Security Protecting information data confidentiality

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Computer and Network Security Mini Lecture by Milica Barjaktarovic.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Encryption Methods By: Michael A. Scott
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Cryptography, Authentication and Digital Signatures
Types of Electronic Infection
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Chapter 6 Introduction to Digital Security
Secret Key Cryptography
Security Issues in Information Technology
Chapter 40 Internet Security.
Computer Security Revision Week
Web Applications Security Cryptography 1
TOPIC: Web Security (Part-3)
Chapter 15: Security.
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
IT246 introduction to networkS Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
What is network security?
Chapter 6 Introduction to Digital Security
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
OPERATING SYSTEMS CS 3502 Fall 2017
Basic Network Encryption
Tutorial on Creating Certificates SSH Kerberos
Cryptography.
Digital Signatures Last Updated: Oct 14, 2017.
أمن المعلومات والبيانات
Computer Security.
Computer Security.
برنامج أمن أنظمة الحاسب
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Chapter 8 Information Security.
Information Security Tanachat Arayachutinan
Faculty of Science IT Department By Raz Dara MA.
Security Risanuri Hidayat 21 February 2019 security.
Lecture 10: Network Security.
Chapter 1: Introduction
Operating Systems: The course
Basic Network Encryption
Test 3 review FTP & Cybersecurity
Cryptography Fundamentals
Introduction to Encryption Technology
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security Protecting information data confidentiality - protect unauthorized reads data integrity - protect unauthorized writes (change) removes or additions system availability - prevent denial of service (DoS) Policy, OS flaws

Security Intruders - read info (email, trade secrets, confidential data) - or make changes (change grades or salary) - DoS - elite hackers - script kiddies

Security Need a backup policy as part of security policy. - accidental data loss (hardware, software, human error) - malicious destruction - multiple copies at another location (earthquake, fire, terrorists)

Cryptography Encrypt data for confidentiality and integrity. Also use for authentication. Key Plaintext Encrypt Alg Ciphertext Ciphertext Decryption Alg Plaintext Key

Cryptography Use known, strong algorithms with a good key. Avoid relying on security by obscurity. Mono alphabetic substitutions are fairly easy to break cryptograms. Symmetric encryption – one key Asymmetric encryption – two keys - also called public key

Symmetric Encryption Uses the same key for encryption and decryption. Usually used to provide confidentiality. Key must be shared by two parties. Algorithms: DES, 3DES, AES Blowfish and others Key length is important. Keeping the key private is important.

Asymmetric Encryption Uses two keys (public and private) The two keys are related. One can be used for encryption with the other for decryption. Based on mathematics – factoring large numbers. Often used for key exchange, and crypto signatures. Slower than symmetric. Algorithms: RSA, DSA

Digital fingerprints - hashes Take a message and produce a hash of it. MD5, SHA-1, others Hope the hash is unique. If message is changed will generate a different hash. Combine with public key for signatures.

Crypto applications SSH – Secure shell - confidentiality - authentication/integrity SSL/TLS – https and other protocols - confidentiality, auth/integrity PGP/GPG – for files and email

More security topics User authentication – username/password Cracking passwords – choose good ones Smartcards, biometrics Sniffing – why encryption important open ports – finding vulnerabilities Trojan Horses, worms, virus Buffer Overflows Firewalls, IDS, IPS