Download presentation
Presentation is loading. Please wait.
Published bySydney Osborne Modified over 9 years ago
1
Copyright © Center for Systems Security and Information Assurance Lesson Four Data Privacy and Encryption
2
Copyright © Center for Systems Security and Information Assurance Lesson Objectives Define the term cryptology and discuss the types and applications of cryptology. Identify the components of a cryptography systems. Identify and discuss common approaches to cryptography. Compare and contrast symmetric and asymmetric encryption. Define the term digital signature and explain its function. Define the term Public-Key Infrastructure and explains it uses. List the most common secure applications and explain there function.
3
Copyright © Center for Systems Security and Information Assurance Protecting Your Personal Information Every day you share personal information about yourself with others It is so routine that you may not even realize you are doing it write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, buy a gift online, call home on your cell phone, schedule a doctors appointment or apply for a credit card.
4
Copyright © Center for Systems Security and Information Assurance Protecting Your Personal Information Each transaction requires you to share personal information: your bank and credit card account numbers your income your Social Security number (SSN) or your name address and phone numbers
5
Copyright © Center for Systems Security and Information Assurance What happened with my personal information? Its important to find out what happens to the personal information you and your children provide to companies, marketers and government agencies. These organizations may use your information simply to process your order; to tell you about products, services, or promotions; or to share with others.
6
Copyright © Center for Systems Security and Information Assurance Identity Theft – Fastest Growing Crime Identity thieves, who want your information to commit fraud Identity theft is the fastest-growing white-collar crime in America Occurs when someone steals your personal identifying information to open new charge accounts, order merchandise or borrow money Consumers targeted by identity thieves usually don’t know they’ve been victimized.
7
Copyright © Center for Systems Security and Information Assurance FTC Tips to Avoid Identity Theft Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others Read the privacy policy on any website directed to you or your children Minimize the identification information and the number of cards you carry to what you’ll actually need
8
Copyright © Center for Systems Security and Information Assurance FTC Tips to Avoid Identity Theft Don’t put all your identifying information in one holder in your purse, briefcase, wallet or backpack Keep items with personal information in a safe place Protect yourself against dumpster diving Use a secure browser when shopping online to guard Employ encryption when transferring sensitive or confidential data
9
Copyright © Center for Systems Security and Information Assurance Cryptography The art and science of keeping information secure from unintended audiences, of encrypting it Cryptanalysis The art and science of breaking encoded data Cryptology The branch of mathematics encompassing both cryptography and cryptanalysis Cryptography Plays a crucial role in the transfer of confidential information across local networks and the Internet
10
Copyright © Center for Systems Security and Information Assurance Cryptography Components Encryption Algorithm A set of mathematically expressed processes for encrypting information Ciphertext Encrypted text Plaintext What you have before encryption, and ciphertext is the encrypted result Key Information used to change the operations performed in crypto-equipment for the purpose of encrypting or decrypting electronic signals.
11
Copyright © Center for Systems Security and Information Assurance Cryptography
12
Copyright © Center for Systems Security and Information Assurance Applying Cryptography Encrypts data residing on storage devices or traveling through communication channels to ensure that any illegal access is not successful Secures the process of authenticating different parties attempting any function on the system Presents a party wishing be granted certain functionality on the system a way to prove that they indeed who they say they are Ensures that credentials are only used by their rightful owner
13
Copyright © Center for Systems Security and Information Assurance Principles of Modern Cryptography Emphasis that security should not depend on the secrecy of the encryption method (or algorithm), only the secrecy of the keys Revelation of the secret keys must not occur when plaintext and ciphertext are compared, and no person should have knowledge of the key Execution of today's algorithms are by computers or specialized hardware devices, and in most cases are implemented in computer software
14
Copyright © Center for Systems Security and Information Assurance Symmetric Encryption The message can be encrypted and decrypted using the same key Symmetric encryption is faster compared to asymmetric encryption Both the sender and the recipient must have an access to (same) encryption key (a disadvantage) Secure distribution of the (encryption) key between the parties is required The most commonly used symmetric encryption method is Data Encryption Standard
15
Copyright © Center for Systems Security and Information Assurance Symmetric Encryption
16
Copyright © Center for Systems Security and Information Assurance Asymmetric Encryption Based on the usage of key pairs Exchangeable keys The recipient's private key is only in the recipient's possession, no third party is able to decrypt the message encrypted with the recipient's public key Management of keys is a big advantage Time-consuming Referred to as public key encryption.
17
Copyright © Center for Systems Security and Information Assurance Asymmetric Encryption
18
Copyright © Center for Systems Security and Information Assurance Digitals Signatures Extra data is appended to a message which identifies and authenticates the sender and message data using public- key encryption The sender uses a one-way hash function to generate a hash-code of about 32 bits from the message data The sender then encrypts the hash-code with his private key The receiver re-computes the hash-code from the data and decrypts the received hash with the sender's public key If the two hash-codes are equal, the receiver can be sure that data has not been corrupted and that it came from the given sender
19
Copyright © Center for Systems Security and Information Assurance Digitals Signatures
20
Copyright © Center for Systems Security and Information Assurance RSA A public key cipher which can be used both for encrypting messages and making digital signatures The company RSA Data Security Inc. takes its name from this algorithm, and has acquired the rights to the patents which cover it
21
Copyright © Center for Systems Security and Information Assurance Public-key Infrastructure ( PKI) Combine software, encryption technologies, and services to enable enterprises to protect the security of their communications and business transactions on the Internet Integrate digital certificates, public-key cryptography, and certificate authorities into a total, enterprise-wide network security architecture
22
Copyright © Center for Systems Security and Information Assurance Virtual Private Network (VPNs) Connect a group of two or more computer systems to a private network with limited public-network access, that communicates securely over a public network, such as the internet Include encryption, authentication of remote users or hosts, and mechanisms for hiding or masking information about private network topology from potential attackers on the public network
23
Copyright © Center for Systems Security and Information Assurance Secure Application Protocols Secure/MIME (S/MIME) A version of the MIME protocol that supports encryption of messages. S/MIME is based on RSA's public-key encryption technology Secure Electronic Transaction (SET) A standard that will enable secure credit card transactions on the Internet Secure Shell (SSH) A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another
24
Copyright © Center for Systems Security and Information Assurance Secure Application Protocols SHTTP An extension to the HTTP protocol to support sending data securely over the World Wide Web IP Security (IPSec) A set of protocols developed by the IETF to support secure exchange of packets at the IP layer
25
Copyright © Center for Systems Security and Information Assurance Exercise 4.1 Using PGP
26
Copyright © Center for Systems Security and Information Assurance Exercise 4.2 Using Token Generator
27
Copyright © Center for Systems Security and Information Assurance Exercise 4.3 VPN Demonstration
28
Copyright © Center for Systems Security and Information Assurance Exercise 4.4 Using SHTTP
29
Copyright © Center for Systems Security and Information Assurance Exercise 4.5 Viewing a Digital Certificate
30
Copyright © Center for Systems Security and Information Assurance Exercise 4.6 Protecting Word Documents
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.