Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT
|
|
|
- Junior Stokes
- 9 years ago
- Views:
Transcription
1 Lecture 7: Privacy and Security in Mobile Computing Cristian Borcea Department of Computer Science NJIT
2 Location Privacy Location Authentication Trusted Ad Hoc Networks 2
3 Privacy Violated Request: Retrieve all bus lines from location to address = = Client Server LBS Database (Location Based Service) 3
4 Problem: Continuous location exposure a serious threat to privacy Research: Preserve privacy without sacrificing the quality of continuous location based applications 4
5 A message from a client to a database is called location anonymous if the client s identity cannot be distinguished from other users based on the client s location information. Database K-anonymity: A message is called location k-anonymous if the client cannot be identified by the database, based on the client s location, from other k-1 clients. 5
6 Server transforms the Server forwards message data by Database anonymizing Server to executes sends client the location request data according the to the Database anonymized replies to server Client sends received plain message request anonymous data with compiled message data to the server 6
7 y Spatial Temporal Cloaking Setting a range a time of interval, space to be a where single all box, the where clients all in clients a specific located location within sending the range a message are said in that to be time in the interval same are location. said to have sent the message in the same time. x t 7
8 t y Spatial-Temporal Cloaking Setting a range of space and a time interval, where all the messages sent by client inside the range in that time interval. This spatial and temporal area is called a cloaking box. x 8
9 Privacy is not the user s main goal Secondary to completing main task Controlling privacy settings Makes systems more complex Hinders ease-of-use Usable privacy settings Provide transparent solutions Put the user in control Inform the user about what is going on 9
10 Privacy fundamentalists Uncompromising about their privacy 37% of the US population Privacy unconcerned Indifferent to privacy concerns 11% of the US population Privacy pragmatists Concerned about privacy, but willing to trade personal data for benefit 52% of the US population Not absolute Changes over time (25% privacy fundamentalists in 2000) Cultural differences 10
11 Yes, if they benefit from that Study with 500+ people in Manhattan over 3 weeks 84% willing to share location to compute place crowding 77% willing to share their location data with others in public or semi-public places 57% would like to know information about other people
12 Location Privacy Location Authentication Trusted Ad Hoc Networks 12
13 Provided by wireless carriers Provided by third parties 13
14 Commonly, third party LBSs receive location from mobile devices Determined by GPS, wireless triangulation (Intel s Placelab), etc Users prefer localization systems on mobiles: control location data But can this location be trusted? Let s hack the phone and submit false location Location: L (Manhattan) LBS Why? Get free location-based coupons in youza Get mayorship deals in foursquare Track your friends in loopt L 14
15 Traditional solutions use infrastructure support E.g., measure signal strength of mobile from fixed trusted beacons with known locations Wireless carriers may refuse to authenticate locations for third party services Due to business and legal reasons Our solution: LINK provides location authentication independent of wireless carriers Trusted mobile devices act as trusted beacons that certify if a user is in their proximity Mobiles communicate through short range wireless (Bluetooth) 15
16 Targets users who exhibit regular malicious behavior Users register with LINK and verify each other s location Claimer: submits location to LBS and asks neighbors for verification Verifier: submits location verification for claimer Users have public/private keys for crypto operations 16
17 Location Certification Authority (LCA) Centralized entity in Internet: receives location claims and verifications Makes location authentication decisions based on current verifications, trust scores, and historical data Maintains user trust scores and updates them function of user behavior Historical data contains claims, verifications, and trust score evolutions Informs LBS once a decision is made 17
18 V 2 LBS V 4 broadcast certification request V 1 C INTERNET certification reply claim decision V 3 Certification request signed by claimer Includes SeqNo to identify specific claim Certification replies signed by verifiers LCA certification reply How Update are trust C s scores trust updated? score Include cert. request to allow LCA to match with claims 18
19 LCA updates claimer trust score function of claim result (additive increase, multiplicative decrease) Accepted when have verifiers: additive increase Accepted when lack verifiers: additive decrease Claimer has good trust score and no suspicious history Rejected: multiplicative decrease Ignored: no update Verifiers sometimes required to authenticate their location (i.e., act as claimers) Cost: communication overhead and protocol complexity 19
20 V 1 V 2 C Certification reply: M Location claim: L Certification reply: M LCA Certification reply: M V 3 Spatio-temporal correlation Could C have reached L from its previous location? No: claim rejected LCA selects only verifiers with good trust scores Improves authentication accuracy If all verifiers contradict C: claim rejected 20
21 V 2 V 1 C Location claim I have no neighbors LCA V 3 Trust score trend measures regular malicious behavior - Counts how often the trust score of a user has been decreased over time - few times = legitimate user - often = malicious user If C s trust score & trust score trend are good : accept claim C s trust score decreased (additive) If C s trust score is good and trust score trend is bad: reject claim Else ignore claim 21
22 V 2 Certification reply: L V 1 C Location claim: L Certification reply: L LCA V 3 Certification reply: M Attempts to slander claimer Individual attacks are thwarted if good verifiers are in majority Hard to collude because at least one of the verifiers would need to follow claimer everywhere Need to capture certification request and pass it to all colluders 22
23 V 4 V 1 V 2 C V 3 Red verifiers agree with C Blue verifiers disagree with C If Tv - Tv > Threshold V 5 Decision based on set of verifiers with greater trust sum Else /* too close to call */ If C s trust score trend is bad : reject claim Else Check trust score trends and locations of blue verifiers If blue verifiers are deemed malicious: accept claim Else ignore claim 23
24 V 2 C Help me authenticate L V 1 Location claim: L Internet Colluders Certification reply: L V 3 LCA Solution: maintain and analyze history of verifications Weighted trust score for verifiers The more often one verifies, the less it contributes in verification Tv / log 2 w; Tv: V s trust score; w: no. of times V verified for C Over time, identify colluding users 24
25 Users have many verifiers and only few of them verify often (e.g., family) If significant no. of verifiers perform verifications often, they may be colluders Maintain matrix of who verified for whom M[v][c] counts how many times v has verified for c Algorithm adapts dynamically to no. of claims and no. of verifiers 25
26 LINK designed to balance privacy and usability Users submit location only when requesting authentication or verifying others Users can define rate limits or place limits for verifications Verification messages could be encrypted to protect against other mobile users in proximity LCA enforces tit-for-tat mechanism (similar to BitTorrent) User must participate in a few verifications before she may issue claim 26
27 False Negative Rate bad/4good 1bad/1good min 70min 130min 190min 250min Time Interval Malicious claimers attempt to game the system Submit both good and bad requests Claim to have no neighbors when submitting bad requests First 10 minutes submit only good requests to improve trust score Attacks detected quickly based on trust score trend analysis 27
28 False Negative Rate min 60min 110min 160min 210min 260min Time Interval Up to 6% of the total number of users collude with each other to verify false claims Use different permutations: 50% of colluders participate in any verification Colluding users detected quickly and punished by analyzing their verification histories 28
29 Implemented on Android phones Bluetooth discovery takes the most time and consumes the most energy Linear increase function of number of verifiers due to Bluetooth connection establishment Feasible for walking speeds from a latency point of view Number of claims phone can do until battery exhausted = 2,701 Number of verifications phone can do until battery exhausted = 20,458 Feasible from an energy consumption point of view 29
30 Location Privacy Location Authentication Trusted Ad Hoc Networks 30
31 Good guys Bad guy Bad guy Firewall Existing solutions for ad hoc networks are reactive Is it possible to have a proactive method? Good guys Protected network Internet Wireless ad-hoc network 31
32 Unauthorized traffic App A App A Untrusted node Policy A Policy A Application A Enforcer Application data Enforcer Trusted nodes Stop attacks at originators Application centric network policy Nodes trusted to enforce the policy create protected network Unauthorized traffic from trusted node is stopped at the originator Untrusted nodes cannot establish a link with trusted network 32
33 Trust establishment protocols user space Connection Manager Application Application Connection Manager Enforcer Enforcer kernel space Satem Link Driver Link Driver Satem hardware TPM Wireless Adaptor Wireless Adaptor TPM Node 1 Node 2 Satem guarantees trusted policy enforcement Changes affecting the policy enforcement are forbidden or cause node to be disconnected TPM guarantees genuine kernel monitor (i.e., Satem) Enforcer enforces the network policy Connection manager handles trust establishment 33
34 How to verify that a remote service is trustworthy? Trustworthy (in this context) = have not been replaced or modified to perform malicious actions Same question can be asked for local programs Threat model: OS/applications on remote platform may be compromised By local operator Through network-enabled attacks Solution: use secure coprocessor to build trusted systems Trusted Platform Module (TPM): a special-purpose chip built into a variety of platforms to enable strong user authentication and machine attestation 34
35 Defined by Trusted Computing Group Tamper-resistant Architecture Computing logic sign, hash Registers Functions Secure key storage Attestation TPM based trusted boot PCR 0 = SHA1(SHA1(SHA1(0 BIOS) LILO) OSK) 35
36 Verifier What code are you running? Here s the digest of my code Remote platform Compute a hash value of a loaded program before execution starts This operation is called measure the code The hash value can later be used by remote party to verify the code integrity E.g., verify it against a hash value of the code signed by the developer of the code TPM-based platform guarantees that hash value cannot be modified 36 `
37 Compromise Disable code enforcer on the disk or Satem Satem Network 37
38 UP: Uncontrolled Port CP: Controlled Port Network Services Network Layer Wireless Link Layer Connection Manager Link Driver Authentication Only Any traffic Connection Manager UP CP Link Driver Dual-Port access control (802.1x) 38
39 Policy key Attest Connection Manager Connection Request Request Commitment Commitment Connection Manager Application Commitment, Policy, key UP CP Enforcer Satem Link Driver Link Driver Remote Node Two-way verification of commitments Commitment: certificate that attests code integrity (using code hashes) Secure link association through encryption All nodes in trusted network share link key Local Node 39
40 Problems with previous solution: Nodes can verify their trustworthiness only at data link layer (using 802.1x) A node can be member in only one trusted ad hoc network at a time Policies associated with network layer In the general framework: Nodes can verify their trustworthiness at any layer A node can be part of multiple trusted ad hoc networks simultaneously Policies can be associated with any application or protocol 40
41 Nodes 1, 4 & 6 form a trusted two-tier file sharing network enforcing both the file sharing and routing policies Nodes 6, 8 & 9 form a trusted two-tier game network enforcing both the game and routing policies Node 6 is member in two networks simultaneously Node 7 is used for routing by nodes 1, 4 & 6 Node 5 doesn t have trusted agent -> can t join any trusted network Node 2 doesn t enforce routing policy -> can t be used by applications that require trusted routing 41
42 Tier manager is an application that allows nodes to create, join, and merge into a tier A node may join multiple tiers, and thereby, run multiple enforcers Tier manager and enforcer(s) must be trusted Code base of the tier manager defined in system commitment Code base of each enforcer defined in service commitment Satem enforces these commitments 42
43 Hardware: laptops with built-in TPM Satem: patched Linux kernel do_execve, do_mmap, sys_init_module, sys_open, etc Enforcers: Linux netfilter Modified application source code Connection manager (link layer architecture): Modified xsupplicant, an open source 802.1x client Modified hostapd, an open source 802.1x server 43
44 Location Privacy 1. ous_lbs.pdf Geerts_hciLocationPrivacy.pptx
45 Location Authentication: 6. Trusted Ad Hoc Networks m_module_tpm_summary
46 This was my last lecture; the slides of all lectures should be posted on the NII site soon: Contact information, papers, etc.: I ll be at NII until 30 November. If you would like to talk: Stop by my office (1415) me
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Aircloak Analytics: Anonymized User Data without Data Loss
Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
tell you about products and services and provide information to our third party marketing partners, subject to this policy;
WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Security Considerations in Cloud Deployments Matthew Garrett <[email protected]>
Security Considerations in Cloud Deployments Matthew Garrett (cloud) Computing for the Enterprise Security concerns in traditional hosting Someone hacks your system Your hosting
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group
TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
What is Firewall? A system designed to prevent unauthorized access to or from a private network.
What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
HW (Fat001) TPM. Figure 1. Computing Node
1. Overview Two major components exist in our current prototype systems: the management node, including the Cloud Controller, Cluster Controller, Walrus and EBS, and the computing node, i.e. the Node Controller
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
SSL, PKI and Secure Communication
SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1 Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting
Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Windows Phone 8 devices will be used remotely over 3G, 4G and non-captive Wi-Fi networks to enable a variety of remote working approaches such as
GOV.UK Guidance End User Devices Security Guidance: Windows Phone 8 Updated 14 October 2013 Contents 1. Usage Scenario 2. Summary of Platform Security 3. How the Platform Can Best Satisfy the Security
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
