Ch. 11: IS Security Gerhard Steinke BUS 3620

Slides:



Advertisements
Similar presentations
Security Controls and Systems in E-Commerce
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
MIS PROTECTING INFORMATION RESOURCES Biometrics Identity theft
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
CS G357: Computer Security, Privacy and Usability Simson L. Garfinkel.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Securing Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
C8- Securing Information Systems
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Cryptography, Authentication and Digital Signatures
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
ECE Lecture 1 Security Services.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
BIOMETRICS.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Network Security & Accounting
Chap1: Is there a Security Problem in Computing?.
Gerhard Steinke BUS 3620 Steinke1 According to Internetworldstats.com, there are 2,405,518,376Internetworldstats.com internet users worldwide.
Computer Security By Duncan Hall.
Computer threats, Attacks and Assets upasana pandit T.E comp.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Security Issues in Information Technology
Securing Information Systems
Information Security Gerhard Steinke BUS 3620
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security in Networking
INFORMATION SYSTEMS SECURITY and CONTROL
G061 - Network Security.
Presentation transcript:

Ch. 11: IS Security Gerhard Steinke BUS 3620 According to Internetworldstats.com, there are 2,095,006,005 internet users worldwide Steinke

It is now unsafe to turn on your computer... Steinke

Network vulnerabilities Slammed on All Sides Viruses Employee Error Rogue Insiders Software Bugs Corporate Spies Script Kiddies Web Defacements Password Crackers Network vulnerabilities Denial of Service War Drivers “SneakerNet” Backdoors Worms Trojans Buffer Overflows “Blended Threats” Steinke

Definition: Information Security Confidentiality Protecting information from unauthorized disclosure Integrity Protecting information from unauthorized alternation/destruction Availability Ensuring the availability and access to the information Availability Integrity Confidentiality

The Threat: Who Are They? Internal (authorized users (intentional & unintentional), contract worker, etc.) Hackers (‘script kiddies’ to experts) Industrial Espionage (legal? acceptable in some countries and sometimes government funded) Foreign Espionage Criminal (financial or criminal motivation) Other (terrorists, political activists) Steinke

The Cyber Security Threat The threat is global The attack sophistication is increasing The skill level required to become a threat is decreasing We live in a “Target Rich” environment Exposure time and response time are critical Steinke

What Are They Doing? Corrupting Information Disclosing Information Viruses, worms File deletion Data tampering (medical & financial), Web page hacks Disclosing Information Public release of private data Selling of private or financial data (e.g., stolen charge card numbers) Stealing Service Using site as intermediary for attacks Denial of Service (preventing the use of IT resources) Network flooding Crashing systems or services Steinke

Security Awareness - Posters Steinke

Technical Security Measures: Firewalls A system which examines network packets entering/leaving an organization and determines whether the packets are allowed to travel ‘through’ the firewall Organization Steinke 4

Firewalls - DMZ Steinke

Intrusion Detection System (IDS) Intrusion Prevention System (IPS) attempts to detect/prevent someone breaking into your system running in background and notifies you when… Match Alarm Steinke

Decryption Exercise Can you decrypt these? mfuttubsu cepninotry Steinke

Why Encryption? Disguising message in order to hide its substance Based in logic and mathematics Confidentiality Message wasn’t changed Authentication who really sent message? Integrity was message altered? Non-repudiation so sender cannot deny they sent message Steinke

Encryption Substitution Cipher (13) ABCDEFGHIJKLMNOPQRSTUVWXYZ                        NOPQRSTUVWXYZABCDEFGHIJKLM Transposition Cipher Rearranging all characters in the plaintext Attack: frequency of letters Concealment – hide in text Break Encryption by brute force - try all possible keys key length Steal, bribe, replace encryption software, flaws in system Steinke

Steganography Hiding information http://www.jjtc.com/Steganography/ http://www- users.aston.ac.uk/~papania1/stegano.html S-tools demo Steinke

Symmetric / Secret Key same key for encryption and decryption confidentiality secure key distribution required otherwise could impersonate sender as well scalability - n users require n*(n-1)/2 keys Steinke

Asymmetric or Public/Private Key Encryption Two keys – one encrypts, the other decrypts Public and Private keys generated as a pair Private key for user Public key for distribution Each key decrypts what the other encrypts Confidentiality, integrity, authentication and non-repudiation Intensive computations, slow

Picture of Asymmetric

Hash / Message Digest Function Create hash value / digital fingerprint Provides integrity checking Shorter than original message Variable length message to fixed length hash value One way function, can’t go back Appended to message Examples: MD5 - 128 bit hash SHA - 160 bit, by NIST, NSA in DSS (Digital Signature Standard)

Digital Signatures Create a hash value Encrypt hash value with your private key Attach to message to be sent Encrypt with recipients public key Send

What does Digital Signature do? Integrity – Message not changed Authentication - Verify sender identity and message origin Creates non-repudiation Applications: Used to authenticate software, data, images Used with electronic contracts, purchase orders Protect software against viruses

Security Basics Security policy document security principles Educate users - what and why of security Physical Security Monitor network Passwords Steinke

PC Security gateway to network access to information on PC power on password, screen saver password encryption password protect files, disk drive erase information when deleting a file Steinke

Software Control control program change requests require multiple authorizations require full documentation independent testing of changes check with operations before acceptance procedure to handle emergency situations Steinke

Operational Controls investigate error messages, reports, alarms monitor communication lines for failures, problems monitor network status for operational, out- of-service stations monitor traffic queues for congestion control tapes, disks and other system materials to ensure proper labeling and retention Steinke

maintain backup for programs, tapes and other material examine system printouts, program dumps, recovery printouts monitor vendor and maintenance personnel control testing during operational hours ensure that changes to hardware and software are necessary Steinke

Biometrics Identify people by measuring some aspect of individual anatomy or physiology, some deeply ingrained skill, or other behavioral characteristic or something that is a combination of the two Handwritten signatures Face Recognition Fingerprints Iris Codes Voice Retina Prints DNA Identification Palm Prints Handwriting Analysis

Errors All recognition systems are subject to error ‘Fraud’ / ‘false positive’ A client is accepted as authenticated when they should have been rejected ‘Insult’ / ‘false negative’ A client is rejected as NOT authenticated when in fact they should have been accepted.

Face Recognition The oldest way There is widespread acceptance (and requirement!) for photo ID The issuing of other authentication devices (like passwords, key cards, digital signatures) usually depends on facial recognition by the agents of the issuing authority Photo-ID is not particularly reliable, but has a very significant deterrent effect

Facial Scan Strengths: Weaknesses: Attacks: Defenses: Database can be built from driver’s license records, visas, etc. Can be applied covertly (surveillance photos). (Super Bowl 2001) Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera Defenses: Scanning stations with mandated poses

Fingerprints Accounts for the majority of sales of biometric equipment The ridges that cover the fingertips make patterns, that were classified in the 1800’s These patterns have loops of several distinct types, branches, and endpoints. Because of the association with criminals, commercial users are very reluctant to impose fingerprinting systems upon their clients Fingerprint sensors on laptops

Iris Codes Iris patterns believed to be unique The patterns are easy enough to detect They do not wear out They are protected by the eyelids and cornea Easier to capture and process than fingerprints A processing technique is used to generate a 256 byte iris code Low false acceptance rates

Iris Codes Practical difficulties: Capturing the iris image is intrusive The subject has to be co-operative

Voice Recognition Strengths: Weaknesses: Attacks: Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise No large database of voice samples Attacks: Tape recordings Identical twins / soundalikes

Hand Scan Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Olympics Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited http://www.cjonline.com/images/040502/new.handscan.jpg

Other Biometrics Retina Scan Facial Thermograms Vein identification Very popular in the 1980s military; not used much anymore. Facial Thermograms Vein identification Scent Detection Gait recognition Handwriting

Space Required for each Biometric Approx Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes

A Comprehensive Security Program Policies & Management Sponsorship Procedures Reporting Practices and Procedures Assessment Service Provider Compliance Awareness and Training

Security Principles impossible to provide complete security match to value of assets provide good security but keep system easy to use easy to use, little security <-----> difficult to use, high security Steinke