Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security… or something like that! Lecture 1 Zaharia Mihai Horia.

Similar presentations


Presentation on theme: "Information Security… or something like that! Lecture 1 Zaharia Mihai Horia."— Presentation transcript:

1 Information Security… or something like that! Lecture 1 Zaharia Mihai Horia

2 Usual stuff! Evaluation –Homework may be One big project with fall semester evaluation Weekly – all jobs from practical assessments –Laboratory work The activity is separately evaluated –Theory exam (20 – 50 questions) depending on my mood

3 Today 1.Brief Introduction 2.Unauthorized access methods classification 3.Some basic ideas

4 Codes A book of codes is required. Here the equivalence tables are stored. In fact we use a bijective function defined in the code book. The translation may be applied at word or group of words level.

5 Ciphers Here the processing level is lower that codes method and can be applied at –String level –Character level –Bit level Is mainly specific to information society but also older.

6 Machine era The previous methods were made by humans without no help from a machine. First modern mechanical approaches in were Jefferson cylinder ”(1790) and Wheatstone disk (1860). But the mechanical typing machine development drive quickly to need of developing modern cipher machines to directly print coded text. A typical example was T52 model made by Siemens and Halski between 1930 and 1945.

7 Cripto devices Nowadays the integrated devices have various domains of appliance in communications. Main applications are related to various types of audio vide communications that usually not use standard networks. There are also variations to supplementary crypt the communication over general unsecured communication lines. As is expected most of the design and implementation related information are proprietary so remains secret. It is common the fact that a hardware and software reverse engineering can be made over almost all available devices on the market. So the design must take this possibility into account. One of the simple way in maintaining reasonable security levels is to use in implementations algorithms with larger solution space.

8 Cyberspace security organisations In 1990 FIRST (Forum of Incident Response and Security Teams) was created. Initially were only 11 emergency teams. Nowadays there are over 200 active teams. The mission of the organization: –FIRST members develop and share technical information, tools, methodologies, processes and best practices –FIRST encourages and promotes the development of quality security products, policies & services –FIRST develops and promulgates best computer security practices –FIRST promotes the creation and expansion of Incident Response teams and membership from organizations from around the world –FIRST members use their combined knowledge, skills and experience to promote a safer and more secure global electronic environment.

9 References 1.Davies D.W., Price W.L., “Security for Computer Networks”, John W&Sons, USA, 1995. 2.Angheloiu I, ş.a., “Securitatea şi protecţia informaţiei în sistemele electronice de calcul”, Ed. Militară, 1986, Bucureşti 3.Menzenes A., et all, “Handbook of applied cryptography”, CRC Press, 1996 4.http://www.cryptomuseum.com/crypto/index.htmhttp://www.cryptomuseum.com/crypto/index.htm

10 Who lives nearby?


Download ppt "Information Security… or something like that! Lecture 1 Zaharia Mihai Horia."

Similar presentations


Ads by Google