– Communication Technology in a Changing World

Slides:



Advertisements
Similar presentations
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Advertisements

Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Dr. Ken Cosh.  Outsourcing  Managing Information Systems  Dependency  Reliability  Security  Ethics.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 2 - Hardware Computer Security.
IT Security for Users By Matthew Moody.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
BUSINESS B1 Information Security.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Topic 5: Basic Security.
INTERNET & ONLINE COMMUNITY Week 14. RECAP Remember “Analysing the Social Web”? Why would we want to do that? Propagation – what is it and how.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 6 Introduction to Digital Security
Securing Information Systems
Chapter 1: Explore the Network
Security Issues in Information Technology
Chapter 40 Internet Security.
What they are and how to protect against them
BUSINESS DRIVEN TECHNOLOGY
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Level 2 Diploma Unit 11 IT Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Network security threats
Chapter 6 Introduction to Digital Security
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Tool Server Workstation Router Universal
Teaching Computing to GCSE
Security in Networking
Call AVG Antivirus Support | Fix Your PC
– Communication Technology in a Changing World
BCT 2.00 Analyze Technology Issues
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Unit 1.6 Systems security Lesson 4
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

269111 – Communication Technology in a Changing World Dr. Ken Cosh Week 14

Previously… We talked about the “Digital Divide” What is it? Projects that attempt to close the divide Value of those projects?

Today Lets talk about “Dependability” Making Communication Technology ‘dependable’.

Dependability The dependability of a system reflects the user’s degree of trust in that system – their confidence that it will operate as expected.

Reliability and Availability The probability of failure-free system operation over a specified time in a given environment for a given purpose Availability The probability that a system, at a point in time, will be operational and able to deliver the requested services It is sometimes possible to subsume system availability under system reliability Obviously if a system is unavailable it is not delivering the specified system services However, it is possible to have systems with low reliability that must be available. So long as system failures can be repaired quickly and do not damage data, low reliability may not be a problem

Why is Reliability important? Costs of downtime for a business critical system How much would a 15 minute failure of service cost? How much would a days failure cost? If this was an Email service? What percent failure is acceptable?

Redundancy One way of dealing with Reliability is to use redundancy ‘Spare’ components, so if one fails another could be used. ‘Back-Ups’ Availability Math If a system is 98% available that means it is not available 2% of the time (i.e. about half an hour each day!!!) Many systems are now needed to be 99.999% available.

Components in Series Consider if each component was 98% reliable, and there were 5 components in series. .98 * .98 * .98 * .98 * .98 = 0.9, i.e. only 90% all components are running just 90% of the time. With more components, it is increasingly less reliable Component 1 98% Component 2 98% Component 3 98% Component 4 98% Component 5 98%

Components in Parallel Now consider these components in parallel. The probability of failure is 0.02 each time; 0.02 * 0.02 * 0.02 * 0.02 * 0.02 = 0.0000000032 !!! Hence, redundancy is used to increase reliability. If one component fails, another can be used in it’s place. Component 1 98% Component 2 98% Component 3 98% Component 4 98% Component 5 98%

Hardware vs Software Components in Parallel is sometimes called ‘Triple Modular Redundancy’, and it has 2 key assumptions; Hardware components do not have common design faults. Components fail randomly (there is low chance of simultaneous failure) Neither of these assumptions are true for software; Copying components copies design faults. So simultaneous failure is inevitable.

5 nines 99.999% Reliability? How about electricity? How about network connection?

Security A wide variety of threats Phishing Social Engineering Hacking Spamming Credit Card Fraud Denial Of Service Malware Trojans Virus / Worm

Fundamental Principles of Security

Risk

Risk Terminology

Intrusion Viruses / Worms Potential Threats Intrusion Viruses / Worms External Attacks Intrusion Viruses / Worms Interception

Threats Intrusion Viruses / Worms External Attacks Interception Gaining Access to internal infrastructure Viruses / Worms Replicating Software External Attacks Denial of Service. Interception Catching communication while en route between sender and receiver.

Intrusion Gaining access to internal infrastructure; Stealing Mobile Phone Guessing Passwords Hacking into private spaces Once a hacker has access to an account, they have the same rights as the account owner. Problem 1: Preventing hacker from accessing account. Problem 2: Finding out what someone may have done while they had access.

Viruses / Worms Virus Worms Software Program that replicate itself on more PC’s – in a similar way to viruses spread between people. Viruses need another program to piggyback off, e.g. a macro in a spreadsheet, or document. Are often spread using email Worms A small piece of software that uses security loopholes to replicate. E.g. finds a loophole in Windows, scans network for another PC with a similar loophole and copies itself to the new PC etc.

External Attacks Attacks without gaining access to a private device. Denial of Service(DoS) Very Common Attacks Purpose, to use up bandwidth or service, by ‘spoof’ conversations. Blocking Webservers with repeated hits Spam emails Distributed Denial of Service (DDOS) Attacking from many addresses simultaneously. Code Red Worm Chain Letters

Interception Catching communication whilst on route between sender and receiver. Intercepting Signals. Wireless Signals Government listening in on telephone conversations Normally minimised through encryption. Accessing someone else’s service Using bandwidth of wireless network

Improving Security Security Policies Firewalls Authentication Limiting users access & actions Firewalls Protection between network and internet Authentication Passwords etc. Encryption Encoding contents of communication Patches Responding to security breaches

Security Policies Access Control Lists (ACL) Limit which users can do what (e.g. update websites) Signed agreements for service When allowing users onto a network, normally they sign an agreement, regarding terms of use. Did you sign one at CMU? Policies could include, Regular password changes Whether personal use of service is permitted Antivirus updates Can help against, external attacks, intrusion, virus / worms

Firewalls Hardware and / or Software protection sitting between internal network and internet. Can help stop viruses/worms from accessing the network, W W W

Authentication Software to ensure permission of user to access service Password Finger prints / retina scans Helps against intrusion

Authentication

Encryption Encoding the contents of a transmission so it can’t be decrypted on route. Symmetric-key encryption Public / Private key encryption Helps prevent interception.

Symmetric Key Encryption Both sender and receiver use the same ‘code’ to encrypt and then decrypt a message. If I tell you to move each character back two in the alphabet, and then send you this message; Jgnnq Encuu Anyone who intercepts the message gets nothing, but you are able to decrypt it. More interesting patterns can be created to increase security. Substitution Transposition Key: FANCY Message: eatitnihmexnetmgmedt

Decoding

Patches Response to a virus or security breach Anti virus software often updates to add new virus definitions. Operating systems regularly update to deal with security loopholes which may allow worms to work.