Download presentation
Presentation is loading. Please wait.
1
Information Security Gerhard Steinke BUS 3620
According to Internetworldstats.com, there are 3,270,490,584 internet users worldwide Steinke
2
It is now unsafe to turn on your computer...
Steinke
3
Open Wireless Networks
Slammed on All Sides Viruses Employee Error Rogue Insiders Software Bugs Corporate Spies Script Kiddies Web Defacements Password Crackers Network vulnerabilities Denial of Service Open Wireless Networks Storage Media Rogue insider = rogue—stealing data, setting up secret access for themselves, even in anger planting logic bombs todestroy data , or just peeking at sensitive information they know is off limits -- they become the very insider threat that the IT department is supposed to be guarding against. Script kiddies = a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own. Defacement = perusakan Backdoors = a feature or defect of a computer system that allows surreptitious unauthorized access to data. a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. This is a special case of the violation of memory safety. Phishing = the activity of defrauding an online account holder of financial information by posing as a legitimate company. Backdoors Worms Trojans Buffer Overflows Phishing Steinke
4
Definition: Information Security
Confidentiality Protecting information from unauthorized disclosure Integrity Protecting information from unauthorized alteration/destruction Availability Ensuring the availability and access to the information Aleration = perubahan Availability Integrity Confidentiality
5
The Threat: Who Are They?
Internal (authorized users (intentional & unintentional), contract worker, etc.) Hackers (‘script kiddies’ to experts) Industrial Espionage (legal? acceptable in some countries and sometimes government funded) Foreign Espionage Criminal (financial or criminal motivation) Other (terrorists, political activists) Steinke
6
The Cyber Security Threat
The threat is global The attack sophistication is increasing The skill level required to become a threat is decreasing We live in a “Target Rich” environment Exposure time and response time are critical ations/worlds-biggest-data-breaches-hacks/ breach/new Steinke
7
Security Basics Security policy Educate users – security awareness
document security principles Educate users – security awareness Physical Security Network Security Monitor network, review logs Web Security Steinke
8
Technical Security Measures: Firewalls
examines network packets entering/leaving an organization determine whether packets are allowed to travel ‘through’ the firewall Organization Steinke 4
9
Intrusion Detection System (IDS) Intrusion Prevention System (IPS)
detect/prevent someone breaking into your system running in background and notifies you when… Match Alarm Steinke
10
Operational Controls Control program change requests
require multiple authorizations independent testing of changes Investigate error messages, reports, alarms Monitor network status for operational, out- of-service stations, traffic queues Control tapes, disks and other system materials Steinke
11
Decryption Exercise Can you decrypt these? mfuttubsu cepninotry
Decrypt = make (a coded or unclear message) intelligible. (membaca balik sandi) Steinke
12
Why Encryption? Disguising message Based in logic and mathematics
Confidentiality Someone else can’t read the message Integrity Ensure message not altered Authentication Verify who sent message Non-repudiation Sender cannot deny they sent message Encrypt = convert (information or data) into a cipher or code, especially to prevent unauthorized access. Steinke
13
Encryption Substitution Cipher (13) ABCDEFGHIJKLMNOPQRSTUVWXYZ
NOPQRSTUVWXYZABCDEFGHIJKLM Transposition Cipher Rearranging all characters in the plaintext Somewhat mseoawth (3142) Attack: Could count frequency of letters… Break encryption by brute force - try all possible keys Longer key length is better Replace encryption software, find flaws in system Steal, bribe Steinke
14
Steganography Hiding information in a picture / video / audio file
S-tools demo Steinke
15
Symmetric / Secret Key Same key for encryption and decryption
Secure key distribution required Scalability: n users require n*(n-1)/2 keys Steinke
16
Asymmetric or Public/Private Key
Two keys – one encrypts, the other decrypts Public and Private keys generated as a pair Private key for user Public key for distribution Each key decrypts what the other encrypts Provides confidentiality, integrity, authentication and non-repudiation! Repudiation = penolakan
17
Picture of Asymmetric
18
Hash Function Create hash value / digital fingerprint
Shorter than original message From variable length message to fixed length hash value One way function (can’t go back) Appended to message Provides integrity checking – message hasn’t changed Examples: MD bit hash SHA0 – 5: bit (NIST) A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, hash sums, or simply hashes. Hash functions accelerate table or database lookup by detecting duplicated records in a large file. An example is finding similar stretches in DNA sequences. They are also useful in cryptography. A cryptographic hash function allows one to easily verify that some input data maps to a given hash value, but if the input data is unknown, it is deliberately difficult to reconstruct it (or equivalent alternatives) by knowing the stored hash value. This is used for assuring integrity of transmitted data, and is the building block for HMACs, which provide message authentication. Hashing is used with a database to enable items to be retrieved more quickly. Hashing can also be used in the encryption and decryption of digital signatures. The hash function transforms the digital signature, then both the hash value and signature are sent to the receiver. The receiver uses the same hash function to generate the hash value and then compares it to that received with the message. If the hash values are the same, it is likely that the message was transmitted without errors. One example of a hash function is called folding. This takes an original value, divides it into several parts, then adds the parts and uses the last four remaining digits as the hashed value or key. Another example is called digit rearrangement. This takes the digits in certain positions of the original value, such as the third and sixth numbers, and reverses their order. It then uses the number left over as the hashed value. It is nearly impossible to determine the original number based on a hashed value, unless the algorithm that was used is known. Appended = menambahkan.
19
Digital Signatures Create a hash value
Encrypt hash value with your private key Attach to message to be sent Encrypt with recipients public key Send
20
What does Digital Signature do?
Integrity – Message not changed Authentication - Verify sender identity Creates non-repudiation Applications: Used to authenticate software, data, images, electronic contracts, purchase orders
21
Biometrics Multi-factor authentication
Identify people by measuring some aspect of individual anatomy or physiology, some deeply ingrained skill, or other behavioral characteristic Handwritten signatures Face Recognition Fingerprints Iris Codes Voice Retina Prints DNA Identification Palm Prints Handwriting Analysis
22
Errors All recognition systems are subject to error
‘Fraud’ / ‘false positive’ A client is accepted as authenticated when they should have been rejected ‘Insult’ / ‘false negative’ A client is rejected as NOT authenticated when in fact they should have been accepted.
23
Face Recognition Oldest way
Widespread acceptance (and requirement) for photo ID Photo-ID is not particularly reliable, but has a very significant deterrent effect Deterrent = pencegahan
24
Facial Scan Strengths: Weaknesses: Attacks: Defenses:
Database can be built from driver’s license records, visas, etc. Can be applied covertly (surveillance photos). (Super Bowl 2001) Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera Defenses: Scanning stations with mandated poses Covert = tersembunyi
25
Fingerprints Accounts for the majority of sales of biometric equipment
Organizations are very reluctant to impose fingerprinting systems upon their clients Fingerprint sensors on laptops
26
Iris Codes Iris patterns believed to be unique
Easier to capture and process than fingerprints Practical difficulties: Capturing the iris image is intrusive The subject has to be co-operative Intrusive = membosankan
27
Voice Recognition Strengths: Weaknesses: Attacks:
Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise No large database of voice samples Attacks: Tape recordings Identical twins / soundalikes
28
Hand Scan Typical systems measure 90 different features:
Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited Robust = kuat
29
Other Biometrics Retina Scan Facial Thermograms Vein identification
Very popular in the 1980s military; not used much anymore. Facial Thermograms Vein identification Scent Detection Gait recognition Handwriting Facial Thermograms = detects heat patterns created by the branching of blood vessels and emitted from the skin. Vein identification/vascular biometrics = refers to identity management solutions that authenticate based on the unique patterns made by a user’s veins. Scent Detection = using canine to smell to detect substances. Gait recognition = involves people being identified purely through the analysis of the way they walk.
30
Space Required for each Biometric
Approx Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
31
A Comprehensive Security Program
Policies & Management Sponsorship Procedures Reporting Practices and Procedures Assessment Service Provider Compliance Awareness and Training
32
Security Principles Impossible to provide complete security
Match security measures to value of assets Provide good security but keep system easy to use easy to use, little security <-----> difficult to use, high security Steinke
33
Security Today shows/security/ /the-10-biggest- data-breaches-of-2015-so- far.htm/pgno/0/1 breaches/ jobs.html Steinke
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.