Ethics, Security and Privacy Management of Hospital Data Part 2 (January 24, ...Nawanan Theera-Ampornpunt
Presented at the Hospital IT Quality Development to level 4, 5, 6 Workshop, Thai Medical Informatics Association, Bangkok, Thailand on January 24, 2020
Ethics, Security and Privacy Management of Hospital Data Part 2 (January 24, ...Nawanan Theera-Ampornpunt
Presented at the Hospital IT Quality Development to level 4, 5, 6 Workshop, Thai Medical Informatics Association, Bangkok, Thailand on January 24, 2020
This document provides an overview of firewall types and how they function. It discusses the OSI and TCP/IP models and how packets are encapsulated and transmitted. It then describes three main types of firewalls: packet filtering firewalls which filter packets based on headers only; stateful inspection firewalls which track connection state; and application layer firewalls which use proxies to handle application data and connections. The document provides examples and diagrams to illustrate how each firewall type works.
PKI uses public/private key pairs, digital certificates, and a certificate authority to authenticate users and encrypt messages. A digital certificate contains the user's public key, identity information, and the digital signature of the issuing certificate authority. The certificate authority verifies identities and issues certificates to validate public keys belong to the correct users. PKI establishes a chain of trust that allows users to securely exchange information even if they do not know each other.
Information system security wk4-cryptography-2Bee Lalita
This document discusses cryptography techniques including symmetric key cryptography, stream ciphers, the one-time pad cipher, RC4 stream cipher, and asymmetric key cryptography. Symmetric key cryptography uses the same key for encryption and decryption, while asymmetric key cryptography uses public and private key pairs. Specific techniques covered include DES, AES, RC4 stream cipher, one-time pad, and the RSA algorithm for asymmetric encryption.
Information system security wk4-cryptography-2Bee Lalita
The document is about cryptography and contains the following key points:
1. It discusses symmetric key cryptography and asymmetric key cryptography (public key cryptography). Symmetric key cryptography uses the same key for encryption and decryption while asymmetric key cryptography uses different keys.
2. It describes stream ciphers and block ciphers as two types of symmetric key cryptography. Stream ciphers encrypt data bit-by-bit using a pseudorandom keystream while block ciphers encrypt fixed-size blocks. RC4 is provided as an example of a stream cipher.
3. It also covers the RSA public key cryptosystem, explaining how it uses prime factorisation and modular arithmetic to encrypt with a public key and decrypt with a
This document discusses symmetric and asymmetric key cryptography. It explains that symmetric key cryptography uses the same key for encryption and decryption, while asymmetric key cryptography uses public and private key pairs. Stream ciphers and block ciphers are types of symmetric key cryptography. Stream ciphers encrypt plaintext bit-by-bit using a pseudorandom keystream. The document then covers asymmetric key algorithms like RSA, which uses a public key to encrypt and a private key to decrypt. It provides examples of generating and using RSA public and private key pairs to encrypt and decrypt messages.
This document provides an overview of symmetric key cryptography and different block cipher modes. It discusses block ciphers, encryption/decryption processes, and modes such as electronic codebook (ECB), cipher block chaining (CBC), cipher feedback (CFB), and output feedback (OFB). It also covers the Diffie-Hellman key exchange algorithm for distributing secret keys between two parties.
This document provides an overview of symmetric-key cryptography and the DES and AES encryption algorithms. It discusses symmetric-key cryptography, how DES and AES work, including their data encryption processes using secret keys, rounds of substitutions and transformations, and how decryption reverses the encryption process. It also covers the strengths and limitations of DES, the move to AES as the new encryption standard, and the key components of AES encryption rounds like substitution tables, shifting rows, and mixing columns.
More Related Content
Similar to Information system security wk7-2-ids-ips_2
This document provides an overview of firewall types and how they function. It discusses the OSI and TCP/IP models and how packets are encapsulated and transmitted. It then describes three main types of firewalls: packet filtering firewalls which filter packets based on headers only; stateful inspection firewalls which track connection state; and application layer firewalls which use proxies to handle application data and connections. The document provides examples and diagrams to illustrate how each firewall type works.
PKI uses public/private key pairs, digital certificates, and a certificate authority to authenticate users and encrypt messages. A digital certificate contains the user's public key, identity information, and the digital signature of the issuing certificate authority. The certificate authority verifies identities and issues certificates to validate public keys belong to the correct users. PKI establishes a chain of trust that allows users to securely exchange information even if they do not know each other.
Information system security wk4-cryptography-2Bee Lalita
This document discusses cryptography techniques including symmetric key cryptography, stream ciphers, the one-time pad cipher, RC4 stream cipher, and asymmetric key cryptography. Symmetric key cryptography uses the same key for encryption and decryption, while asymmetric key cryptography uses public and private key pairs. Specific techniques covered include DES, AES, RC4 stream cipher, one-time pad, and the RSA algorithm for asymmetric encryption.
Information system security wk4-cryptography-2Bee Lalita
The document is about cryptography and contains the following key points:
1. It discusses symmetric key cryptography and asymmetric key cryptography (public key cryptography). Symmetric key cryptography uses the same key for encryption and decryption while asymmetric key cryptography uses different keys.
2. It describes stream ciphers and block ciphers as two types of symmetric key cryptography. Stream ciphers encrypt data bit-by-bit using a pseudorandom keystream while block ciphers encrypt fixed-size blocks. RC4 is provided as an example of a stream cipher.
3. It also covers the RSA public key cryptosystem, explaining how it uses prime factorisation and modular arithmetic to encrypt with a public key and decrypt with a
This document discusses symmetric and asymmetric key cryptography. It explains that symmetric key cryptography uses the same key for encryption and decryption, while asymmetric key cryptography uses public and private key pairs. Stream ciphers and block ciphers are types of symmetric key cryptography. Stream ciphers encrypt plaintext bit-by-bit using a pseudorandom keystream. The document then covers asymmetric key algorithms like RSA, which uses a public key to encrypt and a private key to decrypt. It provides examples of generating and using RSA public and private key pairs to encrypt and decrypt messages.
This document provides an overview of symmetric key cryptography and different block cipher modes. It discusses block ciphers, encryption/decryption processes, and modes such as electronic codebook (ECB), cipher block chaining (CBC), cipher feedback (CFB), and output feedback (OFB). It also covers the Diffie-Hellman key exchange algorithm for distributing secret keys between two parties.
This document provides an overview of symmetric-key cryptography and the DES and AES encryption algorithms. It discusses symmetric-key cryptography, how DES and AES work, including their data encryption processes using secret keys, rounds of substitutions and transformations, and how decryption reverses the encryption process. It also covers the strengths and limitations of DES, the move to AES as the new encryption standard, and the key components of AES encryption rounds like substitution tables, shifting rows, and mixing columns.
ความสุจริตทางวิชาการ เชื่อมไทยเชื่อมโลก Connect Thailand, Connect the World in The “Academic Honesty”
With Five Tools to Drive The Universities to Build The Smart Graduates
With Integrity
4. Scanning Attack
ข้อมูลที่อาจได้จากการสแกน
‣ Topology ของเครือข่ายที่จะโจมตี
‣ ประเภทของ traffic ที่อนุ ญาตให้
ผ่าน Firewall
‣ Host ที่เปิ ดใช้งานอยู่
‣ ประเภทและเวอร์ชนของ OS ที่ host ใช้
ั
‣ Software ที่รนบน server
ั
‣ Version ของ software
Faculty of Information Technology
Page
4
5. Denial of Service Attack
DoS เป็ นการพยายามที่จะทาให้ระบบที่เป็ นเปาหมายทางานช้าลงหรือ
้
ถึงกับให้บริการไม่ได้เลย
DoS แบ่งออกได้เป็ น 2 ประเภท
‣ การโจมตีช่องโหว่
(Flaw Exploitation DoS Attack)
‣ การโจมตีแบบฟลัดดิ่ง
(Flooding DoS Attack)
Faculty of Information Technology
Page
5
6. Flaw Exploitation DoS Attack
เป็ นการโจมตี ช่องโหว่ของระบบ เพื่อให้เกิดข้อผิ ดพลาด หรือทาให้
resource ของระบบถูกใช้งานจนหมด ตัวอย่างเช่น
‣ Ping of Death เป็ นการปิ งที่ส่งแพ็กเก็ตขนาดใหญ่มากไปยังระบบที่เป็ น
วินโดวส์บางเวอร์ชน ทาให้ระบบที่ถกโจมตีไม่สามารถจัดการกับแพ็กเก็ตที่
ั
ู
ผิ ดปกติได้ ทาให้ระบบล่มในที่สุด
ผลของการโจมตีคือ ทาให้ resource ของระบบถูกใช้งานหมดไป
Resource อาจหมายถึง CPU, memory, hard drive, buffer, bandwidth
วิธีการปองกันคือ การปิ ดช่องโหว่หรืออัพเกรดซอฟต์แวร์
้
Faculty of Information Technology
Page
6
9. Remote vs. Local Attacks
การโจมตีแบบ DoS และการโจมตี แบบเจาะเข้าระบบ มีแหล่งที่มาของการ
โจมตี 2 แหล่ง
‣ Authorized User Attacks : เกิดจากบุคคลภายใน
‣ Public User Attacks: เกิดจากบุคคลภายนอกหรือผูใช้ทวไป
้ ั่
Faculty of Information Technology
Page
9
17. Anomaly Detection
GET / HTTP/1.0
IDS
(1) Training models
Models
Model
Unknown pattern
IDS
ALERT
(2) Detect abnormal pattern
Models
Model
Faculty of Information Technology
Page
17
27. Port Mirroring
ปั จจุบนสวิทซ์ส่วนใหญ่สามารถทา port mirroring หรือ spanning port
ั
คือ การที่สวิตซ์จะส่งต่อทุกแพ็กเก็ตที่รบจากพอร์ตหนึ่ งไปยังอีกพอร์ต
ั
หนึ่ ง
Faculty of Information Technology
Page
27
28. ข้อดีของ Port Mirroring
ง่ายต่อการติ ดตัง เนื่ องจาก เชื่ อมต่อ IDS เข้ากับพอร์ตของสวิตซ์โดยที่ไม่
้
ต้องเปลี่ ยนแปลงโครงสร้างของเครือข่าย
ไม่มีผลกระทบต่อการยกเลิ ก session และการ config ไฟร์วอลล์
Faculty of Information Technology
Page
28