1 December Security and Privacy. Information Systems Security Systems Operating system, files, databases, accounting information, logs,... Issue if someone.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
1 An Overview of Computer Security computer security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
6 December Privacy. Presentations News: Tega Scott Peterson trial: Stephen.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Cryptographic Technologies
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Supporting Technologies III: Security 11/16 Lecture Notes.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Dimensions of E – Commerce Security
Encryption.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers due date Moved to Wednesday.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Network Security Celia Li Computer Science and Engineering York University.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Introduction (Pendahuluan)  Information Security  Criptography.
Privacy and Security.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Security through Encryption
Basic of Modern Cryptography
Presentation transcript:

1 December Security and Privacy

Information Systems Security Systems Operating system, files, databases, accounting information, logs,... Issue if someone gets access to your system Information in transit over a network e-commerce transactions, online banking, confidential s, file transfers,...

Basic Components of Security Confidentiality Keeping data and resources secret or hidden Integrity Ensuring authorized modifications Both data and origin Availability Ensuring authorized access to data and resources when desired Accountability Ensuring that an action is traceable uniquely to the actor

Assurance How much to trust a system Requires Protection against unintentional errors Resistance to intentional penetration or by- pass

Info Security 20 Years Ago Physical security Information was primarily on paper Lock and key Safe transmission Administrative security Control access to materials Personnel screening Auditing

Information security today Emergence of the Internet and distributed systems Increasing system complexity Digital information needs to be kept secure Competitive advantage Protection of assets Liability and responsibility Financial losses FBI estimates that an insider attack results in an average loss of $2.8 million Estimates of annual losses: $5 billion - $45 billion National defense Protection of critical infrastructures Power grid Air transportation Interlinked government agencies Severe concerns regarding security management and access control measures (GAO report 2003) Grade F for most of the agencies

Attack Vs Threat A threat is a “potential” violation of security Violation need not actually occur Fact that the violation might occur makes it a threat The actual violation of security is called an attack

Common security attacks Interruption, delay, denial of receipt, denial of service, distributed denial of service System assets or information become unavailable or are rendered unavailable Interception or snooping Unauthorized party gains access to information by browsing through files or reading communications Modification or alteration Unauthorized party changes information in transit or information stored for subsequent access Fabrication, masquerade, or spoofing Spurious information is inserted into the system or network by making it appear as if it is from a legitimate source

Goals of Security Prevention Prevent someone from violating a security policy Detection Detect activities in violation of a security policy Verify the efficacy of the prevention mechanism Recovery Stop attacks Assess and repair damage Ensure availability in presence of an ongoing attack Fix vulnerabilities in order to prevent future attacks Deal with the attacker

Should We Protect Something? Cost-Benefit Analysis Benefits vs. total cost Is it cheaper to prevent or recover? Risk Analysis How much should we protect this thing? Risk depends on environment and changes with time Laws and Customs Are desired security measures illegal? Will people do them? (DNA for identity) Affects availability and use of technology

Human Issues Outsiders and insiders Insiders account for 80-90% of all security problems Social engineering How much do you disclose about security?

Network Security

Information Systems Security “ Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench ” – Gene Spafford (Purdue)

Network Security Model Trusted Third Party arbiter, distributor of secret information Opponent Secure Message Message Information channel SenderReceiver Secret Information Security related transformation Secret Information Message

Network Access Model Gate Keeper Opponent - hackers - software Access Channel Data Software firewall or equivalent, password-based login

Firewall Techniques Filtering Doesn’t allow unauthorized messages through Can be used for both sending and receiving Most common method Proxy The firewall actually sends and receives the information Sets up separate sessions and controls what passes in the secure part of the network

Key Technologies Encryption Authentication

Encryption All encryption algorithms from BCE till 1976 were secret key algorithms Also called classical cryptography or symmetric key algorithms Julius Caesar used a substitution cipher Widespread use in World War II (enigma) Public key algorithms were introduced in 1976 by Whitfield Diffie and Martin Hellman

Caesar Cipher Substitute the letter 3 ahead for each one Example: Et tu, Brute Hw wx, Euxwh Quite sufficient for its time High illiteracy New idea

Enigma Machine Simple Caesar cipher through each rotor But rotors shifted at different rates Roller 1 rotated one position after every encryption Roller 2 rotated every 26 times… Used by Germany in WW II Allies broke the code Major benefit to the war effort

Terminology Plaintexts – unencrypted text Ciphertexts – encrypted text Keys – used to encrypt and decrypt Encryption functions – algorithm to change plaintext to ciphertext Decryption functions – algorithm to change ciphertext to plaintext

Security Level of Encrypted Data Unconditionally Secure Unlimited resources + unlimited time Still the plaintext CANNOT be recovered from the ciphertext Computationally Secure Cost of breaking a ciphertext exceeds the value of the hidden information The time taken to break the ciphertext exceeds the useful lifetime of the information

Types of Attacks Ciphertext only adversary has only ciphertext goal is to find plaintext, possibly key Known plaintext adversary has plaintext and ciphertext goal is to find key Chosen plaintext adversary can get a specific plaintext enciphered goal is to find key

Attack Mechanisms Brute force Statistical analysis Knowledge of natural language

Classical Cryptography Sender, receiver share common key Keys may be the same, or trivial to derive from one another Two basic types Transposition ciphers (rearrange bits) Substitution ciphers Product ciphers Combinations of the two basic types

Advanced Encryption Standard (AES) Government adopted in 2001 A block cipher: encrypts blocks of 128 bits using at least a 128 bit key outputs 64 bits of ciphertext A product cipher performs both substitution and transposition (permutation) on the bits Computationally secure: no known successful attacks

Public Key Cryptography Two keys Private key known only to individual Public key available to anyone Keys are inverses Used for Confidentiality encipher using public key decipher using private key Used for integrity and authentication encipher using private key decipher using public one

Private Key Requirements Computationally easy to encipher or decipher Computationally infeasible to derive the private key from the public key Computationally infeasible to determine the private key from a chosen plaintext attack

RSA Public key algorithm described in 1977 by Rivest, Shamir, and Adelman Exponentiation cipher Basics Public key: (e, n); private key: d e, d and n computed from two large prime numbers Encipher: c = m e mod n Decipher: m = c d mod n Computationally secure with 2048 bit key

Summary Two main types of cryptosystems: classical and public key Classical cryptosystems encipher and decipher using the same key Public key cryptosystems encipher and decipher using different keys

Authentication Assurance of the identity of the party that you’re talking to Methods Digital Signature Kerberos

Digital Signature Authenticates origin, contents of message in a manner provable to a disinterested third party (“judge”) Sender cannot deny having sent message (service is “nonrepudiation”) Limited to technical proofs Inability to deny one’s cryptographic key was used to sign One could claim the cryptographic key was stolen or compromised Legal proofs, etc., probably required Protocols based on both public and private key technologies

Kerberos Authentication system Central server plays role of trusted third party Ticket (credential) Issuer vouches for identity of requester of service Authenticator Identifies sender User must Authenticate to the system Obtain ticket to use a specific server Problems Relies on synchronized clocks Vulnerable to attack

Privacy

What is privacy? The right to have information that you don’t expect to be available to others remain that way On many sites, you give up your right to privacy

Some Views on Privacy “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, former head of BT (British Telecom) Research “You have zero privacy anyway.” Scott McNealy, CEO Sun Microsystems “By 2010, privacy will become a meaningless concept in western society” Gartner report, 2000

Historical Basis of Privacy Justice of Peace Act (England 1361) Provides for arrest of Peeping Toms and eavesdroppers Universal Declaration of Human Rights (1948) European Convention on Human Rights (1970)

Legal Realities of Privacy Self-regulation approach in US, Japan Comprehensive laws in Europe, Canada, Australia European Union Limits data collection Requires comprehensive disclosures Prohibits data export to unsafe countries Or any country for some types of data

Aspects of Privacy Anonymity Security Transparency and Control: knowing what is being collected

Impediments to Privacy Surveillance Data collection and sharing Cookies Web site last year was discovered capturing cookies that it retained for 5 years Sniffing, Snarfing, Snorting All are forms of capturing packets as they pass through the network Differ by how much information is captured and what is done with it

P3P Platform for Privacy Preference Voluntary standard still in draft form Structures a web sites policies in a machine readable format Allows browsers to understand the policy and behave according to a user’s defined preferences