Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Lecture 6: Web security: SSL
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Network Security IS250 Spring 2010 John Chuang. 2 Outline  What is Network Security? -Security properties -Cryptographic techniques  Availability (or.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 3 rd 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Oct 4 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 19 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 16 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 4 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #26 Nov 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #8 Sep 15 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #12 Sep 23 rd 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #25 Nov 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Foundations of Network and Computer Security J J ohn Black Lecture #36 Dec 12 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Nov 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 19 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 1 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
IIT Indore © Neminath Hubballi
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
@Yuan Xue Network Security Review and Beyond Network Security.
Secure Socket Layer (SSL)
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS 4/585: Cryptography Tom Shrimpton FAB
1 Tao Wan Digital Security Group School of Computer Science Carleton University Oct 30, 2003 IP Spoofing Attacks & Defenses.
Network Security Essentials Chapter 5
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Network Attacks CS432 - Security in Computing
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2014 Nitesh Saxena.
Key Generation Bob generates his keys as follows –Choose two large distinct random primes p, q –Set n = pq (in Z… no finite groups yet) –Compute  (n)
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 11 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Network and System Security Risk Assessment
IT443 – Network Security Administration Instructor: Bo Sheng
Attacks and Malicious Code
Exam Review.
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007

Announcements Today: –Final Review –FCQs (last 5 mins) Final Exam on Tuesday –12/18, 7:30am, this room

About the Final Same format as Midterms –Short answers, extended topic questions, Justified True/False –Far fewer “thought problems” than the midterm ie, it’s an easier test

Coverage Everything –Lectures (incl Martin’s guest lecture) –Quizzes and Midterms Know the answers! –Assigned Readings –Projects But does not include: –Material I said you were specifically not responsible for –Reading on the web page or from lecture that was not “assigned reading”

What to Study Blockciphers –Definition, Security Notions, Feistel, Attacks, DES, AES, DDES, TDES Modes of Operations –ECB, CBC, CTR –One-time-pad –Attack models COA, KPA, CPA, CCA

Review (cont) MACs –Syntax, ACMA model –CBC MAC, XCBC, UMAC, HMAC Hash Functions –Syntax, applications, MD paradigm, MD theorem, security notions (inversion resistance, 2 nd -preimage resistance, collision resistance), SHA-1, MD5 –Birthday problem Bounds, how to apply to hash functions

Review (cont) Groups –Definition, examples Z m, Z m *, Z p * –Euler’s  function, Lagrange’s theorem RSA Cryptosystem –Key generation, encryption –Security Basic RSA bad, factoring is best known attack, factoring technology –Implementation Not much…, know the diff between primality testing and factoring!

Review (cont) Digital Signatures –Definition, ACMA model, RSA sigs, hash-then-sign SSL –Outline of protocol, CAs, Man-in-the-middle attacks OpenSSL –Symmetric key and IV derivation Salt, passphrase, base64 encoding –Certificates, administration –Structure of projects 1 and 2

Review (cont) Networking Basics –Routing, basic protocols (IP, UDP, TCP, Eth, ARP, DHCP, DNS, ICMP, BGP), packet formatting –IP addresses, NAT boxes Viruses –High-level history (Morris worm, Windows worms, macro viruses) –Propagation methods How to 0wn the Internet

Review (cont) Trojans –Thompson’s Turing Award lecture –Rootkits –Phishing Denial of Service –Gibson story Bandwidth saturation, filtering, zombie armies –SYN Floods Mechanics, SYN Cookies –Reflection attacks, smurfing –Backscatter, Traceback, Ingress Filtering

Review (cont) Session Hijacking –Technique, prevention ICC Talk –Architecture, network issues, timing, key exchange, mode of operation, blockcipher flaws Vulnerabilities –Buffer overruns Idea, techniques, machine architecture, calling conventions, stack layout, shellcode

Review (cont) Overruns, cont –Prevention Non-executing stack, canaries –Ways around them

Review (cont) Password Crackers –/etc/passwd, salt, shadowed password files Web Security Overview –PHP –Disguised URLs –XSS Wireless Security –War driving, SSIDs, MAC Filters

Review (cont) WEP –Protocol problems Dictionary attack on pads, authentication doesn’t work, etc Protocol Attacks –ARP cache poisoning (ettercap), DNS spoofing, prevention (AuthARP, DNSSEC)