Information System Security introduction

6,813 views

Published on

Introduction

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
6,813
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
258
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • This graphic informs the fundamental approach of the chapter and can be used to illustrate the intersection of information states (x-axis), key objectives of C.I.A. (y-axis), and the three primary means to implement (policy, education, and technology). CNSS stands for Committee of National Security Systems.
  • Spostare in altra sezione
  • 11/22/11 Introduction
  • 11/22/11 Introduction
  • Information System Security introduction

    1. 1. UCCN 1213 Information Security: An Introduction October 2011
    2. 2. Definition <ul><li>Information security is a “well-informed sense of assurance that the information risks and controls are in balance.” — Jim Anderson, Inovant (2002) </li></ul><ul><li>Does not guarantee the safety of an organization, information, or computer systems </li></ul><ul><ul><li>Involves in examining threats and vulnerabilities of an organization and managing them appropriately </li></ul></ul><ul><ul><li>Take appropriate preventative steps to guard information and capabilities against these threats </li></ul></ul><ul><li>Security professionals must review the origins of this field to understand its impact on our understanding of information security today </li></ul>
    3. 3. History <ul><li>Computer security began immediately after the first mainframes were developed </li></ul><ul><ul><li>Groups developing code-breaking computations during World War II created the first modern computers </li></ul></ul><ul><ul><li>Multiple levels of security were implemented </li></ul></ul><ul><li>Physical controls to limit access to sensitive military locations to authorized personnel </li></ul><ul><li>Rudimentary in defending against physical theft, espionage, and sabotage </li></ul>
    4. 4. 1960s to 1980s <ul><li>1960s – US Department of Defense’s Advanced Research Project Agency (ARPA) began to examine feasibility of redundant networked communications </li></ul><ul><li>Larry Roberts, who known as the founder of internet, developed ARPANET from its inception </li></ul><ul><li>Early 1970s – ARPANET grew in popularity as did its potential for misuse </li></ul><ul><li>Late 1970s – microprocessor expanded computing capabilities and security threats </li></ul>
    5. 5. 1960s to 1980s <ul><li>Information security began with “Rand Report R-609: Security Control for Computer Systems” (paper that started the study of computer security) ‏ </li></ul><ul><li>Scope of computer security grew from physical security to include: </li></ul><ul><ul><li>Safety of data </li></ul></ul><ul><ul><li>Limiting unauthorized access to data </li></ul></ul><ul><ul><li>Involvement of personnel from multiple levels of an organization </li></ul></ul><ul><li>At this stage, the concept of computer security evolved into the more sophisticated system we call information security </li></ul>
    6. 6. Key Dates for Seminal Works in Early Computer Security
    7. 7. 2000 to Present <ul><li>The Internet brings millions of computer networks into communication with each other—many of them unsecured </li></ul><ul><li>Ability to secure a computer’s data influenced by the security of every computer to which it is connected </li></ul><ul><li>Growing threat of cyber attacks has increased the need for improved security </li></ul>
    8. 8. What is Security <ul><li>“ The quality or state of being secure—to be free from danger” </li></ul><ul><li>A successful organization should have multiple layers of security in place: </li></ul><ul><ul><li>Physical security - To protect the physical items, objects, or areas of an organization from unauthorized access and misuse. </li></ul></ul><ul><ul><li>Personal security - To protect the individual or group of individuals who are authorized to access the organization and its operations. </li></ul></ul><ul><ul><li>Operations security - To protect the details of a particular operation or series of activities. </li></ul></ul>
    9. 9. What is Security <ul><li>Layers of security continued: </li></ul><ul><ul><li>Communications security - To protect an organization’s communications media, technology, and content. </li></ul></ul><ul><ul><li>Network security - To protect networking components, connections, and contents. </li></ul></ul><ul><ul><li>Information security- To protect the confidentiality, integrity and availability of information assets, whether in storage, processing or transmission. It is achieved via the application of policy, education, training and awareness, and technology. </li></ul></ul>
    10. 10. Components of Information Security
    11. 11. What is Security <ul><li>The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information </li></ul><ul><li>Necessary tools: policy, awareness, training, education, technology </li></ul><ul><li>C.I.A. triangle </li></ul><ul><ul><li>Was standard based on confidentiality, integrity and availability </li></ul></ul><ul><ul><li>Now expanded into list of critical characteristics of information </li></ul></ul>
    12. 12. Security Goal Integrity Confidentiality Availability
    13. 13. Critical Characteristics of Information <ul><li>The value of information comes from the characteristics it possesses: </li></ul><ul><ul><li>Availability – Enables users who need to access information to do so without interference or obstruction and in the required format. The information is said to be available to an authorized user when and where needed and in the correct format. </li></ul></ul><ul><ul><li>Accuracy – Free from mistake or error and having the value that the end user expects. If information contains a value different from the user’s expectations due to the intentional or unintentional modification of its content, it is no longer accurate. </li></ul></ul><ul><ul><li>Authenticity –The quality or state of being genuine or original, rather than a reproduction or fabrication. Information is authentic when it is the information that was originally created, placed, stored, or transferred. </li></ul></ul>
    14. 14. Critical Characteristics of Information <ul><li>Characteristics continued: </li></ul><ul><ul><li>Confidentiality – The quality or state of preventing disclosure or exposure to unauthorized individuals or systems. </li></ul></ul><ul><ul><li>Integrity – The quality or state of being accurate, complete, and authorised. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state. </li></ul></ul><ul><ul><li>Utility – The quality or state of having value for some purpose or end. Information has value when it serves a particular purpose. This means that if information is available, but not in a format meaningful to the end user, it is not useful. </li></ul></ul><ul><ul><li>Possession – The quality or state of having ownership or control of some object or item. Information is said to be in possession if one obtains it, independent of format or other characteristic. While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality. </li></ul></ul>
    15. 15. CNSS Security Model The McCumber Cube
    16. 16. Cryptography <ul><li>Can protect confidentiality and integrity, but not availability </li></ul><ul><li>Confidentiality - Hide the secret data from unauthorised personnel </li></ul><ul><li>Integrity – Make sure the data is not tampered during transmission </li></ul><ul><li>Availability – cannot be control by cryptosystem, e.g. unplug network cable </li></ul>
    17. 17. Cryptographic Concepts <ul><li>Encryption : a means to allow two parties, customarily called Alice and Bob, to establish confidential communication over an insecure channel that is subject to eavesdropping. </li></ul>Alice Bob Eve
    18. 18. Encryption and Decryption <ul><li>The message M is called the plaintext. </li></ul><ul><li>Alice will convert plaintext M to an encrypted form using an encryption algorithm E that outputs a ciphertext C for M. </li></ul>encrypt decrypt ciphertext plaintext shared secret key shared secret key Communication channel Sender Recipient Attacker (eavesdropping) plaintext
    19. 19. Encryption and Decryption <ul><li>As equations: </li></ul><ul><li>C = E(M) </li></ul><ul><li>M = D(C) </li></ul><ul><li>The encryption and decryption algorithms are chosen so that it is infeasible for someone other than Alice and Bob to determine plaintext M from ciphertext C. Thus, ciphertext C can be transmitted over an insecure channel that can be eavesdropped by an adversary. </li></ul>
    20. 20. Caesar Cipher <ul><li>Replace each letter with the one “three over” in the alphabet. </li></ul><ul><li>Can be represented by using modular arithmathic: </li></ul><ul><ul><li>E n (x) = (x + n) mod 26 </li></ul></ul><ul><ul><li>D n (x) = (x – n) mod 26 </li></ul></ul>Public domain image from http://commons.wikimedia.org/wiki/File:Caesar3.svg
    21. 21. Symmetric Cryptosystems <ul><li>Alice and Bob share a secret key, which is used for both encryption and decryption. </li></ul>encrypt decrypt ciphertext plaintext shared secret key shared secret key Communication channel Sender Recipient Attacker (eavesdropping) plaintext
    22. 22. Symmetric Key Distribution <ul><li>Requires each pair of communicating parties to share a (separate) secret key. </li></ul>n  n  1  2 keys shared secret shared secret shared secret shared secret shared secret shared secret
    23. 23. Public-Key Cryptography
    24. 24. Public-Key Cryptography <ul><li>Separate keys are used for encryption and decryption. </li></ul>encrypt decrypt ciphertext plaintext public key private key Communication channel Sender Recipient Attacker (eavesdropping) plaintext plaintext
    25. 25. Public Key Distribution <ul><li>Only one key is needed for each recipient </li></ul>n key pairs private private private private public public public public
    26. 26. Digital Signatures
    27. 27. Cryptographic Hash Functions <ul><li>A checksum on a message, M, that is: </li></ul><ul><li>One-way : it should be easy to compute Y=H(M), but hard to find M given only Y </li></ul><ul><li>Collision-resistant: it should be hard to find two messages, M and N, such that H(M)=H(N). </li></ul><ul><li>Examples: SHA-1, SHA-256, MD5. </li></ul>
    28. 28. Message Authentication Codes <ul><li>Allows for Alice and Bob to have data integrity, if they share a secret key. </li></ul><ul><li>Given a message M, Alice computes H(K||M) and sends M and this hash to Bob. </li></ul>(attack detected) =? MAC h shared secret key Communication channel Sender Recipient Attacker (modifying) MAC 6B34339 4C66809 4C66809 message M’ h shared secret key 87F9024 received MAC computed MAC message M
    29. 29. Digital Certificates <ul><li>certificate authority (CA) digitally signs a binding between an identity and the public key for that identity. </li></ul>
    30. 30. Access Control Models <ul><li>Users and groups </li></ul><ul><li>Authentication </li></ul><ul><li>Passwords </li></ul><ul><li>File protection </li></ul><ul><li>Access control lists </li></ul><ul><li>Which users can read/write which files? </li></ul><ul><li>Are my files really safe? </li></ul><ul><li>What does it mean to be root? </li></ul><ul><li>What do we really want to control? </li></ul>
    31. 31. Access Control Matrices <ul><li>A table that defines permissions . </li></ul><ul><ul><li>Each row of this table is associated with a subject, which is a user, group, or system that can perform actions. </li></ul></ul><ul><ul><li>Each column of the table is associated with an object, which is a file, directory, document, device, resource, or any other entity for which we want to define access rights. </li></ul></ul><ul><ul><li>Each cell of the table is then filled with the access rights for the associated combination of subject and object. </li></ul></ul><ul><ul><li>Access rights can include actions such as reading, writing, copying, executing, deleting, and annotating. </li></ul></ul><ul><ul><li>An empty cell means that no access rights are granted. </li></ul></ul>
    32. 32. Example Access Control Matrix
    33. 33. Access Control Lists <ul><li>It defines, for each object, o, a list, L, called o’s access control list, which enumerates all the subjects that have access rights for o and, for each such subject, s, gives the access rights that s has for object o. </li></ul>/etc/passwd /usr/bin/ /u/roberto/ /admin/ root: r,w,x backup: r,x root: r,w,x roberto: r,w,x backup: r,x root: r,w,x mike: r,x roberto: r,x backup: r,x root: r,w mike: r roberto: r backup: r
    34. 34. Capabilities <ul><li>Takes a subject-centered approach to access control. It defines, for each subject s, the list of the objects for which s has nonempty access control rights, together with the specific rights for each such object. </li></ul>/etc/passwd: r,w,x; /usr/bin: r,w,x; /u/roberto: r,w,x; /admin/: r,w,x root /usr/passwd: r; /usr/bin: r; /u/roberto: r,w,x roberto /usr/passwd: r; /usr/bin: r,x mike backup /etc/passwd: r,x; /usr/bin: r,x; /u/roberto: r,x; /admin/: r,x
    35. 35. Role-based Access Control <ul><li>Define roles and then specify access control rights for these roles, rather than for subjects directly. </li></ul>Department Member Administrative Personnel Accountant Secretary Administrative Manager Faculty Lab Technician Lab Manager Student Undergraduate Student Graduate Student Department Chair Technical Personnel Backup Agent System Administrator Undergraduate TA Graduate TA
    36. 36. Passwords <ul><li>A short sequence of characters used as a means to authenticate someone via a secret that they know. </li></ul><ul><li>Userid: _________________ </li></ul><ul><li>Password: ______________ </li></ul>
    37. 37. How a password is stored? Password file User Butch:ASDSA 21QW3R50E ERWWER323 … … hash function Dog124
    38. 38. Strong Passwords <ul><li>What is a strong password </li></ul><ul><ul><li>UPPER/lower case characters </li></ul></ul><ul><ul><li>Special characters </li></ul></ul><ul><ul><li>Numbers </li></ul></ul><ul><li>When is a password strong? </li></ul><ul><ul><li>Seattle1 </li></ul></ul><ul><ul><li>M1ke03 </li></ul></ul><ul><ul><li>P@$$w0rd </li></ul></ul><ul><ul><li>TD2k5secV </li></ul></ul>
    39. 39. Password Complexity <ul><li>A fixed 6 symbols password: </li></ul><ul><ul><li>Numbers 10 6 = 1,000,000 </li></ul></ul><ul><ul><li>UPPER or lower case characters 26 6 = 308,915,776 </li></ul></ul><ul><ul><li>UPPER and lower case characters 52 6 = 19,770,609,664 </li></ul></ul><ul><ul><li>32 special characters (&, %, $, £, “, |, ^, §, etc.) 32 6 = 1,073,741,824 </li></ul></ul><ul><li>94 practical symbols available </li></ul><ul><ul><li>94 6 = 689,869,781,056 </li></ul></ul><ul><li>ASCII standard 7 bit 2 7 =128 symbols </li></ul><ul><ul><li>128 6 = 4,398,046,511,104 </li></ul></ul>
    40. 40. Password Length <ul><li>26 UPPER/lower case characters = 52 characters </li></ul><ul><li>10 numbers </li></ul><ul><li>32 special characters </li></ul><ul><li>=> 94 characters available </li></ul><ul><li>5 characters: 94 5 = 7,339,040,224 </li></ul><ul><li>6 characters: 94 6 = 689,869,781,056 </li></ul><ul><li>7 characters: 94 7 = 64,847,759,419,264 </li></ul><ul><li>8 characters: 94 8 = 6,095,689,385,410,816 </li></ul><ul><li>9 characters: 94 9 = 572,994,802,228,616,704 </li></ul>
    41. 41. Password Validity: Brute Force Test <ul><li>Password does not change for 60 days </li></ul><ul><li>how many passwords should I try for each second? </li></ul><ul><ul><li>5 characters : 1,415 PW /sec </li></ul></ul><ul><ul><li>6 characters : 133,076 PW /sec </li></ul></ul><ul><ul><li>7 characters : 12,509,214 PW /sec </li></ul></ul><ul><ul><li>8 characters : 1,175,866,008 PW /sec </li></ul></ul><ul><ul><li>9 characters : 110,531,404,750 PW /sec </li></ul></ul>
    42. 42. Secure Passwords <ul><li>A strong password includes characters from at least three of the following groups: </li></ul><ul><li>Use pass phrases eg. &quot;I re@lly want to buy 11 Dogs!&quot; </li></ul>
    43. 43. Social Engineering <ul><li>Pretexting : creating a story that convinces an administrator or operator into revealing secret information. </li></ul><ul><li>Baiting: offering a kind of “gift” to get a user or agent to perform an insecure action. </li></ul><ul><li>Quid pro quo ( from the Latin meaning &quot;what for what&quot; ) : offering an action or service and then expecting something in return. </li></ul>
    44. 44. Direct Attacks on Computational Devices
    45. 45. Environmental Attacks <ul><li>Electricity. Computing equipment requires electricity to function; hence, it is vital that such equipment has a steady uninterrupted power supply. </li></ul><ul><li>Temperature. Computer chips have a natural operating temperature and exceeding that temperature significantly can severely damage them. </li></ul><ul><li>Limited conductance. Because computing equipment is electronic, it relies on there being limited conductance in its environment. If random parts of a computer are connected electronically, then that equipment could be damaged by a short circuit (e.g., in a flood). </li></ul>
    46. 46. Eavesdropping <ul><li>Eavesdropping is the process of secretly listening in on another person’s conversation. </li></ul><ul><li>Protection of sensitive information must go beyond computer security and extend to the environment in which this information is entered and read. </li></ul><ul><li>Simple eavesdropping techniques include </li></ul><ul><ul><li>Using social engineering to allow the attacker to read information over the victim’s shoulder </li></ul></ul><ul><ul><li>Installing small cameras to capture the information as it is being read </li></ul></ul><ul><ul><li>Using binoculars to view a victim’s monitor through an open window. </li></ul></ul><ul><li>These direct observation techniques are commonly referred to as shoulder surfing. </li></ul>
    47. 47. Wiretapping <ul><li>Many communication networks employ the use of inexpensive coaxial copper cables, where information is transmitted via electrical impulses that travel through the cables. </li></ul><ul><li>Relatively inexpensive means exist that measure these impulses and can reconstruct the data being transferred through a tapped cable, allowing an attacker to eavesdrop on network traffic. </li></ul><ul><li>These wiretapping attacks are passive, in that there is no alteration of the signal being transferred, making them extremely difficult to detect. </li></ul>
    48. 48. Signal Emanations <ul><li>Computer screens emit radio frequencies that can be used to detect what is being displayed. </li></ul><ul><li>Visible light reflections can also be used to reconstruct a display from its reflection on a wall, coffee mug, or eyeglasses. </li></ul><ul><li>Both of these require the attacker to have a receiver close enough to detect the signal. </li></ul>
    49. 49. Acoustic Emissions <ul><li>Dmitri Asonov and Rakesh Agrawal published a paper in 2004 detailing how an attacker could use an audio recording of a user typing on a keyboard to reconstruct what was typed. </li></ul><ul><ul><li>Each keystroke has minute differences in the sound it produces, and certain keys are known to be pressed more often than others. </li></ul></ul><ul><ul><li>After training an advanced neural network to recognize individual keys, their software recognized an average 79% of all keystrokes. </li></ul></ul>microphone to capture keystroke sounds sound recording device
    50. 50. Hardware Keyloggers <ul><li>A keylogger is any means of recording a victim’s keystrokes, typically used to eavesdrop passwords or other sensitive information. </li></ul><ul><li>Hardware keyloggers are typically small connectors that are installed between a keyboard and a computer. </li></ul><ul><li>For example, a USB keylogger is a device containing male and female USB connectors, which allow it to be placed between a USB port on a computer and a USB cable coming from a keyboard. </li></ul>USB Keylogger
    51. 51. TEMPEST <ul><li>TEMPEST is a U.S. government code word for a set of standards for limiting information-carrying electromagnetic emanations from computing equipment. </li></ul><ul><li>TEMPEST establishes three zones or levels of protection: </li></ul><ul><ul><li>An attacker has almost direct contact with the equipment, such as in an adjacent room or within a meter of the device in the same room. </li></ul></ul><ul><ul><li>An attacker can get no closer than 20 meters to the equipment or is blocked by a building to have an equivalent amount of attenuation. </li></ul></ul><ul><ul><li>An attacker can get no closer than 100 meters to the equipment or is blocked by a building to have an equivalent amount of attenuation. </li></ul></ul>
    52. 52. Emanation Blockage <ul><li>To block visible light emanations, we can enclose sensitive equipment in a windowless room. </li></ul><ul><li>To block acoustic emanations, we can enclose sensitive equipment in a room lined with sound-dampening materials. </li></ul><ul><li>To block electromagnetic emanations in the electrical cords and cables, we can make sure every such cord and cable is well grounded and insulated. </li></ul>
    53. 53. Faraday Cages <ul><li>To block electromagnetic emanations in the air, we can surround sensitive equipment with metallic conductive shielding or a mesh of such material, where the holes in the mesh are smaller than the wavelengths of the electromagnetic radiation we wish to block. </li></ul><ul><li>Such an enclosure is known as a Faraday cage. </li></ul>
    54. 54. Computer Forensics <ul><li>Computer forensics is the practice of obtaining information contained on an electronic medium, such as computer systems, hard drives, and optical disks, usually for gathering evidence to be used in legal proceedings. </li></ul><ul><li>Unfortunately, many of the advanced techniques used by forensic investigators for legal proceedings can also be employed by attackers to uncover sensitive information. </li></ul>
    55. 55. Computer Forensics <ul><li>Forensic analysis typically involves the physical inspection of the components of a computer, sometimes at the microscopic level, but it can also involve electronic inspection of a computer’s parts as well. </li></ul>
    56. 56. ATMs <ul><li>An automatic teller machine (ATM) is any device that allows customers of financial institutions to complete withdrawal and deposit transactions without human assistance. </li></ul><ul><li>Typically, customers insert a magnetic stripe credit or debit card, enter a PIN, and then deposit or withdraw cash from their account. </li></ul><ul><li>The ATM has an internal cryptographic processor that encrypts the entered PIN and compares it to an encrypted PIN stored on the card (only for older systems that are not connected to a network) or in a remote database. </li></ul>ATM
    57. 57. ATMs <ul><li>To ensure the confidentiality of customer transactions, each ATM has a cryptographic processor that encrypts all incoming and outgoing information, starting the moment a customer enters their PIN. </li></ul><ul><li>The current industry standard for ATM transactions is the Triple DES (3DES) cryptosystem, a legacy symmetric cryptosystem with up to 112 bits of security. </li></ul><ul><li>The 3DES secret keys installed on an ATM are either loaded on-site by technicians or downloaded remotely from the ATM vendor. </li></ul>ATM 3DES Encryption Bank
    58. 58. Attacks on ATMs <ul><li>Lebanese loop: A perpetrator inserts this sleeve into the card slot of an ATM. When a customer attempts to make a transaction and inserts their credit card, it sits in the sleeve, out of sight from the customer, who thinks that the machine has malfunctioned. After the customer leaves, the perpetrator can then remove the sleeve with the victim’s card. </li></ul><ul><li>Skimmer: a device that reads and stores magnetic stripe information when a card is swiped. An attacker can install a skimmer over the card slot of an ATM and store customers’ credit information without their knowledge. Later, this information can be retrieved and used to make duplicates of the original cards. </li></ul><ul><li>Fake ATMs: capture both credit/debit cards and PINs at the same time. </li></ul>
    59. 59. Authentication Technologies
    60. 60. Authentication <ul><li>The determination of identity , usually based on a combination of </li></ul><ul><ul><li>something the person has (like a smart card or a radio key fob storing secret keys), </li></ul></ul><ul><ul><li>something the person knows (like a password), </li></ul></ul><ul><ul><li>something the person is (like a human with a fingerprint). </li></ul></ul>Something you are Something you know Something you have radio token with secret keys password=ucIb()w1V mother=Jones pet=Caesar human with fingers and eyes
    61. 61. Barcodes <ul><li>Developed in the 20th century to improve efficiency in grocery checkout. </li></ul><ul><li>First-generation barcodes represent data as a series of variable-width, vertical lines of ink, which is essentially a one-dimensional encoding scheme. </li></ul><ul><li>Some more recent barcodes are rendered as two-dimensional patterns using dots, squares, or other symbols that can be read by specialized optical scanners, which translate a specific type of barcode into its encoded information. </li></ul>
    62. 62. Authentication via Barcodes <ul><li>Since 2005, the airline industry has been incorporating two-dimensional barcodes into boarding passes, which are created at flight check-in and scanned before boarding. </li></ul><ul><li>In most cases, the barcode is encoded with an internal unique identifier that allows airport security to look up the corresponding passenger’s record with that airline. </li></ul><ul><li>Staff then verifies that the boarding pass was in fact purchased in that person’s name (using the airline’s database), and that the person can provide photo identification. </li></ul><ul><li>In most other applications, however, barcodes provide convenience but not security. Since barcodes are simply images, they are extremely easy to duplicate. </li></ul>Public domain image from http://commons.wikimedia.org/wiki/File:Bpass.jpg Two-dimensional barcode
    63. 63. Magnetic Stripe Cards <ul><li>Plastic card with a magnetic stripe containing personalized information about the card holder. </li></ul><ul><li>The first track of a magnetic stripe card contains the cardholder’s full name in addition to an account number, format information, and other data. </li></ul><ul><li>The second track may contain the account number, expiration date, information about the issuing bank, data specifying the exact format of the track, and other discretionary data. </li></ul>Public domain image by Alexander Jones from http://commons.wikimedia.org/wiki/File:CCardBack.svg
    64. 64. Magnetic Stripe Card Security <ul><li>One vulnerability of the magnetic stripe medium is that it is easy to read and reproduce. </li></ul><ul><li>Magnetic stripe readers can be purchased at relatively low cost, allowing attackers to read information off cards. </li></ul><ul><li>When coupled with a magnetic stripe writer, which is only a little more expensive, an attacker can easily clone existing cards. </li></ul><ul><li>So, many uses require card holders to enter a PIN to use their cards (e.g., as in ATM and debit cards in the U.S.). </li></ul>Public domain image by Alexander Jones from http://commons.wikimedia.org/wiki/File:CCardBack.svg
    65. 65. Smart Cards <ul><li>Smart cards incorporate an integrated circuit, optionally with an on-board microprocessor, which microprocessor features reading and writing capabilities, allowing the data on the card to be both accessed and altered. </li></ul><ul><li>Smart card technology can provide secure authentication mechanisms that protect the information of the owner and are extremely difficult to duplicate. </li></ul>Public domain image from http://en.wikipedia.org/wiki/File:Carte_vitale_anonyme.jpg Circuit interface
    66. 66. Smart Card Authentication <ul><li>They are commonly employed by large companies and organizations as a means of strong authentication using cryptography. </li></ul><ul><li>Smart cards may also be used as a sort of “electronic wallet,” containing funds that can be used for a variety of services, including parking fees, public transport, and other small retail transactions. </li></ul>
    67. 67. SIM Cards <ul><li>Many mobile phones use a special smart card called a subscriber identity module card (SIM card). </li></ul><ul><li>A SIM card is issued by a network provider. It maintains personal and contact information for a user and allows the user to authenticate to the cellular network of the provider. </li></ul>
    68. 68. SIM Card Security <ul><li>SIM cards contain several pieces of information that are used to identify the owner and authenticate to the appropriate cell network. </li></ul><ul><li>Each SIM card corresponds to a record in the database of subscribers maintained by the network provider. </li></ul><ul><li>A SIM card features an integrated circuit card ID (ICCID), </li></ul><ul><li>which is a unique 18-digit number used for hardware identification. </li></ul><ul><li>Next, a SIM card contains a unique international mobile subscriber identity ( IMSI), which identifies the owner’s country, network, and personal identity. </li></ul><ul><li>SIM cards also contain a 128-bit secret key. This key is used for authenticating a phone to a mobile network. </li></ul><ul><li>As an additional security mechanism, many SIM cards require a PIN before allowing any access to information on the card. </li></ul>
    69. 69. GSM Challenge-Response Protocol <ul><li>When a cellphone wishes to join a cellular network it connects to a local base station owned by the network provider and transmits its International Mobile Subscriber Identity (IMSI). </li></ul><ul><li>If the IMSI matches a subscriber’s record in the network provider’s database, the base station transmits a 128-bit random number to the cellphone. </li></ul><ul><li>This random number is then encoded by the cellphone with the subscriber’s secret key stored in the SIM card using a proprietary encryption algorithm known as A3, resulting in a ciphertext that is sent back to the base station . </li></ul><ul><li>The base station then performs the same computation, using its stored value for the subscriber’s secret key. If the two ciphertexts match, the cellphone is authenticated to the network and is allowed to make and receive calls. </li></ul>IMSI = (this phone’s ID) R = a 128-bit random number (the challenge) E K (R) = the 128-bit random number encrypted using the subscriber’s secret key K (the response)
    70. 70. RFIDs <ul><li>Radio frequency identification, or RFID, is a rapidly emerging technology that relies on small transponders to transmit identification information via radio waves. </li></ul><ul><li>RFID chips feature an integrated circuit for storing information, and a coiled antenna to transmit and receive a radio signal. </li></ul>
    71. 71. RFID Technology <ul><li>RFID tags must be used in conjunction with a separate reader or writer. </li></ul><ul><li>While some RFID tags require a battery, many are passive and do not. </li></ul><ul><li>The effective range of RFID varies from a few centimeters to several meters, but in most cases, since data is transmitted via radio waves, it is not necessary for a tag to be in the line of sight of the reader. </li></ul>
    72. 72. RFID Technology <ul><li>This technology is being deployed in a wide variety of applications. </li></ul><ul><li>Many vendors are incorporating RFID for consumer-product tracking. </li></ul><ul><li>Car key fobs. </li></ul><ul><li>Electronic toll transponders. </li></ul>
    73. 73. Passports <ul><li>Modern passports of several countries, including the United States, feature an embedded RFID chip that contains information about the owner, including a digital facial photograph that allows airport officials to compare the passport’s owner to the person who is carrying the passport. </li></ul>e-Passport symbol RFID chip and antenna is embedded in the cover
    74. 74. Passport Security <ul><li>In order to protect the sensitive information on a passport, all RFID communications are encrypted with a secret key. </li></ul><ul><li>In many instances, however, this secret key is merely the passport number, the holder’s date of birth, and the expiration date, in that order. </li></ul><ul><ul><li>All of this information is printed on the card, either in text or using a barcode or other optical storage method. </li></ul></ul><ul><ul><li>While this secret key is intended to be only accessible to those with physical access to the passport, an attacker with information on the owner, including when their passport was issued, may be able to easily reconstruct this key, especially since passport numbers are typically issued sequentially. </li></ul></ul>
    75. 75. Biometrics <ul><li>Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits. </li></ul><ul><li>Generally, biometric systems incorporate some sort of sensor or scanner to read in biometric information and then compare this information to stored templates of accepted users before granting access. </li></ul>Image from http://commons.wikimedia.org/wiki/File:Fingerprint_scanner_in_Tel_Aviv.jpg used with permission under the Creative Commons Attribution 3.0 Unported license
    76. 76. Requirements for Biometric Identification <ul><li>Universality. Almost every person should have this characteristic. </li></ul><ul><li>Distinctiveness. Each person should have noticeable differences in the characteristic. </li></ul><ul><li>Permanence. The characteristic should not change significantly over time. </li></ul><ul><li>Collectability. The characteristic should have the ability to be effectively determined and quantified. </li></ul>
    77. 77. Biometric Identification Feature vector Reference vector Comparison algorithm matches doesn’t match Biometric Reader
    78. 78. Candidates for Biometric IDs <ul><li>Fingerprints </li></ul><ul><li>Retinal/iris scans </li></ul><ul><li>DNA </li></ul><ul><li>“ Blue-ink” signature </li></ul><ul><li>Voice recognition </li></ul><ul><li>Face recognition </li></ul><ul><li>Gait recognition </li></ul><ul><li>Let us consider how each of these scores in terms of universality, distinctiveness, permanence, and collectability… </li></ul>Public domain image from http://commons.wikimedia.org/wiki/File:Retinal_scan_securimetrics.jpg Public domain image from http://commons.wikimedia.org/wiki/File:CBP_chemist_reads_a_DNA_profile.jpg Public domain image from http://commons.wikimedia.org/wiki/File:Fingerprint_Arch.jpg
    79. 79. Summary <ul><li>History  What is security? </li></ul><ul><li>Critical characteristics of security  CNSS security model </li></ul><ul><li>Cryptography (Confidentiality, Integrity)  Access Control (Availability)  Password </li></ul><ul><li>Physical attack  Authentication Technology </li></ul>

    ×