+ All Categories
Home > Documents > Introduction to Computer Security(2)

Introduction to Computer Security(2)

Date post: 04-Apr-2018
Category:
Upload: dr-pradeep-singh-shaktawat
View: 231 times
Download: 0 times
Share this document with a friend

of 15

Transcript
  • 7/29/2019 Introduction to Computer Security(2)

    1/15

    1

    Introduction toComputer Security

    Security Terminology, PasswordGuidelines, E-mail and Web

    Security

    Topics

    Common Security Terminology

    Password Security

    E-mail Security

    Web Security

    Peer-to-Peer Filesharing

    Terminology

    Password Cracking Password Cracker

    An application that tries to obtain a password byrepeatedly generating and comparing encrypted

    passwords or by authenticating multiple times toan authentication source.

    Common Methods of Password Cracking Brute Force = attempts all possible character

    combinations

    Dictionary = attempts pre-determined charactercombinations

  • 7/29/2019 Introduction to Computer Security(2)

    2/15

    2

    Terminology

    Password Cracking (contd) Passwords are usually stored in an encrypted

    form with a one way encryption algorithm

    If this data is compromised, password cracking can

    be moved to a standalone system for easiercontrol and speed of cracking

    Terminology

    Biometrics

    Science and technology of measuring and

    statistically analyzing biological data.

    When used in Information Technology itusually refers to the use of human traits for

    authentication

    This can include fingerprints, eye retinas and

    irises, voice patterns and a host of otherconsistent biological data

    Terminology

    Public Key Cryptography Two keys, a.k.a. certificates, are available

    for each resource, one public and one private

    As the names imply, the public key can be

    shared freely while the private key is keptsecret

    Items encrypted using the public key aredecrypted with the private key and converselyanything encrypted with the private key canbe decrypted with the public key

  • 7/29/2019 Introduction to Computer Security(2)

    3/15

    3

    Terminology

    Public Key Cryptography (contd) This method of encryption is used to ensure

    secure communication is only between avalid, known, sender and recipient

    Terminology

    SSL

    Secure Sockets Layer

    Uses Public Key Cryptography

    Negotiates a method to encrypt communicationbetween a client and server

    Allows other network protocols to connect over topof it, such as web browsing and e-mail protocols

    Transport Layer Security (TLS) is a variant of SSLused to negotiate encryption within the networkprotocol being used

    Terminology

    Man-in-the-Middle Attack

    A system between two hosts that either

    passively watches traffic to gain informationused to replay a session or actively

    interferes with the connection, potentiallyimitating the remote system

  • 7/29/2019 Introduction to Computer Security(2)

    4/15

    4

    Terminology

    Zombies Computer systems infected by a virus or

    trojan horse that allows the system to beremotely controlled for future exploits

    These systems may be used to send large

    amounts of spam email or take part inDistributed Denial of Service (DDoS) attacks

    Terminology

    Denial of Service Attack

    Sending large amounts of data and requests

    to a remote system in order to inundate theremote computer or network

    A Distributed DoS is a a coordinated effort by

    a number of systems to perform a DoS on asingle host

    Terminology

    Key Logging Software

    Software installed on a system to capture and

    log all keystrokes

    Security Exploit A software bug, or feature, that allows access

    to a computer system beyond what was

    originally intended by the operator

  • 7/29/2019 Introduction to Computer Security(2)

    5/15

    5

    Terminology

    Firewall Network device or software used to filter traffic

    to and from the connected resources

    Ranges from simple filters, blocking certain

    services and protocols, to more complex

    systems that plot traffic patterns

    Local operating system firewalls are referred

    to as personal firewall software

    Terminology

    Terminology

    Where to find technology definitions

    www.webopedia.com

    www.whatis.com

    www.techweb.com www.computeruser.com

    www.google.com

  • 7/29/2019 Introduction to Computer Security(2)

    6/15

    6

    Password Security

    According to CERT/CC (ComputerEmergency Response Team /Coordination Center) approximately 80%of all network security issues are causedby bad passwords.

    Computer to Computer authentication canuse large keysets and complex encryptionwhile Human to Computer authenticationrelies on much easier methods

    Password Security

    How to deal with password limitations

    Expiration

    Decreases chances of cracking passwords

    Complexity Requirements

    Decreases ability of automated attacks byincreasing possible character combinations

    Length Requirements

    The longer the password the more possiblecharacter combinations

    Password Security

    How to deal with password limitations

    Password Lockouts

    If a certain number of login attempts fails within agiven timeframe the account is locked for a preset

    time period Stops brute force authentication attempts

    Dictionary Checks

    Simple checks against common dictionaries areused to increase password complexity

  • 7/29/2019 Introduction to Computer Security(2)

    7/15

    7

    Password Security

    Are password rules too complex? Computer hardware speed and price are

    always dropping

    Post-it Notes

    Is your computer in a locked room?

    Who has physical access to your system?

    A majority of system attacks originate through the

    network.

    Password Security

    Suggestions for Complex Passwords

    Think of a phrase and use the first characters

    of each word, mix case and use numbers andspecial characters

    It is good to change your password every 6 months= Iig2cyPe6m

    UI Vandals are number one = UiVdlsR#1

    Password Security

    Future Password Requirements

    Decreasing password expiration times

    Certificate authentication

    Biometrics Two part identification, password and physical

    item

  • 7/29/2019 Introduction to Computer Security(2)

    8/15

    8

    Password Security

    Passwords are like Underwear! Dont leave yours lying around

    Dont share them with friends

    The longer the better (warmer?)

    Change yours often

    Be mysterious

    Password Security

    E-mail Security

    E-mail Security Common E-mail Protocols

    POP Post Office Protocol

    Older protocol for downloading messages from an INBOX

    IMAP Internet Message Access Protocol

    Full featured mail folder access SMTP Simple Mail Transfer Protocol

    Standard for sending and receiving e-mail between clients andservers and from server to server

    MAPI Mail Application Programming Interface A set of communication methods and standards used

    predominately for communication between Microsoft e-mailclients and servers

  • 7/29/2019 Introduction to Computer Security(2)

    9/15

    9

    E-mail Security

    Secure e-mail protocols at the University POPS POP over an SSL connection

    IMAPS IMAP over an SSL connection

    SMTP+TLS Negotiation of a TLS/SSL

    connection after connecting

    All popular e-mail clients allow the use ofthese protocols

    E-mail Security

    Digital Signatures and Encryption

    Uses Public Key Cryptography

    Allows secure signing of messages as wellas complete encryption

    E-mail Security

    Digital Signatures Creates a checksum of an email message

    and then encrypts the message informationusing the senders private key.

    The message is then sent, without encryption,along with the digital signature usuallycontaining the senders public key.

    The recipient can decode the messageinformation using the public key and confirmthe message was not altered in transit

  • 7/29/2019 Introduction to Computer Security(2)

    10/15

    10

    E-mail Security

    Digital Encryption Requires the sender to have the public key of

    the message recipient

    A message is encrypted completely by the

    sender using the recipients public key

    The recipient receives the message and uses

    their private key to decrypt the message

    E-mail Security

    E-mail Security

    What does this look like in e-mail clients? Outlook uses S/MIME natively for encrypting and

    decrypting messages. A signed message has an iconthat looks like a red ribbon. An encrypted messagehas a lock icon.

    Thunderbird also uses S/MIME and will display a keyfor an encrypted message and a pen for a signedmessage.

    Many other e-mail clients use similar methods todenote these types of messages. You can usuallyclick on the icons to display additional informationabout the encoding

  • 7/29/2019 Introduction to Computer Security(2)

    11/15

    11

    Web Security

    HyperText Transfer Protocol (HTTP) Modern web browsers are capable of using

    multiple protocols to download contentalthough most data transfers use HTTP

    Uniform Resource Locator (URL)

    web address

    protocol://server/resource

    http://www.uidaho.edu/registration/

    Web Security

    SSL

    Very important on insecure networks such as

    wireless

    How to verify SSL in a Browser

    https the web address begins with https meaningthe connection is using HTTP over SSL

    Look for a Lock Icon

    Internet Explorer may display a Security Alert thatyou are about to view pages over a secureconnection

    Web Security

    SSL (contd)

    Certificate Authorities

    A CA is an entity that issues certificates

    If you trust a CA you will trust the certificatesissued by that CA

    Web browsers come with a standard collection ofcommon certificate authorities including Verisign,Geotrust, Thawte and a number of others

    Be wary of untrusted certificates as it has the

    potential of being a man-in-the-middle attack

  • 7/29/2019 Introduction to Computer Security(2)

    12/15

    12

    Web Security

    SSL (contd)

    Web Security

    Spyware/Adware

    Spyware is software designed to intercept or takepartial control of a computer without the express

    consent of the operator

    Adware is similar to spyware except it is usedprimarily for advertising purposes and may have

    provided the user with information about its operation

    Regardless of the network level security, when

    browsing, spyware will have access to your data

    Web Security

    Web Browser Software Updates

    Update, update, update!

    Security exploits can use your web browser toaccess your system, install software, delete

    data, spread viruses

  • 7/29/2019 Introduction to Computer Security(2)

    13/15

    13

    Peer-to-Peer Filesharing

    Peer-to-Peer Filesharing, or P2P, is usingsoftware to facilitate the transfer of databetween two systems without the need fora central file server

    Common P2P apps are: Kazaa

    eDonkey

    Morpheus

    Gnutella Clients (Limewire, Bearshare)

    Peer-to-Peer Filesharing

    Issues to consider with P2P filesharing

    Copyright issues

    Spyware/Adware

    Zombies

    Remote Control

    Key logging

    Security exploits

    Sharing unexpected information

    Peer-to-Peer Filesharing

    Install AntiVirus Software

    Symantec Antivirus

    Check for operating system and software

    updates regularly Install Spyware Detection Software

    Microsoft Anti-Spyware Beta

    Spybot

    Adaware

  • 7/29/2019 Introduction to Computer Security(2)

    14/15

    14

    Presentation Schedule

    Tuesday

    November 29th

    2005

    CommonsCrest

    Wireless Network Security4:00pm

    Free Tools for Investigating PC Hacks3:00pm

    Securing Windows XP Desktop Systems2:00pm

    Introduction to Computer Security1:00pm

    Presentation Schedule

    Wednesday

    November 30th

    2005

    Commons

    Horizon

    Phishing, Dont Get Reeled In4:00pm

    ISP Liability for Copyright Violations by TheirCustomers

    3:00pm

    Using Helix for Recovering from PC Hacks2:00pm

    SEL Cybersecurity Solutions for the ElectricPower System

    1:00pm

    Tools for Finding and Removing Rootkits10:00am

    Update, Update, Update: Patching Windowsand Office

    9:00am

  • 7/29/2019 Introduction to Computer Security(2)

    15/15

    15

    Presentation Schedule

    Thursday

    December 1st

    2005

    CommonsHorizon

    Viruses, Worms and Trojans Oh My!10:00am

    Got Backup?9:00am


Recommended