Security & Encryption Thomas Fenske & Joseph Minter.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Cryptography and Network Security
Secure Socket Layer.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Principles of Information Security, 2nd edition1 Cryptography.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Network Security Secure hypertext transfer protocol (https) Cookies Public Key Cryptography.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Computer encryption is… Based on the science of cryptography.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
System Security: Cryptography Technologies CPE Operating Systems
Public Key Encryption.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
CIT 380: Securing Computer Systems
Crypto in information security
E-Commerce Security.
The Secure Sockets Layer (SSL) Protocol
DISSERTATION ON CRYPTOGRAPHY.
Electronic Payment Security Technologies
Cryptography and Network Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Security & Encryption Thomas Fenske & Joseph Minter

Information Security

“Information Security is the preservation of secrecy and integrity in the storage and transmission of information”. (Intelligence Encyclopedia)

Security Breach 1)Interception of messages 2)Theft of stored data 3)Information sabotage 4)Spoofing 5)Denial of service

Security is more important now than ever before due to an increase in electronic storage, processing, and transmission of information. By typing in a user name and password, people can transfer money, shop, and manage financial accounts online.

Anybody who wants to protect their privacy and their identity have an interest in maintaining information security. Computer hackers, government intelligence agencies, criminals, and rival businesses are some of the parties which might seek to breech information security.

The Patriot Act

The “Patriot Act” was passed through congress as a response to the attacks of 9/11. This law allows for your personal records to be searched without your knowledge or consent, secret searches of your home and property without notice, and phone & computer wire taps. The “Patriot ACT” is an acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.

The most important tools for the preservation of information security and encryption. Passwords can be as simple as 123, or as complex as 30 or more letters (capital and lower case) numbers and characters. The more complex the more secure!! Because passwords can be simple, most people use short memorable passwords. They also tend to use the same password for multiple sites and institutions such as banks and credit card companies.

Security Sockets Layer Security Sockets Layer or SSL is the leading internet security protocol. SSL is used to do two things, validate the identity of a website, and create an encrypted connection when sending out personal information on the internet.

History of Encryption Cryptography began thousands of years ago as basic coding sequences. People would use general number sequences to describe words using a cipher of some kind. Ex = HELLO ABCDE 2FGHI/JK 3LMNOP 4QRSTU 5VWXYZ

Ciphering and Cryptography A Cipher is secret method of writing, as by transposition, such as a watermark, or substitution of letters to form a cryptic combination. Encryption is derived from Cryptography and goes all the way back to the BC era. In 1900 BC, Egyptians began substituting hieroglyphs within their form of writing.

Encryption before computers Before Computers, Encryption was primary used to keep classified information from being read by anyone who was not in the need to know. Some famous Encryption devices include: The Enigma Machine (Germany), Purple (Japan), Sigaba (US Enigma)

The Enigma Machine The Enigma Machine used three Rotors at a time out of a possible five to encrypt the lettering sequence of the words typed. Each letter that was typed on the machine had a corresponding light that signified the encryption letter. Each separate branch of the German Military had a different Enigma Cipher machine.

Public Key Encryption Using matched Public/private key pairs Anyone Can encrypt with the public Key, but only one person with the private key can decrypt the message. Many companies use a public key encryption form including clients and State Agencies. Determining public Key Encryption is simple. When loading a secure source a picture of a key will be shown in the bottom right corner of the browser being used as well as

Digital Signature Algorithm (DSA) Developed by the US Government in 1993 Key Generation has two phases: –Choosing your algorithm function parameters –Compute the Private and public keys for the user. DIS is a 128 Bit Block size. Meaning that the password used to encrypt the information is 120 random characters long with a 8 bit character fail-safe.

Hash Functions A Hash Function is an algorithm that turns plain text into a hash value. A hash value is the fixed- length result of a one way hash function. The value is used as a fingerprint of the computer that it was accessed from. One of the easiest objects that could be described as a hash function is a cookie.