Information Security. Information security  All measures taken to prevent unauthorized use of electronic data –unauthorized use includes disclosure,

Slides:



Advertisements
Similar presentations
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Advertisements

Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 17 Controls and Security Measures
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Security Issues on E-Government Presented by, Pranita Upadhyaya PhD Student, KU Presented by, Pranita Upadhyaya PhD Student, KU.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
BUSINESS B1 Information Security.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Introduction to Computer and Network Security
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CompSci Today’s topics l Security ä Demo from RSA Security ( ä Sildes taken from Tammy Bailey ä Slides taken from Kevin Wayne & Robert.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DIGITAL SIGNATURE.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Private key
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CompSci Today’s topics l Security ä Demo from RSA Security ( ä Sildes taken from Tammy Bailey ä Slides taken from Kevin Wayne & Robert.
Fall 2006CS 395: Computer Security1 Key Management.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Information Security and Privacy By: Mike Battestilli.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security in Networking
Presentation transcript:

Information Security

Information security  All measures taken to prevent unauthorized use of electronic data –unauthorized use includes disclosure, alteration, substitution, or destruction of the data concerned  Provision of the following three services –Confidentiality  concealment of data from unauthorized parties –Integrity  assurance that data is genuine –Availability  system still functions efficiently after security provisions are in place  No single measure can ensure complete security

Why is information security important?  Governments, commercial businesses, and individuals are all storing information electronically –compact, instantaneous transfer, easy access  Ability to use information more efficiently has resulted in a rapid increase in the value of information  Information stored electronically faces new and potentially more damaging security threats –can potentially be stolen from a remote location –much easier to intercept and alter electronic communication than its paper-based predecessors

Building blocks of a secure system  Confidentiality: concealment from unauthorized parties –identification – unique identifiers for all users –authentication  user: assurance that the parties involved in a real- time transaction are who they say they are  data: assurance of message source –authorization - allowing users who have been identified and authenticated to use certain resources  Integrity: assurance the data is has not been modified by unauthorized parties –non-repudiation  proof of integrity and origin of data which can be verified by any third party at any time

Completing the security process  Confidentiality + integrity  system security  However, it is not enough for system to be secure  System must also be available –must allow guaranteed, efficient and continuous use of information –security measures should not prohibitively slow down or crash system or make it difficult to use  what good is a secure system if you can’t use it?  Cryptographic systems –high level of security and flexibility –can potentially provide all objectives of information security: confidentiality, integrity, and availability

Symmetric and public key cryptosystems Symmetric-key cryptosystem  same key is used for encryption and decryption  system with 1000 users requires 499,500 keys –each pair of users requires a different key Public-key cryptosystem  separate keys for encryption and decryption  system with 1000 users requires 2000 keys –each individual user has exactly two keys

Public-key encryption: confidentiality  Alice wants to send message M to Bob –uses Bob’s public key to encrypt M  Bob uses his private key to decrypt M –only Bob has key –no one else can decipher M  Identification provided by public key encryption  But … anyone can send message to Bob using his public key –how are we sure the message came from Alice?

Digital signatures  Electronic equivalent of handwritten signatures  Handwritten signatures are hard to forge  Electronic information is easy to duplicate  Digital signatures using public key encryption –Idea:  Bob uses his private key to “sign” a message  Alice verifies signature using Bob’s public key  Data authentication provided by digital signatures

Signed challenges  Alice wants assurance of real-time communication  Bob tries to provide assurance by digital signature  Alice is assured message originated from Bob –digital signatures provide data origin authentication –But … Eve can intercept signature and use it to authenticate herself as Bob at any later time  Signed challenge –Alice sends random number (a challenge) to Bob –Bob replies with challenge encrypted with signature  User authentication provided by signed challenges –combination of digital signature and unpredictability of Alice's random number challenge

Certification authority  A third party trusted by all users that creates, distributes, revokes, & manages certificates  Certificates bind users to their public keys  For example, if Alice wants to obtain Bob's public key –she retrieves Bob's certificate from a public directory –she verifies the CA's signature on the certificate itself –if signature verifies correctly, she has assurance from the trusted CA this really is Bob's public key –she can use Bob's public key to send confidential information to Bob or to verify Bob's signatures, protected by the assurance of the certificate  Integrity is provided by the certification authority

Attacks  Compromise systems in ways that affect services of information security –attack on confidentiality:  unauthorized disclosure of information –attack on integrity:  destruction or corruption of information –attack on availability:  disruption or denial of services Prevention, detection, response –proper planning reduces risk of attack and increases capabilities of detection and response if an attack does occur

Prevention  Establishment of policy and access control –who: identification, authentication, authorization –what: granted on “need-to-know” basis  Implementation of hardware, software, and services –users cannot override, unalterable (attackers cannot defeat security mechanisms by changing them) –examples of preventative mechanisms  passwords - prevent unauthorized system access  firewalls - prevent unauthorized network access  encryption - prevents breaches of confidentiality  physical security devices - prevent theft  Maintenance

Prevention is not enough! Bruce Schneier, Counterpane Internet Security, Inc. Prevention systems are never perfect. No bank ever says: "Our safe is so good, we don't need an alarm system." No museum ever says: "Our door and window locks are so good, we don't need night watchmen.“ Detection and response are how we get security in the real world, and they're the only way we can possibly get security in the cyberspace world.

Detection  Determine that either an attack is underway or has occurred and report it  Real-time monitoring –or, as close as possible –monitor attacks to provide data about their nature, severity, and results  Intrusion verification and notification –intrusion detection systems (IDS) –typical detection systems monitor various aspects of the system, looking for actions or information indicating an attack  example: denial of access to a system when user repeatedly enters incorrect password

Response  Stop/contain an attack –must be timely!  incident response plan developed in advance  Assess and repair any damage  Resumption of correct operation  Evidence collection and preservation –very important  identifies vulnerabilities  strengthens future security measures

Exercises Classify each of the following as an attack on confidentiality, integrity, and/or availability (more than one may apply). Justify your answers. 1. John copies Mary's homework 2. Paul crashes Linda's system 3. Carol changes the amount of Angelo's check from $100 to $1, Gina forges Roger's signature on a deed 5. Rhonda registers the domain name "AddisonWesley.com" and refuses to let the publishing house buy or use that domain name 6. Jonah obtains Peter's credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number 7. Henry spoofs Julie's IP address to gain access to her computer

References Introduction to Information Security ECC white paper, March The Information Security Process: Prevention, Detection and Response James LaPiedra GIAC practical repository, SANS Institute InformIT Reference Guides