Cryptography. Digital security domain. Digital signature. Problems in digital signatures. Firewall. An open network



Similar documents
Advanced Authentication

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Basic Concepts of Information Security

CTS2134 Introduction to Networking. Module Network Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Information Security

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

COSC 472 Network Security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

How To Protect Your Network From Attack

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Cornerstones of Security

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Network Security and Firewall 1

Central Agency for Information Technology

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

information security and its Describe what drives the need for information security.


Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Chap. 1: Introduction

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Compter Networks Chapter 9: Network Security

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Access control policy: Role-based access

Security Goals Services

Fundamentals of Network Security - Theory and Practice-

Security Digital Certificate Manager

Internet Programming. Security

Client Server Registration Protocol

Security Digital Certificate Manager

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Cryptography and Network Security Chapter 1

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Content Teaching Academy at James Madison University

Application Intrusion Detection

Detailed Concept of Network Security

Security Design.

IBX Business Network Platform Information Security Controls Document Classification [Public]

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cryptography and Network Security

Basics of Internet Security

CSE/EE 461 Lecture 23

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Chapter 10. Network Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Standard: Event Monitoring

Information Security Basic Concepts

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Module 7 Security CS655! 7-1!

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Description: Objective: Attending students will learn:

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Securing Distribution Automation

Securing your Online Data Transfer with SSL

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Newcastle University Information Security Procedures Version 3

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Security and Privacy: An Introduction to HIPAA

Network Security Foundations

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

CRYPTOGRAPHY IN NETWORK SECURITY

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion


Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

How To Encrypt Data With Encryption

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Ohio Supercomputer Center

Key Management and Distribution

CS 356 Lecture 28 Internet Authentication. Spring 2013

Firewall Environments. Name

Overview. SSL Cryptography Overview CHAPTER 1

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Data Security 2. Implement Network Controls

Lecture II : Communication Security Services

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CPSC 467: Cryptography and Computer Security

Transcription:

Information security technology Teemupekka Virtanen Helsinki University of Technology Telecommunication Software and Multimedia Laboratory teemupekka.virtanen@hut.fi Content 1. Information security technology in general What, why, content 2. Preventive systems Cryptography, Firewall, VPN, Access control access control, authentication, authorization, key management, PKI 3. Detection Systems IDS 4. Malicious content prevention Virus protection content filtering Corporate Security Physical Security Security domains Prevent outsiders from intruding Fences, walls Authenticate the insiders Keys, access control Alarms Intrusion detection Prevent intrusion Guards Traditional security domain Tamper resistant devices Tamper resistant devices combined physical security with information related services. E.g. smartcards are desiged to store secret information which never come out The device authenticate user itself and can make some operation on behalf of authorized user Good: excellent storage for secret keys and other information Bad: device may be broken or lost

Cryptography Digital security domain Passive methods to prevent unauthorized access to the content Can also prevent unathorized modification of the content Non-repudiation Tenttikysymykset 1. Määrittele 2. Kuinka 3. Salaujärjestelmä 4. Toimii weyoiuh 7qyequ yeqwyediqwh dwqu uy uy iuwdyoiowiuey oiuey oiuey oiuyeoi yeiuqey oi q Tenttikysymykset 1. Määrittele 2. Kuinka 3. Salaujärjestelmä 4. Toimii Digital signature In asymetric cryptography there are always two different keys binded together so that text encrypted with one key can be decrypted with other key and only with that one can t find out what is the other key If a text can be decrypted with a key we know that the text is encrypted with another key of the pair If we know that another key is owned by a certain person we know that only him has been able to encrypt the message Problems in digital signatures Signature is something that connects a person to a document and states that the person accepts the document If one put the name on the paper to show that he has seen a document it is not a signature In electronic environment a user have no control what happens It can t be a signature Firewall There are several possible definitions. My definition is: A policy how information is allowed to flow between two domains and device(s) which are required to put that policy into use The first and often the only defence line against an intruder Often dedicated devices which have special features to define policies and rise security level Requires constant administration and monitoring Not a buy and forget box An open network

A protected network VPN A trusted connection between secure areas A cryptographically protected channel Good: one solution for all the applications Bad: is the other site really secure enough A channel between protected networks Several protection layers Access control Traditionally a method to decide if somebody has a permission to enter restricted zone Consists several areas Identification - who is who Authentication who is going to enter Authorization does one have permission to enter this area Auditing collect information who has entered a certain zone Authentication Connects identity to a subject Can based on Something one has: the one time pad, the key, the device,... Something one knows: the password, the answer, the protocol Something one is: the fingerprint, the voice, the eye, the signature, the face Several methods can be combined: A device which requires a password an id-card with correct face

Authorization Decides if the subject has permission to certain object Access control based (ACL): -rw-r---- tpv users file.txt Capabilities based: tpv: file.txt(rw) In multilevel systems there are more information in security labels Key management Probably the weakest point of cryptography In symmetric methods the same key has to be distributed to all authorized persons and nobody else In asymmetric methods everyone needs only one pair of keys and the key management is easier secure creation of keys, initial distribution, secure strore of secret keys, secure publishing of public keys PKI Public key infrastucture Method for digital signature Method to negotiate symmetric key for encryption Certificates to create trust Method to revokate a certificate Residual information A computer is used normally three years and during that time there have been several confidental files How to remove these files permanently when discarding a computer? There are also communicators and handheld computers which are gate to systems and strorages of information Intrusion detection systems Systems which detect attempts to intrude Server based IDS systems monitor one server Network based systems monitor traffic in the network Try to find out known attacks The database must be updated There must be some active response for alarms Virus protection methods Traditional scanner Scans files and tried to find fingerprints Databases mus be updated regularly Heuristic scanner Tries to find typical elements of virus Firewall type virus protection Removes all executables and Office-macros Activity analyzer Notices if there are too many same attachments and puts them in hold

Virus protection In firewall Scans all the attachments, www-pages and FTPtransfers Good in prevention and in maintainability Slow if there is lot of trafic In mail-server Scans all the attachments Almost all the viruses spread with mail Efficient In file server Scans all the files In workstations Scans all the files Content filtering Information firewall which includes a policy and methods to put the policy in use May block certain adresses: www.playboy.com, www.enemy.com certain filetypes *.mp3 documents with certain strings: Secret, project-x Several protocols: HTTP, FTP, SMTP,... Can open documents, zip-files,... Example of content filtering music.mp3 Firewall Firewall ht tp: Content filtering proxy //www.iltalehti.fi //anon.free.anonymizer.com///www.iltalehti.fi Content filtering proxy Problems with content filtering Practical Requires plenty of maintenance and updates Prevents often authorized work Ethical Who is allowed to decide acceptable content For what reason Theoretical Is content filtering a method to decide what is acceptable: everything which is possible is also allowed Centralized management Personal computer is not personal any more Centralized user administration Centralized software distribution Software inventory Spying users? Good: easier administration, support and asset management Bad: single point of failure, loss of confidence Availability Availability is often more crucial property than confidentiality Confidentiality and availability are almost always conflicting properties Availability prevents loss of information and delays in services

Backup systems Backup is the basic protection method against losing information It can be done by every user with servers, floppy disks, CD-Rs,... In the bigger systems the increased capacity is a problem There might be tens of tapes in a carousel There are not hours enough in a day to transfer all the information to the tapes It is difficult to store only changed information in a database system where everything is just a big file RAID Several hard disks in one system looking as an one hard disk RAID-1 several hard disks with the same data RAID-2-5 several hard disks, data is distributed to several disks and equipped with checksums HA-systems HA-system structure High availability systems are systems which have duplicated components HA systems use standard components and are therefore much cheaper than real fault tolerant systems In some case it is also possible to balance load between components Server A RAID storage system Synchronization network Server B Network Conclusion There are several technical methods to provide security Every improvements one can buy are very cheap. If security could be improved by just bying a box everything would be in excellent condition All the methods have side effects Improving confidentiality decreases availability