1 Panel Presentation: (Future) Practices for Protecting Your Digital Assets Prof. Gene Tsudik Associate Dean of Research & Graduate Studies Donald Bren.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Chris Karlof and David Wagner
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Chapter 9: Privacy, Crime, and Security
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
Presented by Serge Kpan LTEC Network Systems Administration 1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Active Protocols for Agile Censor-Resistant Networks Robert Ricci Jay Lepreau University of Utah May 22, 2001.
Web server security Dr Jim Briggs WEBP security1.
A Guide to major network components
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Protecting People and Information: Threats and Safeguards
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PART THREE E-commerce in Action Norton University E-commerce in Action.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Jamel Callands Austin Chaet Carson Gallimore. Downloading
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
NETWORKS.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Components of wireless LAN & Its connection to the Internet
Lecture 24 Wireless Network Security
Security in Networks Single point of failure Resillence or fault tolerance CS model.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Chapter 1: Explore the Network
Networking Components Assignment 3 Corbin Watkins.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
Chapter 1: Explore the Network
Unit Communication Hardware
What they are and how to protect against them
Instructor Materials Chapter 6 Building a Home Network
Some Important Network Characteristics for Security
Outline Basics of network security Definitions Sample attacks
Outline Basics of network security Definitions Sample attacks
Outline Network characteristics that affect security
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

1 Panel Presentation: (Future) Practices for Protecting Your Digital Assets Prof. Gene Tsudik Associate Dean of Research & Graduate Studies Donald Bren School of Information & Computer Sciences University of California, Irvine

2 (my) Research Group security –Membership control, key management Database Security –Database-as-a-Service model –Authenticity/Integrity in outsourced databases –Privacy in outsourced databases Ad hoc, mobile network security –Key management Multicast Security

3 Communication Technologies Current: –DSL/Cable/Satellite to home / business –Ethernet or within home / business Emerging: –hi-bw wireless (e.g., beamed from light-pole-mounted Access Points) might replace cable & DSL/phone wires Embryonic: –powernet/sewernet/waternet

4 Threats 1 Really unsophisticated users Access Point impersonation, traffic tinkering Malicious Code propagation –Viruses, Worms, Bombs, Snoopers SPAM Phishing  ID theft DoS attacks –trivial in wireless settings –not difficult with wired either

5 Threats 2 Eavesdropping –clearly much easier with wireless –from both inside and outside the site –Allows anyone (e.g., voyeurs, criminals, big brother) to snoop on communication –Also, possible to inject “incriminating” traffic that seems like it came from the inside the site Traffic Analysis – for marketing, SPAM, plain snooping, criminal (e.g., burglary) purposes –type, distribution, size, frequency, timing –host/device characteristics, # of hosts, location, types of devices, etc. ?

6 What technology is needed? 1 Secure tunneling within residential/corporate networks –intelligently “pad” traffic, both in space and time –lots of prior work on traffic analysis counter-measures Secure tunneling between home and ISP DoS-resistant wireless networking Survivable, affordable access devices (combining multiple technologies: cable, DSL, satellite, local wireless, etc.) New SPAM-fighting technologies! New payment instruments

7 What technology is needed? 2 Providers need techniques to detect/inhibit subscribers who are wittingly or unwittingly "split” bandwidth, e.g., provider-supplied devices may need to police/inhibit out-of-perimeter incoming (wireless) traffic. Would be nice if: residence perimeter could be demarcated sensors placed at strategic points along the perimeter wireless traffic coming in from the outside could be tagged as such and purged or routed to single point: firewall? honeypot?

8 Phishing & related fraud: How to make things better? Eliminate SSNs as “confidential” identifier Stop using DLs as IDs Introduce National ID cards –Make them SMART –Allow tiered information release Foster smart credit (and debit) cards –Trivial, technology already exists! –Credit card # changes after each use –Or, after a pre-set time interval –Or, after certain $ amount is exceeded –Hijacked credit card # becomes useless or of limited use Promote anonymous buying/shipping

9 SPAM Modern-day plague is essentially a free commodity True sources are hard to trace Current model has to change! Two “schools-of-thought”: –Change processing at end-points Make sender solve a puzzle? Make sender pay for –Change SMTP wholesale Verify path taken by

10 DoS/DDoS attacks Another plague IP traffic hard to authenticate/trace IP addresses trivial to spoof IPSec far from being universally adopted Two “schools-of-thought”: –Traceback (tough w/out router vendor support) –Application-level remedies, e.g., puzzles Doesn’t work against IP or TCP-level attack traffic