Information Security



Similar documents
Content Teaching Academy at James Madison University

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Advanced Authentication

Information Security Basic Concepts

Why you need secure

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 7: Network security

ICOM 5018 Network Security and Cryptography

Is your data safe out there? -A white Paper on Online Security

Cornerstones of Security

TELE 301 Network Management. Lecture 18: Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

What is network security?

Cryptography and Network Security

Network Security Protocols

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

An Introduction to Cryptography and Digital Signatures

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Savitribai Phule Pune University

Business Issues in the implementation of Digital signatures

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

COSC 472 Network Security

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Lesson 4: Introduction to network security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Chapter 10. Network Security

Chapter 10. Cloud Security Mechanisms

Security Digital Certificate Manager

Security Digital Certificate Manager

Cryptography & Digital Signatures

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from


Application Layer (1)

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

Compter Networks Chapter 9: Network Security

End User Encryption Key Protection Policy

SECURITY IN NETWORKS

Sync Security and Privacy Brief

Overview. SSL Cryptography Overview CHAPTER 1

Network Security. HIT Shimrit Tzur-David

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Chap. 1: Introduction

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Client Server Registration Protocol

Security: Focus of Control. Authentication

This guide will go through the common ways that a user can make their computer more secure.

CSE/EE 461 Lecture 23

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Message Authentication Codes

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

A Study on Secure Electronic Medical DB System in Hospital Environment

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

CPSC 467: Cryptography and Computer Security

ISM/ISC Middleware Module

Message authentication and. digital signatures

Detailed Concept of Network Security

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Research Article. Research of network payment system based on multi-factor authentication

How To Protect Your Data From Attack

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Secure Data Exchange Solution

Fundamentals of Network Security - Theory and Practice-

Chapter 17. Transport-Level Security

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

IF3291 Jaringan Komputer dan Pengamanannya. Bugi Wibowo Mei 2006 Informatika STEI ITB

Chapter 18: System Security

IY2760/CS3760: Part 6. IY2760: Part 6

Network Security Technology Network Management

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

As enterprises conduct more and more

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

Security Sensor Network. Biswajit panja

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Chapter 15: Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Guidelines for Account Management and Effective Usage

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Chapter 8. Network Security

Computer System Management: Hosting Servers, Miscellaneous

Transcription:

Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun

What needs to be secured? With the rapid advances in networked computer technology, the amount of sensitive information stored in digital form has increased private information e-mails phone numbers organisation records budget customer information personnel list national (government) issues military strategic information 2

What are the considerations? Nations, organisations, and people do not agree to share their sensitive information with the public The reasons are different People privacy Companies competition Nations survival 3

What do we want? We want to keep our information secret We want the stored information is not modified or destroyed We want to access our stored information as we like 4

What do we want? We want something (?) to prevent attacks against previous considerations succeed We prefer that the system provides %100 security (?), meaning at all times and with all terms It is possible that we are forced to agree on a model in which we face a harm below a limit that we can survive 5

What is Security? A secure system is one which: does exactly what we want it to do does nothing that we don't want it to do Security: is not only protecting data from unauthorised access but also enabling authorised people to access the data 6

Potential Criminals 1. Programs (virus, worm) 2. Intruders / hackers a. People i. Amateurs ii. Professionals b. Organisations c. Terrorists (Information Warfare) 3. Insiders a. Personnel b. Contractors or partners c. Visitors 7

Model-1: Data Security 8

Model-2: Data Transfer Security 9

Tools for Security? 1. Physical Security Physically block illegal access to the network 2. Computer and Network Security Use technical tools to thwart attacks to data Hardware devices Software tools 10

Security Management tools 1. Security policy 2. Risk management plan 11

Software for Security? Firewall to prevent unwanted packets enter into our computer or intranet Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to control and prevent unwanted access to our computer and intranet Mail Protocols to send / receive mails securely Programs to keep credit card information secret Encrypting data or password files to prevent being read by unauthorised people Virus protection programs to find and remove the malicious programs such as virus 12

Tools for Security tools? Cryptography 13

Basic Cryptography Model Plaintext Encryption Ciphertext Decryption Plaintext Encryption Key Decryption Key 14

Cryptography Used to satisfy security services such as: confidentiality integrity authentication non-repudiation digital signature 15

Primary Security Goals Confidentiality Security Goals Integrity Availability 16

Primary Security Goals Protect the Confidentiality of data So that no unauthorised people can read it Preserve the Integrity of data So that no unauthorised people can delete / modify it Promote the Availability of data for authorised users So that authorised people can acccess data Anytime as required 17

Confidentiality Sender Receiver Plaintext E Cryptotext (Insecure media) D Plaintext Ensures that no unauthorised people can access the plaintext 18

(User) Authentication 1. When a user accesses a web site, (s)he claims to be a specific user (such as customer of a bank) 2. Authentication is assuring that the user is really the person who (s)he claims to be (understanding whether the user is really that customer of the bank or not, for example) 19

(User) Authentication Tools Human authentication factors are classified into three cases: 1. Something the user has (ID card, security token, OTP, software token, phone) 2. Something the user knows (password) 3. Something the user is or does (fingerprint, retinal pattern, signature or voice recognition) 20

Integrity Ensuring that the received (accessed) information is exactly same as the information sent (stored) means it is not modified or destroyed during any operation, such as transfer, storage, and retrieval either accidentally or maliciously 21

Integrity Sender Receiver Plaintext E Cryptotext (Insecure media) D Plaintext Ensures that both plaintexts are identical Means cryptotext has not been changed during transmission 22

Secondary Security Goal Non-repudiation: It can be verified that the sender and the recipient were, in fact, the parties who claimed to send or receive the message, respectively. In other words: non-repudiation of sender proves that data has been sent by the intended sender non-repudiation of receiver proves it has been received by the intended receiver 23

Non - repudiation of sender Sender Receiver Plaintext E Cryptotext D Plaintext Referee Ensures that Sender can not deny sending the ciphertext A Trusted 3rd party decides if the sender actually sent the ciphertext Stronger version of Sender Authentication 24

Non - repudiation of receiver Sender Receiver Plaintext E Cryptotext D Plaintext Referee Ensures that Receiver can not deny receiving the ciphertext (if she uses plaintext content) A Trusted 3rd party decides if the sender actually has sent the ciphertext 25

Message Authentication Sender Receiver Plaintext E Cryptotext D Plaintext Referee Being positive about the originality of the cryptotext Digital signatures, like written signatures, are used to provide authentication (hence, non-repudiation of origin) of the associated document Related with Nonrepudiation of Sender 26

Authorization Authorization is allowing access to resources only to users who are permitted to use them Resources include files, computer programs, computer devices etc. Users include computer users, computer programs etc. 27

Authentication & Authorization Authentication is verifying identity of a user Authorization is deciding whether to grant access by an authenticated user or not 28

Anonymous users Anonymous users or guests are consumers that have not been required to authenticate They often have very few permissions It is often desirable to grant access without requiring a unique identity in large systems 29

Digital Certificates Digital Certificate binds identity to private key owned (that matches the corresponding public key) usually with other info such as period of validity, rights of use etc Contents of the certificate is signed by a trusted Certificate Authority (CA) such as VeriSign or Thawte can be verified by anyone who knows the publickey of the CA typically by the web client (browser) 30

Public-Key Certificates 31

Digital Signature Source: www.wikipedia.org 32

Digital Certificate 33

Digital Signature 34

Cryptographic Functions 1. Public key: 2 different keys are used for encryption and decryption Asymmetric cryptography Modern cryptography 2. Secret (private) key: 1 key is used for both encryption and decryption Symmetric cryptography Conventional cryptography 3. Hash functions: No keys are used for neither encryption nor decryption Message digest 35

Usage of cryptography 1. Secret key Cryptography Secrecy (/Confidentiality) Authentication 2. Public key Secrecy (/Confidentiality) Authentication & Digital signatures Integrity Nonrepudiation (of sender & receiver) 3. Hash functions Message authentication (integrity) 36

Using Encryption Functions integrity confidentiality user authentication Symmetric encryption 37

Using Encryption Functions integrity user authentication Symmetric encryption 38

Using Encryption Functions integrity user authentication digital signature Public-key encryption 39

Using Encryption Functions integrity user authentication confidentiality digital signature Public-key encryption 40

Using Encryption Functions user authentication integrity common secret information S is used 41

Using Encryption Functions integrity confidentiality user authentication common secret information S is used 42

Using Encryption Functions Message authentication Integrity 43

Using Encryption Functions 44

Using Encryption Functions 45