Chapter 6 Introduction to Digital Security

Slides:



Advertisements
Similar presentations
Cryptography The science of writing in secret code.
Advertisements

Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Types of Electronic Infection
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CSCI-235 Micro-Computers in Science Privacy & Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Security Risks Todays Lesson Security Risks Security Precautions
Security Protecting information data confidentiality
Securing Information Systems
Unit 3 Section 6.4: Internet Security
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Systems Security Keywords Protecting Systems
Practical Questions Theoretical Questions
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Lecture 8. Cyber Security, Ethics and Trust
Chapter 6 Introduction to Digital Security
Introduction Of System Security
Firewalls.
Cryptography.
CSCI-235 Micro-Computer Applications
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Year 10 ICT ECDL/ICDL IT Security.
Security in Networking
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Computer Security.
Computer Security.
Cryptography and Network Security
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
ONLINE SECURE DATA SERVICE
DISSERTATION ON CRYPTOGRAPHY.
Basic of Modern Cryptography
Introduction to Cryptography
Test 3 review FTP & Cybersecurity
Computer Security Chapter Two
Protection Mechanisms in Security Management
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Basics Of Symmetric Encryption
Unit 1.6 Systems security Lesson 1
Cryptography and Network Security
Presentation transcript:

Chapter 6 Introduction to Digital Security

Safety Vs Security Safety is also related to security in that the lack of security may pose a safety risk (absence of IT security may lead to a system that is compromised which in turn may not be safe anymore). SAFETY: To be safe requires measures to prevent accidents (cause harm to humans or machines). Examples: Redundant systems to guarantee availability, fire extinguisher. SECURITY: Security requires measures to prevent fraud, crime, illegal activities. Examples: Firewalling, security policy, use of encryption. Security is a necessary but not sufficient prerequisite for achieving safety (a system without security is probably unsafe, but a system with security is not necessarily safe).

Risks Involved in Digital Security COMPUTER SECURITY - generic name for the collection of tools designed to protect data and to thwart hackers. NETWORK SECURITY - measures to protect data during their transmission. INTERNET SECURITY - measures to protect data during their transmission over a collection of interconnected networks. Risks Involved in Digital Security Vulnerabilities Phishing Computer Virus Computer Worms Sniffers Hacking

Vulnerability: In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness. Phishing: is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. PHISHING TECHNIQUES Link manipulation Filter evasion Phone phishing Computer Virus: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.

Computer Worms: A computer worm differs from a computer virus in that a computer worm can run itself. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside. It can damage your files and operation systems. It can spread rapidly on your system or to other computers on network. Sniffers: Sniffers is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. Hackers can sniff your packets with some software or hardware and they can steal your credit card numbers, passwords or e-mails. Hacking: In common usage, a hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge. HACKING TECHNIQUES: Vulnerability scanner Password cracking Packet sniffer Spoofing attack Social engineering Trojan horses Viruses

Avoid Risks In Digital Security We must use antivirus software’s. We must use firewall for hacker attacks. We shouldn’t open every file. When we receive an email we should be careful. We shouldn’t share our personal information on internet. We should be very careful in sharing files when we chat.

Firewall Types of Firewalls: A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another Firewalls act as the intermediate server between SMTP and HTTP connections. A firewall is a group of systems that enforces access between networks. It also enforces the inflow and outflow of data. Some firewalls emphasis on blocking data whereas others deal with permitting data. Important feature of a firewall is access control. Types of Firewalls: Packet Filters Circuit-Level Gateways Application-Level Gateways

What firewalls can protect? Helps keep hackers from accessing the company network. Helps block traffic from the outside to the inside. Can protect against any network borne attack. If attacked the firewall can be used as a tracing tool. What firewalls cannot protect? Can’t protect against trojaned clients. Cant’ protect from those inside the network. Firewalls can’t protect very well against viruses. Too many ways of encoding binary files. Can’t protect against a data-driven attack, in which something is emailed and is opened.

Types of Security Protocols The following diagrams shows you the various security protocols which work at the different layers of the OSI Model.

Cryptography Cryptographic Terms: Cryptography (or cryptology) is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science and electrical engineering. Applications of cryptography include  ATM cards, computer passwords and electronic commerce. Cryptographic Terms: Cryptography - study of encryption principles/methods Cryptanalysis (code breaking) - study of principles/ methods of deciphering ciphertext without knowing key Cryptology - field of both cryptography and cryptanalysis Plaintext - original message Ciphertext - coded message Cipher - algorithm for transforming plaintext to ciphertext Key - info used in cipher known only to sender/receiver Encipher (encrypt) - converting plaintext to ciphertext Decipher (decrypt) - recovering ciphertext from plaintext

Symmetric Key Encryption (Private Key Cryptography) Sender and receiver share a single common key. All classical encryption algorithms are private-key. Was only type prior to invention of public-key in 1970’s and by far most widely used. If this key is disclosed communications are compromised. Symmetric, parties are equal, hence does not protect sender from receiver forging a message & claiming that it is sent by sender. Asymmetric Key Encryption (Public Key Cryptography) Probably most significant advance in the 3000 year history of cryptography. Uses two keys – a public & a private key. Asymmetric since parties are not equal. Uses clever application of number theoretic concepts to function. Complements rather than replaces private key cryptography.