Wiretapping and Encryption

Slides:



Advertisements
Similar presentations
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Advertisements

Security & Encryption Thomas Fenske & Joseph Minter.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Chapter 17 Controls and Security Measures
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Kusserow: “The Government Needs Comp Matching …” Published in the same journal as Shattuck. Comp matching ensures taxpayers’ money is safeguarded without.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
THE GREATEST INVENTION OF THE LAST 50 YEARS: THE INTERNET.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Authentication Question: how does a receiver know that remote communicating entity is who it is claimed to be?
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
ICT in Banking.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Wiretapping and Encryption More Week 5 cont.. Early Forms of Wiretapping uParty Lines uHuman Operators.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Electronic Banking & Security Electronic Banking & Security.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Security, Social and Legal Issues Regarding Software and Internet
Crypto in information security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Cryptography and Security Technologies
COEN 350 Network Security Introduction.
A Gift of Fire Third edition Sara Baase
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Intercepting Communications
Chapter 10 Consumer Education.
Who Uses Encryption? Module 7 Section 3.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
PowerPoint® Slides to Accompany
Confidentiality and Privacy Controls
Encryption, Cryptography, and Steganography:
Security through Encryption
PART VII Security.
A Gift of Fire Third edition Sara Baase
Public-Key, Digital Signatures, Management, Security
Fluency with Information Technology Lawrence Snyder
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Wiretapping and Encryption More Week 5 cont.

Early Forms of Wiretapping Party Lines Human Operators

Wiretapping Today Federal and state law enforcement Businesses Private Detectives Political Candidates ......

Cellular Phones Can be tapped with over-the-counter devices

Standard Phones Easily tapped if signal travels by microwave or satellite Government has secured phones

Legal Mandates 1937 - Supreme Court rules that wiretapping is illegal 1968 - Congress explicitly allowed it by law enforcement agencies needs court order Electronic Communications Privacy Act includes new technologies

Cryptography - Making and breaking of ciphers Translation of the original message into a new incomprehensible one by a mathematical algorithm using a specific KEY Plaintext - a message or data Ciphertext - encrypted text Decryption - decipher back to plaintext

Encryption Includes: Coding scheme or cryptographic algorithm Specific sequence of characters key used by the algorithm

Examples Cereal box codes Substitution cipher Cryptoquip in newspaper

Variations - Symmetric Use the same key to encrypt and decrypt (secret key) Requires a more secure system to send the key than the system itself

Variation - Asymmetric Use a key (public key) to encrypt a message Another (private key) to decrypt the message

Who Uses Encryption? Banks Industry Professionals National ID cards Criminals Government .....

Industrial Espionage Knowledge of a company’s cost and price structure Market research Strategic plans Order and customer lists Insider information

Professionals Cellular telephones and electronic mail unencrypted data on machines

Criminals Cryptography allows criminals to keep their identities a secret Provides security to law breakers Allows anonymity Don’t use systems that leave trails

Reliability The longer the key has remained unbroken, the stronger it is likely to be The longer the key is in use, the more likely someone will be able to discover it larger amount of info will be compromised change key frequently

Algorithms available DES - Data Encryption Standard Developed by IBM in the 1970’s Adopted as a Federal Information Processing Standard Uses a 56 bit key Has been broken easily To extend life - extend key to 128 bits or triple DES

RSA algorithm Used in public key cryptography Patented in US Based on multiplication of large prime numbers

PGP - Pretty Good Privacy Based on RSA Used for protecting E-Mail And Online Credit Card transactions

New Controversies 1991 - Senate Bill - Government wants to be able to intercept any message and be able to decode it as well - not passed FBI and wiretapping - Telephony bills FBI and Clipper Chip

Benefits of Government Intervention Aid law enforcement in protecting us from criminals and terrorists

Problems Threats to privacy global competitiveness civil liberties

Communications Assistance for Law Enforcement Act 1994 to and from Requires that telecommunications equipment be designed so govt. can: intercept all wire and electronic communic. Intercept comms from mobile users Obtain call-identifying info phone numbers Have info transmitted to a specific location Government will help foot the bill

Arguments for... Protection from terrorists and criminals FBI wants no new privileges BUT Necessity has not been justified Expense and other problems outweigh the benefits There has never been a guarantee of interception of private messages before

NEED? Wiretaps are less useful than informants, witnesses, etc. BUT 90% of terrorist cases used wiretaps Industry claims full compliance with FBI Continued cooperation is not guaranteed

COST? A lot more than government is giving Will save money in fines, forfeitures, prevented economic loss Used only in a subset of investigations Could use the money on other technologies

Innovation and global competitiveness Stifle or delay new technologies economic costs prevent new technologies’ implementation Damage to US competitiveness in global markets due to reduced security and privacy

Protection from Dossier Society Digital cash made possible by public key encryption Secure financial transactions without a credit card or checking account number

E-Cash (like PayPal) No link between payer and recipient Convenience of credit card Anonymity of cash Use on Internet for ordinary shopping Can transfer credentials Can prevent duplicate cash files Back up at home in case card is lost or stolen

E-Cash continued Not easy to form a consumer profile or dossier Prevent fraud and forgery Protect privacy from mailing lists More control over personal information

History of Encryption Secret - NSA National Security Agency can do anything has powerful computers - break ciphers and create ciphers monitors all communications between US and other countries

Government Interception NSA censored research controlled researchers Export restrictions munitions can’t export secure systems