Invitation to Computer Science 5 th Edition Chapter 8 Information Security.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Computer Science 101 Data Encryption And Computer Networks.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, Java Version, Third Edition.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Cryptographic Technologies
Business Data Communications, Fourth Edition Chapter 10: Network Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 23 Symmetric Encryption
Chapter 8 Network Security 4/17/2017
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 20: Network Security Business Data Communications, 4e.
Encryption Methods By: Michael A. Scott
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Chapter 8 Information Security 1.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Cryptography, Authentication and Digital Signatures
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Types of Electronic Infection
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Public Key Encryption.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
Chapter 8 Information Security.
Security.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Invitation to Computer Science 5 th Edition Chapter 8 Information Security

Invitation to Computer Science, 5th Edition2 Objectives In this chapter, you will learn about: Threats and defenses Encryption Web transmission security

Introduction Information security –Keeping information secure Security –Can be breached at many different points in the “virtual machine” Invitation to Computer Science, 5th Edition33

Threats and Defenses Authentication –Verifies who has the right to gain access to the computer Hash function –Takes password the user originally chooses, chops it up, and stirs it around according to a given formula Social engineering –Process of using people to get the information you want Invitation to Computer Science, 5th Edition44

5 Authentication Basic physical security principles –Maintain control of your laptop –Be sure no one peers over your shoulder in your office or on the airplane –Lock your office door when you leave

Invitation to Computer Science, 5th Edition6 Authorization Governs what an authenticated user is allowed to do User privileges –Read access (can read a particular file) –Write access (can modify a particular file) –Execute access (can run a particular program file) –Delete access (can delete a particular file) System administrator –Has access to everything

Invitation to Computer Science, 5th Edition7 Threats from the Network Malware –Malicious software Virus –Computer program that infects a host computer and then spreads Worm –Can send copies of itself to other nodes on a computer network without having to be carried by an infected host file

Invitation to Computer Science, 5th Edition8 Threats from the Network (continued) Trojan horse –Computer program that, unbeknownst to the user, contains code that performs malicious attacks Denial-of-service (DOS) attack –Typically directed at a business or government Web site –Automatically directs browsers on many machines to a single URL at roughly the same time

Invitation to Computer Science, 5th Edition9 Encryption Cryptography –The science of “secret writing” Encryption and decryption –Inverse operations Symmetric encryption algorithm –Requires the use of a secret key known to both the sender and receiver Asymmetric encryption algorithm –Key for encryption and decryption are quite different, but related

Invitation to Computer Science, 5th Edition10 Simple Encryption Algorithms Caesar cipher (shift cipher) –Shifting each character in the message to another character some fixed distance farther along in the alphabet –Encodes one character at a time Block cipher –Group or block of plaintext letters gets encoded into a block of ciphertext

Invitation to Computer Science, 5th Edition11 Figure 8.1 Steps in Encoding and Decoding for a Block Cipher

Invitation to Computer Science, 5th Edition12 DES DES (Data Encryption Standard) –Encryption algorithm developed by IBM in the 1970s for the U.S. National Bureau of Standards –A block cipher that is 64 bits long DES algorithm –Every substitution, reduction, expansion, and permutation is determined by a well-known set of tables –The same algorithm serves as the decryption algorithm

Invitation to Computer Science, 5th Edition13 Figure 8.2 The XOR Gate

Invitation to Computer Science, 5th Edition14 Figure 8.3 The DES Encryption Algorithm

Invitation to Computer Science, 5th Edition15 DES (continued) Triple DES –Improves the security of DES –Requires two 56-bit keys –Runs the DES algorithm three times AES (Advanced Encryption Standard) –Adopted for use by the U.S. government in 2001 –Based on the Rijndael algorithm

Invitation to Computer Science, 5th Edition16 Public Key Systems RSA –Most common public key encryption algorithm –Based on results from the field of mathematics known as number theory Prime number –Integer greater than 1 that can only be written as the product of itself and 1

Invitation to Computer Science, 5th Edition17 Web Transmission Security SSL (Secure Sockets Layer) –Method for achieving secure transfer of information on the Web TLS (Transport Layer Security) protocol –First defined in 1999 –Based on SSL and is nearly identical to SSL –Nonproprietary –Supported by the Internet Engineering Task Force

Invitation to Computer Science, 5th Edition18 Figure 8.4 A TLS/SSL Session

Summary Information security –Keeping information secure Threats from the network –Malware, viruses, worms, denial-of-service attacks Encryption algorithms –Caesar cipher, block cipher RSA –Most common public key encryption algorithm Invitation to Computer Science, 5th Edition19