Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Lecture 6: Web security: SSL
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Network Security IS250 Spring 2010 John Chuang. 2 Outline  What is Network Security? -Security properties -Cryptographic techniques  Availability (or.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 3 rd 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Oct 4 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 19 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 16 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 4 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 15 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
CSIT435 Spring 2001 Final Examination Study Guide.
Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #12 Sep 23 rd 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #25 Nov 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 6 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #36 Dec 12 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 19 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 1 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
IIT Indore © Neminath Hubballi
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
@Yuan Xue Network Security Review and Beyond Network Security.
Secure Socket Layer (SSL)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS 4/585: Cryptography Tom Shrimpton FAB
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Network Attacks CS432 - Security in Computing
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2014 Nitesh Saxena.
Key Generation Bob generates his keys as follows –Choose two large distinct random primes p, q –Set n = pq (in Z… no finite groups yet) –Compute  (n)
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Network and System Security Risk Assessment
IT443 – Network Security Administration Instructor: Bo Sheng
Exam Review.
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005

Announcements Back from Tucson last night –7 below zero at DIA?! –Martin did great –But Quiz #3 not yet graded Project #3 –Non-executing stacks – trying to turn this off –Due date extended to 12/12 at 4:30pm Today –Final Review –FCQs Final Exam on Monday –4:30pm, this room

About the Final Same format as Midterm –Short answers, extended topic questions, Justified True/False –10 pages Twice as much time as the midterm, but the final is not twice as long –Far fewer “thought problems” than the midterm ie, it’s an easier test

Coverage Everything –Lectures (incl Martin’s guest lecture and Tuesday’s lecture) –Quizzes and Midterms Know the answers! –Assigned Readings –Projects But does not include: –Material I said you were specifically not responsible for Eg, coupon collecting –Reading on the web page that was not “assigned reading”

What to Study Blockciphers –Definition, Security Notions, Feistel, Attacks, DES, AES, DDES, TDES Modes of Operations –ECB, CBC, CTR –One-time-pad –Attack models COA, KPA, CPA, CCA

Review (cont) MACs –Syntax, ACMA model –CBC MAC, XCBC, UMAC, HMAC Hash Functions –Syntax, applications, MD paradigm, MD theorem, security notions (inversion resistance, 2 nd -preimage resistance, collision resistance), SHA-1, MD5 –Birthday problem Bounds, how to apply to hash functions

Review (cont) Groups –Definition, examples Z m, Z m *, Z p * –Euler’s  function, Lagrange’s theorem RSA Cryptosystem –Key generation, encryption –Security Basic RSA bad, factoring is best known attack, factoring technology –Implementation Not much…, know the diff between primality testing and factoring!

Review (cont) Digital Signatures –Definition, ACMA model, RSA sigs, hash-then-sign SSL –Outline of protocol, CAs, Man-in-the-middle attacks OpenSSL –Symmetric key and IV derivation Salt, passphrase, base64 encoding –Certificates, administration –Structure of projects 1 and 2

Review (cont) Networking Basics –Routing, basic protocols (IP, UDP, TCP, Eth, ARP, DHCP, DNS, ICMP, BGP), packet formatting –IP addresses, NAT boxes Viruses –High-level history (Morris worm, Windows worms, macro viruses) –Propagation methods How to 0wn the Internet

Review (cont) Trojans –Thompson’s Turing Award lecture –Rootkits –Phishing Denial of Service –Gibson story Bandwidth saturation, filtering, zombie armies –SYN Floods Mechanics, SYN Cookies –Reflection attacks, smurfing –Backscatter, Traceback, Ingress Filtering

Review (cont) Session Hijacking –Technique, prevention ICC Talk –Architecture, network issues, timing, key exchange, mode of operation, blockcipher flaws Vulnerabilities –Buffer overruns Idea, techniques, machine architecture, calling conventions, stack layout, shellcode

Review (cont) Overruns, cont –Prevention Non-executing stack, canaries –Ways around them –Static Analysis approach

Review (cont) Password Crackers –/etc/passwd, salt, shadowed password files Web Security Overview –PHP –Disguised URLs –XSS Wireless Security –War driving, SSIDs, MAC Filters

Review (cont) WEP –Protocol problems Dictionary attack on pads, authentication doesn’t work, etc Protocol Attacks –ARP cache poisoning (ettercap), DNS spoofing, prevention (AuthARP, DNSSEC)