+ All Categories
Home > Documents > ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Date post: 24-Dec-2015
Category:
Upload: cornelia-andrews
View: 212 times
Download: 0 times
Share this document with a friend
Popular Tags:
25
S ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University
Transcript
Page 1: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

S

ENGR 1110Introduction to Engineering – Cyber Security

Allison Holt, Adam BrownAuburn University

Page 2: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

E-mail Security

How E-mail works

Receiving E-mail POP3 IMAP

Sending E-mail SMTP

Various malicious uses Social Engineering Spam

Page 3: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

How E-mail Works

Page 4: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

How E-mail Works

Page 5: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

E-mail Accounts

E-mail accounts are virtual addresses for sending and receiving e-mail

An e-mail account is representative of a user on a server

E-mail account names are only unique per domain [email protected] [email protected]

Account Aliasing [email protected] [email protected] [email protected]

Page 6: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Simple Mail Transfer Protocol (25)

SMTP is at the heart of the Internet’s electronic mail system.

Client-Server architecture

No intermediate SMTP servers normally

SMTP is a push protocol

7-bit ASCII encoding required

No authentication required

Page 7: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Mail Message Formats

E-mail was modeled after snail-mail

Peripheral information stored in a header

Headers contain very valuable information

Body of the message follows the header

From: [email protected]: [email protected]: Searching for the meaning of life.

Typical Message Header

Page 8: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

POP3 (110) vs. IMAP (143)

Mail Access Protocols

Post Office Protocol (POP3) Extremely simple protocol Client-Server architecture Three Phases

Internet Message Access Protocol (IMAP) Much more functionality than POP3 Remote management Isolated component retrieval

Page 9: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Receiving E-mail

Spam

Phishing

Fraud

HTML E-mail

Attachment Security

Forged Headers

Page 10: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Tell-Tale Signs of Illegitimate Email

Unexpected Origin

Too Good to be True

Domain Mismatch

Over-Complex Language

Illogical Urgency

Embedded Web Links Mismatch

Active Content

Page 11: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Fake Email

Page 12: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Fake Email Cont.

Page 13: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Forged Headers

Page 14: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Forged Headers

Page 15: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Forged Headers

Page 16: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Sending E-mail

Digital Certificates

Digital Signatures

PGP and GPG

MIME Your Manners

Page 17: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Digital Certificates

What is a digital certificate?

Certificate Authorities

How do they work?

Asymmetric Encryption

Page 18: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Digital Signatures

What is a Digital Signature?

Protects Non-repudiation Data Integrity

How does it accomplish this?

The message digest

Digest comparison

Page 19: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

PGP and GPG

Pretty Good Privacy

Asymmetric Encryption

Non-centralized web of trust

Key pairs

PGP Servers

Page 20: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

MIME Your Manners

Multi-purpose Internet Mail Extensions

Ability to attach files

No security benefit

S/MIME

Security Benefits and Issues

Page 21: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Connection Security (SSL/TLS)

Secure Sockets Layer / Transport Layer Security

Most widely deployed security protocol used today

Operates on top of TCP

Lengthy handshake process

Ensures secure communication

Page 22: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

You Know You Love It!

Page 23: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Where’s the Mail Room?

Mail Exchanger Records

nslookup Queries DNS for certain records for a given host

dig Domain Information Groper

host Normally used to convert host names to IP addresses

Page 24: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Find the Mail Server

google.com

yahoo.com

auburn.edu

aol.com

nslookup> set type=mx> domain-name.com

dig domain-name.com MX

host -t MX domain-name.com

Page 25: ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.

Sending Mail via Your Favorite

Sending and Receiving Mail from the terminal is awesome!

Why is he making us do this?

What all do we have to do?

Can we take a break if we do it?


Recommended