IP & System Security




IP Security (IPsec) & Secure Communication Protocols

What is IP Security (IPsec)?

IPsec (Internet Protocol Security) is a security framework that protects data at the IP (network) layer.

It provides:

  • Confidentiality
  • Authentication
  • Integrity
  • Protection against replay attacks

IPsec secures IP packets, not applications.

IPsec Architecture

Main Components of IPsec Architecture

ComponentDescription
Authentication Header (AH)Provides authentication & integrity
Encapsulating Security Payload (ESP)Provides encryption
Security Association (SA)Security agreement
Key ManagementKey exchange & control
ModesTransport & Tunnel

IPsec Modes

ModeDescriptionUse Case
Transport ModeProtects payload onlyEnd-to-end
Tunnel ModeProtects full packetVPNs

Real-Life Example

  • VPN connections
  • Corporate network security
  • Government communication

Authentication Header (AH)

What is AH?

Authentication Header (AH) ensures:

  • Data integrity
  • Data origin authentication
  • Anti-replay protection

❌ AH does not provide encryption

AH Header Fields

FieldPurpose
Next HeaderType of next protocol
SPISecurity Association ID
Sequence NumberPrevent replay
Authentication DataIntegrity check

Real-Life Example

  • Verifying sender identity
  • Preventing packet tampering

Encapsulating Security Payload (ESP)

What is ESP?

ESP provides:

  • Confidentiality (encryption)
  • Integrity
  • Authentication (optional)
  • Anti-replay protection

ESP Packet Structure

PartFunction
ESP HeaderSPI, Sequence number
Encrypted PayloadActual data
ESP TrailerPadding
Authentication DataIntegrity

Difference: AH vs ESP

FeatureAHESP
Encryption❌ No✅ Yes
Authentication✅ Yes✅ Yes
Integrity✅ Yes✅ Yes
UsageLimitedWidely used

Combining Security Associations (SA)

What is Security Association (SA)?

A Security Association is a one-way logical connection that defines:

  • Encryption algorithm
  • Authentication algorithm
  • Keys
  • Lifetime

SA Characteristics

  • Unidirectional
  • Identified by SPI
  • Exists before communication

SA Bundles (Combination)

CombinationPurpose
AH + ESPAuthentication + Encryption
Transport + TunnelLayered security
Multiple ESPMulti-level protection

Real-Life Example

  • Corporate VPN + authentication
  • Secure government tunnels

Key Management in IPsec

Why Key Management Is Needed

  • Secure key generation
  • Automatic key exchange
  • Key refresh & deletion

Internet Key Exchange (IKE)

VersionFeature
IKEv1Basic
IKEv2Faster & more secure

IKE Functions

  • Authentication
  • SA establishment
  • Key exchange (Diffie-Hellman)

Secure Socket Layer (SSL)

What is SSL?

SSL (Secure Socket Layer) is a security protocol that secures communication between:

  • Web browser
  • Web server

SSL operates at transport layer.

Services Provided by SSL

ServiceDescription
EncryptionSecure data transfer
AuthenticationServer verification
IntegrityPrevent tampering

SSL Handshake Process

  • Client Hello
  • Server Certificate
  • Key exchange
  • Secure session starts

Real-Life Example

  • HTTPS websites
  • Online banking
  • E-commerce portals

Secure Electronic Transaction (SET)

What is SET?

SET (Secure Electronic Transaction) is a protocol designed for secure online credit card payments.

Developed by:

  • Visa
  • MasterCard

SET Participants

EntityRole
CardholderCustomer
MerchantSeller
Issuer BankCustomer bank
Acquirer BankMerchant bank
Payment GatewayTransaction processor

SET Features

FeatureDescription
ConfidentialityCard details protected
AuthenticationBuyer & seller verified
IntegrityNo data modification
Non-repudiationTransaction proof

Why SET Failed Commercially

  • Complex infrastructure
  • High cost
  • SSL became dominant

Comparison: IPsec vs SSL

FeatureIPsecSSL
LayerNetworkTransport
TransparencyApplication-independentApp-specific
UseVPNsWeb security
ComplexityHighModerate

Final Quick Revision Table

TopicKey Point
IPsecNetwork layer security
AHAuthentication only
ESPEncryption + security
SASecurity agreement
Key ManagementIKE
SSLSecure web
SETSecure payments

System Security

What is System Security?

System security refers to protecting:

  • Computers
  • Networks
  • Data
  • Applications

from unauthorized access, misuse, damage, or attacks.

Goal: Confidentiality, Integrity, Availability (CIA Triad)

Introductory Idea of Intrusion

What is an Intrusion?

An intrusion is any unauthorized attempt to:

  • Access a system
  • Modify data
  • Disrupt services

Simple Meaning

Intrusion is like someone entering your house without permission.

Types of Intrusion

TypeDescriptionExample
External IntrusionAttack from outsideHacker breaking into server
Internal IntrusionInsider misuseEmployee stealing data
Physical IntrusionHardware accessUSB attack
Logical IntrusionSoftware-basedPassword cracking

Real-Life Examples

  • Unauthorized login
  • Website defacement
  • Data theft
  • Ransomware attack

Intrusion Detection System (IDS)

What is Intrusion Detection?

Intrusion Detection is the process of monitoring system activity to detect suspicious behavior.

IDS detects attacks but does not block them.

Types of IDS

IDS TypeDescription
Host-Based IDS (HIDS)Monitors individual system
Network-Based IDS (NIDS)Monitors network traffic
Signature-Based IDSMatches known attack patterns
Anomaly-Based IDSDetects unusual behavior

IDS Working (Simple)

  • Collect system/network data
  • Analyze traffic or logs
  • Detect abnormal behavior
  • Generate alert

Real-Life Example

  • Alert when someone tries multiple wrong passwords
  • Detection of malware activity

IDS vs IPS

FeatureIDSIPS
ActionDetectDetect + Prevent
ResponseAlert onlyBlocks attack
PlacementMonitoringInline

Viruses and Related Threats

What is a Computer Virus?

A computer virus is a malicious program that:

  • Attaches itself to files
  • Replicates
  • Damages system or data

Types of Viruses & Threats

ThreatDescriptionExample
VirusAttaches to programFile infection
WormSelf-replicatesNetwork spread
Trojan HorseDisguised as softwareFake antivirus
RansomwareEncrypts dataWannaCry
SpywareSteals informationKeylogger
AdwareDisplays adsPop-up malware

Virus Life Cycle

  • Dormant
  • Propagation
  • Triggering
  • Execution

Real-Life Impact

  • Data loss
  • System crash
  • Financial loss
  • Privacy breach

Protection Against Viruses

MethodPurpose
Antivirus softwareDetect & remove
Regular updatesPatch vulnerabilities
Avoid unknown linksPrevent infection
Backup dataRecovery

Firewalls

What is a Firewall?

A firewall is a security device or software that:

  • Monitors network traffic
  • Allows or blocks data based on rules

Firewall acts like a security gate.

Types of Firewalls

Firewall TypeDescription
Packet Filtering FirewallChecks packets
Stateful FirewallTracks connections
Application FirewallFilters application data
Proxy FirewallActs as middleman
Next-Gen FirewallAdvanced security

Firewall Working (Simple)

  • Incoming packet arrives
  • Firewall checks rules
  • Packet allowed or blocked

Real-Life Example

  • Office network protection
  • Home Wi-Fi router firewall
  • Data center security

Advantages & Limitations

AdvantagesLimitations
Prevents unauthorized accessCannot stop internal attacks
Easy to configureCannot stop all malware
Improves securityNeeds regular updates

Final Comparison Table

Security AspectRole
IntrusionUnauthorized access
IDSDetects intrusion
VirusMalicious software
FirewallNetwork protection

Final Quick Revision Table

TopicKey Point
System SecurityProtect systems
IntrusionUnauthorized access
IDSAttack detection
MalwareSystem damage
FirewallTraffic control

MCA Exam Writing Tips

  • Start with definition
  • Write types in table form
  • Add real-life examples
  • Draw simple diagrams