Uses Of Encryption Algorithms

Slides:



Advertisements
Similar presentations
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Advertisements

A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Electronic Transaction Security (E-Commerce)
Many kinds of clients and servers This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none IT concepts:
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
© Affiliated Computer Services, Inc. (ACS) 2010 ACS Encryption.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
11 1 Cookies CGI/Perl Programming By Diane Zak Objectives In this chapter, you will: Learn the difference between temporary and persistent cookies.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
ECMM6018 Enterprise Networking for Electronic Commerce Tutorial 7
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By Liam Wright Manga comic group Japan SAFETY on your computer.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
COOKIES AND SESSIONS.
ASP.NET WEB Applications. ASP.NET  Web application framework developed by Microsoft  Build dynamic data driven web applications and web services  Subset.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
8 – Protecting Data and Security
Architecture Review 10/11/2004
TOPIC: HTTPS (Security protocol)
Cookies Tutorial Cavisson Systems Inc..
Web Programming Language
Chapter Objectives In this chapter, you will learn:
Chapter 5 Electronic Commerce | Security Threats - Solution
Section 2.1 Section 2.2 Identify hardware
Tonga Institute of Higher Education IT 141: Information Systems
A. Cookie B. Google Earth C. Cache D. ISP E. Netiquette F. Phishing
Session
Sharing and Synching files
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
Hardware security: The use of a Trusted Platform Module
Java Servlets.
Chapter 5 Electronic Commerce | Security Threats - Solution
Computer Basics Section 2.1 YOU WILL LEARN TO… Identify hardware
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Tonga Institute of Higher Education IT 141: Information Systems
HC Hyper-V Module GUI Portal VPS Templates Web Console
Network Security – Kerberos
The Secure Sockets Layer (SSL) Protocol
Web Servers / Deployment
Tonga Institute of Higher Education IT 141: Information Systems
Cookies and sessions Saturday, February 23, 2019Saturday, February 23,
Kerberos Part of project Athena (MIT).
LO3 – Understand Business IT Systems
Unit 8 Network Security.
Presentation transcript:

Uses Of Encryption Algorithms Encrypted string generations Encrypting drives, files, passwords, credit card numbers, and message send of networks.

Whole Drive(Full Disk) Encryption Entire disk is encrypted. At next System boot up, you enter a decryption key and the entire drive is decrypted. While decrypted (and connected to an intranet/internet) the disk is vulnerable to being read.

Trusted Platform Module (TPM) Add-in chip added to some processor-motherboard. Generate Encryption keys and stores them on the hardware (not the disk drive) and the disk drive can only be decrypted by the hardware on your computer. This prevents someone steeling you hard-drive (or memory stick) and using it on another computer.

Filesystem Level Encryption Example: Windows Encrypting File System (EFS)

Secure files on a web server You have a folder www.facebook.com/secretStuff/ This folder is available to the general public You want to put a file in this folder that no one can read by the intended person www.facebook.com/secretStuff/jimStuff.pdf Anyone who guesses the file name jimStuff.pdf and know the folder secretStuff can go looking for it, and read it.

Encrypt the file…send public key We can encrypt the file with a private key, then put the public key in a session variable for a properly logged in user to view the file. This would require all files to be encrypted with the same private key for that user for that login session. There for dynamic encryption of files needs to be done. When a user requests a file, the file gets encrypted at that moment, appears in a web page as a link and the decryption key is given to the user in a session variable so only that user can see the file.

Files in Private and public folders Public folders content is available publicly Private folders content is not We can copy a file over to the public folder temporally Might be good to have a cryptic name www.facebook.com/publicStuff/eRF_98eGSVres!.pdf

Creating encrypted file names(php) $fileName = ‘somewhatPrivateFile.pdf’; $date = date(‘m’); // get current month $salt = “facebook file encryption salt”; $encryptedFileName = encrypt($fileName,$date,salt) copy(private/$fileName, public/ $encryptedFileName ); - Since we know the names of files we can simply regenerate all encrypted file names and delete them after a reasonable amount of time.

Encrypted data sent over internet HTTP – hypertext transport protocol HTTPS – secure HTTP Messages are sent from client (you) to the server (facebook) in encrypted format. Then entire message is sent over the network as encrypted data. So no one along the path can read the data.

Recording encrypted data in a database

Encrypted Credit Card Number Visa may provide Amazon with a public Key to encrypt credit card numbers with and store in Amazon’s database. When a purchase is made, Amazon sends the encrypted CC number to Visa who uses the Amazon private key to decrypt the credit card number and process the purchase. This prevents employees of Amazon or system hackers to expose <customer CC number> pairs. Amazon can maintain credit number even so repeat customers don’t have to repeatedly type in the credit card number.