CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.

Slides:



Advertisements
Similar presentations
Rob Farraher Ken Pickering Lim Vu
Advertisements

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
File Management Chapter 3
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
CSE331: Introduction to Networks and Security Lecture 35 Fall 2002.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
1 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Digital Watermarking Parag Agarwal
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Steganography detection Roland Cmorik, Martin Šumák.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Topic 5: Basic Security.
Network Security & Accounting
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Chap1: Is there a Security Problem in Computing?.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
UNIT 19 Data Security 2.
Part 3.
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Security.
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

CSE331: Introduction to Networks and Security Lecture 36 Fall 2002

CSE331 Fall Announcements Homework 3 Due Today Project 4 Due Monday Review Session on Monday Final Exam Location –Moore 212 –Tues. 17 Dec. –8:30 – 10:30 AM

CSE331 Fall Recap Denial of Service Attacks –Availability –Asymmetric consumption of resources Today: –Denial of Service Prevention & Response –Digital Rights Management

CSE331 Fall Prevention & Response 1 Implement router filters –Lessen exposure to certain denial-of-service attacks. –Aid in preventing internal users from effectively launching denial-of-service attacks. Disable any unused or unneeded network services –Limits the ability of an intruder to take advantage of those services to execute a denial-of-service attack.

CSE331 Fall Prevention & Response 2 Enable quota systems on the operating system –Disk quotas for all accounts –Partition file system to separate critical functions from other data Observe the system performance –Establish baselines for ordinary activity. –Use the baseline to gauge unusual levels of disk activity, CPU usage, or network traffic.

CSE331 Fall Prevention & Response 3 Invest in and maintain "hot spares“ –Machines that can be placed into service quickly in the event that a similar machine is disabled. Invest in redundant and fault-tolerant network configurations. Establish and maintain regular backup schedules –particularly for important configuration information

CSE331 Fall Digital Rights Management Restrict the use of digital information to protect copyright holders DRM attempts to control –File access (# of views, length of views) –Altering –Sharing –Copying –Printing or otherwise exporting

CSE331 Fall DRM Approach 1: Containment Encrypt the data Viewing the data: –Proprietary software –Proprietary hardware Weaknesses –Copy the viewing software –Hardware is inflexible (and fallible) –Reverse engineer viewing software to expose unencrypted data –Only takes one good hacker to create a bootleg

CSE331 Fall DRM Approach 2: Marking Steganography: (covered writing) –The process of secretly embedding information into a data source in such a way its very existence is concealed. Digital watermarking: –A short sequence of information embedded in a way that is difficult to erase.

CSE331 Fall Watermarking Basic Idea Pictures, Video, and Sound –Human perception is imperfect –There are a lot of “least significant bits” –Modifying the least significant bits doesn’t change the picture much Encode a signal in the least significant bits. (R,G,B) = (182,54,89)(R,G,B) = (182,54,90)

CSE331 Fall Watermarking Example Original ImageWatermarked Image

CSE331 Fall Properties of Watermarks Desirable properties –Imperceptible –Robust (withstands modifications to the image) –High capacity –Efficient –Hard to remove (some schemes involve cryptographic operations) Drawbacks –Hard to make tamper proof –Can distort image/sound

CSE331 Fall DRM Examples DVD players/recorders –Keyed to a geographic region –DVD burners may refuse to record watermarked material Secure Digital Music Initiative –

CSE331 Fall But… SDMI hasn’t panned out Ed Felton of Princeton –“In September 2000, SDMI issued a public challenge to help them choose among four proposed watermarking technologies. During the three-week challenge, researchers could download samples of watermarked music, and were invited to attempt to remove the secret copyright watermarks.” –During the challenge period, our team … successfully defeated all four of the watermarking challenges, by rendering the watermarks undetectable without significantly degrading the audio quality of the samples. Our success on these challenges was confirmed by SDMI's server.

CSE331 Fall Identity Theft Steal Personal Information: –Social Security Numbers –Telephone Numbers –Address Information –Date of Birth –Credit card number Use it to: –Open a credit card account –Change the mailing address on your credit card account –Establish cell phone service –Open a bank account

CSE331 Fall For Future Reference… Trust in Cyberspace –National Academy Report on directions in Network Information Systems Security –Complete contents are on the web (for free) – CERT –