doman’s csci 101 sections
TRANSCRIPT
![Page 1: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/1.jpg)
Doman’s CSCI 101 SectionsDoman’s CSCI 101 Sections
http://www.flickr.com/photos/selvin/2762032143/
![Page 2: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/2.jpg)
Computer CrimeMaking and Spreading Viruses
Stealing Corporate Data
Destroying Corporate Data
Stealing Personal Data
Credit card or bank fraud
Identity theft
Denial of Service Attackyou can shut down cnn.com by quickly hitting it
with thousands of bogus requests
Legal Issues
![Page 3: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/3.jpg)
Consequences of computer crimeOr.. 4 bad things that can happen...
Someone gains access to something they are not allowed. - Unauthorised Disclosure
Someone pretends to be someone else to get something they are not allowed. - Deception
Prevent someone from doing their work or prevent the system from doing its work. - Disruption
Something gains control of a system, data or functions for which it is not authorized. - Usurption Copyright: Dave Bremer
Otago Polytechnic, N.Z.©2008, Prentice Hall
![Page 4: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/4.jpg)
Assets – What to secure
![Page 5: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/5.jpg)
Computer Security TriadThree key objectives are at the heart of
computer security
Data and
services
Availability
Confidentiality
Integrity
![Page 6: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/6.jpg)
![Page 7: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/7.jpg)
Threats to Physical SecurityTheftDamage to hardware
Accidental Fire, flood, and earthquake
Destructive Accident Act of terrorism
Unauthorized accessSnooping
![Page 8: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/8.jpg)
Example of Snooping:Wardriving / Warwalking, Warchalking,
Wardriving/warwalking -- driving/walking around with a wireless-enabled notebook looking for unsecured wireless LANs
Warchalking -- using chalk markings to show the presence and vulnerabilities of wireless networks nearbyE.g., a circled "W” -- indicates a
WLAN protected by Wired Equivalent Privacy (WEP) encryption
[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
[Picture from Wikipedia]
![Page 9: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/9.jpg)
Physical protection measuresRestrict physical access to sensitive
network equipment
Guards, security cameras
Backup copies and archives
Cables and locks (e.g., for notebooks)
Authentication policies
![Page 10: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/10.jpg)
Authentication: Password-Based
Determines if user is authorized to access the system
Determines privileges for the userWhat makes a good password?
![Page 11: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/11.jpg)
Authentication : Biometrics Something the individual is
Static Biometrics: Fingerprint, faceSomething the individual does
Dynamic Biometrics: handwriting, voice recognition, typing rhythm
![Page 12: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/12.jpg)
![Page 13: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/13.jpg)
Threats to Software and DataNatural and man-made disaster protection
Fire, flood, and earthquake protectionAccident and terrorism protection
Threats from authorized personnel
Malware
![Page 14: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/14.jpg)
Protection from disasters
Backup copies and archives
![Page 15: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/15.jpg)
Computer CrimeMost corporate computer crime
is done by employees 58% unauthorized employees 24% authorized employees 13% outside hacker 5% other
Legal Issues
![Page 16: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/16.jpg)
Access ControlDictates what types of access are permitted,
under what circumstances, and by whom.
Protection from authorized users
![Page 17: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/17.jpg)
Role Based Access Control
Role: Cat
Role: Dog
Role: Bird
![Page 18: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/18.jpg)
Malware == Harmful SoftwareGeneral term for any Malicious softWare
Software designed to cause damage Or use up the resources of a target computer.
Some malware is parasiticContained within other software
Some malware is self-replicating, others require some other means to propogate.
![Page 19: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/19.jpg)
Logic BombOne of the oldest types of program threat,
predating viruses and worms, is the logic bomb.
Explodes when certain conditions are metPresence or absence of certain filesParticular day of the weekParticular user running application
Malware
![Page 20: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/20.jpg)
Malware
usually destroys files copies itself ex - a MSWord macro sent via email
Viruses
Virus
![Page 21: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/21.jpg)
Objective: gain control of network and computer Zombie is the infected computer
Attackers access lists of zombie PCs and activate them to help with other bad things or sometimes just with games
Launch attacks that are difficult to trace to bot’s creator
Collection of bots is a botnet
BOTS or ZOMBIES
Malware
![Page 22: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/22.jpg)
Attacker attempts to prevent legitimate users from accessing information or services.
1. select target
2. break into hosts around the network (see botnet)
3. send packets to target from compromised hosts
target
Introduction 1-24
MalwareDenial of Service DoS
Most common: flooding a network with information
![Page 23: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/23.jpg)
Malware
objective: steal information personal information (bank account info, …) passwords e.g. monitor and transmit your keyboard
input AdWare
Spyware
![Page 24: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/24.jpg)
TrapdoorSecret entry pointUseful for programmers debugging
But allows unscrupulous programmers to gain unauthorized access.
Backdoor –
Malware - How they get in
![Page 25: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/25.jpg)
Trojan HorseUseful program that contains hidden code
that when invoked performs some unwanted or harmful function
Replicates itselfThe really bad ones wait for a particular date
Not a virus, but a means to transport viruses
Malware - How they get in
![Page 26: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/26.jpg)
Email is not secure
There are some products and adds-on to make it secure or encrypted.
Email is permanent
Email Security
![Page 27: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/27.jpg)
Email is not secure
![Page 28: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/28.jpg)
Anti-Virus Software looks for known viruses and common virus formats
Anti-Spyware Software
Keep operating system and protection programs updated with latest fixes.
If you notice anything odd, like your computer seems to slow down or crash for no apparent reason,
Run your anti-virus and anti-spyware programs!
Protection from malware
![Page 29: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/29.jpg)
University and Industry security research
Honeypot System or network designed to attract
malwareWhen discovered, the malware is
researched An antidote is written
Protection from malware
![Page 30: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/30.jpg)
![Page 31: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/31.jpg)
WormsObjective is to destroy the network (not your
PC)
Use network connections to spread from system to system, replicating itself
Email virus has elements of being a worm (self replicating)But normally requires some intervention to
run, so classed as a virus rather than worm33
Malware
![Page 32: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/32.jpg)
Network Security ThreatsQ: What can a “bad guy” do?A: A lot!
eavesdrop: intercept messagesactively insert messages into connectionimpersonation: can fake (spoof) source
address in packet (or any field in packet)hijacking: “take over” ongoing connection
by removing sender or receiver, inserting himself in place
denial of service: prevent service from being used by others (e.g., by overloading resources)
![Page 33: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/33.jpg)
Starting to think about network security
![Page 34: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/34.jpg)
Protection for Network SecurityWe need to ensure:1.Messages get to destination without being altered 2.Only the persons we want will read our messages3.We need to ensure that source of message is who/what you think it is4.Sender and receiver are not being impersonated
Message Digests
Encryption
Digital Signatures
Certification Authorities
![Page 35: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/35.jpg)
We need to ensure messages get to destination without being altered
Message Digests
Protection for Network Security
![Page 36: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/36.jpg)
42
Message IntegrityAllows communicating parties to verify
that received messages are authentic.Content of message has not been altered
Achieved with1.Message digests2.Digital signatures3.Certification Authorizations
![Page 37: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/37.jpg)
43
Message DigestsFunction that uses the
actual message data to come up with a short code or ID. This is called a : “message signature”
Attach that to the message
MACMessage
(Message Authentication Code)
![Page 38: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/38.jpg)
44
Compare Message Authentication Code (MAC) to ensure message integrity
mes
sage
Message Digest Function
MAC
mes
sage
mes
sage
compare
Message Digest Function
MAC MAC
MAC
MAC
![Page 39: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/39.jpg)
We need to ensure only the persons we want will read our messages
Encryption
Protection for Network Security
![Page 40: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/40.jpg)
46
Simple encryption schemesubstitution cipher: substituting one thing for another
monoalphabetic cipher: substitute one letter for another
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
Plaintext: bob. i love you. aliceciphertext: nkn. s gktc wky. mgsbc
E.g.:
Key: the mapping from the set of 26 letters to the set of 26 letters
![Page 41: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/41.jpg)
Encryptionsymmetric key encryption1 encryption key
public key encryption2 encryption keys
![Page 42: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/42.jpg)
49
Symmetric (Shared) key cryptography
symmetric key crypto: Bob and Alice share same (symmetric) key: K
e.g., key is knowing substitution pattern in mono alphabetic substitution cipher
Q: how do Bob and Alice agree on key value? Symmetric (shared) key exchange video
ciphertext
K S
encryptionalgorithm
decryption algorithm
S
K S
K (m)S
Uses key to decode message
Uses key to encode message
![Page 43: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/43.jpg)
50
Public Key Cryptographysymmetric key cryptorequires sender,
receiver know shared secret key
Q: how to agree on key in first place (particularly if never “met”)?
public key cryptography sender, receiver do not
share secret key public encryption key
known to all private decryption key
known only to receiver
![Page 44: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/44.jpg)
51
Public key cryptography
ciphertextencryptionalgorithm
decryption algorithm
Bob’s public key
K B+
Bob’s privatekey
K B-
Uses PUBLIC key to encode message
Can not decode message!
Uses PRIVATE key to decode message
![Page 45: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/45.jpg)
We need to ensure that source of message is who/what you think it is
Digital Signatures
Protection for Network Security
![Page 46: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/46.jpg)
Transfer $1Mfrom Bill to Trudy
Transfer $1M fromBill to Trudy
Playback attack – Who really sent this?
![Page 47: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/47.jpg)
54
Digital Signatures
Cryptographic technique analogous to hand-written signatures.
Sender (Bob) digitally signs document, establishing he is document owner/creator.
Simple digital signature for message m:Bob signs m by encrypting with his
PRIVATE key, creating “signed” message.
![Page 48: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/48.jpg)
We need to ensure that the sender or receiver is not being impersonated
Certification Authority
Protection for Network Security
![Page 49: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/49.jpg)
56
Public-key certificationMotivation: Trudy plays pizza prank on Bob
Trudy creates e-mail order: Dear Pizza Store, Please deliver to me four pepperoni pizzas. Thank you, Bob
Trudy signs order with her private keyTrudy sends order to Pizza StoreTrudy sends to Pizza Store her public key, but
says it’s Bob’s public key.Pizza Store verifies signature; then delivers four
pizzas to Bob.Bob doesn’t even like Pepperoni
![Page 50: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/50.jpg)
57
Certification AuthoritiesCertification authority (CA): binds public key to
particular entity, Bob.Bob(person, router) registers its public key
with CA.Bob provides “proof of identity” to CA. CA creates certificate binding Bob to its public key.certificate containing Bob’s public key digitally signed
by CA – CA says “this is Bob’s public key”Bob’s public
key
Bob’s identifying
information
certificate for Bob’s
public key, signed by
CA
![Page 51: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/51.jpg)
58
Certification AuthoritiesWhen Alice wants Bob’s public key:
gets Bob’s certificate (Bob or elsewhere).apply CA’s public key to Bob’s certificate,
get Bob’s public key
Bob’s public
key
![Page 52: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/52.jpg)
![Page 53: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/53.jpg)
Firewalls
FirewallsPrevent access to the network by
unauthorized usersComposed of software and/or hardware
![Page 54: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/54.jpg)
61
SSL: Secure Sockets LayerWidely deployed security protocol using
Encryption (especially credit-card numbers) Server authentication
Provides Confidentiality Integrity Authentication
Identified by the prefix https://
![Page 55: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/55.jpg)
62
Virtual Private Networks (VPNs)Institutions often want private networks
for security. Costly!
With a VPN, institution’s inter-office traffic is sent over public Internet instead. But inter-office traffic is encrypted before
entering public Internet
Client must sign in to VPN to access the network
![Page 56: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/56.jpg)
![Page 57: Doman’s CSCI 101 Sections](https://reader030.vdocument.in/reader030/viewer/2022032707/56649e205503460f94b0c49f/html5/thumbnails/57.jpg)
Protection via Security PolicyHardware security
Lock desktopsLaptops, phones,
etcLog off!!
Password SecurityPassword strengthChanging password
Encryption
Resource SecurityFilesMark document as
finalPassword protectCopyright