Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004.

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Lecture 6: Web security: SSL
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Security - Systems Design Considerations. Layer 2 Design L2 Control protocols q, STP and ARP 802.1q for Ethernet switches to exchange VLAN info.
Network Security IS250 Spring 2010 John Chuang. 2 Outline  What is Network Security? -Security properties -Cryptographic techniques  Availability (or.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 3 rd 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 19 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 16 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
CSIT435 Spring 2001 Final Examination Study Guide.
Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #12 Sep 23 rd 2009 CSCI 6268/TLEN 5550, Fall 2009.
SUNY at Buffalo; Computer Science; CSE620 – Advanced Networking Concepts; Fall 2005; Instructor: Hung Q. Ngo 1 Agenda Last words on buffer overflows Overview.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 19 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 1 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
IIT Indore © Neminath Hubballi
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
Web Server Administration Chapter 10 Securing the Web Environment.
@Yuan Xue Network Security Review and Beyond Network Security.
Secure Socket Layer (SSL)
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS 4/585: Cryptography Tom Shrimpton FAB
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Network Attacks CS432 - Security in Computing
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
PKCS #5: Password-Based Cryptography Standard
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Key Generation Bob generates his keys as follows –Choose two large distinct random primes p, q –Set n = pq (in Z… no finite groups yet) –Compute  (n)
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
IT443 – Network Security Administration Instructor: Bo Sheng
Attacks and Malicious Code
Exam Review.
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004

Announcements Last Class Today –Final Review Final Exam on Monday –Dec 13 th –In this room –10:30am – 1:00pm –Calculators allowed –Closed “book”, closed notes, etc.

About the Final Same format as Midterm –Short answers, extended topic questions, Justified True/False –11 pages Twice as much time as the midterm, but the final is not twice as long –Far fewer “thought problems” than the midterm ie, it’s an easier test

Coverage Everything –Lectures (incl Ryan’s guest lecture) –Quizzes and Midterm Know the answers! –Readings –Projects But does not include: –Material I said you were specifically not responsible for Eg, coupon collecting –Reading on the web page that was not “assigned reading”

What to Study Blockciphers –Definition, Security Notions, Feistel, Attacks, DES, AES, DDES, TDES Modes of Operations –ECB, CBC, CTR –One-time-pad –Attack models COA, KPA, CPA, CCA

Review (cont) MACs –Syntax, ACMA model –CBC MAC, XCBC, UMAC, HMAC Hash Functions –Syntax, applications, MD paradigm, MD theorem, security notions (inversion resistance, 2 nd -preimage resistance, collision resistance), SHA-1, MD5 –Birthday problem Bounds, how to apply to hash functions

Review (cont) Groups –Definition, examples Z m, Z m *, Z p * –Euler’s  function, Lagrange’s theorem RSA Cryptosystem –Key generation, encryption –Security Basic RSA bad, factoring is best known attack, factoring technology –Implementation Not much…, know the diff between primality testing and factoring! Prime number theorem –  (n) » n/ln(n)

Review (cont) Digital Signatures –Definition, ACMA model, RSA sigs, hash-then-sign SSL –Outline of protocol, CAs, Man-in-the-middle attacks OpenSSL –Symmetric key and IV derivation Salt, passphrase, base64 encoding –Certificates, administration –Structure of projects 1 and 2

Review (cont) Networking Basics –Routing, basic protocols (IP, UDP, TCP, Eth, ARP, DHCP, DNS, ICMP, BGP), packet formatting –IP addresses, subnetting, NAT boxes Viruses –High-level history (Morris worm, Windows worms, macro viruses) –Propagation methods How to 0wn the Internet

Review (cont) Trojans –Thompson’s Turing Award lecture –Rootkits –Phishing Denial of Service –Gibson story Bandwidth saturation, filtering, zombie armies –SYN Floods Mechanics, SYN Cookies –Reflection attacks, smurfing –Backscatter, Traceback, Ingress Filtering

Review (cont) Session Hijacking –Technique, prevention ICC Talk –Architecture, network issues, timing, key exchange, mode of operation, blockcipher flaws Vulnerabilities –Buffer overruns Idea, techniques, machine architecture, calling conventions, stack layout, shellcode

Review (cont) Overruns, cont –Prevention Non-executing stack, canaries –Ways around them –Static Analysis Off-by-One Format String Vulnerabilities –What they look like –How to exploit –Prevention Heap Overflows –Basic idea only

Review (cont) Password Crackers –/etc/passwd, salt, shadowed password files Web Security Overview –PHP –Disguised URLs –XSS Wireless Security –War driving, SSIDs, MAC Filters

Review (cont) WEP –Protocol problems Dictionary attack on pads, authentication doesn’t work –RC4 problems Uses RC4 in a bad way Details of FMS attack Protocol Attacks –ARP cache poisoning (ettercap), DNS spoofing, prevention (AuthARP, DNSSEC)

Review (cont) Intrusion Detection –Static vs Dynamic –Profiling Statistical, ML, etc –pH-type systems Tracking system calls for each app –Mimicry Attacks Nops, building a FSM, finding a sequence –Escaping from chroot jail