Security.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 17 Computer Security. Chapter Goals Discuss the CIA triad List three types of authentication credentials Create secure passwords and assess the.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Types of Electronic Infection
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Unit 3 Section 6.4: Internet Security
Security Issues in Information Technology
Chapter 40 Internet Security.
Web Applications Security Cryptography 1
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security Outline Encryption Algorithms Authentication Protocols
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Network Security.
Secure Sockets Layer (SSL)
Cryptographic Hash Function
CSCE 715: Network Systems Security
Security.
Cryptography and Security Technologies
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Encryption
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Presented by: Dr. Munam Ali Shah
NET 311 Information Security
– Communication Technology in a Changing World
12: Security The Security Problem Authentication Program Threats
Chap 10 Malicious Software.
ISNE101 Dr. Ken Cosh Week 13.
برنامج أمن أنظمة الحاسب
Security.
Lecture 4 - Cryptography
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Protocol ap1.0: Alice says “I am Alice”
Information Security Tanachat Arayachutinan
Faculty of Science IT Department By Raz Dara MA.
Security.
Chap 10 Malicious Software.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Operating System Concepts
Chapter 3 - Public-Key Cryptography & Authentication
Computer Security By: Muhammed Anwar.
Operating System Concepts
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Chapter Goals Discuss the CIA triad
Lecture 36.
Lecture 36.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security

CIA Model Confidentiality means private data can be kept private Integrity means messages cannot be changed (without detection) Availability means resources can be kept available against a determined attacker Security analysis often assumes all communications can be seen by an attacker and all methods are open. Risk Analysis must be done to balance the costs of security with the costs of a failure in security, Not related to Central Intelligence Agency. Just the tip of the iceberg -- consider a setup where a general is either going to send an “Stay vigilant” (do nothing message) or a battle plan, with a map, etc. -- the message can be perfectly unbreakable (confidential), unmodifiable (integrity), and unblockable (available) -- an attacker can still infer just from the size alone critical informaton. Security analysis is deep and requires thinking through many (infinite?) possibilities. As an aside, what’s the fix?

Authentication Authentication is a process that validates a user or device is who they claim to be Many Attacks are threats against authentication Passwords are a form of Authentication Digital Signatures offer another (upcoming)

Hashes (brief aside) There are many hash functions -- functions that take data and return some sort of value that describes the data Network packets have CRC (Cyclic Redundancy Checks) which are designed to check for bit-flips (0->1, 1->0) and many other types of alterations. There’s a third type, a cryptographic hash function, which returns a number and is quite robust to modification of the data -- it’s very hard to change data in a way that will yield an identical hash value. Also, parity check ( or mod 2)

Passwords, Good and Bad Passwords provide Authentication Length is important (to a limit) Randomness is Better, both in selection and unrelated to you Password Reuse is problematic -- your password is only as strong as the weakest site you used it on. Hackers often target password lists -- they are valuable by themselves because of reuse Passwords should not ever be stored (they are hashed)

Typical Password Criteria Contain six or more characters Contain at least one uppercase and one lowercase letter Contain at least one digit Contain at least one special character No dictionary words, No names or part of names

Symmetric Encryption Sender and Receiver have same Key Problem with having a pre-shared key?

Substitution Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Substitute the letters in the second row for the letters in the top row to encrypt a message Encrypt(COMPUTER) gives FRPSXWHU Substitute the letters in the first row for the letters in the second row to decrypt a message Decrypt(Encrypt(COMPUTER)) gives COMPUTER Above is just a Caesar cipher

(D)DOS, (Distributed Denial of Service) Attack What happens if you send more data than a connection can handle? Answer: Packets get dropped If you flood a connection then it is possible to take down or seriously degrade a connection. Normally requires many uploading computer (1000s or more) Most major sites have a lot of connections and redundancy What CIA trait does this violate?

Attack: Social Engineering and Phishing It is possible to have perfect (computer) security but still be vulnerable: If users can reduce security and be fooled into doing so, then the security is imperfect. Many hacks involve social engineering, which is the process of convincing a user to violate a security rule. Phishing is just social engineering through e-mail.

Malicious Code A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm stands alone, targets network resources and servers Trojan horse disguised as benevolent resource Virus self-replicating Logic bomb set up to execute at system event (date or otherwise) (Vulnerabilities (Plain Old Mistakes):https://xkcd.com/1354/ ) Word/Excel files can have code embedded. (vulnerabilites aren’t malicious, just dangerous)

Asymmetric Encryption It is possible to send information one-way without a pre- shared secret key Often requires “obscure” math -- relies on problems that are known to be hard that can be made easy given extra knowledge, such as prime factorization

Asymmetric Key Generation

Asymmetric Encryption and Decryption

Digital Signatures and Certificates (okay, now forget the lockbox and key metaphor for this…) It is possible to run some of the Asymmetric Key Algorithms backwards -- “sign” something with the private key and then check the signature by running the public key to get the result One problem remains: how do we know we have the public key of the person we believe we’re communicating with? (Imperfect) Solution: We get the public keys from “Certificate Authorities” who sign things on behalf of others -- the CA will verify the identity of the entity through more rigorous means decrypt(encrypt(msg)) == encrpyt(decrypt(message)) for some algorithms. Can sign programs and communications. Also, we generally sign the hash of the data… since it’s much smaller.

References [parts of slides and images from Textbook]: Dale, Nell B., and John Lewis. Computer science illuminated. Jones & Bartlett Learning, 2007.