security security: –security means, protection against, –some kind of threat (danger)

35
Security •Security: –Security means, •Protection against, –Some kind of Threat (Danger).

Upload: eunice-adams

Post on 17-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Security

•Security:–Security means,

•Protection against,–Some kind of Threat (Danger).

Security•Security:

–Scenario: Few years ago:•It was only about a Computer / PC security which was obtained by,

–Using physical controls over access to computers.•Tools to secure computers were:

–Alarmed Doors and Windows.–Security Guards.–Security Badges to admit people to sensitive areas.–Surveillance cameras.

•Mainly dealing with,–Physical Security.

–Scenario: Today:•It’s not about a Computer/PC security but,

–All about Computer Network Security.•Physical security is just one aspect of security and,•Along with Physical security, one more aspect of security needs to be considered:

–Logical Security

Network Security•Network Security:

–2 general types of security:•Physical Security:

–Protection against physical threats/dangers such as:»Unauthorized Person such as Thief etc.»Unauthorized Device such as CD, Pen Drive etc.

•Logical Security:–Protection against logical/software/electronic threats/dangers such as:

»Viruses, Worms, Spywares etc.

–Note:•Physical security is the first step to any kind of security because,

–If a PC is not ‘Physically’ secure, it can never be secured ‘Logically’.

Network Security

•Physical Security:–Measures to control Physical Access to Networks and improve Physical Security:

•Basic measures:–Locked Rooms, Security Alarms, CCTV Cameras, Security Badges for Authorized Persons.

•Advanced measures:–Writing pads that detect the form and pressure of a person writing a signature.–Biometric Devices such as:

»Fingerprint Scanner, Face Recognition, Eye/Retina Scanner, Palm Scanner.

Network Security

•Physical Security:–Apart from the normal physical security such as guards, surveillance systems,

•Many companies maintain backup copies of server contents at a remote location.•In case of a disaster,

–The operations can be switched over in a matter of seconds to the backup location.

Network Security

•Logical Security:–Need:

•Internet/Network was always designed to be,–Redundant because,

»Packets travel through different uncontrolled paths,

•And was never designed to be,–Secure.

–Hence ‘Logical Security’ is something which is,

•Not a inherent (inbuilt) part of Network.

Logical Security

•Measures for Logical Security:–IDs and Passwords:

•Provide authentication credentials to every user of the system in the form of:

–IDs and Passwords

•Even after successful login,–Allow access to only certain required applications by giving,

»Selected ‘Rights/Permissions’ to the users.

•Apply ‘Time-of-Day’ restrictions to users and applications so that,

–Available on weekdays but offline on weekends.

Logical Security•IDs and Passwords:

–Tips to Select & Protect IDs and Passwords:•Select a password which is,

–At least 8 characters long and,»Including all types of symbols such as lowercase, uppercase, numbers and special characters.

•Password should be selected in such a way so that it is,–Not easily guessable/identifiable such as,

»Name of spouse, children, phone number, as a password.

•Change the passwords,–Periodically or at regular intervals.

•Log (Store) and check all the unsuccessful login attempts and,

–Block the ID if unsuccessful login attempts increase beyond a certain threshold (level) because,–A pattern of attempted but unsuccessful logins might signal that an unauthorized user is trying to access the network.

Logical Security

Hello

Ifmmp

Hello

Ifmmp

IfmmpHelloHello

Encryption / Decryption

Sender Receiver

3rd person

Cryptography

Encryption (Example)

Transfer One Lakh Rupees To Account 756

V I O L I N

6 1 5 3 2 4

rrLuTo5snheAt nOke n fe sc a apou6Te R c7

Transfer One Lakh Rupees To Account 756

SENDER RECEIVER

Key:

Algorithm:

Encryption Decryption

VIOLIN

T r a n s f

e r O n e

L a k h

R u p e e s

T o A c

c o u n t

7 5 6

Logical Security•Measures for Logical Security:

–Encryption:•Coding / Locking of information by using:

–A mathematically based program (Algorithm) AND –A secret key,

»To produce a string of characters that is,»Unintelligible (Not understandable).

•Similar to,–Scrambling that is done on the premium cable channels.–If the cable user pays an extra fee,

»The cable company unscrambles the signal for that user by,»Sending over the KEY.

Logical Security

•Measures for Logical Security:–Cryptography:

•Science that studies encryption / decryption.•Comes from 2 Greek words:

–krypto: secret–grapho: writing

Cryptography

HelloHello

EncryptionSender Receiver

Ifmmp

Decryption

Plaintext

Ciphertext

Same Keys&

Private

Symmetric Key Encryption /

Challenge/Disadvantage:

Difficult to exchange ‘KEY’ itself securely at the first place.

Private Key Cryptography

Advantage:

Anyone can easily generate a Symmetric Key.2-way secure communication is possible using a single Symmetric Key.

CryptographyASymmetric Key Encryption / Public Key Cryptography

Sender2

ReceiverSender1

Sender3

Private Key

Public Key

Encryption Decryption

Different KeysPublic, Private

Hello

Ifmmp

Hello

Challenge/Disadvantage:

With 2 keys, only 1 way secure communication is possible and

It is not easy for everyone to generate those related keys.

Logical Security•Cryptography:

–Symmetric/Private Key Cryptography:•Uses a single key for,

–Encryption and Decryption, which must be kept,–Private (Secret) between the Sender and the Receiver.

•Challenge/Disadvantage:–Difficult to share the Private Key securely at the first place.

•Examples:–DES: Data Encryption Standard.

»56 bit encryption key.»Could be broken by a fast computer in 6 minutes.

–3DES: Triple DES.»Key Length: 112 bits.

–AES: Advanced Encryption Standard.»Key Length: 256 bytes = 2048 bits.»Takes 150 trillion years to break the key.

–Blowfish, IDEA (International Data Encryption Algorithm) etc.

Logical Security•Cryptography:

–Asymmetric/Public Key Cryptography:•Uses 2 different (mathematically related) keys for,

–Encryption and Decryption where,

»Encryption is done using Receiver’s Public Key and,

»Decryption is done using Receiver’s Private Key.

•Data encrypted using receiver’s Public Key can only be decrypted using,

–Receiver’s Private Key and cannot be decrypted using,

–The same Public Key.

•Examples:–RSA: Ron Rivest, Adi Shamir, Leonard Adleman.

»Key Length: 1024 bit

•For more detailed information, click here.

CryptographyPrivate

Public

Private

Public

How a 2-way secure communication happens?

Symmetric

Public Key Cryptography is usedto exchange the Symmetric Key securely.

All further communication happensusing the Symmetric Key.

Challenge / Disadvantage:

Encryption only ensuressecure communication.

Does not ensure theauthenticity / genuinenessof the receiver.

Using Symmetric Key EncryptionOR

Using Public Key Encryption

Difficult to ensure thatcommunication is happeningwith ‘Facebook’ and not‘Fakebook’.

CryptographyASymmetric Key Encryption / Public Key Cryptography

Student1

Student2

Student3

HOD

Faculty

Digital Signature

Encryption: Done using the private key.

Decryption: Done using the public key.

Keys

Private

Public

Private

Public

Cryptography

Certification Authorities(CAs)

From where did client get the public key of google server?

Private

PublicDigital Certificate

Private

Public

Question:

1. Clients sends a request.

2. Server sends a response in the form of its Digital Certificate issued by some Certification Authority (CA).Digital Certificate is encrypted by the Private Keyof CA.

3. Client decrypts the Digital Certificateusing the preloaded Public Key of CA andextracts information such as Name of Server,Address of Server, Public Key of Server, Expiry Date of Certificate etc.

4. Client generates a unique Symmetric Keyand sends it to the Server by encrypting itusing Public Key of Server.

5. Server decrypts the Symmetric Key using the Private Key of Server.

6. Then communication happens between Client and Server using the Symmetric Key.

SSL (HTTPS) Communication

Cryptography

SSL (HTTPS) Communication

SSL (HTTPS) Communication

Logical Security•Asymmetric/Public Key Cryptography:

–Digital Signature:•A method for,

–Showing the authenticity (genuineness) of a message or document.

•A valid digital signature gives a receiver a reason to believe that,

–Authentication:»Message was created by a known sender.

–Non-Repudiation:»Sender cannot deny having sent the message.

–Integrity:»Message was not altered in transit.

•Commonly used for,–Software distribution, Financial transactions etc.

Logical Security

•Digital Certificates / Digital ID:–A functionality that:

•Verifies that a sender (Web site) is who or what it claims to be.

–Serves the same function as a:»Driving license»Passport

–Although it does not say one thing:•About the usefulness or quality of the downloaded program.

–Only supplies a level of assurance that the software is genuine.

Logical Security•Digital Certificates:

–Issued to organizations or individuals by an agency called:

•Certification authority (CA).–Examples:

»Thawte»VeriSign»Entrust»Equifax Secure

–Entities must supply appropriate proof of identity when applying for digital certificates.

•Once the CA is satisfied, it issues the certificate.

Logical Security

•Digital Certificates:–Includes following elements:

•Certificate owner’s identifying information such as name, organization, address.•Certificate owner’s public key.•Dates between which the certificate is valid.•Serial number of the certificate.•Name of the certificate issuer (Certification Authority).

Logical SecurityNetwork of an Organization

Switch

Firewall

Question:

Will there be any control on the traffic either moving From the Organization to the Internet or vice versa?

NO.

Could this be dangerous/risky for the security of the organization?

Logical Security•Firewall:

–Entity which is placed at the,•Entry/Exit point of the networks to,

–Provide a defense between,»A network and the Internet and,

–Control the data traffic moving through it.

–Acts as a,•Filter which can distinguish/identify,

–Good from the Bad,–Allowed from Denied,

•According to the,–Rules/Configurations/Policies set in a Firewall.

–Similar to,•Scanning machine kept at the Malls / Airports.•Ozone layer of the atmosphere.

Firewall

•Characteristics of a Firewall:–1) All traffic from inside to outside and from outside to inside the network,

•Must pass through the firewall.

–2) A firewall should obstruct/block/stop,•All the unauthorized traffic.

–3) A firewall should not obstruct/block/stop,•Any legitimate users.

Firewall•Characteristics of a Firewall:

–4) The firewall itself should be immune to penetration.

•Firewalls should not have any unnecessary software installed.

–Should be used only as a firewall and not as a general-purpose computing machine.

»Only essential OS and firewall-specific protection software should remain on the computer.

–Having fewer software programs on the system means:

»Less chances of security breaches.

•Access to a firewall should only be restricted to:–Physical Access (Not remote access)

Firewall

•Types of Firewalls:–Classified into following categories:

•Application-level Firewall.•Packet-level Firewall.

Firewall

•Types of Firewalls:–Application-level Firewall:

•Filter traffic based on the application requested.–Allow/Deny access to specific applications such as,

»FTP, HTTP etc.

•Example of Application-level policy:–Allows Incoming FTP requests but Blocks Outgoing FTP requests.–Allows Incoming HTTP requests but Blocks Outgoing HTTP requests.

Firewall

•Types of Firewalls:–Packet-level Firewall:

•Works as IP level filter.•Examines/Checks the source and destination addresses and ports of incoming packets and,

–Allows or denies entrance to the packets based on a set of rules.

•Example:–Allow IP address 192.168.1.1 to go through but disallow IP address 192.168.10.10.

Logical SecurityFirewall

Home User

Software Firewall:

Windows Firewall, Norton Internet Security etc.

Can a home user afford a dedicated machine for a Firewall? NO.

Network Security

•References:–http://content.hccfl.edu/pollock/AUnixSec/P

ublicKeyDemo.htm–http://www.youtube.com/watch?v=Ao5pMFe9fHU