Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Secure Computing CMSC 100, Fall 2011 Adapted from slides provided by Marie.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Confidentiality and Privacy Controls
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Computer Viruses.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter 9 1.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Secure Computing CMSC 100, Fall 2009 Marie desJardins Some slides borrowed.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Topic 5: Basic Security.
What is Spam? d min.
Security fundamentals Topic 9 Securing internet messaging.
Computer Skills and Applications Computer Security.
Chapter 7 Software Engineering © 2007 Pearson Addison-Wesley. All rights reserved.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Information Systems Design and Development Security Precautions Computing Science.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Class Name: Online Safety & Privacy Basics
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Security.
Secure Computing CMSC 100, Fall 2009 Marie desJardins
Operating System Concepts
Presentation transcript:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Secure Computing CMSC 100, Fall 2011 Adapted from slides provided by Marie desJardins Some slides borrowed from book slides for Computer Science: An Overview by J. Glenn Brookshear

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Security Issues Network security (protecting against unwanted intrusions; chap. 4.5) Software quality assurance (ensuring software does what is is meant to; chap. 5.6, 7.6) Database integrity (ensuring stored information is maintained correctly; chap. 9.4) Protecting confidential information (encryption & other methods for access control; chap. 12.6) Protecting intellectual property (copyrights, patents, trademarks) 4-2

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley ISO 27002: Information Security Standard Key issues for organizations: [quoted from –intellectual property rights –safeguarding of organizational records –data protection and privacy of personal information –information security policy document –information security education and training –reporting security incidents –business continuity management 4-3

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley NETWORK SECURITY 4-4

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 25 Worst Passwords of password qwerty 5. abc monkey letmein 9. trustno1 10. dragon baseball iloveyou 14. master 15. sunshine 16. ashley 17. bailey 18. passw0rd 19. shadow superman 23. qazwsx 24. michael 25. football Source: SplashData

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-6 Source:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-7 Security Attacks –Malware (viruses, worms, Trojan horses, spyware, phishing software) –Denial of service –Spam Protection –Firewalls –Spam filters –Proxy servers –Antivirus software

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Malware Malware: Software designed to get into your computer without your consent/knowledge Viruses: self-replicating software that travels with a “host” ( attachment, downloaded file) Effects range from pranks (displaying messages on the user’s screen) to malicious behavior (destroy data on the hard disk) 4-8

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Malware (cont.) Worms: Like viruses, but spread by copying themselves (rather than being transmitted with a “host” file) Spyware: Collects information (about user, websites accessed, etc.) surreptitiously Trojan horses: Apparently non-malicious software that actually provides remote access to the designer/hacker –downloaded software, executable website content (ActiveX), attachments 4-9

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Source:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prevention: Firewalls Block unauthorized network access –Packet filtering –Port blocking –Password protection 4-11

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prevention: Virus Checkers Most virus checkers rely on a library of known virus “signatures” –These libraries have to be constantly maintained and updated –Updated your virus checker lately?? Heuristics can also be used to identify likely new viruses –False negatives: True viruses go undetected –False positives: Legitimate software flagged as virus 4-12

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Denial of Service Attempt to make a computer resource inaccessible to its intended users –Saturate with access attempts to slow down the computer/connection –Deliberately cause the resource to enter an error state and reset itself –Disrupt the physical network or network connection 4-13

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prevention: Intrusion Detection Monitor and analyze network traffic –Look for known patterns of “bad behavior” –Anomaly detection: Determine when traffic patterns are different than normal patterns 4-14

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Spam Spam: Defined as unsolicited bulk mail –Unwanted individual is (technically) not spam –Mailing lists are not necessarily spam –Costs industry and individuals billions of dollars to send, process, detect, and deal with unwanted spam –Costs spammers close to nothing! 4-15

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prevention: Spam Filtering Preprocessors in programs to identify and discard (or refile) likely spam –Regular expression matching (hand-designed rules) –User-specified filters –AI learning-based techniques (train with tagged “spam” and “ham”) 4-16

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prevention: Anti-Spam Legislation CAN-SPAM Act of 2003 –Covers all commercial messages, not just spam –Header line information must be truthful –Subject lines must be accurate (reflect the content of the message) –Commercial messages must be explicitly identified as such –A valid postal address must be included –Recipients must be told how to opt out of future mailings –Such opt out procedures must be honored July 2009: Five spammers pled guilty, facing fines of up to $1M and 6+ years in prison 4-17

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Phishing (or IM, or text message, or Facebook message) that purports to be from an official organization, used to gather confidential information –Disguised to look like from banks, credit card companies, universities, etc. –Often ask you to update your information or reset your password, or threaten to close your account –Link text is often different than URL 4-18

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley SOFTWARE QUALITY ASSURANCE 4-19

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 7-20 Software Testing Strategies Verification – conforms to specifications Validation – meets requirements Glass-box testing –Pareto principle (80% of the errors will come from 20% of the code) –Basis path testing Black-box testing –Boundary value analysis –Redundancy testing –Beta testing

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Software Testing Consequences Blackberry outage, October 2011 (unconfirmed) Northeast blackout of 2003 AT&T network outage, January 1990 Therac-25, ; National Cancer Inst, 2000 Soviet gas pipeline, Sources:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Software Testing Consequences Buffer Overflow SQL Injection Malformed Packet Attack 4-22

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley DATABASE INTEGRITY 4-23

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 9-24 Maintaining Database Integrity Transaction: A sequence of operations that must all happen together –Example: transferring money between bank accounts Transaction log: A non-volatile record of each transaction’s activities, built before the transaction is allowed to execute –Commit point: The point at which a transaction has been recorded in the log –Roll-back: The process of undoing a transaction

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 9-25 Maintaining database integrity (continued) Simultaneous access problems –Incorrect summary problem –Lost update problem Locking = preventing others from accessing data being used by a transaction –Shared lock: used when reading data –Exclusive lock: used when altering data

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley CRYPTOGRAPHY 4-26

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-27 Encryption FTPS, HTTPS, SSL Public-key Encryption –Public key: Used to encrypt messages –Private key: Used to decrypt messages Certificates and Digital Signatures

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Public-Key Cryptography Key: A value used to encrypt or decrypt a message –Public key: Used to encrypt messages –Private key: Used to decrypt messages RSA: A popular public key cryptographic algorithm –Relies on the (presumed) intractability of the problem of factoring large numbers

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 4-29 Figure 4.16 Public-key encryption

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Figure Public key cryptography

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Figure Establishing an RSA public key encryption system

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley RSA Scheme Constructing public & private keys: –p, q: large random primes (can find efficiently) –n = pq This implies that phi(n) = (p-1)(q-1) –e: 1 < e < phi(n) AND e and phi(n) are coprime –d: de = 1 (mod phi(n)) Public key: (n, e) Private key exponent: d –p and q are also private 4-32 Additional reference:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley RSA Encryption and Decryption Convert the message to be encrypted into an integer m in the range [0,n] Encoded message: c = m e mod n Decrypted message: m = c d mod n 4-33

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Encrypting the Message Recall: n=pq phi(n)=(p-1)(q-1) 1<e<phi(n) de = 1 (mod phi(n)) Public keys: n = 91 and e = 5 Message: two = 23 ten 23 e = 23 5 = 6,436,343 6,436,343 ÷ 91 has a remainder of 4 4 ten = 100 two Thus, encrypted version of is 100. Additional example:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Decrypting the Message 100 Decrypting keys: d = 29, n = two = 4 ten 4 d = 4 29 = 288,230,376,151,711, ,230,376,151,711,744 ÷ 91 has a remainder of ten = two Therefore, decrypted version of 100 is

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Properties of RSA Public key can be made freely available – does not need to be kept secret RSA can only be “broken” in one of three ways: –Get the private key –Factor the very large number, n (typicaly bits) – computationally too hard –Solve the RSA problem (invert exponentiation and modulus) – also too hard 4-36

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley INTELLECTUAL PROPERTY 4-37

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 7-38 Software Ownership Copyright –The “substantial similarity” test –Filtration criteria: what is not copyrightable Features covered by standards Characteristics dictated by software purpose Components in the public domain –The “look and feel” argument

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 7-39 Software Ownership (continued) Patents –“Natural laws” are traditionally not patentable Trade secrets –Non-disclosure agreements are legally enforceable In general, laws haven’t kept up with technology...