Introduction to Data Encryption and Network Security

Published on May 2016 | Categories: Types, Research | Downloads: 27 | Comments: 0 | Views: 259
of 47
Download PDF   Embed   Report

Author: Asad Raza MCS (NUST)

Comments

Content

Data Encryption & Network Security y
Lecture # 1

[email protected]

1 October 2009

1

Course Outline
Areas of Information Security
Cryptography (Data Encryption) Network Security Security Management Computer Forensics Distributed system Security Secure Software Development
1 October 2009 2

What security is about in general?
Prevention
take measures that prevent your assets from being damaged (or stolen)

Detection
take measures so that you can detect when, how, and by whom an asset has been damaged

Reaction
take measures so that you can can……

1 October 2009

3

Real world example
Prevention
locks at doors, window bars, secure the walls around the property, hire a guard

Detection
missing items, burglar alarms, closed circuit TV

Reaction
attack on burglar, call the police, replace stolen items, make an insurance claim

1 October 2009

4

Internet shopping example
Prevention
encrypt your order and card number, enforce merchants h t t to d do some extra t checks, h k d don’t ’t send d card number via Internet

Detection
an unauthorized transaction appears on your credit card statement

R Reaction ti
complain, dispute, ask for a new card number, sue ( (if you y can find of course ☺) Or, pay and forget (a glass of cold water) ☺
1 October 2009 5

Information security in past and present
Traditional Information Security
keep the cabinets locked put them in a secure room human guards electronic surveillance systems in general:physical and administrative mechanisms Data are in computers Computers are interconnected Computer and Network Security
6

Modern World

1 October 2009

Global Perspective
According to an FBI study, 90% of US companies suffered a security incident in 2005 The FBI also estimates that cyber crime cost each US companies an average of $24 $24,000 000 in 2005 But, , they y estimate that the total cost of cyber y crime to the US was over $400 billion in 2005 alone

1 October 2009

7

Cyber Crime
“Criminal acts using computers and networks as tools or targets” “Traditional crimes conducted through the use of computers” Can be based on malicious code such as a virus virus, email virus, virus worm or Trojan horse. Passive Attacks Or actively perpetrated by knowledgeable individuals, individuals who attempt to exploit network, computer, and software flaws Active Attacks

1 October 2009

8

Cyber Crime
Pre-existing crimes that are facilitated by the Internet or ones that have found new life because the Internet has made them lucrative endeavours endeavours.
Theft, theft of information, financial crimes, fraud, copyright infringement, pornography, scams, harassment, and terrorism

1 October 2009

9

WHAT ARE WE UP AGAINST?
FIRST We are faced with weak underlying technology and i h inherently tl vulnerable l bl software ft
SECOND Issues such as users anonymity coupled with uninformed, misguided, and malicious users contribute to the problem
FINALLY Weak or non-existent legal, regulatory, and policy environments y countries’ ability y to tackle cyber y crimes limit many
1 October 2009 10

CYBER CRIMINALS
Cyber criminals come in many forms. The most harmful can be malicious insiders, and disgruntled or uninformed employees p y The Internet also has its share of professional criminals like hackers, , organized g crime and pedophiles, p p , who make a living off of their well honed skills and criminal endeavours Finally, competing business, governments and terrorists will also use the internet to improve their position or further their cause
1 October 2009 11

Technology Factors
Technology plays a key role in securing computers and networks, but only if properly deployed and maintained There are a panoply of security tools at your disposal. If used properly they will shield your organization from most attacks Security ranges from the basics like limiting access to the network, forcing users to change passwords at regular intervals, to physically limiting access to certain computers

1 October 2009

12

Technology Factors
A step up would involve virus scanners that inspect incoming files for viruses, to firewalls, which limit incoming and outgoing network traffic To sophisticated tools like intrusion detection systems, which constantly analyze network traffic and send out alerts or shut off access in the event of anomalies If information must be sent over the Internet Internet, encryption technology can shield sensitive data when it must be transmitted

1 October 2009

13

Policy Factors
Ensure laws, regulations and policies provide the necessary support and focus that can complement cyber security endeavours A strong legal framework sends a message that cyber crime will be dealt with seriously and that limits on online conduct will be imposed It must also ensure that countries are able to investigate arrest and prosecute cyber criminals investigate,
1 October 2009 14

Policy Factors
A well articulated regulatory scheme will ensure that key players such as security providers, government and industry understand their roles in ensuring a secure environment Well articulated policies that outline the roles, responsibilities and commitments of users and governments t will ill bring b i all ll this thi together t th

1 October 2009

15

Terminology
Computer Security
automated tools and mechanisms to protect data in a computer, even if the computers are connected to a network
against hackers (intrusion) against viruses against Denial of Service attacks

Network Security
measures to prevent prevent, detect detect, and correct security violations that involve the transmission of information in a network or interconnected network

1 October 2009

16

Services, Mechanisms, Attacks
application presentation session transport p network data link physical RPC TCP IP 802.11 Smart Sniffers, RF Noise RPC worms, portmapper exploits SYN flooding, RIP attacks, sequence number prediction IP smurfing and other address spoofing attacks WEP attacks email, il Web, W b NFS Sendmail, FTP, Sendmail FTP NFS bugs, bugs chosen-protocol and version-rollback attacks

Only as secure as the single weakest layer…
1 October 2009 17

Services, Mechanisms, Attacks
3 aspects of information security:
security attacks (and threats)
actions that compromise security

security services
services counter to attacks

security mechanisms
used by services E g secrecy is a service E.g. service, encipherment is a mechanism
1 October 2009 18

Attacks
Attacks on computer systems
break-in to destroy y information break-in to steal information blocking to operate properly malicious software
wide spectrum of problems

1 October 2009

19

Attacks
Network Security threats Passive attacks
Active Passive

Interception of the messages What can the attacker do?
use information internally release the content traffic analysis
hard to avoid hard to understand can be understood

Hard to detect, try to prevent

1 October 2009

20

Attacks
Active attacks (cont’d)
deny
repudiate sending/receiving a message later

modification
change the content of a message

1 October 2009

21

Eavesdropping on a Dialog
Dialog

Hello Client PC Bob Server Alice

Hello

Attacker (Eve) intercepts and reads messages

22

Encryption for Confidentiality
Encrypted Message “100100110001”

Client PC Bob “100100110001” Attacker (Eve) intercepts but cannot read

Server Alice

Original Message “Hello”

Decrypted Message “Hello”

23

Attacks
Active attacks involves interruption, modification and fabrication, etc. Masquerade fabrication Replay
pretend as someone else possible to get more privileges create a bogus message passively capture data and send later preventing the normal use of servers, end users, or network itself
24

Denial-of-service

1 October 2009

Masquerading & Authentication
I’m Bob

Client Cli t PC Bob

Attacker Att k (Eve)

Prove it! (Authenticate Yourself) Server Alice

25

Message Modification
Dialog

Client PC Bob

Balance = $1

Balance = $1,000,000

Server Alice

Balance = $1 Attacker (Eve) intercepts and alters messages

Balance = $1,000,000

26

Secure Dialog System
Secure Dialog

Client PC Bob

Automatically Handles Negation of Security Options Authentication Encryption Integrity

Server Alice

Attacker cannot read messages, alter messages, or impersonate

27

Network Penetration Attacks
Scanning (Probing) Attacks
Reply from 172.16.99.1 Probe Packets to 172.16.99.1, 172.16.99.2, etc.

Host 172.16.99.1

Internet

Attacker No Host 172.16.99.2 Results 172.16.99.1 is reachable 172 16 99 2 is 172.16.99.2 i not t reachable h bl …

No Reply

Corporate Network

28

Single-Message Break-In Attack
1. Single Break-In Packet

2. Server Taken Over By Single Message

Attacker

29

Denial-of-Service (DoS) Flooding Attack
Message Flood

Server Overloaded By Message Flood

Attacker

30

Network Penetration Attacks and Firewalls
Passed Packet Internet Firewall Hardened Client PC Attack Packet

Internet Attacker

Dropped Packet Hardened Server Log File

Internal Corporate Network

31

Intrusion Detection System (Defense against penetration attacks )
4. Alarm Intrusion Detection System 1. Suspicious Packet

Network Administrator

2. Suspicious Packet Passed

Internet Attacker

3. Log Packet

Hardened Server Log g File p Network Corporate

32

Security Services
to prevent or detect attacks to enhance the security y replicate functions of physical documents
e.g. g
have signatures, dates need protection from disclosure, tampering, or destruction Notarization record

1 October 2009

33

Basic Security Services
Authentication
assurance that the communicating entity is the one it claims to be peer entity authentication Data-origin Data origin authentication
mutual confidence in the identities of the parties involved in a connection assurance about the source of the received data

Access Control

Data Confidentiality

prevention of the unauthorized use of a resource protection of data from unauthorized disclosure

1 October 2009

34

Basic Security Services
Data Integrity
assurance that data received are exactly as sent by an authorized sender i.e. no modification, insertion, deletion etc

Non-Repudiation
protection against denial by one of the parties in a communication Origin non-repudiation
proof that the message was sent by the specified party

Destination non-repudiation
proof that the message was received by the specified party

1 October 2009

35

Security Mechanisms
Basically cryptographic techniques
that serve to security services to prevent/detect/recover attacks

E i he e t Encipherment
use of mathematical algorithms to transform data into a form that is not readily y intelligible; g ; encryption
keys are involved

1 October 2009

36

Security Mechanisms
Message Digest
similar to encipherment, but one-way (recovery not possible) generally no keys are used

Digital g Signatures g and Message g Authentication Codes
data appended to, or a cryptographic transformation of, a data unit to prove the source and the integrity of the data

Authentication Exchange

ensure the identity of an entity by exchanging some information
37

1 October 2009

Security Mechanisms
Notarization
use of a trusted third party to assure certain properties of a data exchange

Timestamping
inclusion of correct date and time within messages

Non-cryptographic mechanisms
intrusion detection and prevention firewalls

1 October 2009

38

Model for Network Security

1 October 2009

39

Model for Network Security
using this model requires us to:
design a suitable algorithm for the security transformation (Encryption Algorithms) generate the secret information (keys) used by the algorithm (Key Generation ) develop methods to distribute and share the secret information ( (Key y distribution mechanisms) ) specify a protocol enabling the principals to use the transformation and secret information for a security service
1 October 2009 40

Model for Network Access Security

1 October 2009

41

Model for Network Access Security
using this model requires us to:
select appropriate gatekeeper functions to identify users and ensure only authorized users access designated information or resources
e g password-based e.g. password based

Internal control to monitor the activity y and analyze y information to detect unwanted intruders

1 October 2009

42

Network Defenses
Systems

Implementations

Firewalls, intrusion detection detection… SSL, IPSec, access control…

Blueprints

Protocols and policies

Building B ildi blocks

Cryptographic primitives

RSA, DES, SHA-1…

…all defense mechanisms must work correctly and securely
1 October 2009 43

Fundamental Dilemma of Security
“Security unaware users have specific security requirements but no security expertise.”
from D. Gollmann

Solution: level of security is given in predefined classes specified in some common criteria
Orange book (Trusted Computer System Evaluation Criteria) is such a criteria
1 October 2009 44

Fundamental Tradeoff
Between security and ease-of-use Security y may y require q clumsy y and inconvenient restrictions on users and processes
“If security is an add-on that people have to do something special to get, then most of the time they will not get it” it Martin Hellman, co inventor of Public Key Cryptography co-inventor
1 October 2009 45

Design criteria for a successful product ???
Do not assume potential users to be security experts
but provide enough set of options for security experts

A security feature in a product is a plus, but a security product is a challenge in the market
people intend to pay for secure products, but not to pay security p products

1 October 2009

46

THANK U
1 October 2009 47

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close