Chapter 9 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2006 Prentice-Hall Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

COS 338 Day 18. DAY 18 Agenda Second capstone progress report over due Lab 5 graded 1 A, 2 B’s, 2 F’s and 1 non-submits Assignment 5 Graded 2 A’s, 2 B’s.
Security Chapter 9 Copyright 2004 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 5 th edition.
Security+ Guide to Network Security Fundamentals
COS 338 Day 16. DAY 16 Agenda Capstone Proposals Overdue 3 accepted, 3 in mediation Capstone progress reports still overdue I forgot to mark in calendar.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 22.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 9 Security. The Threat Environment 3 Figure 9-1: CSI/FBI Survey Companies Face Many Attacks –Viruses (and other malware) –Insider abuse of net.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
© 2013 Pearson.  Controlling Access to Resources ◦ If criminals cannot get access, they cannot do harm.  Authentication ◦ Proving one’s identity ◦ Cannot.
Chapter 3 Revised August  Introductory Chapters ◦ 1. Overview and core concepts ◦ 2. Standards concepts and key standards ◦ 3. Network security.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 9 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
Chapter 9 Updated January 2009 XU Zhengchuan Fudan University Security.
Securing Information Systems
Chapter 10 E-Commerce Security.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Security Copyright 2003 Prentice-Hall Panko’s Business Data Networking and Telecommunications, 4 th edition.
Security Chapter 9 (October 2002) Copyright 2003 Prentice-Hall Panko’s Business Data Networking and Telecommunications, 4 th edition.
Hacker Zombie Computer Reflectors Target.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Internet Security facilities for secure communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Chapter 3.  Introductory Chapters ◦ 1. Overview and core concepts ◦ 2. Standards concepts and key standards ◦ 3. Network security  Critical for understanding.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Types of Electronic Infection
ELC 200 Day 11. Agenda Questions? Assignment 3 is Not Corrected  Missing assignments Assignment 4 is posted  Due March 9:30 AM  Assignment4.pdf.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 The Elements of Cryptography Chapter 7 Copyright 2003 Prentice-Hall.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 9 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security Celia Li Computer Science and Engineering York University.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Chapter 3 Network Security KuangChiu Huang Ph.D. Institute of Telecommunications Management National Cheng Kung University.
Chapter 40 Internet Security.
Instructor Materials Chapter 7 Network Security
Secure Sockets Layer (SSL)
Security Chapter 9 Copyright 2004 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 5th edition.
Lecture 3: Secure Network Architecture
Security Chapter 9 Revised January 2007
Test 3 review FTP & Cybersecurity
Protection Mechanisms in Security Management
Presentation transcript:

Chapter 9 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2006 Prentice-Hall Security

2 Security Requirements Authenticity Confidentiality Integrity Non-repudiation Availability

3 Figure 9-2: Malware Malware ( 惡意軟體 ) –A general name for evil software Viruses –Pieces of code that attach to other programs –When infected programs execute, the virus executes –Infects other programs on the computer –Spreads to other computers by attachments, IM, peer-to-peer file transfers, etc. –Antivirus programs are needed to scan arriving files Also scans for other malware

4 Figure 9-2: Malware Worms –Stand-alone programs that do not need to attach to other programs –Can propagate like viruses through , etc. But this require human gullibility, which is slow –Vulnerability-enabled worms jump to victim hosts directly –Can do this because hosts have vulnerabilities –Vulnerability-enabled worms can spread with amazing speed –Vendors develop patches for vulnerabilities but companies often fail or are slow to apply them 漏洞

5 Figure 9-2: Malware Payloads –After propagation, viruses and worms execute their payloads (damage code) –Payloads erase hard disks, send users to pornography sites if they mistype URLs –Trojan horses: exploitation programs disguise ( 假裝 ) themselves as system files

6 Figure 9-2: Malware Attacks on Individuals –Social engineering—tricking the victim into doing something against his or her interests –Spam—unsolicited( 未被懇求的 ) commercial –Credit card number theft is performed by carders –Identity theft: collect enough data to impersonate the victim in large financial transactions –Fraud: get-rich-quick schemes( 一夜致富法 ), medical scams( 欺詐 ) Phishing

7 Figure 9-2: Malware Attacks on Individuals –Adware pops up advertisements –Spyware collects sensitive data and sends it to an attacker –Phishing: sophisticated social engineering attack in which an authentic-looking or website entices the user to enter his or her username, password, or other sensitive information

8 Figure 9-3: Human Break-Ins (Hacking) Human Break-Ins –Viruses and worms rely on one main attack method –Humans can keep trying different approaches until they succeed Hacking –Breaking into a computer –Hacking is intentionally using a computer resource without authorization or in excess of authorization

9 Figure 9-3: Human Break-Ins (Hacking) Scanning Phase –Send attack probes to map the network and identify possible victim hosts –Nmap programming is popular (Figure 9-4)

10 Figure 9-4: Nmap IP Range to Scan Type of Scan Identified Host and Open Ports

11 Figure 9-3: Human Break-Ins (Hacking) The Exploit –The actual break-in –Noun: Exploit is the program used to make the break-in –Verb: Attackers exploit the computer ( 開拓 )

12 Figure 9-3: Human Break-Ins (Hacking) After the Break-In –Become invisible by deleting log files –Create a backdoor (way to get back into the computer) Backdoor account—account with a known password and super user privileges Backdoor program—program to allow reentry; usually Trojanized Rootkit—stealthy backdoor that cannot be detected by the operating system –Do damage at leisure New

13 Figure 9-5: Distributed Denial-of-Service Flooding Attack The attacker installs handler and zombie programs on victims The attacker sends an attack command to handlers. Handlers send attack commands to zombies. The zombies overwhelm the victim with attack packets. TCP Syn Flooding

14 Figure 9-6: Bots Bots are like zombies, but they can be updated by the human master to give new functionality.

15 Figure 9-19: Cryptographic Systems Cryptographic Systems –Provide security to multi-message dialogues At the Beginning of Each Communication Session –The two parties authenticate each other Party A Party B Initial Authentication Credentials

16 Figure 9-19: Cryptographic Systems Message-by-Message Protection –After this initial authentication, cryptographic systems provide protection to every message –Encrypt each message for confidentiality so that eavesdroppers cannot read it Party A Party B Messages Encrypted for Confidentiality

17 Figure 9-19: Cryptographic Systems Message-by-Message Protection –Adds an electronic signature to each message –The electronic signature authenticates the sender –It also provides message integrity: receiver can tell if a message has been changed in transit Party A Party B Electronic Signature

18 Symmetric and Public Key Encryption Symmetric Key Encryption for Confidentiality Message “Hello” Encryption Method & Key Symmetric Key Party A Party B Network Encrypted Message Encryption uses a non-secret encryption method and a secret key

19 Figure 9-20: Symmetric and Public Key Encryption Symmetric Key Encryption for Confidentiality Encrypted Message Symmetric Key Party A Party B Interceptor Network Interceptor cannot read encrypted messages Encrypted Message

20 Figure 9-20: Symmetric and Public Key Encryption Symmetric Key Encryption for Confidentiality Message “Hello” Encryption Method & Key Encrypted Message Message “Hello” Decryption Method & Key Symmetric Key Same Symmetric Key Party A Party B Interceptor Network Receiver decrypts the message Using the same encryption message And the same symmetric key Encrypted Message

21 Types of Symmetric Key Encryption DES3DESAES Key Length (bits)56112 or , 192, or 256 StrengthWeakStrongStrong to Very Strong Processing Requirements ModerateHighModest RAM RequirementsModerateHighModest

22 Figure 9-20: Symmetric and Public Key Encryption Public Key Encryption for Confidentiality Encrypted Message Encrypted Message Party A Party B Encrypt with Party B’s Public Key Decrypt with Party B’s Private Key Decrypt with Party A’s Private Key Encrypt with Party A’s Public Key Note: Four keys are used to encrypt and decrypt in both directions

23 Figure D-7: Digital Signature Sender Receiver DSPlaintext Add Digital Signature to Each Message Provides Message-by-Message Authentication Encrypted for Confidentiality

24 Figure D-7: Digital Signature: Sender DS Plaintext MD Hash Sign (Encrypt) MD with Sender’s Private Key To Create the Digital Signature: 1.Hash the plaintext to create a brief message digest a brief message digest; This is NOT the digital signature 2. Sign (encrypt) the message sender’s private digest with the sender’s private key key to create the digital Signature Hash algorithms: MD5, SHA-1

25 Figure D-7: Digital Signature Sender Encrypts Receiver Decrypts Send Plaintext Plus Digital Signature Encrypted with Symmetric Session Key DSPlaintext Transmission Receiver Decrypts the Message, Getting the Plaintext Plus Digital Signature

26 Figure D-7: Digital Signature: Receiver DSReceived Plaintext MD 1. Hash 2. Decrypt with True Party’s Public Key 3. Are they Equal? 1. Hash the received plaintext with the same hashing algorithm the sender used. This gives the message digest. 2. Decrypt the digital signature with the sender’s public key. This also should give the message digest. 3. If the two match, the message is authenticated; The sender has the true Party’s private key

27 Figure D-8: Public Key Deception Impostor “I am the True Party.” “Here is TP’s public key.” (Sends Impostor’s public key) “Here is authentication based on TP’s private key.” (Really Impostor’s private key) Decryption of message from Verifier encrypted with Impostor’s public key, so Impostor can decrypt it Verifier Must authenticate True Party. Believes now has TP’s public key Believes True Party is authenticated based on Impostor’s public key “True Party, here is a message encrypted with your public key.” Critical Deception

28 Digital Certificates Digital certificates are electronic documents that give the true party’s name and public key Applicants claiming to be the true party have their authentication methods tested by this public key If they are not the true party, they cannot use the true party’s private key and so will not be authenticated Digital certificates follow the X.509 Standard

29 Figure D-10: Roles of Digital Certificates and Digital Signatures in Authentication Public key authentication requires both a digital signature and a digital certificate to give the public key needed to test the digital signature DSPlaintext Applicant Verifier Certificate Authority Digital Certificate: True Party’s Public Key

30 Figure D-10: Roles of Digital Certificates and Digital Signatures in Authentication Digital Signature Authentication Applicant Verifier Certificate Authority Digital Certificate: True Party’s Name and Public Key Must be Tested with True Party’s Digital Certificate

31 Figure D-9: Public Key Infrastructure (PKI) Verifier (Brown) Certificate Authority PKI Server 2. Distribute Private Key Applicant (Lee) Verifier (Cheng) 1. Create Public Key/ Private Key Pair

32 Figure D-9: Public Key Infrastructure (PKI) Verifier (Brown) Certificate Authority PKI Server 4. Certificate for Lee Applicant (Lee) Verifier (Cheng) 3. Request Certificate for Lee

33 Figure D-9: Public Key Infrastructure (PKI) Verifier (Brown) Certificate Authority PKI Server 6. Request Certificate Revocation List (CRL) Applicant (Lee) 5. Certificate for Lee Verifier (Cheng) 7. CRL

34 Figure 9-9: Access Control Companies must then develop an access control plan for each asset –The plan includes the AAA protections –Authentication—proving the identity of the person wishing access –Authorization—determining what the person may do if they are authenticated –Auditing*—logging data on user actions for later appraisal *3rd A: Accounting

35 Figure 9-10: Authentication The applicant is the person who wishes to prove his or her identity. The verifier is the person who wants to authenticate the applicant. The applicant sends credentials (passwords, etc.). Usually a central authentication server judges the credentials. This provides consistency in authentication. 憑據

36 Figure 9-11: Password Authentication Passwords should be complex –Mix case (A and a), digits (6), and other keyboard characters ($, #, etc.) –Can only be cracked with brute force attacks (trying all possibilities) Passwords should be long –Eight characters minimum –Each added character increases the brute force search time by a factor of about 70

37 Figure 9-12: Digital Certificate Authentication Public and Private Keys –Each party will have both a public key and a private key –Each party makes its public key available to everybody –Each party keeps the private key secret Digital Certificate –Tamper-proof file giving a party’s public key

38 Figure 9-12: Digital Certificate Authentication Operation –Applicant performs a computation with his or her private key, which only he or she should know –Verifier tests the calculation with the public key in the digital certificate of the party the applicant claims to be –If the test is successful, the applicant is authenticated as knowing the claimed party’s secret public key –If the test fails, the applicant is rejected

39 Figure 9-12: Digital Certificate Authentication CalculationDigital Certificate Authentication Public key of the person the applicant claims to be Calculation created with the private key of applicant Verifier tests the calculation with the public key of the claimed party. If the test succeeds, the applicant must know the secret private key of the claimed party, which only the claimed party should know.

40 Figure 9-12: Digital Certificate Authentication Appraisal ( 評價 ) –Digital signature authentication gives extremely strong authentication –Very expensive: must set up infrastructure for distributing public-private key pairs –Must do the labor of creating, distributing, and installing private keys.

41 Figure 9-13: Biometric Authentication Biometric Authentication –Authentication based on bodily measurements –Promises to eliminate passwords Fingerprint Scanning –Dominates biometrics use today –Simple and inexpensive –Substantial error rate (misidentification) –Often can be fooled fairly easily by determined impostors –Not a problem for low-risk situations like home computers

42 Figure 9-13: Biometric Authentication Iris Scanners –Scan the iris (colored part of the eye) –Irises are complex, so very strong authentication –Expensive Face Recognition –Camera allows analysis of facial structure –Can be done surreptitiously—without the knowledge or consent of person being scanned –Very high error rate and easy to fool

43 Figure 9-13: Biometric Authentication Error Rates and Deception( 欺騙 ) –Error rates are higher than vendors claim –Deception is easier than vendors claim –The usefulness of biometrics is uncertain

44 Figure 9-14: Firewall Operation Firewalls inspect each packet. Legitimate packets are allowed through. Provable attack packets are dropped and logged.

45 Figure 9-15: Stateful Firewall Filtering Stateful Firewall Filtering –There are several types of firewall filtering –Stateful inspection is the dominant methodology today –Stateful firewalls often use other filtering mechanisms as secondary mechanisms

46 Figure 9-15: Stateful Firewall Filtering Connection Initiation –Some Packets Attempt to Open a Connection Example: packets with TCP segments whose SYN bits are set Stateful firewalls have default rules for connection-opening attempts Site Stateful Border Firewall Externally Initiated Connections are Rejected By Default Internally Initiated Connections Are Allowed by default

47 Stateful Firewalls All Packets Connection-Opening Attempts Other Packets Default Behavior for Connections ACL Exceptions Not Part of Previously Permitted Connection Part of Previously Permitted Connection Drop PacketAccept Packet

48 Figure 9-15: Stateful Firewall Filtering Perspective –Simple operation leads to inexpensive stateful firewall operation –However, stateful inspection firewall operation is highly secure

49 Figure 9-17: Ingress Access Control List (ACL) for a Stateful Inspection Firewall 1. If packet’s source and destination sockets are in the connection table, PASS. –If the packet is part of an previously-established connection, pass it without further filtering. 2. If the packet’s source and destination sockets are not in the connection table and the packet is not a connection-opening attempt, DROP and LOG. –Drop any packet that is not a connection-opening attempt and that is not part of an established connection.

50 Figure 9-17: Ingress Access Control List (ACL) for a Stateful Inspection Firewall 3. If protocol = TCP AND destination port number = 25, PASS and add connection to connection table –This rule permits external access to all internal mail servers. 4. If IP address = AND protocol = TCP AND destination port number = 80, PASS and add connection to connection table. –This rule permits access to a particular webserver,

51 Figure 9-17: Ingress Access Control List (ACL) for a Stateful Inspection Firewall 5. Deny All AND LOG –If earlier rules do not result in a pass or deny decision, this last rule enforces the default rule of banning all externally-initiated connection-opening attempts.

52 Figure 9-18: Firewalls, Intrusion Detection Systems, and Intrusion Prevention Systems Firewalls –Drop provable attack packets Intrusion Detection Systems (IDSs) –Very sophisticated filtering—better than firewalls –Identify suspicious packets –Cannot drop--suspicious packets may be legitimate Intrusion Prevention Systems (IPSs) –Use IDS filtering mechanisms –Drop suspicious packets highly likely to be attacks –Ignore other suspicious packets

53 Figure 9-18: Firewalls, Intrusion Detection Systems, and Intrusion Prevention Systems IDS and IPS filtering –Stream Analysis Analyze streams of packets to identify suspicious patterns –Deep packet inspection Inspect headers and messages at the internet, transport, and application layers

54 Figure 9-18: Firewalls, Intrusion Detection Systems, and Intrusion Prevention Systems FirewallsIDSsIPSs Processing Power Needed ModestHeavy MaturityFairly MatureStill immature. Too many false positives Tuning reduces false positives but is labor- intensive New. Only used to stop attacks that can be identified fairly accurately.