Security Design.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Cryptography, Authentication and Digital Signatures
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Public Key Encryption.
Digital Signatures, Message Digest and Authentication Week-9.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Encryption. What is encryption? Encryption is conversion of original data to another data that can be converted back to original data by authorized persons.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Private key
Network Security Celia Li Computer Science and Engineering York University.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Information Systems Design and Development Security Precautions Computing Science.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Unit 3 Section 6.4: Internet Security
Web Security.
Cryptography: an overview
Cryptography: an overview
VNF Package Integrity and Authenticity – Public key based
Unit 3 Section 6.4: Internet Security
Symmetric and Asymmetric Encryption
Computer Communication & Networks
e-Health Platform End 2 End encryption
K E Y Plain text Cipher text Encryption Decryption
Uses Uses of cryptography Lab today on RSA
IS3230 Access Security Unit 9 PKI and Encryption
NET 311 Information Security
12 E-Commerce Overview.
Keys Campbell R. Harvey Duke University, NBER and
Campbell R. Harvey Duke University and NBER
Amit Kulkarni February 17, 2004
Pooja programmer,cse department
Campbell R. Harvey Duke University and NBER
Secure Electronic Transaction (SET) University of Windsor
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Asymmetric Cryptographic Algorithms
Electronic Payment Security Technologies
Operating Systems Concepts
Secure Diffie-Hellman Algorithm
Presentation transcript:

Security Design

Encryption Encryption involves the use of secret keys (small binary files) to convert documents and communication channels into seeming random data, but losslessly convertible to the original if the key is known. Encryption is necessary to send (and store) sensitive information. There are two types of encryption algorithms for communication: Symmetric Key Algorithms: Here both parties have a shared secret key, the data is encrypted, transmitted, and then decrypted by the other party. Asymmetric (Public) Key Algorithms: Here a key is composed of two parts, a public key that is used to encrypt the data, and a private key that is used to decrypt the data. The sender encrypts the data with the receiver's public key and only the receiver (with their private key) can decrypt it.

Digital Certificates Often symmetric (or private) keys are used to digitally 'sign' documents to demonstrate that they were created by the authorized sender. Such a digital signature often includes a timestamp and a hash of the original document to verify that no part of the document was modified. Certificates can be issued by Certificate Authorities who confirm the identifies of the actors. https://www.acmetek.com/blog/why-we-should-use-the-term-digital-certificates-instead-of-ssl-certificates/

Database Survivability A DBMS, in addition to making every effort, to prevent an attack, should do the following if an attack is detected. Confinement: Eliminate an attacker's access to the system and contain the problem to prevent further spread. Damage Assessment: Determine the extend of the problem, including failed functions and corrupted data. Reconfiguration: Change options to allow the database to continue operating while recovery proceeds. Repair: Recover lost or corrupted data and restore functionality. Fault Treatment: Identify the weakness exploited by an attack and take steps to prevent reoccurrence.