security bart vansevenant who is who? who can read what? traces virusses safety and...
TRANSCRIPT
![Page 1: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/1.jpg)
SECURITYSECURITYBart Vansevenant
Who is who?
Who can read what?
Traces
Virusses
Safety and confidentiality
![Page 2: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/2.jpg)
Who is who?Who is who?
![Page 3: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/3.jpg)
Telephone line
Mail server
TCP/IP
Echelon & Carnivore
Who can read what ?Who can read what ?
![Page 4: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/4.jpg)
SMTP
POP3
POST
e-mail using an ISPe-mail using an ISP
POST OFFICE
![Page 5: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/5.jpg)
SMTP
POP3
POST
a) Telephone-linea) Telephone-line
POST OFFICE
![Page 6: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/6.jpg)
SMTP
POP3
POST
b) e-mail serverb) e-mail serverEverything on the servers can be read or copied
POST OFFICE
![Page 7: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/7.jpg)
SMTP
POP3
POST
c) TCP/IPc) TCP/IP
Not readable – following different ways
POST OFFICE
![Page 8: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/8.jpg)
Echelon/CarnivoreEchelon/Carnivore
Source: http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm
![Page 9: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/9.jpg)
TracesTraces
![Page 10: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/10.jpg)
TracesTracesThe IP address of your computer is : 213.177.129.120
your DNS address is : adsl-129-120.wanadoo.be
We know you use : Microsoft Windows 98
Your navigator has the code: Mozilla/4.78 [en] (Win98; U)
In fact it is: Netscape Communicator 4.x English
What you did is stored :
Windows 95 C:\Windows\Temporary Internet Files\
Windows NT C:\WinNt\Temporary Internet Files\
A nice demo in french on: www.cnil.fr
![Page 11: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/11.jpg)
VirusVirus
What is a virus and types?
How is a computer infected?
Danger
![Page 12: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/12.jpg)
a) What is a virus?a) What is a virus? computer virus = a computer program
'I love you', 45 million computers infected
worm = multiplicates itselfcode Red: 300.000 servers destroyed
trojan horse = hides for other actionsBack Orifice
logic bomb = distroys programs
hoax = false alarm
![Page 13: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/13.jpg)
b) How is a computer infected?b) How is a computer infected?
files attached to e-mail (attachment)
diskettes
other
![Page 14: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/14.jpg)
c) Dangerc) Danger infecting components of your system
effects:
malfunctions
deletion of data
wiping of hard disk
...
![Page 15: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/15.jpg)
Solutions to provide safety and Solutions to provide safety and confidentialityconfidentiality
solving identity problem and unauthorised reading
protection against traces
protection against virusses
![Page 16: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/16.jpg)
Encryption
Purpose
Functions
How?
Identity and unauthorised Identity and unauthorised readingreading
![Page 17: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/17.jpg)
Functions of encryptionFunctions of encryption
Authentication
Integrity
Confidentiality
![Page 18: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/18.jpg)
Symmetrical encryptionSymmetrical encryption
Ubizen Vcjafo
EncryptionE(…)
DecryptionD(…)
Sender Receiver
VcjafoUntrustednetwork
SAME KEY
Ubizen
A=A+1 A=A-1
![Page 19: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/19.jpg)
Asymmetrical encryptionAsymmetrical encryption
Ubizen
Sender Receiver
Untrustednetwork
Go#st$
EncryptionE(…)
Public Key Receiver
DecryptionD(…)
Go#st$ Ubizen
Private Key Receiver
confidentiality towards receiver
![Page 20: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/20.jpg)
Asymmetrical encryptionAsymmetrical encryption
Ubizen
Sender Receiver
Untrustednetwork
Go#st$
EncryptionE(…)
Private Key Sender
DecryptionD(…)
Go#st$ Ubizen
Public Key Sender
authentication of sender
![Page 21: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/21.jpg)
ExampleExample
![Page 22: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/22.jpg)
ExampleExample
![Page 23: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/23.jpg)
ExampleExample
![Page 24: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/24.jpg)
Traces at the ISP
Traces on own computer
Against leaving tracesAgainst leaving traces
![Page 25: SECURITY Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality](https://reader036.vdocument.in/reader036/viewer/2022062314/56649e985503460f94b9b9e9/html5/thumbnails/25.jpg)
anti-virus programNorton, McAfee, eSafe, F-Secure, …
watch out for attachments.exe, .com, .pif, .vbs, .doc, .xls, …
www.bipt.be
Against virussesAgainst virusses