Computer Security and Cryptography Partha Dasgupta, Arizona State University.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 5 Security and Encryption
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Class on Security Raghu. Current state of Security Cracks appear all the time Band Aid solutions Applications are not designed properly OS designs are.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Information Systems
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 9 Security. Copyright © 2003, Addison-Wesley Security The quality or state of being secure Freedom from danger Freedom from fear or anxiety Measures.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Cryptography, Authentication and Digital Signatures
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Types of Electronic Infection
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
1 Part 7: State of the Art and Future u Are we in a sorry state? u How to keep us Safe? u Software trust management u Hardware trust management u Evasive.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Chap1: Is there a Security Problem in Computing?.
Partha Dasgupta, Arizona State University Consumer Identity and Consumer Computing Security Rev.2–Feb
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Network Security Celia Li Computer Science and Engineering York University.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Securing Information Systems
Security Issues in Information Technology
Securing Information Systems
Network Security (the Internet Security)
Securing Information Systems
Faculty of Science IT Department By Raz Dara MA.
Security.
Computer Security By: Muhammed Anwar.
Operating System Concepts
Presentation transcript:

Computer Security and Cryptography Partha Dasgupta, Arizona State University

2 The Problem If I didn't wake up, I'd still be sleeping.

3 Not just hype + paranoia u Internet hosts are under constant attack u Financial losses are mounting u Miscreants are getting smarter  (and so are consumers) u “National Security” risks were stated and then underplayed u Data loss threatens normal users, corporations, financial institutions, government and more u Questions: HOW? WHY? and What can we do?

4 Overview u Part 1: Security Basics u Part 2: Attacks u Part 3: Countermeasures u Part 4: Cryptography u Part 5: Network Security u Part 6: System Security u Part 7: State of the Art and Future

5 Part 1: Security Basics u Computer and Network Security basics u Hacking u Attacks and Risks u Countermeasures u Secrets and Authentication u Paranoia

6 Computer and Network Security u Keep computers safe from program execution that is not authorized u Keep data storage free from corruption u Keep data storage free from leaks u Keep data transmissions on the network private and un- tampered with u Ensure the authenticity of the transactions (or executions) u Ensure that the identification of the human, computer, resources are established  With a high degree of confidence  Do not get stolen, misused or misrepresented

7 Hacking or Cracking u Plain old crime u Phone Phreaking u Credit cards, the old fashioned way u Technology Hacks  Design deficiencies and other vulnerabilite  ATM, Coke Machines, Credit Cards, Social Engineering  Software hacks  Second channel attacks  RFID issues  Cell phone vulnerabilities  Grocery cards?

8 Attacks and Risks u “Attacks”  An attack is a method that compromises one or more of: - privacy (or confidentiality) - data integrity - execution integrity u Attacks can originate in many ways  System based attacks  Network based attacks  “Unintended Consequences” u Risk – a successful attack leads to “compromise”  Data can be stolen, changed or “spoofed”  Computer can be used for unauthorized purposes  Identity can be stolen  RISK can be financial

9 Attack Types u System based attacks  Virus, Trojan, rootkit  Adware, spyware, sniffers u A program has potentially infinite power  Can execute, spawn, update, communicate  Can mimic a human being  Can invade the operating system u Network based attacks  Eavesdropping  Packet modifications, packet replay  Denial of Service u Network attacks can lead to data loss and system attacks

10 Countermeasures u System Integrity Checks  Virus detectors  Intrusion detection systems  Software signatures u Network Integrity checks  Encryption  Signatures and digital certificates  Firewalls  Packet integrity, hashes and other cryptographic protocols u Bottom Line:  We have an arsenal for much of the network attacks  System security is still not well solved

11 What is at Risk? u Financial Infrastructure u Communication Infrastructure u Corporate Infrastructure u Confidentiality and Privacy at many levels u Economy u Personal Safety

12 The Shared Secret Fiasco u Our authentication systems (personal, financial, computing, communications) are all based on “shared secrets”  ID numbers, Account numbers, passwords, SS#, DOB u When secrets are shared, they are not secrets  They will leak! u Given the ability of computers to disseminate information, all shared secret schemes are at extreme risk  Media reports of stolen data is rampant The Fake ATM attack The check attack The extortion attack

13 How do secrets leak? u Malicious reasons u Simple mistakes u Oversight u Bad human trust management u Bad computer trust management u “Nothing can go wrong”  Please believe in Murphy!

14 Keeping Secrets? u Simple answer, not possible. u Encryption is good, but data has to be unencrypted somewhere u “Disappearing Ink”? u Use paper based documents, not scanned. u Public Key Encryption has much promise (PKI systems) u Shared secrets need to be eliminated as much as possible u Separate out of band communications  Phone, postal mail, person-to-person

15 Authentication u Shared secrets are used for authentication  Username/passwords u Multi-factor authentication  What you know  What you have  What you are, what you can do. u Most of the authentication methods are quite broken  Designed when networking was not around  PKI systems are better, but not deployed  Too many false solutions (dangerous, gives a feeling of security)

16 Passwords u The password is known to the host and the client  Under some password schemes the host does not know the password (e.g. Unix) u Passwords can leak from host or from client u Same password is used for multiple sites u Password managers are not too effective u “Good passwords” are not as good as you think u Invented for a completely different purpose, using passwords on the web, even with SSL encryption, is a bad idea

17 False Solutions u Biometrics  A digital bit string, or password that cannot be changed  Plenty of attacks possible, including framing u RFID identification  Plenty of attacks possible u Multi-Factor authentication  Better, but still not good u Smart cards (the not-so-smart ones)  Again, based on shared secrets, have attacks and limitations

18 Paranoia? u A large number of computers (consumer, business) are compromised or used for fraud  Viral infections, zombies  Many web servers are for fraudulent reasons u Spam is an indicator  Unprecedented lying, cheating u Adware, popups, spyware  All attempting to mislead, steer, and victimize u Identity theft, financial theft, cheating  Probably at an all time high u Security Awareness is often coupled with paranoia  It is necessary to be paranoid!

19 What is the point of an attack? u Get your shared secrets for financial gain u Espionage u Disruption Personal Corporate Financial System Identification

20 Computer Security u Software needs to be verifiably untampered and trusted u Networks need to be free from tampering/sniffing u Data has to be secure from stealing and tampering u End user protection u A coalescing of software, hardware and cryptography along with human intervention and multi-band communication.