Network Security and Surveillance



Similar documents
Cryptographic Protocols and Network Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

CPSC 467: Cryptography and Computer Security

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Cryptography and Network Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chap. 1: Introduction

CSCI 4541/6541: NETWORK SECURITY

SECURITY ISSUES INTERNET WORLD WIDE WEB FOR THE AND THE

Information Security

Weighted Total Mark. Weighted Exam Mark

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Content Teaching Academy at James Madison University

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Notes on Network Security - Introduction

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

CPSC 467b: Cryptography and Computer Security

Cryptography and Network Security Chapter 1

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Information Security Basic Concepts

COSC 472 Network Security

Introduction to Security

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Security Goals Services

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Information, Network & Cyber Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Introduction to Cyber Security / Information Security

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

INFORMATION SECURITY FOR YOUR AGENCY

CSC 474 Information Systems Security

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Overview of computer and communications security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

ISM/ISC Middleware Module

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Firewalls for small business

CS 203 / NetSys 240. Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

CRYPTOGRAPHY AND NETWORK SECURITY

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

CSC574 - Computer and Network Security Module: Introduction

SCADA SYSTEMS AND SECURITY WHITEPAPER

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

E-COMMERCE and SECURITY - 1DL018

e-code Academy Information Security Diploma Training Discerption

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Hardware and Software Security

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Network Security Essentials:

3. Firewall Evaluation Criteria

The FBI and the Internet

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

CRYPTOG NETWORK SECURITY

Penetration Testing Service. By Comsec Information Security Consulting

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Information System Security

Promoting Network Security (A Service Provider Perspective)

Network Security Administrator

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Computer Security (EDA263 / DIT 641)

ICOM 5018 Network Security and Cryptography

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

CNT4406/5412 Network Security Introduction

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Basics of Internet Security

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

CS5008: Internet Computing

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Cyber Security Analyst VS-1160

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

TELE 301 Network Management. Lecture 18: Network Security

Client Server Registration Protocol

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

I ve been breached! Now what?

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Transcription:

G. Sivakumar Computer Science and Engineering IIT Bombay siva@iitb.ac.in October 29, 2004 1 Internet Security Overview Some Puzzles 2 3

Internet s Growth and Charter Some Puzzles Information AnyTime, AnyWhere, AnyForm, AnyDevice,...

Internet s Dream Internet Security Overview Some Puzzles Why should a fridge be on Internet? Will security considerations make this a nightmare?

What are Cyber crimes? Some Puzzles Against People Cyber Stalking and Harrassment (Child) Pornography Against Property Cracking Virus and Spam Software/Entertainment Piracy Cyber Terrorism!

Security Concerns Internet Security Overview Some Puzzles Match the following! Problems Attackers Highly contagious viruses Unintended blunders Defacing web pages Disgruntled employees or customers Credit card number theft Organized crime On-line scams Foreign espionage agents Intellectual property theft Hackers driven by technical challenge Wiping out data Petty criminals Denial of service Organized terror groups Spam E-mails Information warfare Reading private files... Surveillance... Crackers vs. Hackers Note how much resources available to attackers.

Cyber Terrorism? Internet Security Overview Some Puzzles Some examples from http://cybercrimes.net/ 1989: Legion of Doom group took over the BellSouth telephone system, tapped phone lines, re-routed calls,... 1996: A white supremacist movement took out a Massachusetts internet service provider 1997: A cracker disabled the computer system of an airport control tower at the Worcester, Mass. Airport. 1997: a hacker in Sweden jammed the 911 emergency telephone system all throughout west-central Florida. 1998: NASA, Navy, and Defence Department computers were attacked. 2000: in Maroochy Shire, Australia, a disgruntled consultant hacked into a waste management control system and released millions of gallons of raw sewage on the town. 2001: Two post-graduate students cracked a bank system used by banks and credit card companies to secure the personal

Vulnerabilities Internet Security Overview Some Puzzles Application Security Buggy code Buffer Overflows Host Security Server side (multi-user/application) Client side (virus) Transmission Security

Denial of Service Internet Security Overview Some Puzzles Small shop-owner versus Supermarket What can the attacker do? What has he gained or compromised? What defence mechanisms are possible? Screening visitors using guards (who looks respectable?) VVIP security, but do you want to be isolated? what is the Internet equivalent?

Security Requirements Some Puzzles Informal statements (formal is much harder) Confidentiality Protection from disclosure to unauthorized persons Integrity Assurance that information has not been modified unauthorizedly. Authentication Assurance of identity of originator of information. Non-Repudiation Originator cannot deny sending the message. Availability Not able to use system or communicate when desired. Anonymity/Pseudonomity For applications like voting, instructor evaluation. Traffic Analysis Should not even know who is communicating with whom. Why? Emerging Applications Online Voting, Auctions (more later) And all this with postcards (IP datagrams)!

Exchanging Secrets Internet Security Overview Some Puzzles Goal A and B to agree on a secret number. But, C can listen to all their conversation. Solution? A tells B: I ll send you 3 numbers. Let s use their LCM as the key.

Exchanging Secrets Internet Security Overview Some Puzzles Goal A and B to agree on a secret number. But, C can listen to all their conversation. Solution? A tells B: I ll send you 3 numbers. Let s use their LCM as the key.

Mutual Authentication Some Puzzles Goal A and B to verify that both know the same secret number. No third party (intruder or umpire!) Solution? A tells B: I ll tell you first 2 digits, you tell me the last two...

Mutual Authentication Some Puzzles Goal A and B to verify that both know the same secret number. No third party (intruder or umpire!) Solution? A tells B: I ll tell you first 2 digits, you tell me the last two...

Cryptography and Data Security sine qua non [without this nothing :-] Historically who used first? (L & M) Code Language in joint families!

Symmetric/Private-Key Algorithms

Asymmetric/Public-Key Algorithms Keys are duals (lock with one, unlock with other) Cannot infer one from other easily How to encrypt? How to sign?

One way Functions Mathematical Equivalents Factoring large numbers (product of 2 large primes) Discrete Logarithms

Security Mechanisms System Security: Nothing bad happens to my computers and equipment virus, trojan-horse, logic/time-bombs,... Network Security: Authentication Mechanisms you are who you say you are Access Control Firewalls, Proxies who can do what Data Security: for your eyes only Encryption, Digests, Signatures,...

Security Mechanisms System Security: Nothing bad happens to my computers and equipment virus, trojan-horse, logic/time-bombs,... Network Security: Authentication Mechanisms you are who you say you are Access Control Firewalls, Proxies who can do what Data Security: for your eyes only Encryption, Digests, Signatures,...

Security Mechanisms System Security: Nothing bad happens to my computers and equipment virus, trojan-horse, logic/time-bombs,... Network Security: Authentication Mechanisms you are who you say you are Access Control Firewalls, Proxies who can do what Data Security: for your eyes only Encryption, Digests, Signatures,...

Network Security Mechanism Layers Cryptograhphic Protocols underly all security mechanisms. Real Challenge to design good ones for key establishment, mutual authentication etc.

What is RFID? Not just super barcode. Already in use by Andhra Pradesh police?

How RFID works

RFID Tags Internet Security Overview Passive Cheapest: no battery in tag All power comes from reader Semi Passive With batteries Improved performance and reliability Increased size and cost Active High performance and cost Active

Privacy Concerns

RFID Applications Payment Toll collection Fuel payment (Speedpass) Parking Pre-payment card (Dexit) Supply Chain Mgmt Logistics Inventory Mgmt Asset Tracking High value assets Re-useable containers Shipping containers Inventory Access Control Card Keys Automotive anti-theft Anti-theft Shrinkage Automotive anti-theft Track & Trace Food Pharmaceuticals Books Parts/lots tracking Apparel

References Internet Security Overview Books TCP/IP Illustrated by Richard Stevens, Vols 1-3, Addison-Wesley. Applied Cryptography - Protocols, Algorithms, and Source Code in C by Bruce Schneier, Jon Wiley & Sons, Inc. 1996 Cryptography and Network Security: Principles and Practice by William Stallings (2nd Edition), Prentice Hall Press; 1998. Practical Unix and Internet Security, Simson Garfinkel and Gene Spafford, O Reilly and Associates, ISBN 1-56592-148-8. Web sites www.cerias.purdue.edu (Centre for Education and Research in Information Assurance and Security) www.sans.org (System Administration, Audit, Network Security) cve.mitre.org (Common Vulnerabilities and Exposures) csrc.nist.gov (Computer Security Resources Clearinghouse) www.vtcif.telstra.com.au/info/security.html