SlideShare una empresa de Scribd logo
1 de 43
Security
Security Objectives
Secrecy
Prevent/detect/deter improper
Disclosure of information
Availability
Prevent/detect/deter improper
Denial of access to services
IntegrityPrevent/detect/deter
Improper modification
of information
Policy
Organizational policyOrganizational policy
Information systems policyInformation systems policy
Security Overview
Many fears to overcome
Intercepted e-mail messages
Unauthorized access to digital intelligence
Credit card information falling into the wrong
hands
Two types of computer security
Physical - protection of tangible objects
Logical - protection of non-physical objects
What is security?
Dictionary Definition: protection or defense
against attack, interference, espionage, etc
System correctness
Good input ⇒ Good output
Security
Bad input ⇒ Bad output
Goals of Security
DATA
Integrity
DATA
Availability
DATA
Confidentiality
Aspects of Security
consider 3 aspects of information security:
security attack
security mechanism (control)
security service
note terms
threat – a potential for violation of security
vulnerability – a way by which loss can happen
attack – an assault on system security, a
deliberate attempt to evade security services
Computer Security Classification
SECURITY SERVICESSECURITY SERVICES
DATA
CONFIDENTIALITY
DATA
CONFIDENTIALITY
DATA
INTEGRITY
DATA
INTEGRITY
AUTHENTICATIONAUTHENTICATION
NONREPUDIATIONNONREPUDIATION
ACCESS
CONTROL
ACCESS
CONTROL
Computer Security Classification
1. ENCIPHERMENT
2. DATA INTEGRITY
3. DIGITAL SIGNATURE
4. AUTHENTICATION
EXCHANGE
5. TRAFFIC PADDING
6. ROUTING CONTROL
7. NOTARIZATION
8. ACCESS CONTROL
1. ENCIPHERMENT
2. DATA INTEGRITY
3. DIGITAL SIGNATURE
4. AUTHENTICATION
EXCHANGE
5. TRAFFIC PADDING
6. ROUTING CONTROL
7. NOTARIZATION
8. ACCESS CONTROL
SECURITY
MECHANISM
SECURITY
MECHANISM
-To provide the services.
- A method, tools or procedure for enforcing a
security policy.
DATA
CONFIDENTIALITY
DATA INTEGRITY
AUTHENTICATION
NONREPUDIATION
ACCESS CONTROL
1,3,4
2,3,7
1,2,3
8
1
SECURITY ATTACKS
PASSIVE
ATTACKS
ACTIVE
ATTACKS
Interception
Traffic Analysis
Interruption
Fabrication
Replay
Modification
Passive Attack - Interception
Passive Attack: Traffic Analysis
Observe traffic pattern
Active Attack: Interruption
Block delivery of message
Active Attack: Fabrication
Fabricate message
Active Attack: Replay
Active Attack: Modification
Modify message
Handling Attacks
Passive attacks – focus on Prevention
Easy to stop
Hard to detect
Active attacks – focus on Detection and
Recovery
Hard to stop
Easy to detect
System
AttackerAlice
General picture
Security is about
Honest user (e.g., Alice, Bob, …)
Dishonest Attacker
How the Attacker
Disrupts honest user’s use of the system (Integrity,
Availability)
Learns information intended for Alice only (Confidentiality)
Databases
and
data security
It’s your data – are you
sure it’s safe?
Network
Attacker
Intercepts and
controls network
communication
Alice
System
Network security
Web Attacker
Sets up
malicious site
visited by victim;
no control of
network
Alice
System
Web security
OS Attacker
Controls
malicious files
and
applications
Alice
Operating system security
System
AttackerAlice
Confidentiality : Attacker does not learn Alice’s secrets
Integrity : Attacker does not undetectably corrupt
system’s function for Alice
Availability : Attacker does not keep system from being
useful to Alice
How Viruses and Worms Spread
25
Defending Against Viruses and
Worms
Keys to protecting PCs
Don’t open e-mails or IM attachments unless
they are expected and have been inspected by
antivirus software
Keep up with software patches for your system
Use caution when exploring Web sites
Avoid software from untrusted sources
Stay away from file-sharing networks
WHY INTERNET IS
DIFFERENT?
Paper-Based Commerce Electronic Commerce
Signed paper Documents Digital Signature
Person-to-person Electronic via Website
Physical Payment System Electronic Payment System
Merchant-customer Face-to-face Face-to-face Absence
Easy Detectability of modification Difficult Detectability
Easy Negotiability Special Security Protocol
Specific Elements of a Security Policy
Authentication
Who is trying to access the site?
Access Control
Who is allowed to logon and access the site?
Secrecy
Who is permitted to view selected information
Data integrity
Who is allowed to change data?
Audit
What and who causes selected events to occur,
and when?
Three components to security
Three perspectives
User’s point of view
Server’s point of view
Both parties
Three parts
Client-side security
Server-side security
Document confidentiality
Client-side security
Measures to protect the user’s privacy and
the integrity of his computer
Example technological solutions
Protection from computer viruses and other
malicious software
Limit the amount of personal information that
browser’s can transmit without the user’s
consent
Any others?
Server-side security
Measures to protect the server and the
machine it runs from break-ins, site
vandalism, and denial-of-service attacks.
Solutions range
installing firewall systems
tightening operating systems security measures
Document confidentiality
Measures to protect private information
from being disclosed to third parties.
Example risks:
Solutions range
Password to identify users
Cryptography
Tools Available to Achieve Site
Security
Encryption
 Transforms plain text or data into cipher
text that cannot be read by anyone outside
of the sender and the receiver. Purpose:
 to secure stored information
 to secure information transmission.
 Cipher text
 text that has been encrypted and thus cannot be
read by anyone besides the sender and the
receiver
 Symmetric Key Encryption
 DES standard most widely used
Encryption
 Public key cryptography
uses two mathematically related digital keys: a
public key and a private key.
 The private key is kept secret by the owner,
and the public key is widely disseminated.
 Both keys can be used to encrypt and
decrypt a message.
 A key used to encrypt a message, cannot be
used to unencrypt the message
Public Key Cryptography -
A Simple Case
Public Key Cryptography with Digital
Signatures
Public Key Cryptography: Creating
a Digital Envelope
Securing Channels of Communications
 Secure Sockets Layer (SSL) is the most
common form of securing channels
 Secure negotiated session
client-server session where the requested
document URL, contents, forms, and cookies are
encrypted.
 Session key is a unique symmetric encryption
key chosen for a single secure session
Securing Channels of
Communications
 Secure Hypertext Transfer Protocol
(S-HTTP)
secure message-oriented communications
protocol for use with HTTP.
 Virtual Private Networks (VPN)
remote users can securely access internal
networks via Point-to-Point Tunneling Protocol
(PPTP)
Secure Negotiated Sessions Using
SSL
Protecting Networks
 Firewalls
software applications that act as a filter
between a private network and the Internet
 Proxy server
server that handles all communications
originating from or being sent to the Internet,
acting as a spokesperson or bodyguard for the
organization
Tension Between Security and Other
Values
Ease of use
 Often security slows down processors and adds
significantly to data storage demands. Too much
security can harm profitability; not enough can
mean going out of business.
 Public Safety & Criminal Use
 claims of individuals to act anonymously vs. needs
of public officials to maintain public safety in
light of criminals or terrorists.
Why Care?
 Online banking, trading, purchasing may be insecure
Credit card and identity theft
 Personal files could be corrupted
All school work, music, videos, etc. may be lost
 Computer may become too slow to run
If you aren't part of the solution you are part of the problem
 Pwn2Own contest - 2008
Mac (Leopard) fell first via Safari, Vista took time but was hacked
via Flash Player, Ubuntu stood ground.
 Upon discovery, vulnerabilities can be used against many
computers connected to the internet.
43

Más contenido relacionado

La actualidad más candente

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 

La actualidad más candente (20)

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Capítulo 7: Firma digital
Capítulo 7: Firma digitalCapítulo 7: Firma digital
Capítulo 7: Firma digital
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Email security
Email securityEmail security
Email security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Cryptography
CryptographyCryptography
Cryptography
 
Data security
Data securityData security
Data security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 

Destacado

Plan your security
Plan your securityPlan your security
Plan your securityAccord Group
 
Integrated Physical Security
Integrated Physical SecurityIntegrated Physical Security
Integrated Physical SecurityJohn N. Motlagh
 
SOLAR TREE technical seminar report doc
SOLAR TREE technical seminar report docSOLAR TREE technical seminar report doc
SOLAR TREE technical seminar report docMohsin Khan
 
Direct to home(DTH) Technical seminar
Direct to home(DTH) Technical seminarDirect to home(DTH) Technical seminar
Direct to home(DTH) Technical seminarram mettu
 
Technical seminar power humps
Technical seminar power humpsTechnical seminar power humps
Technical seminar power humpsMaltesh4jn10me051
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

Destacado (10)

Plan your security
Plan your securityPlan your security
Plan your security
 
Integrated Physical Security
Integrated Physical SecurityIntegrated Physical Security
Integrated Physical Security
 
SOLAR TREE technical seminar report doc
SOLAR TREE technical seminar report docSOLAR TREE technical seminar report doc
SOLAR TREE technical seminar report doc
 
Direct to home(DTH) Technical seminar
Direct to home(DTH) Technical seminarDirect to home(DTH) Technical seminar
Direct to home(DTH) Technical seminar
 
Technical seminar power humps
Technical seminar power humpsTechnical seminar power humps
Technical seminar power humps
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Similar a Technical seminar on Security

COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 

Similar a Technical seminar on Security (20)

COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Security communication
Security communicationSecurity communication
Security communication
 
Data security
Data securityData security
Data security
 
E comm jatin
E comm jatinE comm jatin
E comm jatin
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Website security
Website securityWebsite security
Website security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Information security
Information securityInformation security
Information security
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 

Último

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Technical seminar on Security

  • 2. Security Objectives Secrecy Prevent/detect/deter improper Disclosure of information Availability Prevent/detect/deter improper Denial of access to services IntegrityPrevent/detect/deter Improper modification of information
  • 3. Policy Organizational policyOrganizational policy Information systems policyInformation systems policy
  • 4. Security Overview Many fears to overcome Intercepted e-mail messages Unauthorized access to digital intelligence Credit card information falling into the wrong hands Two types of computer security Physical - protection of tangible objects Logical - protection of non-physical objects
  • 5. What is security? Dictionary Definition: protection or defense against attack, interference, espionage, etc System correctness Good input ⇒ Good output Security Bad input ⇒ Bad output
  • 7. Aspects of Security consider 3 aspects of information security: security attack security mechanism (control) security service note terms threat – a potential for violation of security vulnerability – a way by which loss can happen attack – an assault on system security, a deliberate attempt to evade security services
  • 8. Computer Security Classification SECURITY SERVICESSECURITY SERVICES DATA CONFIDENTIALITY DATA CONFIDENTIALITY DATA INTEGRITY DATA INTEGRITY AUTHENTICATIONAUTHENTICATION NONREPUDIATIONNONREPUDIATION ACCESS CONTROL ACCESS CONTROL
  • 9. Computer Security Classification 1. ENCIPHERMENT 2. DATA INTEGRITY 3. DIGITAL SIGNATURE 4. AUTHENTICATION EXCHANGE 5. TRAFFIC PADDING 6. ROUTING CONTROL 7. NOTARIZATION 8. ACCESS CONTROL 1. ENCIPHERMENT 2. DATA INTEGRITY 3. DIGITAL SIGNATURE 4. AUTHENTICATION EXCHANGE 5. TRAFFIC PADDING 6. ROUTING CONTROL 7. NOTARIZATION 8. ACCESS CONTROL SECURITY MECHANISM SECURITY MECHANISM -To provide the services. - A method, tools or procedure for enforcing a security policy. DATA CONFIDENTIALITY DATA INTEGRITY AUTHENTICATION NONREPUDIATION ACCESS CONTROL 1,3,4 2,3,7 1,2,3 8 1
  • 11. Passive Attack - Interception
  • 12. Passive Attack: Traffic Analysis Observe traffic pattern
  • 13. Active Attack: Interruption Block delivery of message
  • 17. Handling Attacks Passive attacks – focus on Prevention Easy to stop Hard to detect Active attacks – focus on Detection and Recovery Hard to stop Easy to detect
  • 18. System AttackerAlice General picture Security is about Honest user (e.g., Alice, Bob, …) Dishonest Attacker How the Attacker Disrupts honest user’s use of the system (Integrity, Availability) Learns information intended for Alice only (Confidentiality)
  • 19. Databases and data security It’s your data – are you sure it’s safe?
  • 21. Web Attacker Sets up malicious site visited by victim; no control of network Alice System Web security
  • 23. System AttackerAlice Confidentiality : Attacker does not learn Alice’s secrets Integrity : Attacker does not undetectably corrupt system’s function for Alice Availability : Attacker does not keep system from being useful to Alice
  • 24. How Viruses and Worms Spread
  • 25. 25 Defending Against Viruses and Worms Keys to protecting PCs Don’t open e-mails or IM attachments unless they are expected and have been inspected by antivirus software Keep up with software patches for your system Use caution when exploring Web sites Avoid software from untrusted sources Stay away from file-sharing networks
  • 26. WHY INTERNET IS DIFFERENT? Paper-Based Commerce Electronic Commerce Signed paper Documents Digital Signature Person-to-person Electronic via Website Physical Payment System Electronic Payment System Merchant-customer Face-to-face Face-to-face Absence Easy Detectability of modification Difficult Detectability Easy Negotiability Special Security Protocol
  • 27. Specific Elements of a Security Policy Authentication Who is trying to access the site? Access Control Who is allowed to logon and access the site? Secrecy Who is permitted to view selected information Data integrity Who is allowed to change data? Audit What and who causes selected events to occur, and when?
  • 28. Three components to security Three perspectives User’s point of view Server’s point of view Both parties Three parts Client-side security Server-side security Document confidentiality
  • 29. Client-side security Measures to protect the user’s privacy and the integrity of his computer Example technological solutions Protection from computer viruses and other malicious software Limit the amount of personal information that browser’s can transmit without the user’s consent Any others?
  • 30. Server-side security Measures to protect the server and the machine it runs from break-ins, site vandalism, and denial-of-service attacks. Solutions range installing firewall systems tightening operating systems security measures
  • 31. Document confidentiality Measures to protect private information from being disclosed to third parties. Example risks: Solutions range Password to identify users Cryptography
  • 32. Tools Available to Achieve Site Security
  • 33. Encryption  Transforms plain text or data into cipher text that cannot be read by anyone outside of the sender and the receiver. Purpose:  to secure stored information  to secure information transmission.  Cipher text  text that has been encrypted and thus cannot be read by anyone besides the sender and the receiver  Symmetric Key Encryption  DES standard most widely used
  • 34. Encryption  Public key cryptography uses two mathematically related digital keys: a public key and a private key.  The private key is kept secret by the owner, and the public key is widely disseminated.  Both keys can be used to encrypt and decrypt a message.  A key used to encrypt a message, cannot be used to unencrypt the message
  • 35. Public Key Cryptography - A Simple Case
  • 36. Public Key Cryptography with Digital Signatures
  • 37. Public Key Cryptography: Creating a Digital Envelope
  • 38. Securing Channels of Communications  Secure Sockets Layer (SSL) is the most common form of securing channels  Secure negotiated session client-server session where the requested document URL, contents, forms, and cookies are encrypted.  Session key is a unique symmetric encryption key chosen for a single secure session
  • 39. Securing Channels of Communications  Secure Hypertext Transfer Protocol (S-HTTP) secure message-oriented communications protocol for use with HTTP.  Virtual Private Networks (VPN) remote users can securely access internal networks via Point-to-Point Tunneling Protocol (PPTP)
  • 41. Protecting Networks  Firewalls software applications that act as a filter between a private network and the Internet  Proxy server server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization
  • 42. Tension Between Security and Other Values Ease of use  Often security slows down processors and adds significantly to data storage demands. Too much security can harm profitability; not enough can mean going out of business.  Public Safety & Criminal Use  claims of individuals to act anonymously vs. needs of public officials to maintain public safety in light of criminals or terrorists.
  • 43. Why Care?  Online banking, trading, purchasing may be insecure Credit card and identity theft  Personal files could be corrupted All school work, music, videos, etc. may be lost  Computer may become too slow to run If you aren't part of the solution you are part of the problem  Pwn2Own contest - 2008 Mac (Leopard) fell first via Safari, Vista took time but was hacked via Flash Player, Ubuntu stood ground.  Upon discovery, vulnerabilities can be used against many computers connected to the internet. 43

Notas del editor

  1. The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: • Security attack: Any action that compromises the security of information owned by an organization. • Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. • Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. In the literature, the terms threat and attack are commonly used to mean more or less the same thing. Table 1.1 provides definitions taken from RFC 2828, Internet Security Glossary. Threat - A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability. Attack - An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.
  2. A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: + release of message contents - as shown above in Stallings Figure 1.2a here + traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged These attacks are difficult to detect because they do not involve any alteration of the data.
  3. A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: + release of message contents - as shown above in Stallings Figure 1.2a here + traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged These attacks are difficult to detect because they do not involve any alteration of the data.
  4. A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: + release of message contents - as shown above in Stallings Figure 1.2a here + traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged These attacks are difficult to detect because they do not involve any alteration of the data.
  5. A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: + release of message contents - as shown above in Stallings Figure 1.2a here + traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged These attacks are difficult to detect because they do not involve any alteration of the data.
  6. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: masquerade of one entity as some other replay previous messages (as shown above in Stallings Figure 1.3b) modify/alter (part of) messages in transit to produce an unauthorized effect denial of service - prevents or inhibits the normal use or management of communications facilities Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
  7. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: masquerade of one entity as some other replay previous messages (as shown above in Stallings Figure 1.3b) modify/alter (part of) messages in transit to produce an unauthorized effect denial of service - prevents or inhibits the normal use or management of communications facilities Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
  8. Consider the role of a security service, and what may be required. Note both similarities and differences with traditional paper documents, which for example: have signatures & dates; need protection from disclosure, tampering, or destruction; may be notarized or witnessed; may be recorded or licensed