SlideShare a Scribd company logo
Security
Content
• The Security Problem
• Types of Security Violations
• Program Threads
• Cryptography as a Security Tool
• System and Network Threats
• User Authentication
• Implementing Security Defenses
• Firewalling to Protect System and Networks
• Computer-Security Classifications
The Security Problems
What is Security
Security Violations
Level of Security
What is security?
Security is the process of ensuring that operating system can
operate without external disruption or intrusion.
• Data
• Memory
• CPU
• Software, etc
• Hacking
• Virus
• Malware
• Worm, etc
What? From what?
System
Resources
Threats
Security violations
Breach of confidentiality
Breach of integrity
Breach of availability
Theft of service
Denial of service (DOS)
Security Levels
Physical
Human
Network
Operating
System
Program Threats
Trojan Horse
Trap Door
Logic Bomb
Stack and Buffer Overflow
Viruses
Trojan Horse
Trap Door
Logic Bomb
Stack and Buffer Overflow
Viruses
File: write a code to execute itself at the start of the infected program
Boot: (memory virus) infects the boot section of floppy/hard disks during the start-up and continue to infect other bootable programs used
by the system.
Macro: is written in high-level language and is only capable of execution inside a program such as ms words, excel, etc.
Source Code: it changes source code to include itself in it.
Polymorphic: changes its virus signature (pattern that can give itself off as virus) every time it is install.
Encrypted: encrypt itself to avoid detection and decrypt itself once it wants to execute.
Stealth: avoid detection by many means such as trying to give out clean codes (code without virus) when being read by scanner.
Tunneling: protect itself by interrupting antivirus scanner before it is found.
Multipartite: infected many parts of system such as boot sector, memory and files.
Armored: it uses special tricks to make it difficult to detection, disinfection, and understand of its codes.
What is Cryptography ?
The word ‘cryptography’ was combining two Greek words, ‘Kryptos’ meaning
hidden and ‘graphein’ meaning writing.
It is the techniques of electronic security messages by converting into
unreadable form, only a computer that have a matching key can read it.
Why cryptography?
• Hiding the meaning of messages
• Security between communications
• Protect database,files and entire disks
• Defenses against computer attacks
• Protect the worm and the other viruses
• Authentication the sender and receiver messages
Encryption
● Encryption enable the sender to ensure that only the computer
possessing a matching key can read the data
● The encryption function E :K (M C)
● The decryption function D :K (C M )
K is a set as keys
M is a set as messages
C is a set as ciphertexts
Encryption
There are two types of encryption algorithms : symmetric and asymmetric.
Symmetric is all algorithms that are use the same key to both encrypt and
decrypt.
Asymmetric is the algorithms that are use different key to encrypt and
decrypt.
Symmetric encryption
The general process of symmetric encryption :
Symmetric encryption
Block cipher is the a block of plaintext bits and generates a block of
ciphertext bits, generally of same size or fix-length group of bits. The
choice of block size not affect to encryption scheme. The strength of
cipher depends up on the key length.
Symmetric encryption
All those algorithm use symmetric method:
Asymmetric encryption
The operation as like symmetric but encrypted communication create two
keys that one called public key (anyone can get it to encrypted messages)
and other one is private keys ( only the key creator that can decrypted
messages).
Authentication
Authentication have 2 function: S (generate authentication from message) and V
(verity authentication on message).
S: K ( M A) and V: K ((M A ) {true, false})
Message-authentication algorithm code (MAC): is a symmetric key to provide
message authentication.
Authentication
Digital signature is a cryptographic value that is calculated from the data and a secret key
known only by the signer.
System and Network Threats
• Worms
• Port Scanning: is not an attack but rather a mean for a cracker to detect a
system’s vulnerabilities to attack.
• Denial of Service
What is the System and Network Threats?
Threat = in computer security refers to anything that has the potential to cause serious
harm to a computer system.
System and Network threads involve the abuse of services and network connection.
Usually, it create an environment in which operating system resources and user file are
misuse.
The more Open an operating system, the more
• Services it has enabled
• Function it allow
• Bug is available to exploit
What is worm ?
A worm is independent self-replicating code that one initiated, spread across networks
consuming memory resources without user intervention.
Cornell graduate student “Robert Tappan Morris”
Unleashed the first worm that quickly spread in Unix
system. And result that was estimated :
● 10% of the 60 000 system in U.S were affected.
● Damages $100 million, according U.S General
Accounting Office.
He then was sentenced to 3 years probation, 400 hours of
community service and fined $10 000. Morris’s legal costs
probably exceeded $100 000. And he became a
Professor at MIT.
What is Denial of Service(DOS) attacks ?
DOS is the attack in which disrupting legitimate use of a system without gaining or
stealing information from users.
Ex: When DOS attack happen, user may not be able to use internet browser. Sometime she did not
know the attack, because she think that is the slowdown of the internet.
DOS attack fall into two categories :
1. Only use so many system resource (No big deal).
Ex: A website click : use available CPU and to pop up window infinitely.
2. Disrupting the network of facility, against major website. (This cause may
temporarily block the network till OS can be updated).
Distributed Denial-of-Service(DDOS) attacks
These attacks come from many
computer all at once toward a common
website, typically by zombies(bot-net).
Botnet = (digital army, zombie army) a
network of private computer infected with
malicious software and controlled as a group.
DDOS + Blackmail => in exchange for
money .
User Authentication
• Password and Password Vulnerabilities
• Securing Passwords
• One-Time Passwords
• Biometrics
What is user authentication?
User Authentication is the act of verifying the identity of someone( a user,
device, or entity) who want to access data resources or application.
Ex: Password is common way to authenticate someone identity. Generally,
passwords are used to protect object in computer system.
Password Vulnerabilities
Password: A string of characters used for authenticating a user identity. Password are often used
to protect objects in the computer system.
Some type of passwords compromise, illegal transfer
• There are two common ways to guess a password:
1. For the intruder (human or program): use obvious information.
2. Use brute force: trying all possible combination of valid password.
• Shoulder surfing: look the shoulder of a user.
• Exposure is written down where passwords can be read or lost.
• Result of human nature: share your accounts to someone.
One-Time Passwords
Using paired password to avoid the problem of password sniffing and
shoulder surfing. In this scheme, the system and user share a symmetric
password.
Symmetric or private key:
1. Uses a single key : must be kept secret
2. One other may be made public
The two keys are related mathematically.
Biometrics
Bio(meaning life) + metric(meaning to measure)
Biometrics is the measurement and analysis of people :
1. Physiological characteristics: The shape or composition of the body.
Example: fingerprint, face, DNA
2. Behavioral characteristics: The behavior of a person.
Example: voice, gestures
Biometric authentication is a type of system that relies on the unique biological
characteristics of individuals to verify identity for secure access to systems.
Implementing security defense
● Security Policy
Security policy is set of rule that stating which is permitted and which not. It also
a statement that partitions the states of system into a set of authorized or secured and
the set of unauthorized or non-secured.
Ex: a policy state that that outside accessible application must have code review
before deployed, or that user can not share their passwords.
Implementing security defense
● Vulnerability assessment
Vulnerability : the weak point of network or computer
system that easy for attacker to exploit into our system.
Vulnerability assessment: is process of identification
of devices vulnerability. It use method scan to identify
the vulnerability.or it is a process to protect possible
flaw of security.
Ex: nessus, webinspect are vulnerability scanner
Implementing security defense
Intrusion detection
Intrusion detection : is device or software application that can monitor a
network or computer system from malicious activity and policy violation.
There are two method of intrusion detection: anomaly based-detection and
signature based-detection.
1. Anomaly based-detection: use technique to characterize the simple behaviour and
detect when strange occurs.
2. signature based-detection: characterize the dangerous behaviour detect when it
occurs.
Implementing security defense
Virus protection
Antivirus : is software that can stop the virus to
enter our computer when we are online or
download application from internet.
Antivirus use database call virus dictionary that
contained of unique viruses signature. When we
download app from internet Antivirus search for
signatures in that application if it contained with
signature of virus if will remove that command.
When we update the antivirus software it mean that
we are update the for new virus signature .
Firewalling to protect system and network
Firewall: is a hardware or software system that
prevent unauthorized access to or from the
network.it can be implement by hardware or
softwear or bombination of both.all data enterng
or leaving in network must pass through the
firewall.
Ex: router is hardware firewall and
zonealarm is software firewall
Function of firewall: can monitor and control
network traffic in and out network. Allow wanted
data in and block unwanted data
Firewalling protect system and network
Three types of firewall :
1. personal firewall: is software to install in individual computer that offer protection
against unwanted and intrusion. It disguised from other by it scale.
2. application proxy firewall: understand application protocol and can control them
( work as an SMTP)
3. system call firewall: monitor all important system call and apply rules for them
(which program can execute which system call)
Security classification
U.S department of defense outline four division of computer security
classification A,B,C,D:
Division D: the lowest level classification or minimal protection.
Division C: provides the discretionary protection through auditing.
C1:identifies cooperating users with the same level of protection.
C2: allows user-level access control
Division B: have all properties of C2,but they attach a sensitivity label to each
system.
Computer security classification
Division B Divided into 3 classes :
• B1: maintains the security label of each object in the system. And label is used for
making decision .
• B2:extend the sensitive label to each system resource such as storage object.
• B3: allow the creation of access-control lists that denote user not to granted access
to given name object .
Division A: highest level of security classification. Uses formal design and verification
techniques to ensure security.

More Related Content

What's hot

Security models
Security models Security models
Security models
LJ PROJECTS
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
Pradipta Poudel
 
Web Security
Web SecurityWeb Security
Web Security
Dipika Bambhaniya
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
vampugani
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
Smriti Rastogi
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 

What's hot (20)

Security models
Security models Security models
Security models
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
 
Web Security
Web SecurityWeb Security
Web Security
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Network security
Network securityNetwork security
Network security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Security threats
Security threatsSecurity threats
Security threats
 

Viewers also liked

Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication securityLê Liêu
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security finalneerajchor
 
Communication security
Communication securityCommunication security
Communication securitycharina cheniz
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
Cultural shock
Cultural shockCultural shock
Cultural shock
Sotheavy Nhoung
 
Communication Security
Communication SecurityCommunication Security
Communication Security
Axis Communications
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Sam Bowne
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
Sam Bowne
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 

Viewers also liked (11)

Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication security
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security final
 
Communication security
Communication securityCommunication security
Communication security
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Cultural shock
Cultural shockCultural shock
Cultural shock
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Similar to Communication security

Ch19 OS
Ch19 OSCh19 OS
Ch19 OSC.U
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
trendy updates
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
Argie242424
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
AJAY VISHKARMA
 

Similar to Communication security (20)

Data security
Data securityData security
Data security
 
OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer security
Computer securityComputer security
Computer security
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
System Security
System SecuritySystem Security
System Security
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer security
Computer securityComputer security
Computer security
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

Communication security

  • 2. Content • The Security Problem • Types of Security Violations • Program Threads • Cryptography as a Security Tool • System and Network Threats • User Authentication • Implementing Security Defenses • Firewalling to Protect System and Networks • Computer-Security Classifications
  • 3. The Security Problems What is Security Security Violations Level of Security
  • 4. What is security? Security is the process of ensuring that operating system can operate without external disruption or intrusion. • Data • Memory • CPU • Software, etc • Hacking • Virus • Malware • Worm, etc What? From what? System Resources Threats
  • 5. Security violations Breach of confidentiality Breach of integrity Breach of availability Theft of service Denial of service (DOS)
  • 7. Program Threats Trojan Horse Trap Door Logic Bomb Stack and Buffer Overflow Viruses
  • 11. Stack and Buffer Overflow
  • 12. Viruses File: write a code to execute itself at the start of the infected program Boot: (memory virus) infects the boot section of floppy/hard disks during the start-up and continue to infect other bootable programs used by the system. Macro: is written in high-level language and is only capable of execution inside a program such as ms words, excel, etc. Source Code: it changes source code to include itself in it. Polymorphic: changes its virus signature (pattern that can give itself off as virus) every time it is install. Encrypted: encrypt itself to avoid detection and decrypt itself once it wants to execute. Stealth: avoid detection by many means such as trying to give out clean codes (code without virus) when being read by scanner. Tunneling: protect itself by interrupting antivirus scanner before it is found. Multipartite: infected many parts of system such as boot sector, memory and files. Armored: it uses special tricks to make it difficult to detection, disinfection, and understand of its codes.
  • 13. What is Cryptography ? The word ‘cryptography’ was combining two Greek words, ‘Kryptos’ meaning hidden and ‘graphein’ meaning writing. It is the techniques of electronic security messages by converting into unreadable form, only a computer that have a matching key can read it.
  • 14. Why cryptography? • Hiding the meaning of messages • Security between communications • Protect database,files and entire disks • Defenses against computer attacks • Protect the worm and the other viruses • Authentication the sender and receiver messages
  • 15. Encryption ● Encryption enable the sender to ensure that only the computer possessing a matching key can read the data ● The encryption function E :K (M C) ● The decryption function D :K (C M ) K is a set as keys M is a set as messages C is a set as ciphertexts
  • 16. Encryption There are two types of encryption algorithms : symmetric and asymmetric. Symmetric is all algorithms that are use the same key to both encrypt and decrypt. Asymmetric is the algorithms that are use different key to encrypt and decrypt.
  • 17. Symmetric encryption The general process of symmetric encryption :
  • 18. Symmetric encryption Block cipher is the a block of plaintext bits and generates a block of ciphertext bits, generally of same size or fix-length group of bits. The choice of block size not affect to encryption scheme. The strength of cipher depends up on the key length.
  • 19. Symmetric encryption All those algorithm use symmetric method:
  • 20. Asymmetric encryption The operation as like symmetric but encrypted communication create two keys that one called public key (anyone can get it to encrypted messages) and other one is private keys ( only the key creator that can decrypted messages).
  • 21. Authentication Authentication have 2 function: S (generate authentication from message) and V (verity authentication on message). S: K ( M A) and V: K ((M A ) {true, false}) Message-authentication algorithm code (MAC): is a symmetric key to provide message authentication.
  • 22. Authentication Digital signature is a cryptographic value that is calculated from the data and a secret key known only by the signer.
  • 23. System and Network Threats • Worms • Port Scanning: is not an attack but rather a mean for a cracker to detect a system’s vulnerabilities to attack. • Denial of Service
  • 24. What is the System and Network Threats? Threat = in computer security refers to anything that has the potential to cause serious harm to a computer system. System and Network threads involve the abuse of services and network connection. Usually, it create an environment in which operating system resources and user file are misuse. The more Open an operating system, the more • Services it has enabled • Function it allow • Bug is available to exploit
  • 25. What is worm ? A worm is independent self-replicating code that one initiated, spread across networks consuming memory resources without user intervention. Cornell graduate student “Robert Tappan Morris” Unleashed the first worm that quickly spread in Unix system. And result that was estimated : ● 10% of the 60 000 system in U.S were affected. ● Damages $100 million, according U.S General Accounting Office. He then was sentenced to 3 years probation, 400 hours of community service and fined $10 000. Morris’s legal costs probably exceeded $100 000. And he became a Professor at MIT.
  • 26. What is Denial of Service(DOS) attacks ? DOS is the attack in which disrupting legitimate use of a system without gaining or stealing information from users. Ex: When DOS attack happen, user may not be able to use internet browser. Sometime she did not know the attack, because she think that is the slowdown of the internet. DOS attack fall into two categories : 1. Only use so many system resource (No big deal). Ex: A website click : use available CPU and to pop up window infinitely. 2. Disrupting the network of facility, against major website. (This cause may temporarily block the network till OS can be updated).
  • 27. Distributed Denial-of-Service(DDOS) attacks These attacks come from many computer all at once toward a common website, typically by zombies(bot-net). Botnet = (digital army, zombie army) a network of private computer infected with malicious software and controlled as a group. DDOS + Blackmail => in exchange for money .
  • 28. User Authentication • Password and Password Vulnerabilities • Securing Passwords • One-Time Passwords • Biometrics
  • 29. What is user authentication? User Authentication is the act of verifying the identity of someone( a user, device, or entity) who want to access data resources or application. Ex: Password is common way to authenticate someone identity. Generally, passwords are used to protect object in computer system.
  • 30. Password Vulnerabilities Password: A string of characters used for authenticating a user identity. Password are often used to protect objects in the computer system. Some type of passwords compromise, illegal transfer • There are two common ways to guess a password: 1. For the intruder (human or program): use obvious information. 2. Use brute force: trying all possible combination of valid password. • Shoulder surfing: look the shoulder of a user. • Exposure is written down where passwords can be read or lost. • Result of human nature: share your accounts to someone.
  • 31. One-Time Passwords Using paired password to avoid the problem of password sniffing and shoulder surfing. In this scheme, the system and user share a symmetric password. Symmetric or private key: 1. Uses a single key : must be kept secret 2. One other may be made public The two keys are related mathematically.
  • 32. Biometrics Bio(meaning life) + metric(meaning to measure) Biometrics is the measurement and analysis of people : 1. Physiological characteristics: The shape or composition of the body. Example: fingerprint, face, DNA 2. Behavioral characteristics: The behavior of a person. Example: voice, gestures Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to systems.
  • 33. Implementing security defense ● Security Policy Security policy is set of rule that stating which is permitted and which not. It also a statement that partitions the states of system into a set of authorized or secured and the set of unauthorized or non-secured. Ex: a policy state that that outside accessible application must have code review before deployed, or that user can not share their passwords.
  • 34. Implementing security defense ● Vulnerability assessment Vulnerability : the weak point of network or computer system that easy for attacker to exploit into our system. Vulnerability assessment: is process of identification of devices vulnerability. It use method scan to identify the vulnerability.or it is a process to protect possible flaw of security. Ex: nessus, webinspect are vulnerability scanner
  • 35. Implementing security defense Intrusion detection Intrusion detection : is device or software application that can monitor a network or computer system from malicious activity and policy violation. There are two method of intrusion detection: anomaly based-detection and signature based-detection. 1. Anomaly based-detection: use technique to characterize the simple behaviour and detect when strange occurs. 2. signature based-detection: characterize the dangerous behaviour detect when it occurs.
  • 36. Implementing security defense Virus protection Antivirus : is software that can stop the virus to enter our computer when we are online or download application from internet. Antivirus use database call virus dictionary that contained of unique viruses signature. When we download app from internet Antivirus search for signatures in that application if it contained with signature of virus if will remove that command. When we update the antivirus software it mean that we are update the for new virus signature .
  • 37. Firewalling to protect system and network Firewall: is a hardware or software system that prevent unauthorized access to or from the network.it can be implement by hardware or softwear or bombination of both.all data enterng or leaving in network must pass through the firewall. Ex: router is hardware firewall and zonealarm is software firewall Function of firewall: can monitor and control network traffic in and out network. Allow wanted data in and block unwanted data
  • 38. Firewalling protect system and network Three types of firewall : 1. personal firewall: is software to install in individual computer that offer protection against unwanted and intrusion. It disguised from other by it scale. 2. application proxy firewall: understand application protocol and can control them ( work as an SMTP) 3. system call firewall: monitor all important system call and apply rules for them (which program can execute which system call)
  • 39. Security classification U.S department of defense outline four division of computer security classification A,B,C,D: Division D: the lowest level classification or minimal protection. Division C: provides the discretionary protection through auditing. C1:identifies cooperating users with the same level of protection. C2: allows user-level access control Division B: have all properties of C2,but they attach a sensitivity label to each system.
  • 40. Computer security classification Division B Divided into 3 classes : • B1: maintains the security label of each object in the system. And label is used for making decision . • B2:extend the sensitive label to each system resource such as storage object. • B3: allow the creation of access-control lists that denote user not to granted access to given name object . Division A: highest level of security classification. Uses formal design and verification techniques to ensure security.