Chapter 14: Representing Identity

Slides:



Advertisements
Similar presentations
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Advertisements

Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
CMSC 414 Computer (and Network) Security Lecture 15 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #13-1 Chapter 14: Identity What is identity Multiple names for one thing Different.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How IP Address Protocols Work INTRO v2.0—4-1.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Identity.
CS 447 Networks and Data Communication ARP (Address Resolution Protocol) for the Internet Department of Computer Science Southern Illinois University Edwardsville.
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
TCP/IP (Transmission Control Protocol / Internet Protocol)
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Network Address Translation
Chapter 13. Identity.
or call for office visit, or call Kathy Cheek,
Chapter 5 Network and Transport Layers
Chap 13. Representing Identity
Module 3: Enabling Access to Internet Resources
IT443 – Network Security Administration Instructor: Bo Sheng
CONNECTING TO THE INTERNET
Grid Security.
Computer Security: Art and Science
Chapter 18 IP Security  IP Security (IPSec)
Chapter 6 – Routing.
Troubleshooting IP Communications
Mobility And IP Addressing
Introducing To Networking
How to Check if a site's connection is secure ?
Address Resolution Protocol
The Open System Interconnection (OSI) Model & Network Protocols.
IIS.
NAT/ARP/RARP (Ch 5 & 8) Dr. Clincy Lecture.
Advanced System Security
Chapter 26: Network Security
Chapter 27: System Security
8PM – Quickly Overview Final Project
Ch. 11 – Cipher Techniques Dr. Wayne Summers
Pooja programmer,cse department
Chapter 17: Confinement Problem
Chapt. 10 – Key Management Dr. Wayne Summers
Network Hardware and Protocols
Chapter 28: User Security
Computer Security: Art and Science
AbbottLink™ - IP Address Overview
Introduction to Network Security
Ch 17 - Binding Protocol Addresses
Advanced Computer Networks
Lecture 4a Mobile IP 1.
Review of Internet Protocols Network Layer
Presentation transcript:

Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University Summers_wayne@colstate.edu http://csc.colstate.edu/summers

Representing Identity Principal - unique entity (ex. File, user) Identity - specifies a principal (ex. Filename, UID) Authentication binds a principal to a representation of identity internal to the computer Principals may be grouped into sets called groups Role – type of group that ties membership to function

Naming and Certificates Certificate – mechanism for binding cryptographic keys to identifiers X.509v3 certificates use Distinguished Names: /O=Columbus State University/OU=Computer Science Dept/CN=Wayne Summers CA authentication policy describes the level of authentication required to identify the principal to whom the certificate is to be issued Defines the way in which principals prove their identity CA issuance policy describes the principals to whom the CA will issue certificates

Identity on the Web Host Identity Static & Dynamic Identifiers Ethernet (MAC) address: 00-07-E9-72-B3-75 IP address: 192.168.0.3 Host name: jaring.colstate.edu Static & Dynamic Identifiers ARP (maps MAC and IP addresses) DNS (maps IP addresses and host names) DHCP – provides a dynamic IP address NAT (Network Address Translation): router that translates between external and internal (private) addresses (e.g. 10.x.y.z)

Identity on the Web State and Cookies Cookie – token that contains information about the state of a transaction on a network name and associated value are encoded to represent the state Expiration field indicates when the cookie is valid Domain indicates for which domain the cookie is intended Path restricts the dissemination of the cookie within the domain Secure field restricts the use of the cookie to over SSL connections only

Anonymity on the Web Anonymizer – site that hides the origin of the connection (similar to a proxy server) Pseudo-anonymous remailer – remailer that replaces the originating e-mail address before it forwards the e-mail but keeps the mappings Cyberpunk (type 1) remailer – strips the header before forwarding Mixmaster (type 2) remailer- Cyperpunk remailer that only handles enciphered messages and pads messages to a fixed size before sending them