Presentation is loading. Please wait.

Presentation is loading. Please wait.

SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality.

Similar presentations


Presentation on theme: "SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality."— Presentation transcript:

1 SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality

2 Who is who?

3 Telephone line Mail server TCP/IP Echelon & Carnivore Who can read what ?

4 SMTP POP3 POST MAIL e-mail using an ISP POST OFFICE

5 SMTP POP3 POST MAIL a) Telephone-line POST OFFICE

6 SMTP POP3 POST MAIL b) e-mail server Everything on the servers can be read or copied POST OFFICE

7 SMTP POP3 POST MAIL c) TCP/IP Not readable – following different ways POST OFFICE

8 Echelon/Carnivore Source: http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htmhttp://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm

9 Traces

10 Traces The IP address of your computer is : 213.177.129.120 your DNS address is : adsl-129-120.wanadoo.be We know you use : Microsoft Windows 98 Your navigator has the code: Mozilla/4.78 [en] (Win98; U) In fact it is: Netscape Communicator 4.x English What you did is stored : Windows 95 C:\Windows\Temporary Internet Files\ Windows NT C:\WinNt\Temporary Internet Files\ A nice demo in french on: www.cnil.fr

11 Virus What is a virus and types? How is a computer infected? Danger

12 a) What is a virus?  computer virus = a computer program 'I love you', 45 million computers infected  worm = multiplicates itself c ode Red: 300.000 servers destroyed  trojan horse = hides for other actions Back Orifice  logic bomb = distroys programs  hoax = false alarm

13 b) How is a computer infected?  files attached to e-mail (attachment)  diskettes  other

14 c) Danger  infecting components of your system  effects:  malfunctions  deletion of data  wiping of hard disk ...

15 Solutions to provide safety and confidentiality solving identity problem and unauthorised reading protection against traces protection against virusses

16 Encryption  Purpose  Functions  How? Identity and unauthorised reading

17 Functions of encryption Authentication Integrity Confidentiality

18 Symmetrical encryption UbizenVcjafo Encryption E(…) Decryption D(…) SenderReceiver Vcjafo Untrusted network SAME KEY Ubizen A=A+ 1 A=A- 1

19 Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Public Key Receiver Decryption D(…) Go#st$Ubizen Private Key Receiver confidentiality towards receiver

20 Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Private Key Sender Decryption D(…) Go#st$Ubizen Public Key Sender authentication of sender

21 Example

22 Example

23 Example

24  Traces at the ISP  Traces on own computer Against leaving traces

25  anti-virus program N orton, McAfee, eSafe, F-Secure, …  watch out for attachments.exe,.com,.pif,.vbs,.doc,.xls, …  www.bipt.be Against virusses


Download ppt "SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality."

Similar presentations


Ads by Google