MIS 5211.001 Week 8 Site:

Slides:



Advertisements
Similar presentations
II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
Advertisements

NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Encryption Matches Domain 4.0 Basics of Cryptography (15 percent of Security +) Network Security Class Dr. Kleist Note: Most material from Harris, Shon.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography Basic (cont)
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
1 Chap 1: Introduction Some background –The message is usually represented as M or P (plaintext), the encryption result is usually represented as C (ciphertext).
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptography Week-6.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Lecture 2: Introduction to Cryptography
Topic 5: Basic Security.
MIS Week 8 Site:
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
MIS Week 9 Site:
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security Celia Li Computer Science and Engineering York University.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Web Applications Security Cryptography 1
Basics of Cryptography
Intro to Ethical Hacking
Intro to Ethical Hacking
Robert Leonard Information Security Manager Hamilton
Fluency with Information Technology Lawrence Snyder
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

MIS Week 8 Site:

 In the news  Student Presentations  Social Engineering  Encryption  Encoding 2MIS

 Submitted  engineering-audits-on-the-rise-what-this-means-for- cios-and-csos/ engineering-audits-on-the-rise-what-this-means-for- cios-and-csos/  malware-is-expensive-oops-for-hp/#more malware-is-expensive-oops-for-hp/#more  pbox-passwords-leaked-third-party-services- blamed/ pbox-passwords-leaked-third-party-services- blamed/  allows-attackers-steal-millions allows-attackers-steal-millions  3MIS

4

 What I noted  10/this-poodle-bites-exploiting-ssl-30.html 10/this-poodle-bites-exploiting-ssl-30.html  14/hackers-shake-confidence-in-1980s-free-software- idealism.html 14/hackers-shake-confidence-in-1980s-free-software- idealism.html  security.org/secworld.php?id=17488 (DropBox Non- Hack or Don’t reuse IDs and Passwords) security.org/secworld.php?id=17488  security/veracrypt-a-worthy-truecrypt- alternative.html security/veracrypt-a-worthy-truecrypt- alternative.html MIS

 Definition  Getting people to do what you want  Alternatively  Psychological manipulation of people into performing actions or divulging confidential information. - wikipedia.org  Or  Social engineering exploits people's emotions and their desire to help others – malware.wikia.com MIS

 Confidence  Act like you belong there  Friendliness  Make people want to help you  Appearance  Dress for the part MIS

 Can take a number of forms  Pretexting  Phishing  Spear Phishing  Vishing  Tailgating  Quid Pro Quo  Baiting  Diversion Theft MIS

 Inventing a scenario  Do some recon  Speak the language  Impersonate someone who should be there  Give information outsider would not have  Legitimate name of supervisor or department  Reference correct office location  Project name or internal initiative  Pretend to be police, FBI, TSA, or Homeland Security  Note: this is a crime all by itself MIS

  Again, starts with Recon  Send legitimate looking  Request verification of information and warn of consequences for non-compliance  Link to fraudulent web site  Note: Larger organizations pay for monitoring services to catch this MIS

 Similar to phishing, but much more targeted  Heavy recon  Identify just the right target or targets  Executive  IT Admins  Accounts payable  Create content very specific to Target(s) MIS

 Often used to deliver malware  Tempting attachments:  New bonus plan  Layoff list  Memorial notice for recently passed employee  Web sites that deliver promised content  But infect browser MIS

 Similar to phishing, but by phone or fraudulent IVR  VOIP can be used to falsify source phone number (Caller ID Spoofing)  Swatting – Initiating a police raid MIS

 May or May Not be Social Engineering  People feel a need to “Hold the door”  Especially problematic in the south eastern US  Even man traps and roto-gates can be gotten around  Show up with large packages or boxes  Ask security for help MIS

 Call into company claiming to be Tech Support  May take a number of calls  Eventually you will hit someone that actually called for support  Help them (Sort of)  They’ll follow your directions  Type commands  Download software  Provide data MIS

 Spread USBs around parking lots  Mail official looking CDs  Send a token desk toy (with WiFi repeater installed)  Replacement mouse (with malware preloaded)  MP3 player MIS

 Fake ATM  Intercept delivery man  “Borrow” a FedEx or UPS truck and make a pickup MIS

 More of a recon technique then actual Social Engineering  Gold Standards of Dumpster Diving  Yellow Sticky  Hand written notes MIS $

MIS

 Couple of points up front  Real “Standards based” encryption is hard to break  Proprietary encryption is usually not as hard to break  When encryption is broken, it is usually the implementation, not the cypher suite that is broken  Example: WEP and RC4  Regardless of encryption, the computer has to decrypt the data to act on it. Therefore, clear text data is in memory  Also true of browsers, browser must decrypt to act MIS

 Algorithm – Mathematical rules used to encrypt and decrypt  Ciphertext – The encrypted data  Encipher – Encrypting  Decipher – Decrypting  Key – Sequence of bits and instruction that governs encryption and decryption  Plaintext – Unencrypted data MIS

 Symmetric – Both parties use the same key  Anyone with a key can encrypt and decrypt  Relatively fast, less intensive to use  Asymmetric – Keys a linked mathematically, but cannot be derived from each other  What one key encrypts, the other key decrypts  Works both ways  Also known as a key pair and associated with PKI or public key encryption  Relatively slow, resource intensive MIS

 Block Ciphers  Data is broken in to blocks  Blocks are encrypted/decrypted individually  Stream Cipher  Message is not broken up  Encrypted/decrypted one bit at a time MIS

 DES  3DES  AES or Advanced Encryption Standard  Blowfish MIS

 RC4  RSA  El Gamal  ECC or Elliptic Curve Cryptosystems MIS

 A “Hybrid” encryption method  Symmetric key is used to perform bulk encryption/decryption of data  Asymmetric keys are used to pass the symmetric key securely MIS

 Basically just a secret key that is only used for one session between users (or systems) and is then disposed of. MIS

 Comprehensive process including:  Programs  Data formats  Procedures  Protocols  Policies  Mechanisms  All working together to secure communications MIS

 Certificate Authority (CA)  Issues public keys  Verifies you are who you say you are and provides certificate to prove it that can only come from a secret key you posses  Registration Authority (RA)  Performs registration activities for a CA MIS

 Provides for message integrity  Mathematical value calculated from data that cannot be reversed  Sender and receiver can both calculate the value and verify that the data sent is the data received MIS

 Encrypted hash value  Data sent is data received  Data can only have come from someone with the appropriate key(s)  Reference: CISSP Certification, Shon Harris MIS

 Only one cipher is truly unbreakable  One-Time Pad  Each pad is only used once  Pad is XORd against cleartext data  Ciphertext is XORd against pad at receiver  Generally not used due to difficulty in distributing non-recurring pads MIS

 Longer keys are better  Keys need to be protected  Keys should be extremely random and use full spectrum of keyspace MIS

 Encoding is NOT encrypting  Perfect example: Base64 encoding  Well known  Reversible  Provide limited obfuscation  Other examples  Morse code  ASCII  UTF-8, 16, 32  EBCIDIC  Unicode MIS

 Often used incorrectly as a substitute for encryption  Some “proprietary” encryption systems were nothing more then Base64 or Base64 with character substitution  Even if you don’t recognize the encoding it is easily “cracked” with frequency analysis MIS

 We will see this again when we cover Web applications and intercepting proxies  Base64 encoding is often used as an obfuscation technique MIS

 Readings and Articles as usual  We will be covering  Malware MIS

? MIS