Wiretapping and Encryption More Week 5 cont.. Early Forms of Wiretapping uParty Lines uHuman Operators.

Slides:



Advertisements
Similar presentations
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Advertisements

Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Security & Encryption Thomas Fenske & Joseph Minter.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Chapter 17 Controls and Security Measures
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Kusserow: “The Government Needs Comp Matching …” Published in the same journal as Shattuck. Comp matching ensures taxpayers’ money is safeguarded without.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Encryption Export Controls in the US Preliminary Research.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Authentication Question: how does a receiver know that remote communicating entity is who it is claimed to be?
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
ICT in Banking.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Cryptography, Authentication and Digital Signatures
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Free Cookies and Other Security and Privacy Issues.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Fall 2006CS 395: Computer Security1 Key Management.
Encryption Name : Maryam Mohammed Alshami ID:H
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Electronic Banking & Security Electronic Banking & Security.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Wiretapping and Encryption
Who Uses Encryption? Module 7 Section 3.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Chapter Goals Define cryptography
Presentation transcript:

Wiretapping and Encryption More Week 5 cont.

Early Forms of Wiretapping uParty Lines uHuman Operators

Wiretapping Today uFederal and state law enforcement uBusinesses uPrivate Detectives uPolitical Candidates u......

Cellular Phones uCan be tapped with over- the-counter devices

Standard Phones uEasily tapped if signal travels by microwave or satellite uGovernment has secured phones

Legal Mandates u Supreme Court rules that wiretapping is illegal u Congress explicitly allowed it by law enforcement agencies u needs court order uElectronic Communications Privacy Act include new technologies

Cryptography - Making and breaking of ciphers uTranslation of the original message into a new incomprehensible one by a mathematical algorithm using a specific KEY uPlaintext - a message or data uCiphertext - encrypted text uDecryption - decipher back to plaintext

Encryption Includes: uCoding scheme or cryptographic algorithm uSpecific sequence of characters key used by the algorithm

Examples uCereal box codes uSubstitute cipher uCryptoquip in newspaper

Variations - Symmetric uUse the same key to encrypt and decrypt (secret key) uRequires a more secure system to send the key than the system itself

Variation - Asymmetric uUse a key (public key) to encrypt a message uAnother (private key) to decrypt it uRequires both keys

Who Uses Encryption? uBanks uIndustry uProfessionals uNational ID cards uCriminals u.....

Industrial Espionage uKnowledge of a company’s cost and price structure uMarket research uStrategic plans uOrder and customer lists uInsider information

Professionals uCellular telephones and electronic mail uunencrypted data on machines

Criminals uCryptography allows criminals to keep their identities a secret uProvides security to law breakers uAllows anonymity uDon’t use systems that leave trails

Reliability uThe longer the key has remained unbroken, the stronger it is likely to be uThe longer the key is in use, the more likely someone will be able to discover it u larger amount of info will be compromised u change key frequently

Algorithms available uDES - Data Encryption Standard u Developed by IBM in the 1970’s u Adopted as a Federal Information Processing Standard u Uses a 56 bit key uHas been broken uTo extend life - extend key to 128 bits u or triple DES

RSA algorithm uUsed in public key cryptography uPatented in US uBased on multiplication of large prime numbers

PGP - Pretty Good Privacy uBased on RSA uUsed for protecting

New Controversies u Senate Bill - Government wants to be able to intercept any message and be able to decode it as well - not passed uFBI and wiretapping - Telephony bills uFBI and Clipper Chip

Benefits of Government Intervention uAid law enforcement in protecting us from criminals and terrorists

Problems uThreats to u privacy u global competitiveness u civil liberties

Communications Assistance for Law Enforcement Act 1994 uto and from Requires that telecommunications equipment be designed so govt. can: u intercept all wire and electronic communic. u Intercept comms from mobile users u Obtain call-identifying info u phone numbers u Have info transmitted to a specific location uGovernment will help foot the bill

Arguments for... uProtection from terrorists and criminals uFBI wants no new privileges uBUT u Necessity has not been justified u Expense and other problems outweigh the benefits u There has never been a guarantee of interception of private messages before

NEED? uWiretaps are less useful than informants, witnesses, etc. uBUT u 90% of terrorist cases used wiretaps uIndustry claims full compliance with FBI uBUT u Continued cooperation is not guaranteed

COST? uA lot more than government is giving uWill save money in u fines, forfeitures, prevented economic loss uUsed only in a subset of investigations uCould use the money on other technologies

Innovation and global competitiveness uStifle or delay new technologies u economic costs u prevent new technologies’ implementation uDamage to US competitiveness in global markets due to reduced security and privacy

Protection from Dossier Society uDigital cash made possible by public key encryption uSecure financial transactions without a credit card or checking account number

E-Cash uNo link between payer and recipient uConvenience of credit card uAnonymity of cash uUse on Internet for ordinary shopping uCan transfer credentials uCan prevent duplicate cash files uBack up at home in case card is lost or stolen

E-Cash continued uNot easy to form a consumer profile or dossier uPrevent fraud and forgery uProtect privacy from mailing lists uMore control over personal information

History of Encryption uSecret - NSA uNational Security Agency u can do anything u has powerful computers - break ciphers and create ciphers u monitors all communications between US and other countries

Government Interception uNSA censored research u controlled researchers u Export restrictions u munitions u can’t export secure systems