describe the main differences between traditional accounting systems and Activity Based Cost Accounting systems. Which system is generally considered better and why?
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and...
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and understand why two more attributes, Authentication and Nonrepudiation, should be involved in the Security Services dimension, and what the Time dimension for information security and assurance discusses. Write a short paper to discuss and describe your understanding.
Explain what academic integrity is, and explain how you are prepared to meet the academic integrity...
Explain what academic integrity is, and explain how you are prepared to meet the academic integrity standards at your nursing school
Explain Incident Data Integrity and Retention. When should you report an incident? To whom should you...
Explain Incident Data Integrity and Retention. When should you report an incident? To whom should you report it? etc.....
7. (a) Do you think application-level authentication is superior to operating system authentication? Explain. (b) Discuss...
7. (a) Do you think application-level authentication is superior to operating system authentication? Explain. (b) Discuss how a SQL injection attack works. (c) Differentiate between in-band and out-of-band SQL injection attacks.
Please list and explain some examples of how network integrity and availability can be compromised?
Please list and explain some examples of how network integrity and availability can be compromised?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT