Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Tutorial 6: Internet Security.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
(4.4) Internet Protocols Layered approach to Internet Software 1.
Implementing Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
CSCI 6962: Server-side Design and Programming
Internet safety By Lydia Snowden.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Masud Hasan Secue VS Hushmail Project 2.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
INFORMATION SYSTEM : SECURITY MEASURES Nurul Filzah Bt Hussain Muhammad Lokman Nurhakim Bin Hamin Nor Afina Binti Nor Aziz
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Chapter 40 Internet Security.
TOPIC: HTTPS (Security protocol)
Fire-wall.
Electronic Payment Security Technologies
Presentation transcript:

Networks and Security

Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service Attacks  Cookies  Spam

Security – Internet Connections Methods for blocking intruders from network or individual computers:  Firewall  Browser security settings  Automatic operating system updates

Security – Internet Connections Methods for blocking intruders:  Firewall

Firewalls  A firewall is software or hardware that monitors and controls data flowing between computers.  Why is it called a firewall?  Firewalls have a set of adjustable filters that detect and block certain types of activities.  Network admins typically configure the firewall to allow only one computer (called a gateway) on the network to interact with the Internet.  Firewalls can control TCP/IP, HTTP, FTP, Telnet, SMTP, and other protocols.

Browser Security Settings  Browsers have certain security settings that can block certain features that pose security risks. Some of these are: 1. Disable Java or ActiveX applets in web pages. 2. Prevent web pages from storing cookies. Unfortunately, high security settings sometimes disable user-friendly features of some web pages.

Encrypted Communications Kinds of messages we might send/receive:  HTTP requests / responses   Instant Messages  Telnet sessions  Transactions (shopping, etc.)

Privacy  Any machine (router) along the path of the message can read it. –Message more like a postcard than a letter  Is this good???  What can we do???

Encryption/Cryptography  Need to figure out a way so that ONLY the recipient can read the message.  Most common techniques today: symmetric key encryption, public key encryption

Symmetric Key Encryption  A key is a binary number, typically 40 – 128 bits long.  Use a specific algorithm to combine the key with the message (already translated into binary) to produce an encrypted message.  The same key is used to decrypt the message.  Method is fast, but sender and receiver must have the key – how can the key be passed safely?

Public Key Encryption  Each person has a public key and a private key  The two keys ‘un-do’ each other: –Encrypt with public key, decrypt with private key  Public keys are publicly available on Key Servers (anyone can see / get them)  This method is slower, but more secure than symmetric key.

Combination of Symmetric and Public Key Encryption  Sender encrypts message using symmetric key  Sender encrypts symmetric key with the public key of the receiver.  Send encrypted key to receiver.  Receiver uses private key to decrypt symmetric key.  Receiver uses symmetric key to decrypt message.

Certificate Authority  How do you obtain someone’s public key?  Refer to a Certificate Authority (CA) – a trusted source that maintains a database of user names and their public keys. (similar to a DMV)  The CA may be used to identify merchants when making online purchases, or to verify contents of important documents and their senders.  VeriSign is a CA.

How does encryption address security concerns? 4 communication security concerns:  Eavesdropping: If a message is encrypted, it is unreadable by eavesdroppers without a key  Spoofing: Sender uses his or her private key to encrypt part of the message. Receiver uses sender’s public key to decrypt that part – if it decrypts, it confirms sender’s identity.

Encryption & Security Concerns cont.  Misrepresentation: Obtain a business’s public key from a CA and encrypt your message. Only the business identified by CA can decrypt the message.  Tampering: Use symmetric key encryption – Word & Excel can encrypt a file and require a password to decrypt it. (Password is used in making the symmetric key.) Weakness? More secure – using a digital signature.

Digital Signatures  To create a digital signature, the message is first processed by some algorithm to produce a single number (a 1-way hash).  This algorithm and the 1-way hash are then encrypted with the private key to produce the digital signature.  The message and digital signature are then transmitted.

Digital Signatures, cont.  The recipient uses the public key to decrypt the hash and its algorithm.  The recipient uses the algorithm and the transmitted message to produce a new hash. If this new hash matches the decrypted hash, recipient knows the message was not altered.