SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality
Who is who?
Telephone line Mail server TCP/IP Echelon & Carnivore Who can read what ?
SMTP POP3 POST MAIL using an ISP POST OFFICE
SMTP POP3 POST MAIL a) Telephone-line POST OFFICE
SMTP POP3 POST MAIL b) server Everything on the servers can be read or copied POST OFFICE
SMTP POP3 POST MAIL c) TCP/IP Not readable – following different ways POST OFFICE
Echelon/Carnivore Source:
Traces
Traces The IP address of your computer is : your DNS address is : adsl wanadoo.be We know you use : Microsoft Windows 98 Your navigator has the code: Mozilla/4.78 [en] (Win98; U) In fact it is: Netscape Communicator 4.x English What you did is stored : Windows 95 C:\Windows\Temporary Internet Files\ Windows NT C:\WinNt\Temporary Internet Files\ A nice demo in french on:
Virus What is a virus and types? How is a computer infected? Danger
a) What is a virus? computer virus = a computer program 'I love you', 45 million computers infected worm = multiplicates itself c ode Red: servers destroyed trojan horse = hides for other actions Back Orifice logic bomb = distroys programs hoax = false alarm
b) How is a computer infected? files attached to (attachment) diskettes other
c) Danger infecting components of your system effects: malfunctions deletion of data wiping of hard disk ...
Solutions to provide safety and confidentiality solving identity problem and unauthorised reading protection against traces protection against virusses
Encryption Purpose Functions How? Identity and unauthorised reading
Functions of encryption Authentication Integrity Confidentiality
Symmetrical encryption UbizenVcjafo Encryption E(…) Decryption D(…) SenderReceiver Vcjafo Untrusted network SAME KEY Ubizen A=A+ 1 A=A- 1
Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Public Key Receiver Decryption D(…) Go#st$Ubizen Private Key Receiver confidentiality towards receiver
Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Private Key Sender Decryption D(…) Go#st$Ubizen Public Key Sender authentication of sender
Example
Example
Example
Traces at the ISP Traces on own computer Against leaving traces
anti-virus program N orton, McAfee, eSafe, F-Secure, … watch out for attachments.exe,.com,.pif,.vbs,.doc,.xls, … Against virusses