32
E - SECURITY COMPUTER SECURITY BY DR. D. SAHU UTKAL UNIVERSITY

2.e Security Ppt(1)

Embed Size (px)

Citation preview

Page 1: 2.e Security Ppt(1)

E - SECURITY

COMPUTER SECURITY

BY

DR. D. SAHUUTKAL

UNIVERSITY

Page 2: 2.e Security Ppt(1)

INTRODUCTIONSecurity encompasses a set of measures and procedures to guard against theft, attack, crime, and sabotage. The goal of computer security is to maintain the integrity, availability, and privacy of information entrusted to the system.

Unauthorized access, revelation, or destruction of data can violate individual privacy. Corruption of business data can result in significant and potentially catastrophic losses to Companies.

In order to build a secure e-Commerce system, we need to employ cryptographic techniques. Cryptography is originally about keeping messages secret.

Page 3: 2.e Security Ppt(1)

SECURITY THREATS AND GOALS

1. Unauthorized disclosure of information2. Unauthorized alteration or destruction of information3. Unauthorized use of service4. Denial of service to legitimate users5. Interruption & disruption in communications

A computer is secure if you can depend on it and its software to behave as you expect.

Page 4: 2.e Security Ppt(1)

PENETRATION ATTEMPTSLogged-on TerminalPasswordsBrowsingTrap doors (secret points of entry without access authorization)Electronic eavesdropping (electromagnetic pickup of screen radiation)Mutual trust Trojan Horse (program may be written to steal user passwords)Computer Worms (programs can attack via a network and deny service)Computer VirusesTrial & Error

Page 5: 2.e Security Ppt(1)

E-Security according to Consumers mean:• Protection of Personal Information• Protection of Assets

E-Security according to Corporate, Government and Other Institutions mean:• Protection of Information• Protection of Systems(* The type of information and systems for corporate, Government and other institutions are different)

E-SECURITY FOR DIFFERENT INSTITUTIONS

Page 6: 2.e Security Ppt(1)

VICTIMIZED FIRMS• Banks• Financial Companies• Insurance companies• Brokerage Houses• Consultants• Network Service Providers• Textile Business• Wholesale/ Retail Traders• Government Contractors• Government agencies• Hospitals• Medical Laboratories• Utility Companies• Universities, etc……….(The list goes on as no firm is fully immune to e-threats)

Page 7: 2.e Security Ppt(1)

THREATS• Uncover confidentiality

• Leak Authentication and Access Control

• Conduct ID theft

• Hacking

• Virus

• Client based security threats

• Server based security threats

• Other threats

Page 8: 2.e Security Ppt(1)

Security ConcernsWorry 1: I transmit my credit card information over the internet. Can people other than the intended recipient read it?Worry 2: I agree to pay Rs 10000/- for the goods. Will this payment information be captured and changed by someone on the internet?Worry 3: This company claims itself to be company X. Is this the real company X? The aforementioned worries can be summarized into three security requirements namely : 1. Confidentiality 2. Integrity 3. Authentication

Page 9: 2.e Security Ppt(1)

SECURITY SERVICES• MESSAGE :

1. CONFIDENTIALITY (SENDER AND RECEIVER EXPECT PRIVACY)2. INTEGRITY (DATA MUST ARRIVE AT THE RECEIVER EXACTLY AS SENT)3. AUTHENTICATION (THE RECEIVER NEEDS TO BE SURE OF SENDERS IDENTITY)4. NONREPUDIATION (A SENDER MUST NOT BE ABLE TO DENY SENDING A MESSAGE THAT HE SENT)

• ENTITY :AUTHENTICATION (USER IDENTIFICATION)

Page 10: 2.e Security Ppt(1)

Privacy and Confidentiality: Information must be kept away from unauthorized parties.

Security and Integrity: Message must not be altered or tampered with.

Authenticity: Sender and recipient must prove their identities to each other.

Non-Repudiation: Proof is needed that the message was indeed received.

4 BASIC SECURITY PRINCIPLES

Page 11: 2.e Security Ppt(1)

BASIC E-SECURITY TIPSUse firewall

Use virus protection software

Use strong passwords

Back up your files on a regular basis

Do not keep a computer online when not in use

Do not open e-mail attachments from strangers

Disable scripts

Page 12: 2.e Security Ppt(1)

Firewall : A network node consisting of both hardware and software that isolates a private network from public networks.

Page 13: 2.e Security Ppt(1)

Secure access (password authentication)

Secure interconnection

Secure personal connection

Secure networking (VPNs)

Secure managed services

Secure Hypertext Transfer Protocol (S-HTTP)

Secure/Multipurpose Internet mail Extensions (S/MIME)

Secure electronic transaction (SET)

Secure socket layer (SSL)

E-SECURITY STANDARDS

Page 14: 2.e Security Ppt(1)

Secure socket layer (SSL) A special communication protocol used by Web browsers and servers to encrypt all communications online. This protocol makes secure Web transmissions transparent to end users.

Secure electronic transaction (SET) a set of cryptographic protocols jointly developed by Visa, Master card, Netscape, and Microsoft and designed to provide secure Web credit card transactions for both consumers and merchants.

SET is established on top of SSL, understanding SSL Is understanding foundation of SET. The protocol S-HTTP applies SSL between Web servers and browsers , which communicated by HTTP protocol. SSL protocol performs message exchanges.

Page 15: 2.e Security Ppt(1)

CRYPTOGRAPHY

Cryptography is the science of using mathematics to encrypt and decrypt data.

It is of two categories• Symmetric encryption/Secret Key cryptography (uses the same key for encryption and decryption)• Asymmetric encryption/Public Key Cryptography(uses a public key and a private key)

• Data Encryption Standard(DES):It is a symmetric algorithm Designed by IBM for the U.S. Government in 1977. It is based on a 56 bit key. It is reasonably secure since all possible keys are exhaustively tried to break the code and it takes a long time even with fast computers. It applies transformation on blocks of 64 bit corresponding to binary encoding

Page 16: 2.e Security Ppt(1)

Data that can be read and understood without any special measures is called plain text or clear text. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called cipher text. You use encryption to ensure thatinformation is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting cipher text to its original plaintext is called decryption

Plain TextEncryption

Cipher TextDecryption

Plain Text

Page 17: 2.e Security Ppt(1)

The RSA algorithm, named for its creators Ron Rivest, Adi Shamir, and Leonard Adleman, is currently one of the favorite public key encryption methods.

The RSA Algorithm

Page 18: 2.e Security Ppt(1)

Example of how an encrypted message may look after using RSA Algorithm:

Recipient: Bob Key Encryption Algorithm: rsaEncryption Encrypted Key: 3D2AB25B1EB667A40F504CC4D778EC399A899C8790EDECEF062CD739492C9CE5 8B92B9ECF32AF4AAC7A61EAEC346449891F49A722378E008EFF0B0A8DBC6E621 EDC90CEC64CF34C640F5B36C48EE9322808AF8F4A0212B28715C76F3CB99AC7E 609787ADCE055839829E0142C44B676D218111FFE69F9D41424E177CBA3A435B Content Encryption Algorithm: aes128-cbc IV: 5732164B3ABB6C4969ABA381C1CA75BA Encrypted Content: 67290EF00818827C777929A56BC3305B

Page 19: 2.e Security Ppt(1)

DIGITAL SIGNATURES

• A digital signature is a cryptographic mechanism that performs a similar function like a written signature, used to verify the origin and contents of the message.

• It may be implemented with the use of RSA public key encryption in a way that provides both security and authentication of message. To make a DS, a sender encrypts a message with his private key.

• Assuming that B receives a message M signed by A the digital signature must satisfy the following requirements :

1. It must be possible for B to validate A’s signature on M

2. It must be impossible for anyone to forge A’s signature3. It must be impossible for A to repudiate the message M

Page 20: 2.e Security Ppt(1)

• Secure transport stacks

• Kerberos

• Secure transactions over the internet

• UNIX security

• Password security systems - one time passwords - smart cards

• Electronic mail

• Server security

• Network security

SECURITY TOOLS

Page 21: 2.e Security Ppt(1)

CASE STUDY

Australian Government Initiative

ICICI PRUDENTIAL

Page 22: 2.e Security Ppt(1)
Page 23: 2.e Security Ppt(1)
Page 24: 2.e Security Ppt(1)
Page 25: 2.e Security Ppt(1)
Page 26: 2.e Security Ppt(1)
Page 27: 2.e Security Ppt(1)
Page 28: 2.e Security Ppt(1)
Page 29: 2.e Security Ppt(1)
Page 30: 2.e Security Ppt(1)

CONCLUSIONE-security can never be perfect because a better system will be broken into by a better cracker

Solutions?Better education of people using systemBetter system usage and monitoringBetter enforcement and legislation without infringing on privacy

“The price of freedom is eternal vigilance”

Page 31: 2.e Security Ppt(1)

Reference BooksOperating Systems By MILAN MILENKOVICData Communications & Networking By B. A. FOROUZANElectronic Commerce By TURBAN,LEE,KING & CHUNGElectronic Commerce By CHAN,LEE,DILLON & CHANG

Page 32: 2.e Security Ppt(1)