Week 1 - Wednesday.  What did we talk about last time?  Course overview  Terminology  Threats  Vulnerabilities  Attacks  Controls  CIA.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Chapter 1 Introduction to Security
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CPSC 6126 Computer Security Information Assurance.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber crime & Security Prepared by : Rughani Zarana.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Computer & Network Security
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Data Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Chap1: Is there a Security Problem in Computing?.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
Computer Security By Duncan Hall.
Private key
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Introduction to Computer Security
Week 2 - Friday.  What did we talk about last time?  Biometrics  Tokens  Started access control.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Information Systems Design and Development Security Precautions Computing Science.
Introduction (Pendahuluan)  Information Security  Criptography.
PRESENTED BY : Bhupendra Singh
Chapter 6 Introduction to Digital Security
Security Protecting information data confidentiality
Seminar On Ethical Hacking Submitted To: Submitted By:
Network security threats
Chapter 6 Introduction to Digital Security
Year 10 ICT ECDL/ICDL IT Security.
Security in Networking
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Computer Security.
Computer Security.
PART VII Security.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Presentation transcript:

Week 1 - Wednesday

 What did we talk about last time?  Course overview  Terminology  Threats  Vulnerabilities  Attacks  Controls  CIA

 Yesterday was Patch Tuesday  Microsoft, Oracle, and Adobe put out their patches on the second Tuesday of the month  Oracle (Java's owner) only puts them out quarterly  Are these patches available for Java 6?  No!  Unless you have an expensive support license from Oracle  And this lab has Java 6!

 Welcome to Exploit Wednesday!  Because the patches on Patch Tuesday are often to fix security holes, today is one of the most dangerous days for computer security  All the hackers now know exactly what vulnerabilities can be attacked  36 of the fixes will be for Java 7 SE products  34 of these cover remote exploits without authentication  Follow the story:  products-tuesday / products-tuesday /

 Most computer criminals are amateurs  They commit crimes of opportunity  Time-stealing is common  Disgruntled or recently fired employees can use their knowledge of a system to attack it

 You are all hackers by now  A malicious hacker is called a cracker  A large segment of crackers are high school or college students  They often attempt to gain access to other people’s computer systems for the fun or challenge of it

 Most professional crackers are trained computer scientists who have turned to crime  In the early days of hacking and viruses, destroying hardware, software, or data was the goal  Professional crackers now look to make money by stealing valuable data  There are connections to organized crime  Many attacks come from Russia, Asia, and Brazil

 Modern terrorists are often computer savvy  Three common forms of terrorist computer usage are:  Targets of attack Denial-of-service and defacement of websites  Propaganda vehicles Websites and lists used to disseminate information  Methods of attack Using computers to coordinate or initiate other forms of terrorism

 There are five common ways of dealing with attacks, many of which can be used together Prevent Remove the vulnerability from the system Deter Make the attack harder to execute Deflect Make another target more attractive (perhaps a decoy) Detect Discover that the attack happened, immediately or later Recover Recover from the effects of the attack

 Many different controls can be used to achieve the five methods of defense

 Encryption is the scrambling of data  Often a key or some other secret information is used to do the scrambling  Without knowledge of the secret, the data becomes useless  Modern encryption is one of the most powerful tools for preserving computer security  Most modern attacks do not depend on breaking encryption but on circumventing it

 The process of encryption takes plaintext as an input and produces ciphertext as an output  Plaintext (or cleartext) is not necessarily human readable, but its contents are not protected in any way  Using cryptography, we can build protocols to support confidentiality and integrity (and even availability indirectly)  As useful as it is, encryption is not a panacea

 Software controls include:  Internal program controls ▪ Parts of a program that enforce security ▪ Example: password checking to access parts of a database  OS and network controls ▪ Tools to protect users from each other ▪ Example: user files that cannot be accessed by other users)  Independent control programs ▪ Application programs that protect against specific vulnerabilities ▪ Example: virus scanners  Development controls ▪ Quality control for creating software so that vulnerabilities are not introduced

 There are many different kinds of hardware controls that can be used for many different situations:  Smart cards used for encryption on satellite or cable television set-top boxes  Locks and cables preventing theft  Fingerprint or other biometric readers  Firewalls  Many others

 Human beings ultimately get involved  It is important to have policies and procedures to guide their actions, such as:  Change passwords regularly  Don’t give people your password  Don’t allow coworkers access to data they should not have  Laws are important policies with consequences, but they react slowly to the rapid changes in technology

 Physical controls can be inexpensive and effective  Locks on doors  Security guards  Backup copies of data  Planning for natural disasters and fires  Simple controls are often the best  Attackers will always look for a weak point in your defenses

 Many issues impact the effectiveness of controls  Awareness of problem Users must be convinced that it is worth using the controls  Likelihood of use The controls must be easy enough to use that the task performed is not seriously affected  Overlapping controls Overlapping controls or a layered defense can help, but sometimes the controls negatively impact each other  Periodic review Conditions change, and controls must be reviewed periodically and updated when needed

 "Secret writing"  The art of encoding a message so that its meaning is hidden  Cryptanalysis is breaking those codes

 Encryption is the process of taking a message and encoding it  Decryption is the process of decoding the code back into a message  A plaintext is a message before encryption  A ciphertext is the message in encrypted form  A key is an extra piece of information used in the encryption process

 A plaintext is M (sometimes P)  A ciphertext is C  The encryption function E(x) takes M and converts it into C  E(M) = C  The decryption function D(x) takes C and converts it into M  D(C) = M  We sometimes specify encryption and decryption functions E k (x) and D k (x) specific to a key k

 Cryptography is supposed to prevent people from reading certain messages  Thus, we measure a cryptosystem based on its resistance to an adversary or attacker  Kinds of attacks:  Ciphertext only: Attacker only has access to an encrypted message, with a goal of decrypting it  Known plaintext: Attacker has access to a plaintext and its matching ciphertext, with a goal of discovering the key  Chosen plaintext: Attacker may ask to encrypt any plaintext, with a goal of discovering the key  Others, less common

 There are two kinds of security for encryption schemes  Unconditionally secure ▪ No matter how much time or energy an attacker has, it is impossible to determine the plaintext  Computationally secure ▪ The cost of breaking the cipher exceeds the value of the encrypted information ▪ The time required to break the cipher exceeds the useful lifetime of the information  We focus on computationally secure, because there is only one practical system that is unconditionally secure  "I want them to remain secret for as long as men are capable of evil" -Avi from Cryptonomicon

 Modulo operator takes the remainder  Two numbers are said to be congruent modulo n if they have the same remainder when divided by n  For example, 39  3 (mod 12)  Addition, subtraction, and multiplication:  [(a mod n) + (b mod n)] mod n = (a + b) mod n  [(a mod n) – (b mod n)] mod n = (a – b) mod n  [(a mod n) x (b mod n)] mod n = (a x b) mod n

 We can’t actually divide  Instead, we have to find the multiplicative inverse  The multiplicative inverse of x exists if and only if x is relatively prime to n  13 ∙ 5  65  1 (mod 16)  So, 13 and 5 are multiplicative inverses mod 16  But, 0, 2, 4, 6, 8, 10, and 12 do not have multiplicative inverses mod 16

 Cryptography basics  Stream and block ciphers  Shift ciphers

 Read Sections 2.1 and 2.2