Professional Documents
Culture Documents
561
Information Technology Essentials
Sessions 9 & 10
Computer Security
Acknowledgments:
• Securing communications
– Three steps:
» Secrecy = prevent understanding of intercepted communication
» Authentication = establish identity of sender
» Integrity = establish that communication has not been tampered
with
Amazon.com
Bob
Communication security issues
• Encryption - How do I ensure the secrecy of my transactions?
Consumer Merca
hnt
Bob Alice
I
mpost
or
Darth
Traditional cryptography
KEY
HAL
Plausible
Deniability
• Revenue from
– products (PKI servers for intranets and extranets)
– services (certificate services for individuals and organizations)
Applications: eCommerce Security
• Requirements
– sender and receiver must authenticate each other before sending
any “real” data
– all “real” data must flow encrypted through the network
– no intercepted communication can be used to an intruder’s
advantage
SSL / TLS
Customer Merchant
Random session key generated by customer
and encrypted with merchant’s public key
• Several subcategories
• Password leaks
– Commonly used password
– Explicitly told
» Voluntarily
» Trojan horse
Fingerprint Reader
Match
Fingerprint Template
Face Pattern
Match Match
Voiceprint
Microphone
Camera "Liveness" test
• Disguise themselves
– How?
• Common sources:
– “Free” software you download and install
– Some web pages
Denial of service attacks
• Firewalls
OUTSIDE INSIDE
CONNECTION CONNECTION
OUTSIDE INSIDE
FTP
PROXY
CLIENT-PROXY PROXY-SERVER
CONNECTION CONNECTION
TELNET
PROXY
OUTSIDE CLIENT INSIDE SERVER
STRONGER APPLICATION
LEVEL GATEWAYS
HYBRID
SECURITY
STATEFUL
INSPECTION
CIRCUIT-LEVEL
GATEWAYS PACKET
FILTERS
WEAKER
SLOWER FASTER
SPEED
s OS and
web server.
Despite all that…
security breaches are on the rise
8,000
7,000
NUMBER OF INCIDENTS
6,000
5,000
4,000
3,000
2,000
1,000
1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999
YEARS
• www.microsoft.com/security
– Advisories
– Patches
– IIS Security Checklist
• www.securityfocus.com
– Bugtraq Mailing List
– Tools, Books, Links
– Vulnerabilities and Fixes