Content Teaching Academy at James Madison University



Similar documents
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chap. 1: Introduction

COSC 472 Network Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Information Security

Table: Security Services (X.800)

IY2760/CS3760: Part 6. IY2760: Part 6

Cryptography and Network Security

Savitribai Phule Pune University

Compter Networks Chapter 9: Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

TELE 301 Network Management. Lecture 18: Network Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Notes on Network Security - Introduction

Chapter 10. Network Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Overview. SSL Cryptography Overview CHAPTER 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Information System Security

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Lecture II : Communication Security Services

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Cryptography and Network Security Chapter 1

Client Server Registration Protocol

Skoot Secure File Transfer

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Security Goals Services

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Information Security Basic Concepts

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CPSC 467b: Cryptography and Computer Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Message Authentication Codes

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Cornerstones of Security

544 Computer and Network Security

How To Use A College Computer System Safely

CSCI 4541/6541: NETWORK SECURITY

NETWORK ADMINISTRATION AND SECURITY

Chapter 8. Network Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Why you need secure

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Cybersecurity for the C-Level

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Fundamentals of Network Security - Theory and Practice-

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Data Security Incident Response Plan. [Insert Organization Name]

Module 7 Security CS655! 7-1!

Introduction to Security

Chapter 7: Network security

Network Security. HIT Shimrit Tzur-David

The Information Security Problem

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Sync Security and Privacy Brief

Chapter 15: Security

Is your data safe out there? -A white Paper on Online Security

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Cryptography and Network Security

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

CS5008: Internet Computing

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

E-COMMERCE and SECURITY - 1DL018

An Introduction to Cryptography and Digital Signatures

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

ISM/ISC Middleware Module

Network Security Protocols

Chapter 18: System Security

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Overview of computer and communications security

Detailed Concept of Network Security

Authentication requirement Authentication function MAC Hash function Security of

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

CS 758: Cryptography / Network Security

Transcription:

Content Teaching Academy at James Madison University 1

2 The Battle Field: Computers, LANs & Internetworks

3 Definitions Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission over a collection of interconnected networks Traditionally provided by physical and administrative mechanisms Security requirements have changed in recent times: computer use requires automated tools to protect files and other stored information use of networks and communications links requires measures to protect data during transmission

4 Examples of Insecurity: Lack of Confidentiality User C views confidential data transmitted from user A to user B. Source: Network security Essentials, 3rd Ed., by William Stallings

5 Examples of Insecurity: Lack of Integrity User C modifies data transmitted from user A to user B. Source: Network security Essentials, 3rd Ed., by William Stallings

6 Examples of Insecurity: Masquerading User C fabricates a message to user B pretending it is from A. Source: Network security Essentials, 3rd Ed., by William Stallings

7 Examples of Insecurity: Denial of Service User A cannot access a server he is authorized to. Source: Network security Essentials, 3rd Ed., by William Stallings

8 Examples of Insecurity: Delay or Replay Attacks User C delays, or even duplicates, a message from A to B. Source: Network security Essentials, 3rd Ed., by William Stallings

9 Examples of Insecurity: Traffic Analysis User C analyzes the volume, frequency of messages from A to B. Source: Network security Essentials, 3rd Ed., by William Stallings

10 Examples of Insecurity: Repudiation User A sends a message to B, but then denies she did.

11 Key Security Concepts e.g. student grades e.g. patient information e.g. authentication service e.g. e-commerce

12 Attacks, Services and Mechanisms Deliberate Actions to Compromise Security Attacks Security Service(s) Processing or Communication Service to Protect Resources Security Mechanisms Tools & Protocols to detect / prevent / recover from a specific attack

13 Security Attacks Any action that compromises the security of information owned by an organization. They may be originated from Within the computer itself (Internal Attacks) Outside the computer (External Attacks) Security aims to prevent, and detect / recover from, attacks. Generic types of attacks: 1. Passive: Difficult to detect, yet possible to prevent their success. 2. Active: Difficult to prevent, yet possible to detect and recover from.

14 Mitigation of Internal Attacks at the Hardware level Regular Users are prohibited from changing the operating parameters of the system: how long they can use the CPU, which memory regions they have access to, what happens when a hardware device needs attention of the O.S., etc. CPU Privileges: 2 CPU Modes 1. Privileged Mode: All instruction can be executed 2. User Mode: Attempt to execute a privileged instruction (e.g. setting timers, memory management, interrupt handling, communication with devices, changing the privilege level, etc.) is denied by the CPU and control is transferred to the O.S. immediately. The O.S. always runs in privileged CPU mode and lowers the level to User Mode just before handing the CPU to a regular user program. When User programs are interrupted, say by the timer, the CPU level is automatically elevated to Privileged mode and the CPU is handed to the O.S.

15 Forms of Attacks Attack Description Mitigation Virus Worm Trojan horse Spyware / Sniffers Phishing Denial-of-Service DoS Piggyback software attaches itself to local programs Independent programs actively spreading itself across networks Infected programs that users download (e.g. games) Collects information on the computer and sends it to the villain attacker. Explicitly asks for your confidential info (Yes, some people proudly give away their secrets) Flood computers/networks with useless traffic Antivirus software (useless with new viruses) Intrusion Detection Systems Just be wise and pay for the software you use. Auditing the software on your system for abnormal behavior Authenticate. Spam filters. Proxy Server (next slide) Traffic filters (Firewalls)

16 Proxy Servers

17 Security Services A security service is a sort of processing or communication service provided by a system to enhance the security of the system s resources. They implement the organization s security polices They are implemented by the use of one or more security mechanisms Security services are grouped in 5 categories: 1. Authentication 2. Access Control 3. Data Confidentiality 4. Data Integrity 5. Nonrepudiation

18 Security Services: 1- Authentication The assurance that the communicating entity is the one that it claims to be: 1. Peer Entity Authentication Used in association with an ongoing (established) connection to provide confidence in the identity of the entities connected. 2. Data-origin Authentication In a connectionless transfer, provides assurance that the source of received data is as claimed. No protection against duplication of data. Suitable for e-mail applications.

19 Security Services: 2- Access Control The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). Usually, by creating accounts: user name + password Administrator account: Super user who can create, erase, restrict access to the computer Regular user: has limited access to data, programs, and other resources (e.g. use of printers, network connections, etc.) Auditing Software Record behavior of users and in/out network activity. Helps administrator detect and abnormal behavior

20 Security Services: 3- Data Confidentiality The protection of data from unauthorized disclosure. 1. Content Confidentiality The protection of all user data on a connection. 2. Traffic-flow Confidentiality The protection of the information that might be derived from observation of traffic: volume, frequency, peers that are communicating, etc.

21 Security Services: 4- Data Integrity The assurance that data received is exactly as sent by an authorized entity (i.e., contain no unauthorized modification, insertion, deletion, or replay). 1. Data Integrity with Recovery Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted. 2. Data Integrity without Recovery As above, but provides only detection without recovery.

22 Security Services: 5- Nonrepudiation Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. 1. Nonrepudiation, Origin Proof that the message was sent by the specified party even when the sender denies that. 2. Nonrepudiation, Destination Proof that the message was received by the specified party even when the receiver denies that.

23 Security Mechanisms ( features designed to implement security services ) SPECIFIC SECURITY MECHANISMS Encryption The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys. Digital Signature Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient). Access Control A variety of mechanisms that enforce access rights to resources. Authentication Exchange A mechanism intended to ensure the identity of an entity by means of information exchange. Routing Control Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected. Secure Hashing A variety of mechanisms used to assure the integrity of a data unit or stream of data units.

24 A Model for Network Security Source: Network security Essentials, 3rd Ed., by William Stallings

25 Network Access Security Model Source: Network security Essentials, 3rd Ed., by William Stallings

26 Encryption

27 Terminology Cipher Plaintext Encrypt Ciphertext Decrypt Plaintext Key ( K ) Key ( K ) plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key

28 Symmetric Encryption: A Simplified Model encryption algorithm is publicly known Requirements: 1. a strong encryption algorithm 2. a secret key known only to sender / receiver

29 Symmetric Encryption: Characteristics Uses one key shared by both sender and receiver Needs a secure key distribution mechanism to share the key with all involved parties in a group communication. In a multi-party session, if one party departs, a new key must be used by remaining parties If this key is disclosed communications are compromised This is a symmetric, system, parties, say A and B, are equal hence does not prevent receiver B from forging a message & claiming it was sent by A

30 Public-Key Encryption uses clever application of Number Theory concepts complements rather than replaces symmetric key encryption developed to address two key issues: 1. key distribution how to have secure communications in general without having to trust a 3 rd party (KDC) with your key 2. digital signatures how to verify a message comes intact from the claimed sender You own two keys: a public-key, which may be known by anyone, and can be used by others to send encrypt messages to you, and verify your signatures on the message they receive from you. a private-key, known only to you, used to decrypt incoming messages, and digitally sign outgoing messages. asymmetric since parties are not equal Others who encrypt messages for you cannot decrypt messages those who verify signatures cannot create signatures

31 Public-Key Cryptography: Confidentiality 1. Can an attacker compromise the secrecy of the document? Why? 2. Can Alice be sure it is Bob who sent the message? Why?

32 Public-Key Cryptography: Authentication 1. Is the secrecy of the document maintained? i.e. is Alice the only one capable of reproducing the plaintext X? 2. Could an attacker alter the Bob s document X without being detected by Alice?

33 Digital Signatures

34 Digital Signatures Similar to handwritten signatures on physical documents A digital signature indicates the signer s agreement with the contents of an electronic document Digital signatures should have these properties: Signer must deliberately sign a document Only the signer can produce his/her signature Cannot move a signature from one document to another document or alter a signed document without invalidating the signature Signatures can be validated by other users, and the signer cannot reasonably claim that he/she did not sign a document bearing his/her signature Signatures can be stored for future dispute resolution

35 Digital Signatures Source: Network security Essentials, 3rd Ed., by William Stallings

36 Certificates

37 You say you are My Bank? Prove it! How do I know that some public key K really belongs to my bank? The bank presents its public key and identification information (e.g. name, address, etc.) to a commonly trusted agency (e.g. ViriSign) This trusted agency (a.k.a. the Certification Authority) generates an electronic document (the Certificate) with that information and digitally signs the certificate. The Bank presents its name & address + certificate to the client The client verifies the CA signature on the certificate, If signature is valid, the client then matches the Bank name, address on the certificate to the information presented by the bank If match, the client uses the Public Key stored inside the certificate to encrypt communication to the Bank All of this is done as part of the Secure Sockets Layer (SSL) protocol upon which the HTTPS secure web browsing protocol is built

Network Security and the 38 Law Source: http://www.cityofhewitt.com

39 Legal Approaches to Network Security Fighting Malware: the Computer Fraud and Abuse Act of 1984 Prosecuting the introduction of worms and viruses Theft of theft of information Protection of Privacy: Electronic Communication Privacy Act (ECPA) of 1986 and USA PATRIOT of 2001 Employers monitors employees communication ISP monitors subscribers government agencies monitor electronic communications under certain restrictions Protect against Imposters: Anticybersquatting Consumer Protection Act of 1999

40 Hands-on & On-Line Cryptography Calculators Text to Hexadecimal Converter http://www.asciitohex.com/ AES Encryption: http://extranet.cryptomathic.com/aescalc/index Secure Hashing: http://extranet.cryptomathic.com/hashcalc/index RSA Encryption: http://nmichaels.org/rsa.py