SlideShare a Scribd company logo
1 of 96
Information security
 some illustrated principles
Waarom security?
Geheimen
“aan niemand doorvertellen he!”
Controle
“_Wie_ weet dat allemaal?”
Information wants to
      be free
Problemen?
www.facebook.net
     phishing
OMG pink poniezzz
      trojan horses
Botnets
crack!
sniffers
spam
Concepten
Data confidentiality
Entity Authentication
   (Identification)
Data authentication
(integrity + who sent it)
Non-repudiation
(origin vs receipt)
Denial of Service
Terminology &
         definitions
• Cryptographers and computer security
  people talk a different language (e.g.
  ‘authentication’ vs ‘authorisation’)
• Integrity(Data authentication? Entity authentication?)


• Availability (Denial of Service? Non-repudiation?)


• Confidentiality
• Trust
Terminology &
         definitions
• Cryptographers and computer security
  people talk a different language (e.g.
  ‘authentication’ vs ‘authorisation’)
• Integrity(Data authentication? Entity authentication?)


• Availability (Denial of Service? Non-repudiation?)


• Confidentiality
• Trust
Terminology &
         definitions
• Cryptographers and computer security
  people talk a different language (e.g.
  ‘authentication’ vs ‘authorisation’)
• Integrity(Data authentication? Entity authentication?)


• Availability (Denial of Service? Non-repudiation?)


• Confidentiality
• Trust
Terminology &
         definitions
• Cryptographers and computer security
  people talk a different language (e.g.
  ‘authentication’ vs ‘authorisation’)
• Integrity(Data authentication? Entity authentication?)


• Availability (Denial of Service? Non-repudiation?)


• Confidentiality
• Trust
Terminology &
         definitions
• Cryptographers and computer security
  people talk a different language (e.g.
  ‘authentication’ vs ‘authorisation’)
• Integrity(Data authentication? Entity authentication?)


• Availability (Denial of Service? Non-repudiation?)


• Confidentiality
• Trust
Vertrouwen (trust)
➡ Dieter Gollman:
   “Trust is not the      ➡ Based on
   concept that            ➡ reputation
   unifies security, it     ➡ control and
   is an absolute             punishment
   mess.”
                           ➡ policy enforcement
➡ “If it is trusted, it    ➡ ... or blind
   can hurt you.”
Vertrouwen (trust)
➡ Dieter Gollman:
   “Trust is not the      ➡ Based on
   concept that            ➡ reputation
   unifies security, it     ➡ control and
   is an absolute             punishment
   mess.”
                           ➡ policy enforcement
➡ “If it is trusted, it    ➡ ... or blind
   can hurt you.”
Vertrouwen (trust)
➡ Dieter Gollman:
   “Trust is not the      ➡ Based on
   concept that            ➡ reputation
   unifies security, it     ➡ control and
   is an absolute             punishment
   mess.”
                           ➡ policy enforcement
➡ “If it is trusted, it    ➡ ... or blind
   can hurt you.”
Vertrouwen

Nieuws.be 27/11/’08 18u13:

 “A320 crasht in de Middellandse
              Zee.”
Vertrouwen

Luchtvaartnieuws.nl op 5/10/’07:

“US Airways bestelt 92 Airbussen.”
Nieuws.be: A320   Luchtvaartnieuws.nl: A350
Vertrouwen

Nieuws.be 27/11/’08 20u25:

 “A320 crasht in de Middellandse
              Zee.”
Vertrouwen

• In de praktijk:
 • cryptografische sleutel (bvb. encryptie)
 • toegangsrechten
 • digitale handtekeningen
 • “trusted computing”
Vertrouwen

• In de praktijk:
 • cryptografische sleutel (bvb. encryptie)
 • toegangsrechten
 • digitale handtekeningen
 • “trusted computing”
Vertrouwen

• In de praktijk:
 • cryptografische sleutel (bvb. encryptie)
 • toegangsrechten
 • digitale handtekeningen
 • “trusted computing”
Vertrouwen

• In de praktijk:
 • cryptografische sleutel (bvb. encryptie)
 • toegangsrechten
 • digitale handtekeningen
 • “trusted computing”
Information Security
      Principles

• Be clear about
 definitions
Don’ts
Don’ts
• Security and complexity do not mix
Don’ts
• Security and complexity do not mix:
  •   operating system
  •   network architecture
  •   applications
  •   mobile code
  •   services: XML, SOAP, VoIP (through the firewall!)
  •   always on connections (botnets!)
Don’ts
• Security and complexity do not mix:
  •   operating system
  •   network architecture
  •   applications
  •   mobile code
  •   services: XML, SOAP, VoIP (through the firewall!)
  •   always on connections (botnets!)
Don’ts
• Security and complexity do not mix:
  •   operating system
  •   network architecture
  •   applications
  •   mobile code
  •   services: XML, SOAP, VoIP (through the firewall!)
  •   always on connections (botnets!)
Don’ts
• Security and complexity do not mix:
  •   operating system
  •   network architecture
  •   applications
  •   mobile code
  •   services: XML, SOAP, VoIP (through the firewall!)
  •   always on connections (botnets!)
Don’ts
• Security and complexity do not mix:
  •   operating system
  •   network architecture
  •   applications
  •   mobile code
  •   services: XML, SOAP, VoIP (through the firewall!)
  •   always on connections (botnets!)
Don’ts
• Security and complexity do not mix:
  •   operating system
  •   network architecture
  •   applications
  •   mobile code
  •   services: XML, SOAP, VoIP (through the firewall!)
  •   always on connections (botnets!)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
• Security through obscurity:
  •   mobile phone systems: GSM in US
  •   DVD copyright protection (DVD Jon!)
  •   Sony rootkit
  •   Diebold voting machines
  •   Microsoft
  •   Cisco router OS
  •   physical locks
  •   blacking out text in PDF (hack: “read out loud”)
Don’ts
•   Risk avoidance:

    •   accept the risk
    •   reduce risk with technology
    •   reduce risk with procedures
    •   reduce risk with insurance
    •   reduce risk with disclaimers
    •   transfer the risk (e.g.: from data to key)
Don’ts
•   Risk avoidance:

    •   accept the risk
    •   reduce risk with technology
    •   reduce risk with procedures
    •   reduce risk with insurance
    •   reduce risk with disclaimers
    •   transfer the risk (e.g.: from data to key)
Don’ts
•   Risk avoidance:

    •   accept the risk
    •   reduce risk with technology
    •   reduce risk with procedures
    •   reduce risk with insurance
    •   reduce risk with disclaimers
    •   transfer the risk (e.g.: from data to key)
Don’ts
•   Risk avoidance:

    •   accept the risk
    •   reduce risk with technology
    •   reduce risk with procedures
    •   reduce risk with insurance
    •   reduce risk with disclaimers
    •   transfer the risk (e.g.: from data to key)
Don’ts
•   Risk avoidance:

    •   accept the risk
    •   reduce risk with technology
    •   reduce risk with procedures
    •   reduce risk with insurance
    •   reduce risk with disclaimers
    •   transfer the risk (e.g.: from data to key)
Don’ts
•   Risk avoidance:

    •   accept the risk
    •   reduce risk with technology
    •   reduce risk with procedures
    •   reduce risk with insurance
    •   reduce risk with disclaimers
    •   transfer the risk (e.g.: from data to key)
Don’ts
• Security is not forever:
  • Cryptography:
    • 1958 vs now : peanuts
    • now vs 2058 : ?
  •   Advances in:
      • reverse engineering
      • side channel attacks
Don’ts
• Security is not forever:
  • Cryptography:
    • 1958 vs now : peanuts
    • now vs 2058 : ?
  •   Advances in:
      • reverse engineering
      • side channel attacks
Don’ts

•   Security and complexity don’t mix

•   Security through obscurity does not work

•   100% security doesn’t exist

•   Security is not forever
Do’s
Assumptions


•   Clearly state the assumptions behind the system.

•   Code re-use can be dangerous: design assumptions
    might no longer be valid!
Assumptions

•   GSM:

     •   encryption until the base station

     •   no need to authenticate the network (in Soviet
         mobile nation, network authenticates YOU!)
Assumptions

•   e-ID:

      •     PIN code is kept secret by the user
Assumptions
•   RFID:

      •   opponent cannot eavesdrop > 1
          meter
Do’s


•   Clearly state the assumptions behind the system.

•   Need for integrated approach
Integrated approach
Do’s


•   Clearly state the assumptions behind the system.

•   Need for integrated approach

•   Find the right mix of technology and law
“Gentlemen don’t go in
  through the exit”
Digital Rights
Management
Digital Millenium
 Copyright Act
Spam
Legislation

• Electronic Signatures • Data retention
• Eavesdropping         • Computer Crime
Legislation

• Electronic Signatures • Data retention
• Eavesdropping         • Computer Crime
Legislation

• Electronic Signatures • Data retention
• Eavesdropping         • Computer Crime
Legislation

• Electronic Signatures • Data retention
• Eavesdropping         • Computer Crime
Do’s

•   Clearly state the assumptions behind the system.

•   Need for integrated approach

•   Find the right mix of technology and law

•   Need for secure implementations
Secure implementations


 • “Nothing is more practical than a good
   theory”
 • “Theory is important, at least in theory”
Secure implementations
 • Consider:
  • Secure software/hardware (orlly?)
  • Side channel attacks
  • Buffer overflows
  • API errors
  • Random number generators
 • Model vs reality
Model vs Reality
Challenges
Challenges

•   Always room at the bottom:

    •   RFID

    •   Sensor networks

    •   Smartphones
Challenges

•   Always room at the bottom

•   Human Factors:

    •   usability (“This certificate is invalid.” - “OK”)

    •   social engineering
Challenges


•   Always room at the bottom

•   Human Factors

•   It’s the economy, stupid!
Challenges
•   It’s the economy, stupid!

    •   “No gain, no pain”

    •   Examples:

        •   Software (no liability)

        •   Credit cards in France
Questions to you
1. Did you _really_ implement
       secure software?
2. Do you trust your news
        service(s)?
3. Do you use Facebook’s
    privacy features?
4. Do you respect someone
else’s privacy on Facebook?
5. Do you care?
Questions?
Disclaimer
Credits

•   Introduction to security and course overview,
    prof. dr. ir. Bart Preneel,
    Intensive Program on Information and Communication Security, July 2006


•   Google Images (most of the images)

•   Sigridschrijft.be / Sony (Terminator 4 poster)

More Related Content

Similar to Information Security, some illustrated principles

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- Nikhil Praharshi
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionMatt Dawdy
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingaleoscon2007
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UImozilla.presentations
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networksjaymemcree
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTrustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTWD Industries AG
 
Disagree with "I Agree"
Disagree with "I Agree"Disagree with "I Agree"
Disagree with "I Agree"Pronovix
 
APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...
APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...
APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...apidays
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublinDerek King
 
Care and Feeding of Healthy Computers
Care and Feeding of Healthy ComputersCare and Feeding of Healthy Computers
Care and Feeding of Healthy ComputersLorens Tech Solutions
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsDan Houser
 

Similar to Information Security, some illustrated principles (20)

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
 
Juice Jacking 101
Juice Jacking 101Juice Jacking 101
Juice Jacking 101
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTrustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable Security
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Disagree with "I Agree"
Disagree with "I Agree"Disagree with "I Agree"
Disagree with "I Agree"
 
APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...
APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...
APIdays Paris 2018 - Disagree with “I Agree”. Enforcing Better GDPR Complianc...
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Care and Feeding of Healthy Computers
Care and Feeding of Healthy ComputersCare and Feeding of Healthy Computers
Care and Feeding of Healthy Computers
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 

Recently uploaded

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Information Security, some illustrated principles

  • 1. Information security some illustrated principles
  • 7. www.facebook.net phishing
  • 8. OMG pink poniezzz trojan horses
  • 9.
  • 10.
  • 14. spam
  • 17. Entity Authentication (Identification)
  • 21. Terminology & definitions • Cryptographers and computer security people talk a different language (e.g. ‘authentication’ vs ‘authorisation’) • Integrity(Data authentication? Entity authentication?) • Availability (Denial of Service? Non-repudiation?) • Confidentiality • Trust
  • 22. Terminology & definitions • Cryptographers and computer security people talk a different language (e.g. ‘authentication’ vs ‘authorisation’) • Integrity(Data authentication? Entity authentication?) • Availability (Denial of Service? Non-repudiation?) • Confidentiality • Trust
  • 23. Terminology & definitions • Cryptographers and computer security people talk a different language (e.g. ‘authentication’ vs ‘authorisation’) • Integrity(Data authentication? Entity authentication?) • Availability (Denial of Service? Non-repudiation?) • Confidentiality • Trust
  • 24. Terminology & definitions • Cryptographers and computer security people talk a different language (e.g. ‘authentication’ vs ‘authorisation’) • Integrity(Data authentication? Entity authentication?) • Availability (Denial of Service? Non-repudiation?) • Confidentiality • Trust
  • 25. Terminology & definitions • Cryptographers and computer security people talk a different language (e.g. ‘authentication’ vs ‘authorisation’) • Integrity(Data authentication? Entity authentication?) • Availability (Denial of Service? Non-repudiation?) • Confidentiality • Trust
  • 26. Vertrouwen (trust) ➡ Dieter Gollman: “Trust is not the ➡ Based on concept that ➡ reputation unifies security, it ➡ control and is an absolute punishment mess.” ➡ policy enforcement ➡ “If it is trusted, it ➡ ... or blind can hurt you.”
  • 27. Vertrouwen (trust) ➡ Dieter Gollman: “Trust is not the ➡ Based on concept that ➡ reputation unifies security, it ➡ control and is an absolute punishment mess.” ➡ policy enforcement ➡ “If it is trusted, it ➡ ... or blind can hurt you.”
  • 28. Vertrouwen (trust) ➡ Dieter Gollman: “Trust is not the ➡ Based on concept that ➡ reputation unifies security, it ➡ control and is an absolute punishment mess.” ➡ policy enforcement ➡ “If it is trusted, it ➡ ... or blind can hurt you.”
  • 29. Vertrouwen Nieuws.be 27/11/’08 18u13: “A320 crasht in de Middellandse Zee.”
  • 30. Vertrouwen Luchtvaartnieuws.nl op 5/10/’07: “US Airways bestelt 92 Airbussen.”
  • 31. Nieuws.be: A320 Luchtvaartnieuws.nl: A350
  • 32. Vertrouwen Nieuws.be 27/11/’08 20u25: “A320 crasht in de Middellandse Zee.”
  • 33. Vertrouwen • In de praktijk: • cryptografische sleutel (bvb. encryptie) • toegangsrechten • digitale handtekeningen • “trusted computing”
  • 34. Vertrouwen • In de praktijk: • cryptografische sleutel (bvb. encryptie) • toegangsrechten • digitale handtekeningen • “trusted computing”
  • 35. Vertrouwen • In de praktijk: • cryptografische sleutel (bvb. encryptie) • toegangsrechten • digitale handtekeningen • “trusted computing”
  • 36. Vertrouwen • In de praktijk: • cryptografische sleutel (bvb. encryptie) • toegangsrechten • digitale handtekeningen • “trusted computing”
  • 37. Information Security Principles • Be clear about definitions
  • 39. Don’ts • Security and complexity do not mix
  • 40. Don’ts • Security and complexity do not mix: • operating system • network architecture • applications • mobile code • services: XML, SOAP, VoIP (through the firewall!) • always on connections (botnets!)
  • 41. Don’ts • Security and complexity do not mix: • operating system • network architecture • applications • mobile code • services: XML, SOAP, VoIP (through the firewall!) • always on connections (botnets!)
  • 42. Don’ts • Security and complexity do not mix: • operating system • network architecture • applications • mobile code • services: XML, SOAP, VoIP (through the firewall!) • always on connections (botnets!)
  • 43. Don’ts • Security and complexity do not mix: • operating system • network architecture • applications • mobile code • services: XML, SOAP, VoIP (through the firewall!) • always on connections (botnets!)
  • 44. Don’ts • Security and complexity do not mix: • operating system • network architecture • applications • mobile code • services: XML, SOAP, VoIP (through the firewall!) • always on connections (botnets!)
  • 45. Don’ts • Security and complexity do not mix: • operating system • network architecture • applications • mobile code • services: XML, SOAP, VoIP (through the firewall!) • always on connections (botnets!)
  • 46. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 47. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 48. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 49. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 50. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 51. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 52. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 53. Don’ts • Security through obscurity: • mobile phone systems: GSM in US • DVD copyright protection (DVD Jon!) • Sony rootkit • Diebold voting machines • Microsoft • Cisco router OS • physical locks • blacking out text in PDF (hack: “read out loud”)
  • 54. Don’ts • Risk avoidance: • accept the risk • reduce risk with technology • reduce risk with procedures • reduce risk with insurance • reduce risk with disclaimers • transfer the risk (e.g.: from data to key)
  • 55. Don’ts • Risk avoidance: • accept the risk • reduce risk with technology • reduce risk with procedures • reduce risk with insurance • reduce risk with disclaimers • transfer the risk (e.g.: from data to key)
  • 56. Don’ts • Risk avoidance: • accept the risk • reduce risk with technology • reduce risk with procedures • reduce risk with insurance • reduce risk with disclaimers • transfer the risk (e.g.: from data to key)
  • 57. Don’ts • Risk avoidance: • accept the risk • reduce risk with technology • reduce risk with procedures • reduce risk with insurance • reduce risk with disclaimers • transfer the risk (e.g.: from data to key)
  • 58. Don’ts • Risk avoidance: • accept the risk • reduce risk with technology • reduce risk with procedures • reduce risk with insurance • reduce risk with disclaimers • transfer the risk (e.g.: from data to key)
  • 59. Don’ts • Risk avoidance: • accept the risk • reduce risk with technology • reduce risk with procedures • reduce risk with insurance • reduce risk with disclaimers • transfer the risk (e.g.: from data to key)
  • 60. Don’ts • Security is not forever: • Cryptography: • 1958 vs now : peanuts • now vs 2058 : ? • Advances in: • reverse engineering • side channel attacks
  • 61. Don’ts • Security is not forever: • Cryptography: • 1958 vs now : peanuts • now vs 2058 : ? • Advances in: • reverse engineering • side channel attacks
  • 62. Don’ts • Security and complexity don’t mix • Security through obscurity does not work • 100% security doesn’t exist • Security is not forever
  • 64. Assumptions • Clearly state the assumptions behind the system. • Code re-use can be dangerous: design assumptions might no longer be valid!
  • 65. Assumptions • GSM: • encryption until the base station • no need to authenticate the network (in Soviet mobile nation, network authenticates YOU!)
  • 66. Assumptions • e-ID: • PIN code is kept secret by the user
  • 67. Assumptions • RFID: • opponent cannot eavesdrop > 1 meter
  • 68. Do’s • Clearly state the assumptions behind the system. • Need for integrated approach
  • 70. Do’s • Clearly state the assumptions behind the system. • Need for integrated approach • Find the right mix of technology and law
  • 71. “Gentlemen don’t go in through the exit”
  • 74. Spam
  • 75. Legislation • Electronic Signatures • Data retention • Eavesdropping • Computer Crime
  • 76. Legislation • Electronic Signatures • Data retention • Eavesdropping • Computer Crime
  • 77. Legislation • Electronic Signatures • Data retention • Eavesdropping • Computer Crime
  • 78. Legislation • Electronic Signatures • Data retention • Eavesdropping • Computer Crime
  • 79. Do’s • Clearly state the assumptions behind the system. • Need for integrated approach • Find the right mix of technology and law • Need for secure implementations
  • 80. Secure implementations • “Nothing is more practical than a good theory” • “Theory is important, at least in theory”
  • 81. Secure implementations • Consider: • Secure software/hardware (orlly?) • Side channel attacks • Buffer overflows • API errors • Random number generators • Model vs reality
  • 84. Challenges • Always room at the bottom: • RFID • Sensor networks • Smartphones
  • 85. Challenges • Always room at the bottom • Human Factors: • usability (“This certificate is invalid.” - “OK”) • social engineering
  • 86. Challenges • Always room at the bottom • Human Factors • It’s the economy, stupid!
  • 87. Challenges • It’s the economy, stupid! • “No gain, no pain” • Examples: • Software (no liability) • Credit cards in France
  • 89. 1. Did you _really_ implement secure software?
  • 90. 2. Do you trust your news service(s)?
  • 91. 3. Do you use Facebook’s privacy features?
  • 92. 4. Do you respect someone else’s privacy on Facebook?
  • 93. 5. Do you care?
  • 96. Credits • Introduction to security and course overview, prof. dr. ir. Bart Preneel, Intensive Program on Information and Communication Security, July 2006 • Google Images (most of the images) • Sigridschrijft.be / Sony (Terminator 4 poster)