SlideShare a Scribd company logo
1 of 41
Security of
communication protocols
      Dr. Tech. Mikko Särelä
Robbing a grocery store G

•   Consider a grocery store (called G).
    •   A customer goes into the store and picks up stuff by
        himself
    •   Goes to the cashier,
    •   Pays for the stuff, packs his bags and leaves

•   Think of ways someone can rob the store
•   Write down your list of answers
•   Feel free to discuss with other students
•   You have 10 minutes
                                                TkT Mikko Särelä
Robbing a grocery store G




                  TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest




                                                 TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it




                                                  TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it
•   Customer puts a chocolate bar in another customers shopping
    queue and gets him to pay for it




                                                  TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it
•   Customer puts a chocolate bar in another customers shopping
    queue and gets him to pay for it
•   Clerk takes money for groceries, but does not put it in the
    cash register




                                                  TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it
•   Customer puts a chocolate bar in another customers shopping
    queue and gets him to pay for it
•   Clerk takes money for groceries, but does not put it in the
    cash register
•   Someone robs the cash register of the money (perhaps with a
    gun




                                                  TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it
•   Customer puts a chocolate bar in another customers shopping
    queue and gets him to pay for it
•   Clerk takes money for groceries, but does not put it in the
    cash register
•   Someone robs the cash register of the money (perhaps with a
    gun
•   Someone robs the money when it is being transferred to the
    bank




                                                  TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it
•   Customer puts a chocolate bar in another customers shopping
    queue and gets him to pay for it
•   Clerk takes money for groceries, but does not put it in the
    cash register
•   Someone robs the cash register of the money (perhaps with a
    gun
•   Someone robs the money when it is being transferred to the
    bank
•   Breaking in during the night and stealing groceries


                                                   TkT Mikko Särelä
Robbing a grocery store G
•   Customer hides something in his bag while paying for the rest
•   Customer takes stuff from the store and runs for it
•   Customer puts a chocolate bar in another customers shopping
    queue and gets him to pay for it
•   Clerk takes money for groceries, but does not put it in the
    cash register
•   Someone robs the cash register of the money (perhaps with a
    gun
•   Someone robs the money when it is being transferred to the
    bank
•   Breaking in during the night and stealing groceries
•   Someone empties the company bank account
                                                   TkT Mikko Särelä
Robbing a grocery store G




                  TkT Mikko Särelä
Robbing a grocery store G
•   Competitor tampers with the food and tries to cause a
    scandal




                                              TkT Mikko Särelä
Robbing a grocery store G
•   Competitor tampers with the food and tries to cause a
    scandal
•   Competitor (hires someone to) photograph and publish
    pictures of people buying e.g. condoms or pornography




                                              TkT Mikko Särelä
Robbing a grocery store G
•   Competitor tampers with the food and tries to cause a
    scandal
•   Competitor (hires someone to) photograph and publish
    pictures of people buying e.g. condoms or pornography
•   Competitor hires someone to prevent supply truck from
    arriving to the store




                                             TkT Mikko Särelä
Robbing a grocery store G
•   Competitor tampers with the food and tries to cause a
    scandal
•   Competitor (hires someone to) photograph and publish
    pictures of people buying e.g. condoms or pornography
•   Competitor hires someone to prevent supply truck from
    arriving to the store
•   Preventing employees from arriving at work




                                             TkT Mikko Särelä
Robbing a grocery store G
•   Competitor tampers with the food and tries to cause a
    scandal
•   Competitor (hires someone to) photograph and publish
    pictures of people buying e.g. condoms or pornography
•   Competitor hires someone to prevent supply truck from
    arriving to the store
•   Preventing employees from arriving at work
•   A mafia threatens to burn the building unless the owner pays
    protection fees




                                               TkT Mikko Särelä
Robbing a grocery store G
•   Competitor tampers with the food and tries to cause a
    scandal
•   Competitor (hires someone to) photograph and publish
    pictures of people buying e.g. condoms or pornography
•   Competitor hires someone to prevent supply truck from
    arriving to the store
•   Preventing employees from arriving at work
•   A mafia threatens to burn the building unless the owner pays
    protection fees
•   Someone plants illegal drugs into the store and informs local
    police enforcement


                                                TkT Mikko Särelä
Understanding security
Threat model

• Protected assets
• Threats
• Potential attackers
• Risk assessment
• Steps to improve security
                              TkT Mikko Särelä
Assets needing protection




                  TkT Mikko Särelä
Assets needing protection
• The building   and customer access




                              TkT Mikko Särelä
Assets needing protection
• The building and customer access
• Store reputation




                            TkT Mikko Särelä
Assets needing protection
• The building and customer access
• Store reputation
• The stock of groceries



                            TkT Mikko Särelä
Assets needing protection
• The building and customer access
• Store reputation
• The stock of groceries
• Deliveries


                            TkT Mikko Särelä
Assets needing protection
• The building and customer access
• Store reputation
• The stock of groceries
• Deliveries
• Employees

                            TkT Mikko Särelä
Assets needing protection
• The building and customer access
• Store reputation
• The stock of groceries
• Deliveries
• Employees
• Money
                            TkT Mikko Särelä
Assets needing protection
• The building and customer access
• Store reputation
• The stock of groceries
• Deliveries
• Employees
• Money
• Customer information
                            TkT Mikko Särelä
Threat model
• Threats from the store owner’s
  perspective
 •   Someone steals money, or food
 •   Someone destroys food or money
 •   Someone prevents store from being open
 •   Someone causes problems for the store
     image
 •   and more


                                 TkT Mikko Särelä
Attacker model

• Potential attackers include
  •   customer, employee, outsider, competitor,
      organized crime, government
• Attacker capabilities
  •   From empty hands, to guns and millions of dollars
      and thousands of employees to do their bidding
• Attacks: technical or social engineering?

                                          TkT Mikko Särelä
Risk assessment

• Security is not a purpose by itself!
• Weighing costs of security to its
  benefits
 • Good enough security
• You can never protect against all
  threats!


                               TkT Mikko Särelä
Wait a second!
• That was only store owner’s
  perspective
• How about the perspective of
 •   customer,
 •   insurance company,
 •   government,
 •   etc.


                            TkT Mikko Särelä
Improving security


• Think of ways to improve grocery
  store security




                          TkT Mikko Särelä
Weakest link
Layers of protection


• Prevent
• Detect
• Respond


               TkT Mikko Särelä
Prevent


• Technologies and processes designed to
  prevent an attack from taking place
 •   e.g. locks and guards




                                 TkT Mikko Särelä
Detect


• Technologies and processes designed for
  ensuring detection of intrusion
 •   alarm system, guards




                                    TkT Mikko Särelä
Respond

• Technologies and processes designed to
 •   stop an attack,
 •   limit damages, and
 •   recover




                                TkT Mikko Särelä
CIA model


• Confidentiality
• Integrity
• Availability

                    TkT Mikko Särelä
Next week


• Cryptographic building blocks
• Telnet
• SSH


                                  TkT Mikko Särelä

More Related Content

Viewers also liked

Crime+in+korczyna
Crime+in+korczynaCrime+in+korczyna
Crime+in+korczynaaniakuliga
 
Crime in korczyna
Crime in korczynaCrime in korczyna
Crime in korczynaaniakuliga
 
Derechos basicos de aprendizaje matematicas
Derechos basicos de aprendizaje matematicasDerechos basicos de aprendizaje matematicas
Derechos basicos de aprendizaje matematicasJuan Carlos
 
Sustainable transit
Sustainable transitSustainable transit
Sustainable transitmikkosarela
 
Hierarchical architecture
Hierarchical architectureHierarchical architecture
Hierarchical architecturebrigeit
 
平面构成
平面构成平面构成
平面构成8837528
 
2011 기업 로고볼 특별 프로모션(제안용)
2011 기업 로고볼 특별 프로모션(제안용)2011 기업 로고볼 특별 프로모션(제안용)
2011 기업 로고볼 특별 프로모션(제안용)whizgee
 
Lecture 2 crypto and basics of protocols
Lecture 2 crypto and basics of protocolsLecture 2 crypto and basics of protocols
Lecture 2 crypto and basics of protocolsmikkosarela
 

Viewers also liked (10)

Crime+in+korczyna
Crime+in+korczynaCrime+in+korczyna
Crime+in+korczyna
 
Crime in korczyna
Crime in korczynaCrime in korczyna
Crime in korczyna
 
Derechos basicos de aprendizaje matematicas
Derechos basicos de aprendizaje matematicasDerechos basicos de aprendizaje matematicas
Derechos basicos de aprendizaje matematicas
 
Sustainable transit
Sustainable transitSustainable transit
Sustainable transit
 
Hierarchical architecture
Hierarchical architectureHierarchical architecture
Hierarchical architecture
 
Greenmap
GreenmapGreenmap
Greenmap
 
平面构成
平面构成平面构成
平面构成
 
2011 기업 로고볼 특별 프로모션(제안용)
2011 기업 로고볼 특별 프로모션(제안용)2011 기업 로고볼 특별 프로모션(제안용)
2011 기업 로고볼 특별 프로모션(제안용)
 
Edad media
Edad   mediaEdad   media
Edad media
 
Lecture 2 crypto and basics of protocols
Lecture 2 crypto and basics of protocolsLecture 2 crypto and basics of protocols
Lecture 2 crypto and basics of protocols
 

Recently uploaded

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 

Turvallisuusajattelun perusteet

  • 1. Security of communication protocols Dr. Tech. Mikko Särelä
  • 2. Robbing a grocery store G • Consider a grocery store (called G). • A customer goes into the store and picks up stuff by himself • Goes to the cashier, • Pays for the stuff, packs his bags and leaves • Think of ways someone can rob the store • Write down your list of answers • Feel free to discuss with other students • You have 10 minutes TkT Mikko Särelä
  • 3. Robbing a grocery store G TkT Mikko Särelä
  • 4. Robbing a grocery store G • Customer hides something in his bag while paying for the rest TkT Mikko Särelä
  • 5. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it TkT Mikko Särelä
  • 6. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it • Customer puts a chocolate bar in another customers shopping queue and gets him to pay for it TkT Mikko Särelä
  • 7. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it • Customer puts a chocolate bar in another customers shopping queue and gets him to pay for it • Clerk takes money for groceries, but does not put it in the cash register TkT Mikko Särelä
  • 8. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it • Customer puts a chocolate bar in another customers shopping queue and gets him to pay for it • Clerk takes money for groceries, but does not put it in the cash register • Someone robs the cash register of the money (perhaps with a gun TkT Mikko Särelä
  • 9. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it • Customer puts a chocolate bar in another customers shopping queue and gets him to pay for it • Clerk takes money for groceries, but does not put it in the cash register • Someone robs the cash register of the money (perhaps with a gun • Someone robs the money when it is being transferred to the bank TkT Mikko Särelä
  • 10. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it • Customer puts a chocolate bar in another customers shopping queue and gets him to pay for it • Clerk takes money for groceries, but does not put it in the cash register • Someone robs the cash register of the money (perhaps with a gun • Someone robs the money when it is being transferred to the bank • Breaking in during the night and stealing groceries TkT Mikko Särelä
  • 11. Robbing a grocery store G • Customer hides something in his bag while paying for the rest • Customer takes stuff from the store and runs for it • Customer puts a chocolate bar in another customers shopping queue and gets him to pay for it • Clerk takes money for groceries, but does not put it in the cash register • Someone robs the cash register of the money (perhaps with a gun • Someone robs the money when it is being transferred to the bank • Breaking in during the night and stealing groceries • Someone empties the company bank account TkT Mikko Särelä
  • 12. Robbing a grocery store G TkT Mikko Särelä
  • 13. Robbing a grocery store G • Competitor tampers with the food and tries to cause a scandal TkT Mikko Särelä
  • 14. Robbing a grocery store G • Competitor tampers with the food and tries to cause a scandal • Competitor (hires someone to) photograph and publish pictures of people buying e.g. condoms or pornography TkT Mikko Särelä
  • 15. Robbing a grocery store G • Competitor tampers with the food and tries to cause a scandal • Competitor (hires someone to) photograph and publish pictures of people buying e.g. condoms or pornography • Competitor hires someone to prevent supply truck from arriving to the store TkT Mikko Särelä
  • 16. Robbing a grocery store G • Competitor tampers with the food and tries to cause a scandal • Competitor (hires someone to) photograph and publish pictures of people buying e.g. condoms or pornography • Competitor hires someone to prevent supply truck from arriving to the store • Preventing employees from arriving at work TkT Mikko Särelä
  • 17. Robbing a grocery store G • Competitor tampers with the food and tries to cause a scandal • Competitor (hires someone to) photograph and publish pictures of people buying e.g. condoms or pornography • Competitor hires someone to prevent supply truck from arriving to the store • Preventing employees from arriving at work • A mafia threatens to burn the building unless the owner pays protection fees TkT Mikko Särelä
  • 18. Robbing a grocery store G • Competitor tampers with the food and tries to cause a scandal • Competitor (hires someone to) photograph and publish pictures of people buying e.g. condoms or pornography • Competitor hires someone to prevent supply truck from arriving to the store • Preventing employees from arriving at work • A mafia threatens to burn the building unless the owner pays protection fees • Someone plants illegal drugs into the store and informs local police enforcement TkT Mikko Särelä
  • 20. Threat model • Protected assets • Threats • Potential attackers • Risk assessment • Steps to improve security TkT Mikko Särelä
  • 21. Assets needing protection TkT Mikko Särelä
  • 22. Assets needing protection • The building and customer access TkT Mikko Särelä
  • 23. Assets needing protection • The building and customer access • Store reputation TkT Mikko Särelä
  • 24. Assets needing protection • The building and customer access • Store reputation • The stock of groceries TkT Mikko Särelä
  • 25. Assets needing protection • The building and customer access • Store reputation • The stock of groceries • Deliveries TkT Mikko Särelä
  • 26. Assets needing protection • The building and customer access • Store reputation • The stock of groceries • Deliveries • Employees TkT Mikko Särelä
  • 27. Assets needing protection • The building and customer access • Store reputation • The stock of groceries • Deliveries • Employees • Money TkT Mikko Särelä
  • 28. Assets needing protection • The building and customer access • Store reputation • The stock of groceries • Deliveries • Employees • Money • Customer information TkT Mikko Särelä
  • 29. Threat model • Threats from the store owner’s perspective • Someone steals money, or food • Someone destroys food or money • Someone prevents store from being open • Someone causes problems for the store image • and more TkT Mikko Särelä
  • 30. Attacker model • Potential attackers include • customer, employee, outsider, competitor, organized crime, government • Attacker capabilities • From empty hands, to guns and millions of dollars and thousands of employees to do their bidding • Attacks: technical or social engineering? TkT Mikko Särelä
  • 31. Risk assessment • Security is not a purpose by itself! • Weighing costs of security to its benefits • Good enough security • You can never protect against all threats! TkT Mikko Särelä
  • 32.
  • 33. Wait a second! • That was only store owner’s perspective • How about the perspective of • customer, • insurance company, • government, • etc. TkT Mikko Särelä
  • 34. Improving security • Think of ways to improve grocery store security TkT Mikko Särelä
  • 36. Layers of protection • Prevent • Detect • Respond TkT Mikko Särelä
  • 37. Prevent • Technologies and processes designed to prevent an attack from taking place • e.g. locks and guards TkT Mikko Särelä
  • 38. Detect • Technologies and processes designed for ensuring detection of intrusion • alarm system, guards TkT Mikko Särelä
  • 39. Respond • Technologies and processes designed to • stop an attack, • limit damages, and • recover TkT Mikko Särelä
  • 40. CIA model • Confidentiality • Integrity • Availability TkT Mikko Särelä
  • 41. Next week • Cryptographic building blocks • Telnet • SSH TkT Mikko Särelä

Editor's Notes

  1. \n
  2. Tehtävänanto harhaanjohtaja. Tämä on tyypillistä tietoturvatyössä. Asiakas tulee pyytämään apua ihan eri asiassa kuin mikä oikeasti on ongelma\n\nLähde tangentille yliopistokoulutuksesta!\n
  3. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  4. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  5. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  6. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  7. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  8. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  9. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  10. Laita kalvot tulemaan bullet kerrallaan!\n\n\n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. credit card info\n
  20. credit card info\n
  21. credit card info\n
  22. credit card info\n
  23. credit card info\n
  24. credit card info\n
  25. credit card info\n
  26. \n
  27. \n
  28. Piirrä kuva turvallisuuden kustannuksista ja riskien kustannuksista\n\nMeteoriittihyökkäys\n - ovat tappaneet ihmisiä, voimme laskea uhalle todennäköisyyden\nLiikenne\n - 20kmh kattonopeus\n - Kaiva liikenneturvallisuuskuva\n\n
  29. \n
  30. \n
  31. \n
  32. Hyviä esimerkkejä kaupan turvallisuuden parantamisen jäljiltä\n\nSocial engineering -hyökkäykset\n
  33. \n
  34. \n
  35. \n
  36. \n
  37. Esimerkkinä terveystiedot? \n
  38. \n