Download presentation
Presentation is loading. Please wait.
Published byTerence Martin Poole Modified over 9 years ago
1
SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality
2
Who is who?
3
Telephone line Mail server TCP/IP Echelon & Carnivore Who can read what ?
4
SMTP POP3 POST MAIL e-mail using an ISP POST OFFICE
5
SMTP POP3 POST MAIL a) Telephone-line POST OFFICE
6
SMTP POP3 POST MAIL b) e-mail server Everything on the servers can be read or copied POST OFFICE
7
SMTP POP3 POST MAIL c) TCP/IP Not readable – following different ways POST OFFICE
8
Echelon/Carnivore Source: http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htmhttp://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm
9
Traces
10
Traces The IP address of your computer is : 213.177.129.120 your DNS address is : adsl-129-120.wanadoo.be We know you use : Microsoft Windows 98 Your navigator has the code: Mozilla/4.78 [en] (Win98; U) In fact it is: Netscape Communicator 4.x English What you did is stored : Windows 95 C:\Windows\Temporary Internet Files\ Windows NT C:\WinNt\Temporary Internet Files\ A nice demo in french on: www.cnil.fr
11
Virus What is a virus and types? How is a computer infected? Danger
12
a) What is a virus? computer virus = a computer program 'I love you', 45 million computers infected worm = multiplicates itself c ode Red: 300.000 servers destroyed trojan horse = hides for other actions Back Orifice logic bomb = distroys programs hoax = false alarm
13
b) How is a computer infected? files attached to e-mail (attachment) diskettes other
14
c) Danger infecting components of your system effects: malfunctions deletion of data wiping of hard disk ...
15
Solutions to provide safety and confidentiality solving identity problem and unauthorised reading protection against traces protection against virusses
16
Encryption Purpose Functions How? Identity and unauthorised reading
17
Functions of encryption Authentication Integrity Confidentiality
18
Symmetrical encryption UbizenVcjafo Encryption E(…) Decryption D(…) SenderReceiver Vcjafo Untrusted network SAME KEY Ubizen A=A+ 1 A=A- 1
19
Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Public Key Receiver Decryption D(…) Go#st$Ubizen Private Key Receiver confidentiality towards receiver
20
Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Private Key Sender Decryption D(…) Go#st$Ubizen Public Key Sender authentication of sender
21
Example
22
Example
23
Example
24
Traces at the ISP Traces on own computer Against leaving traces
25
anti-virus program N orton, McAfee, eSafe, F-Secure, … watch out for attachments.exe,.com,.pif,.vbs,.doc,.xls, … www.bipt.be Against virusses
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.