Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Database Administration and Security Transparencies 1.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Information Security Policies and Standards
October 22, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint, Part II SOEN321-Information-Systems Security.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Using Digital Credentials On The World-Wide Web M. Winslett.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Defining Security Issues
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
IMS 4212: Database Security 1 Dr. Lawrence West, Management Dept., University of Central Florida Data & Database Administration Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Information Security in Distributed Systems Distributed Systems1.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Key Management in AAA Russ Housley Incoming Security Area Director.
CPT 123 Internet Skills Class Notes Internet Security Session B.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
1 Example security systems n Kerberos n Secure shell.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Securing Information Systems
VIRTUALIZATION & CLOUD COMPUTING
Chapter 17 Risks, Security and Disaster Recovery
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Challenges Of Network Security
INTERNET SECURITY.
Presentation transcript:

Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton

For Today What is security? What is being secured? What are the ways to do it? Physical Electronic Social

What is Security? Refers to our desire to restrict access to resources to only those people who are authorized to consume or handle them

Components of Any Security Architecture Includes: Authentication—the process of discovering that a person is who he/she says he/she is Authorization—the granting of privileges based on the identity of the person (which has been confirmed using Authentication above)

Components of Security Architectures (continued) Definition of what resources are being secured Establishing barriers to access for those resources, which may be: Physical—walls, guards, dogs, ID badges Electronic—encryption algorithms, passwords, firewalls, etc. Social—training in appropriate use of resources

Tradeoffs in Creating Security Architectures An important decision for application developers is choosing an appropriate level of security for the application Adding security mechanisms adds complexity, processing overhead, increased points of failure, and therefore increased costs to creating, operating, maintaining a system

The Cost of Security The goal is not to create the “perfect” system that will keep out any intruder, but mainly it’s to make the cost of accessing the resources higher than the value of the resources to those who might try to obtain them illegally Finding an appropriate balance between cost and security is the challenge you’ll face

The Goal for this Lecture To give you enough understanding of security architectures so that you can make your own decision about what levels of security are appropriate for systems that you will build

Question 1: What to secure? What resources do you possess? What is their value to you and to others? YouOthers Critical Important Unimportant

What to secure? For networked applications the primary resources you have are: Data Processing capacity Bandwidth What is the value to your operation of each of these resources?

Question 2: What could happen? It is important to have a good idea of what could happen to your resources so that you’ll know what to protect against. e.g you don’t wear kevlar at home (at least I hope!)

What could happen to your data? Stolen Corrupted Destroyed

What could happen to your processing capacity? ‘Evil’ processes such as viruses can take up processing capacity.

What could happen to your bandwidth? People can steal your bandwidth particularly with wireless networks.

How to implement your security Three main aspects: Physical Electronic Social

Physical Security Protection of: Servers Transmission systems Clients (as much as you can) Protection from Theft Break-ins Vandalism or destruction Natural Disasters

Electronic Security Data Encryption Authentication and Authorization of users Firewalls Protocol TCP/IP is the main protocol for networked applications. It by itself is not secure Run other secure protocols on top of TCP/IP such as SSL, TLS, and PCT.

Social Security People are the weakest link People have bad passwords Store passwords in poor locations Take data out of secure locations, i.e. home. Give out information to other people knowingly or unknowingly

Public Key Encryption is not secure PGP was developed in the early 90’s and since then many public key encryption technologies have been developed Here’s an example of the process…