Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Security and Systems. Three tenets of security Confidentiality Integrity Availability.
Cryptography and Network Security Chapter 1
1 Network Security Ola Flygt Växjö University
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz.
Applied Cryptography for Network Security
Chapter 8 Web Security.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Cryptography and Network Security
SSL/TLS after DigiNotar and BEAST
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Software Security Testing Vinay Srinivasan cell:
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
1 Introduction to Information Security Spring 2012.
Chapter 4 Application Level Security in Cellular Networks.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Network Security David Lazăr.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Computer Security and Cryptography Partha Dasgupta, Arizona State University.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Information Security threats in today’s organizations -Y Gautami Sree 07S11A1214.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Network Security Overview
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Information System and Network Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Secure Software Confidentiality Integrity Data Security Authentication
Secure Sockets Layer (SSL)
Lecture 5. Security Threats
Security in Networking
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
NET 311 Information Security
Message Digest Cryptographic checksum One-way function Relevance
امنیت شبکه علی فانیان
Cryptography and Network Security
Network Security Ola Flygt Växjö University
Mohammad Alauthman Computer Security Mohammad Alauthman
Protection Mechanisms in Security Management
Chapter 5 Computer Security
Presentation transcript:

Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber Security Kyungil University Index  Why Information Security  Threats of Information Security  Solutions of Information Security  Example of Internet Banking  Conclusion 2 Hacking Information Security

Cyber Security Kyungil University Why Information Security 3  Stand-alone -> Secure enough

Cyber Security Kyungil University Why Information Security  To improve usage 4 => Multi-user case  To improve connectivity => Networked-computer case Hacking Information Security

Cyber Security Kyungil University Threats of Information Security  Definition from Wikipedia A possible danger that might exploit a vulnerability to breach security and thus cause possible harm   Threats 5 eavesdropping traffic analysis modification masquerading replaying repudiation denial of service

Cyber Security Kyungil University Threats to Integrity Threats of Information Security 6 eavesdropping traffic analysis modification masquerading replaying repudiation denial of service Threats to Confidentiality Threat to Availability   Classification of Threats

Cyber Security Kyungil University Solutions of Information Security  Confidentiality 7  Integrity  Availability

Cyber Security Kyungil University Solutions of Information Security  Confidentiality  Attacks Eavesdropping and traffic analysis Eavesdropping and traffic analysis  Definition A set of rules or a promise that limits access or places restrictions on certain types of information  Solution Encryption, traffic padding 8 Function()

Cyber Security Kyungil University Solutions of Information Security  Integrity  Attacks Modification, masquerading, replaying Modification, masquerading, replaying and repudiation and repudiation  Definition Internal consistency or state of being uncorrupted in electronic data  Solution Encryption, digital signature, authentication 9 Function()

Cyber Security Kyungil University Solutions of Information Security  Availability  Attacks Denial of service Denial of service  Definition The degree to which a system is in a specified operable and committable state at the start of a mission  Solution Packet filtering, complex schemes 10 Function() Threshold

Cyber Security Kyungil University Example - Internet Banking  Authentication 11 Internet

Cyber Security Kyungil University Example - Internet Banking  Authentication  Threat scenario 1 -> authentication with {ID, PW} 12 { ID, PW } eavesdropping masquerading

Cyber Security Kyungil University Example - Internet Banking  Authentication  Threat scenario 2 -> authentication with E k (ID, PW) 13 E k (ID, PW) eavesdropping E (ID, PW) k k k replaying modification

Cyber Security Kyungil University Example - Internet Banking  Authentication  Threat scenario 3 -> authentication with E k (ID, PW, Time) 14 k k replaying Time sync other threats verifier with MAC k (E k (ID, PW, Time)) k E k (ID, PW, Time) Function() MAC k (E k (ID, PW, Time)) modification E k (ID, PW, Time), MAC k (E k (ID, PW, Time))

Cyber Security Kyungil University Example - Internet Banking  Authentication  Current usage scenario -> authentication with Certificate 15 Certificate user Certificate server Secret card Device auth.

Cyber Security Kyungil University Modification Integrity Masquerading Replaying Repudiation Eavesdropping Confidentiality Traffic analysis Conclusion ThreatsServices 16 Denial of service Availability Encryption, traffic padding Encryption, digital signature, authentication

Cyber Security Kyungil University 17