SlideShare a Scribd company logo
Security




 COMP3231   1
Security in the “Real” World
• We are all familiar with securing valuables
  – Guards
  – Locked doors, cabinets, safes
  – ID badges
• Goal: Only authorised people have access
  to the valuables
• How does this relate to computer
  systems?
                    COMP3231               2
Computer System “Valuables”
• Hardware
  – Threats include theft, accidental or deliberate
    damage.
  – Hardware security is similar to physical
    security of valuables
     • Use similar techniques to secure the physical
       hardware.




                       COMP3231                        3
Computer System “Valuables”
• Data
  – Three general goals of data security
  – Confidentiality
     • Data is only readable by authorised people
         – Able to specify who can read what on system, and be
           enforced
         – Preserve secrecy or privacy
  – Integrity
     • Data is only modifiable by authorised people
  – Availability
     • Data is available to authorized parties
                          COMP3231                               4
Threats
• Denial of Service
  – An asset of the system is destroyed, or
    becomes unavailable or unusable
  – Attack on Availability
  – Example:
     •   Destruction of hardware
     •   Cutting a communication line
     •   Disabling a file server
     •   Overloading a server or network

                         COMP3231             5
Threats
• Interception
  – An unauthorised party gains access to an
    asset
  – Attack on Confidentiality
  – Examples:
     • Wiretapping to capture data on a network
     • Illicit copying of files and programs




                       COMP3231                   6
Threats
• Modification
  – An unauthorized party not only gained
    access, but tampers with data
  – Attack on Integrity
  – Examples:
     • Changing values in a file
     • Altering a program so that it performs differently
     • Modifying the content of messages being
       transmitted on a network

                        COMP3231                            7
Data Security
• Can be partially solved using physical security
• Usually too expensive or inconvenient to do so
   – Example:
      • Each user has private computer, in a locked guarded room.
      • No sharing of information is permitted
      • No outside connectivity permitted
          – No email, shared file server, shared printer, shared tape drive
          – No printouts or storage media can enter or exit the room.
      • Users can still memorise information a bit at a time and leak
        secrets
• However, physical security is still an important
  part of any computer security system.
                              COMP3231                                    8
Intruders
•       Strategies to provide security typically consider the expected
        intruders (also called adversaries) to be protected against.
•       Common categories
    1.        Casual prying by nontechnical users
          •      Stumble across others users files on file server
    2.        Snooping by insiders
          •      Local programmer explicitly attempting to break security
    3.        Determined attempts to make money
          •      Bank programmers installing software to steal money
    4.        Commercial or military espionage
          •      Well funded attempts to obtain corporate or government secrets
•       Depending on the value of the data, and the perceived adversary,
    –         more resources may be provided to secure the system
    –         less convenient methods of access may be tolerated by users


                                        COMP3231                                  9
Data Loss
•    Protecting against data loss is an important
     part of any security policy
•    Examples:
    1. Acts of God
       -   fires, floods, wars
    2. Hardware or software errors
       -   CPU malfunction, bad disk, program bugs
    3. Human errors
       -   data entry, wrong tape mounted
-    General approach is off-site backups
                                 COMP3231            10
User Authentication
• Thus far, we have described various concepts with
  reference to authorised users
• Assume we can decide whether a given user is
  authorised to perform an operation, but how can we
  determine if the user is who he says he is?
⇒ How can we authenticate the users?




                        COMP3231                       11
Approaches to User Authentication
•    Three general approaches to identifying a user
    –    Based on some unique property they possess
    1.   Something the user knows
    2.   Something the user has
    3.   Something the user is
    –    Each approach has its own complexities and
         security properties




                         COMP3231                     12
Authentication Using Passwords
• Most common form of authentication is
  entering a login name and password
  – The password entered is not displayed for
    obvious reasons
  – Windows 2K/XP/Vista/7 is broken in this
    regard
    • Prints ‘*’ for each character typed
       – Reveals the length of password
    • Also remembers the last login name
  – UNIX approach is much better
    • In security, the less revealed the better
                        COMP3231                  13
Example: Less is More
•   Careless login program can give away
    important information
    a) Successful login
    b) Valid login ID revealed
    c) No useful information revealed




                      COMP3231             14
Problems with Password
            Security
• One study from 1979
  – Given a list of first name, last names, street
    names, moderate dictionary, license plate
    number, some random strings, the previous
    spelt backwards, etc..
  – A comparison with a password file obtained
    86% of all passwords
• A more recent study (1990) produced
  similar results
                     COMP3231                        15
RockYou Passwords
    Dec 2009




      COMP3231      16
The Importance Password
            Security
• Good password security is vital if
  computer is publicly accessible .
  – Connected to a network or the Internet


• It’s common for intruders probe internet
  connect machines for weakness, including
  poor (default) passwords.


                    COMP3231                 17
Approaches to improving password
            security
• Passwords are are stored encrypted
  – Avoids sysadmins, and potentially unwanted
    computer “maintainers” from obtaining passwords
     • Example: from backup tapes
     • Example: RockYou attack yielded unencrypted passwords.
• Login procedure takes user-supplied string,
  – encrypts it
  – compares result to stored encrypted password




                         COMP3231                          18
An Attack on Encrypted
            Passwords
• Take the dictionary of words, names, etc,
  and encrypt all of then using the same
  encryption algorithm
• Simply match pre-encrypted list with
  password file to get matches
  – Assumes you have access to encrypted
    passwords
     • One did by default in old versions of Linux/Unix


                       COMP3231                           19
Improving Password Security
           with a Salt
• Idea:
   – Encrypt the password together with a n-bit random number (the
     salt) and store both the number and encrypted result
   – Example
      result = encrypt(‘Dog1234’), 1234
• Cracker must encrypt each dictionary word 2n different
  ways
   – Make pre-computed list 2n times larger
• UNIX “crypt” takes this approach with n = 12
• Additional security via making encrypted passwords
  unreadable (shadow passwords)

                              COMP3231                          20
Improving Password Security
• Storing passwords more securely does not
  help if user ‘homer’ has the password
  ‘homer’
• User must be educated (or forced) to
  choose good passwords
  – Approaches:
    • Warn users who choose poor passwords
    • Pick passwords for users
       – easy to remember nonsense words
    • Force them to change the password regularly
                       COMP3231                     21
Issues with ‘Good’ Passwords
• By forcing frequent password changes,
  users tend to choose simpler passwords
• By choosing too ‘good’ a password for
  users, users put them on post-it notes on
  the monitor
• Still many attacks involving intercepting
  password between user and service, and
  re-using it.
  – phishing
                  COMP3231                22
Aside: One-Way Functions
• Function such that given formula for f(x)
  – easy to evaluate y = f(x)
• But given y
  – computationally infeasible to find x




                   COMP3231                   23
One-time Passwords
• Password changing in the extreme
• Advantage:
  – Snooping login provides no useful information
     • Only a stale previous password
• Approach - S/KEY, author: Leslie Lamport
  – Choose a secret phrase and the number of one time
    passwords required.
  – Each password is generated via re-applying a one-
    way function
  – Passwords are then used in reverse order
     • Easy to compute the previous password, but not the next.

                          COMP3231                                24
One-time Password: Example
•   P0=f(f(f(f(s))))               • On home PC
•   P1=f(f(f(s)))                      – Compute one-time
•   P2=f(f(s))                           password to supply via 3
•   P3=f(s)                              iterations of 1 way function
                                       – Subsequent via 2, 1, 0
• Server initially stores P0
• Server receives O-T password     • Note
  (P) and computes f(P)                – Server never stores secret
• If f(P) matches P0, login              (s)
  successful, server stores P (=       – Home PC store number of
  P1)                                    passwords used, but does
                                         not need to store secret
                                         either.
                            COMP3231                              25
Challenge-Response
• Server and client both know secret key (k)
• Server sends a challenge random number (c) to
  client
• Client combines the secret key (k) with random
  number (c) and applies a publicly-known
  function r = f(c,k)
• Client sends the response to server
• On server, if supplied r equals f(c,k) we have
  successful login


                    COMP3231                  26
Challenge-Response
• Advantage:
  – Secret Key is never transmitted on potentially
    insecure networks
  – Eavesdropping is fruitless
     • Assuming function (f) is such that k cannot be easily deduced
       from a large number of observed challenge-responses
• Con:
  – Need a ‘computer’ present to login (compute
    response)
     • PDA, phone, etc.


                           COMP3231                             27
COMP3231   28
Authentication Using a Physical
             Object




  • Magnetic cards
    – magnetic stripe cards
    – chip cards: stored value cards, smart cards
                    COMP3231                        29
Authentication Using
              Biometrics
• A device for measuring
  finger length.
• Alternatives:
  – Retina scans
  – Voice analysis
  – Analysing signature
    dynamics



                          COMP3231   30
Issue: User Acceptance
• Low user acceptance results in:
  – Users themselves compromising the system
     • Example: using post-it notes
  – Refusal to login
     • E.g. login using a blood sample
• Challenge:
  – To find a secure, unobtrusive, simple scheme


                       COMP3231               31
Authentication Summary
• Authentication is an important component of
  security
• Password-based schemes only modestly robust
  to attack. Many attacks possible
  – Insecure user behaviour
  – Password storage
  – Attacks on cryptographic algorithms (for storage or
    transfer)
  – Snooping Networks
• Physical and Biometric authentication improves
  security
  – Attacks still possible, but more resources required.

                        COMP3231                           32
Software Threats
• Given an reasonable authentication mechanism,
  many other software threats exist.
• Software Exploits
   –   Trojan Horses
   –   Login Spoofing
   –   Logic Bombs
   –   Backdoors (Trapdoors)
   –   Buffer Overflows
• Self replicating
   – Viruses

                        COMP3231            33
Trojan Horses
• Seemingly innocent program executed by an
  unsuspecting user
  – Either directly or indirectly
• Program can then do anything the user can
  – Modify or delete files, send them elsewhere on the
    net.
• Sample exploit
  – If a user has “.”, “:/bin” or similar in their PATH, place
    a file called ls in your directory (or /tmp).


                          COMP3231                          34
Login Spoofing
• Write a program that emulates the login screen
   – Login, run the program to collect password of unsuspecting user,
     then exit to the real login prompt.
• Windows 2K/XP provides a key combination (CTRL-
  ALT-DEL) that can’t be bypassed to produce the real
  login program




                             COMP3231                             35
Logic Bombs
• Code secretly embedded in an application
  or the OS that goes off when certain
  conditions are met.
  – Example: Payroll programmer embeds code
    that checks he is on the payroll, if not, the
    payroll software becomes malicious
• Variant: Time Bombs


                     COMP3231                   36
Backdoors
• Code inserted by the programmer to bypass some
  check.
   – Example: The login program




                          COMP3231                 37
Buffer Overflows
• Main calls A which has a local buffer
• Overflow the buffer with code + starting address of the
  code
• Good for both local and remote attacks
• Caused by programmers not checking buffer bounds




                         COMP3231                       38
Viruses
• A program that reproduces itself by attaching its
  code to another program.
• Can do anything the normal program could do
  – Print harmless message
  – Destroy all files on hard disk
  – Send all your data to the net
  – Trash the EEPROM BIOS to make your computer
    inoperable
  – Denial of service attack


                      COMP3231                    39
How Viruses Work
• Virus written in assembly language
• Inserted into another program
  – use tool called a “dropper”
• Virus dormant until program executed
  – then infects other programs
  – eventually executes its “payload”


                   COMP3231             40
How Viruses Work
• Parasitic Viruses
  – Add their code to various locations in the executable
  – Redirect the start address in the header
  – On execution, it may replicate by modifying another
    executable file (and other malicious activities).




                        COMP3231                       41
How Viruses Work
• Boot Sector Viruses
  – Copies original boot block to different location
  – Replaces boot block with itself
  – When machine boots, virus is loaded into
    RAM
  – It installs itself, and then boots OS via original
    boot block
• How does it regain control later?

                      COMP3231                     42
How Viruses Work
• Virus installs interrupt handlers which rely on OS not
  installing all its own handlers prior to next interrupt
  occurring
   – Older versions of Windows behaved that way
• Virus reinstalls trap handlers at next opportunity




                           COMP3231                         43
How Viruses Work
• Memory Resident Viruses
  – Install themselves in main memory
  – Typically redirect the exception/interrupt handlers to itself
      • Still calls the real code to remain undetected
      • checks and reinstalls redirections changed
      • Replicate during, or manipulate and spy-on on syscalls




                              COMP3231                              44
How Viruses Work
• Macro Viruses
  – Rely on overly powerful/feature overloaded
    macro languages
  – MS office uses visual basic – complete
    programming language that can read/write
    files
  – Opening a Word document is like running a
    program (it could do anything)
    • Most people ignore warnings about macros

                     COMP3231                    45
How Viruses Spread

• Virus placed where it’s likely to be
  copied
• When copied
  – infects programs on hard drive, USB stick
  – may try to spread over LAN
• Attach to innocent looking email
  – when it runs, use mailing list (address book)
    to replicate
                     COMP3231                   46
Antivirus Approach
• Scanning
  – Search each file and check if virus present
    • 10,000 potential viruses and 10,000 files
    • Hard to make fast
  – Use fuzzy searches to catch small changes in
    known viruses
    • Slower, false positives
  – Trade-off between accuracy and acceptable
    performance
                       COMP3231                   47
Antivirus and Anti-Antivirus Techniques




     (a) A program
     (b) Infected program
        Change in file length a give away

                        COMP3231            48
Antivirus and Anti-Antivirus Techniques




     (c) Compressed infected program
        Presence of virus code still a give away


                        COMP3231                   49
Antivirus and Anti-Antivirus Techniques




     (d) Encrypted virus
        Presence of (de)compressor a give away


                       COMP3231                  50
Antivirus and Anti-Antivirus Techniques




     (e) Compressed virus with encrypted compression
        code
        Can still search for remaining decryptor code

                       COMP3231                         51
Antivirus and Anti-Antivirus Techniques




       Examples of a polymorphic virus
   All of these examples do the same thing
                  X=A+B+C-4                52
Antivirus and Anti-Antivirus
            Techniques
• Integrity checkers
  – Scan the disk and determine checksums for all
    executable files
  – Check checksums, if changed we have a virus
  – Counter, viruses can hack checksum database
    is
• Behavioral checkers
  – Look for virus like behaviour
     • Example: overwriting executable file
        – False alarms (e.g. a compiler)

                        COMP3231              53
Antivirus and Anti-Antivirus
              Techniques
• Virus avoidance
  – good OS
       • Separate user/system mode/protection to minimise damage
  –   Run/install only reputable software
  –   use antivirus software
  –   Do not open attachments to email
  –   frequent backups
• Recovery from virus attack
  – halt computer, reboot from safe disk, run antivirus
  – restore from backups

                          COMP3231                          54
Running Foreign Code
• We can see that running foreign code can
  be dangerous (trojan horse, viruses,
  simply malicious, etc.)
• Problem is that all the code we run has all
  the privileges we do
• We need a method of running untrusted
  code safely


                   COMP3231                55
Principle of Least Privilege
• A guiding principle we would like to apply
• Idea:
  – Give the suspicious program only the
    privileges required to complete the task you
    expect, nothing more
  – Example:
     • Can only perform file related system calls
     • Can only access files within a specified directory


                        COMP3231                        56
Example: Active Web Content
• We’d like to browse “active” web content
  – Run content in the web browser
  – The browser has all the privileges we do
• Some approaches
  – Sandboxing
  – Interpretation
  – Code Signing


                     COMP3231                  57
Sandboxing
• Idea:
  – Code runs within a sandbox
    within a browser (or some other
    larger application)
  – The applet can access only the
    data contained within its
    sandbox, and nothing else.
  – It can only jump to code within its
    sandbox (and cannot modify the
    code)
• How can we create a sandbox
  within a process?
                        COMP3231          58
Sandbox Implementation
• Firstly, assume we can restrict access to code to
  avoid problem of self modifying code
• To restrict code to the code segment
  – Scan the code
  – Check all jumps and branches jump to addresses
    within the sandbox
     • Handle both absolute and relative addresses
  – For computed (dynamic jumps) we insert extra
    instruction into the code to check the destination
    addresses are within the code
     • Involves fairly complex code rewriting, but it is doable
• To restrict data access to data section, we do
  the some thing we did for code
                            COMP3231                              59
Sandbox Implementation
• What about system calls
  – We use a reference monitor that
    • Intercepts all system calls
    • Determine whether the call is allowed to succeed
      or not
       – Based on the type of call, or the arguments supplied.
  – Reference monitor restricts the system calls to
    a safe subset


                         COMP3231                                60
Interpretation
• Instead of running code directly (natively), we run it using
  an interpreter
   – Interpreter can apply addressing restrictions
   – Can consider the interpreter as implementing a sandbox
   – Example: JAVA




                            COMP3231                          61
Code Signing
• Authenticity of the code is guaranteed
• Issues
   – Does not protect you against bad or buggy code
   – Example: Shockwave has had various “authentic” security
     problems




                           COMP3231                            62
Summary
• Even given strong authentication, there
  are many software threats to data security
  policies.
• The affect of exploiting those threats can
  be minimised by adopting the principle of
  least privilege.



                  COMP3231                63

More Related Content

What's hot

Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
Rashid Yahye
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
yaminohime
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Sam Bowne
 
File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating System
Meghaj Mallick
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
dilahkmpk
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
N.Jagadish Kumar
 
Day 1-1-intro-sw-vuls
Day 1-1-intro-sw-vulsDay 1-1-intro-sw-vuls
Day 1-1-intro-sw-vuls
Stephanie Rogers
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
Online
 
Computer Security
Computer SecurityComputer Security
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
CTIN
 
July132000
July132000July132000
July132000
CTIN
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Sam Bowne
 
Week 12
Week 12Week 12
Week 12
Joey Pierce
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
Dheeraj Kumar Singh
 
Unit v
Unit vUnit v
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
Irfan Ali Memon
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 

What's hot (20)

Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating System
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Day 1-1-intro-sw-vuls
Day 1-1-intro-sw-vulsDay 1-1-intro-sw-vuls
Day 1-1-intro-sw-vuls
 
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qbCs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
 
July132000
July132000July132000
July132000
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Week 12
Week 12Week 12
Week 12
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
 
Unit v
Unit vUnit v
Unit v
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 

Viewers also liked

Ikumen communication
Ikumen communicationIkumen communication
Ikumen communicationTakaho Maeda
 
Portfolio 2013
Portfolio 2013 Portfolio 2013
Portfolio 2013
suehoeft
 
Paczka ciasteczek
Paczka ciasteczekPaczka ciasteczek
Paczka ciasteczekderus19
 
The UK Government's First World War centenary commemoration programme
The UK Government's First World War centenary commemoration programmeThe UK Government's First World War centenary commemoration programme
The UK Government's First World War centenary commemoration programme
onthewight
 
44th AES conference (2011)
44th AES conference (2011)44th AES conference (2011)
44th AES conference (2011)
Alvaro Barbosa
 
Prof. David Coggon: Environmental health hazards
Prof. David Coggon: Environmental health hazardsProf. David Coggon: Environmental health hazards
Prof. David Coggon: Environmental health hazards
onthewight
 
Digitaal leermateriaal op school
Digitaal leermateriaal op school Digitaal leermateriaal op school
Digitaal leermateriaal op school
wimdboer
 
OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編
OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編
OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編
Kazumi Ohhashi
 
Brain inf2012(present)
Brain inf2012(present)Brain inf2012(present)
Brain inf2012(present)
Alvaro Barbosa
 
ইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষা
ইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষাইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষা
ইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষা
Abul Bashar
 
Slide bio4206
Slide bio4206Slide bio4206
Slide bio4206
dparkin
 
The Caribbean can never be surpassed
The Caribbean can never be surpassedThe Caribbean can never be surpassed
The Caribbean can never be surpassed
Trevor Fordyce
 
Edicion 103 Reporte Energia
Edicion 103 Reporte EnergiaEdicion 103 Reporte Energia
Edicion 103 Reporte Energia
Reporte Energía
 
Saigon luxury apartment
Saigon luxury apartment Saigon luxury apartment
Saigon luxury apartment
tranduyen76
 
referenties C2- The Communication Square Website
referenties C2- The Communication Square Websitereferenties C2- The Communication Square Website
referenties C2- The Communication Square WebsiteValerie Leeman
 
Slide bcs4311
Slide bcs4311Slide bcs4311
Slide bcs4311
dparkin
 
Actors and Academics
Actors and AcademicsActors and Academics
Actors and Academics
David Hopes
 
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
onthewight
 
Quang thai new
Quang thai newQuang thai new
Quang thai new
tranduyen76
 

Viewers also liked (20)

Ikumen communication
Ikumen communicationIkumen communication
Ikumen communication
 
JAXB
JAXBJAXB
JAXB
 
Portfolio 2013
Portfolio 2013 Portfolio 2013
Portfolio 2013
 
Paczka ciasteczek
Paczka ciasteczekPaczka ciasteczek
Paczka ciasteczek
 
The UK Government's First World War centenary commemoration programme
The UK Government's First World War centenary commemoration programmeThe UK Government's First World War centenary commemoration programme
The UK Government's First World War centenary commemoration programme
 
44th AES conference (2011)
44th AES conference (2011)44th AES conference (2011)
44th AES conference (2011)
 
Prof. David Coggon: Environmental health hazards
Prof. David Coggon: Environmental health hazardsProf. David Coggon: Environmental health hazards
Prof. David Coggon: Environmental health hazards
 
Digitaal leermateriaal op school
Digitaal leermateriaal op school Digitaal leermateriaal op school
Digitaal leermateriaal op school
 
OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編
OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編
OSC2015 Tokyo/Spring セミナー「初めてのLibreOffice L10N UI/ヘルプ翻訳」予告編
 
Brain inf2012(present)
Brain inf2012(present)Brain inf2012(present)
Brain inf2012(present)
 
ইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষা
ইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষাইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষা
ইভটিজিং প্রতিরোধে দক্ষতাভিত্তিক শিক্ষা
 
Slide bio4206
Slide bio4206Slide bio4206
Slide bio4206
 
The Caribbean can never be surpassed
The Caribbean can never be surpassedThe Caribbean can never be surpassed
The Caribbean can never be surpassed
 
Edicion 103 Reporte Energia
Edicion 103 Reporte EnergiaEdicion 103 Reporte Energia
Edicion 103 Reporte Energia
 
Saigon luxury apartment
Saigon luxury apartment Saigon luxury apartment
Saigon luxury apartment
 
referenties C2- The Communication Square Website
referenties C2- The Communication Square Websitereferenties C2- The Communication Square Website
referenties C2- The Communication Square Website
 
Slide bcs4311
Slide bcs4311Slide bcs4311
Slide bcs4311
 
Actors and Academics
Actors and AcademicsActors and Academics
Actors and Academics
 
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
 
Quang thai new
Quang thai newQuang thai new
Quang thai new
 

Similar to Lect19

chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
satonaka3
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
Wiliam Ferraciolli
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Hadi Aoun
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
JebasheelaSJ
 
Data security
Data securityData security
Data security
sbmiller87
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Nune SrinivasRao
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
ch15.pdf
ch15.pdfch15.pdf
ch15.pdf
Sami Mughal
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
RushikeshChikane2
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
Spyglass Security
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
Irfan Ali Memon
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Dharmalingam Ganesan
 
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Gurbir Singh
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
mysoria
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Resilient Systems
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
Jasleen Kaur
 

Similar to Lect19 (20)

chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
 
Data security
Data securityData security
Data security
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
 
ch15.pdf
ch15.pdfch15.pdf
ch15.pdf
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural StyleThreat Modeling: Applied on a Publish-Subscribe Architectural Style
Threat Modeling: Applied on a Publish-Subscribe Architectural Style
 
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
Prof. Fred Piper: Professor Fred Piper -: Cryptography - From Black Art to Po...
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 

More from Vin Voro

Tele3113 tut6
Tele3113 tut6Tele3113 tut6
Tele3113 tut6
Vin Voro
 
Tele3113 tut5
Tele3113 tut5Tele3113 tut5
Tele3113 tut5
Vin Voro
 
Tele3113 tut4
Tele3113 tut4Tele3113 tut4
Tele3113 tut4
Vin Voro
 
Tele3113 tut1
Tele3113 tut1Tele3113 tut1
Tele3113 tut1
Vin Voro
 
Tele3113 tut3
Tele3113 tut3Tele3113 tut3
Tele3113 tut3
Vin Voro
 
Tele3113 tut2
Tele3113 tut2Tele3113 tut2
Tele3113 tut2
Vin Voro
 
Tele3113 wk11tue
Tele3113 wk11tueTele3113 wk11tue
Tele3113 wk11tue
Vin Voro
 
Tele3113 wk10wed
Tele3113 wk10wedTele3113 wk10wed
Tele3113 wk10wed
Vin Voro
 
Tele3113 wk10tue
Tele3113 wk10tueTele3113 wk10tue
Tele3113 wk10tue
Vin Voro
 
Tele3113 wk11wed
Tele3113 wk11wedTele3113 wk11wed
Tele3113 wk11wed
Vin Voro
 
Tele3113 wk7wed
Tele3113 wk7wedTele3113 wk7wed
Tele3113 wk7wed
Vin Voro
 
Tele3113 wk9tue
Tele3113 wk9tueTele3113 wk9tue
Tele3113 wk9tue
Vin Voro
 
Tele3113 wk8wed
Tele3113 wk8wedTele3113 wk8wed
Tele3113 wk8wed
Vin Voro
 
Tele3113 wk9wed
Tele3113 wk9wedTele3113 wk9wed
Tele3113 wk9wed
Vin Voro
 
Tele3113 wk7wed
Tele3113 wk7wedTele3113 wk7wed
Tele3113 wk7wed
Vin Voro
 
Tele3113 wk7wed
Tele3113 wk7wedTele3113 wk7wed
Tele3113 wk7wed
Vin Voro
 
Tele3113 wk7tue
Tele3113 wk7tueTele3113 wk7tue
Tele3113 wk7tue
Vin Voro
 
Tele3113 wk6wed
Tele3113 wk6wedTele3113 wk6wed
Tele3113 wk6wed
Vin Voro
 
Tele3113 wk6tue
Tele3113 wk6tueTele3113 wk6tue
Tele3113 wk6tue
Vin Voro
 
Tele3113 wk5tue
Tele3113 wk5tueTele3113 wk5tue
Tele3113 wk5tue
Vin Voro
 

More from Vin Voro (20)

Tele3113 tut6
Tele3113 tut6Tele3113 tut6
Tele3113 tut6
 
Tele3113 tut5
Tele3113 tut5Tele3113 tut5
Tele3113 tut5
 
Tele3113 tut4
Tele3113 tut4Tele3113 tut4
Tele3113 tut4
 
Tele3113 tut1
Tele3113 tut1Tele3113 tut1
Tele3113 tut1
 
Tele3113 tut3
Tele3113 tut3Tele3113 tut3
Tele3113 tut3
 
Tele3113 tut2
Tele3113 tut2Tele3113 tut2
Tele3113 tut2
 
Tele3113 wk11tue
Tele3113 wk11tueTele3113 wk11tue
Tele3113 wk11tue
 
Tele3113 wk10wed
Tele3113 wk10wedTele3113 wk10wed
Tele3113 wk10wed
 
Tele3113 wk10tue
Tele3113 wk10tueTele3113 wk10tue
Tele3113 wk10tue
 
Tele3113 wk11wed
Tele3113 wk11wedTele3113 wk11wed
Tele3113 wk11wed
 
Tele3113 wk7wed
Tele3113 wk7wedTele3113 wk7wed
Tele3113 wk7wed
 
Tele3113 wk9tue
Tele3113 wk9tueTele3113 wk9tue
Tele3113 wk9tue
 
Tele3113 wk8wed
Tele3113 wk8wedTele3113 wk8wed
Tele3113 wk8wed
 
Tele3113 wk9wed
Tele3113 wk9wedTele3113 wk9wed
Tele3113 wk9wed
 
Tele3113 wk7wed
Tele3113 wk7wedTele3113 wk7wed
Tele3113 wk7wed
 
Tele3113 wk7wed
Tele3113 wk7wedTele3113 wk7wed
Tele3113 wk7wed
 
Tele3113 wk7tue
Tele3113 wk7tueTele3113 wk7tue
Tele3113 wk7tue
 
Tele3113 wk6wed
Tele3113 wk6wedTele3113 wk6wed
Tele3113 wk6wed
 
Tele3113 wk6tue
Tele3113 wk6tueTele3113 wk6tue
Tele3113 wk6tue
 
Tele3113 wk5tue
Tele3113 wk5tueTele3113 wk5tue
Tele3113 wk5tue
 

Recently uploaded

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Lect19

  • 2. Security in the “Real” World • We are all familiar with securing valuables – Guards – Locked doors, cabinets, safes – ID badges • Goal: Only authorised people have access to the valuables • How does this relate to computer systems? COMP3231 2
  • 3. Computer System “Valuables” • Hardware – Threats include theft, accidental or deliberate damage. – Hardware security is similar to physical security of valuables • Use similar techniques to secure the physical hardware. COMP3231 3
  • 4. Computer System “Valuables” • Data – Three general goals of data security – Confidentiality • Data is only readable by authorised people – Able to specify who can read what on system, and be enforced – Preserve secrecy or privacy – Integrity • Data is only modifiable by authorised people – Availability • Data is available to authorized parties COMP3231 4
  • 5. Threats • Denial of Service – An asset of the system is destroyed, or becomes unavailable or unusable – Attack on Availability – Example: • Destruction of hardware • Cutting a communication line • Disabling a file server • Overloading a server or network COMP3231 5
  • 6. Threats • Interception – An unauthorised party gains access to an asset – Attack on Confidentiality – Examples: • Wiretapping to capture data on a network • Illicit copying of files and programs COMP3231 6
  • 7. Threats • Modification – An unauthorized party not only gained access, but tampers with data – Attack on Integrity – Examples: • Changing values in a file • Altering a program so that it performs differently • Modifying the content of messages being transmitted on a network COMP3231 7
  • 8. Data Security • Can be partially solved using physical security • Usually too expensive or inconvenient to do so – Example: • Each user has private computer, in a locked guarded room. • No sharing of information is permitted • No outside connectivity permitted – No email, shared file server, shared printer, shared tape drive – No printouts or storage media can enter or exit the room. • Users can still memorise information a bit at a time and leak secrets • However, physical security is still an important part of any computer security system. COMP3231 8
  • 9. Intruders • Strategies to provide security typically consider the expected intruders (also called adversaries) to be protected against. • Common categories 1. Casual prying by nontechnical users • Stumble across others users files on file server 2. Snooping by insiders • Local programmer explicitly attempting to break security 3. Determined attempts to make money • Bank programmers installing software to steal money 4. Commercial or military espionage • Well funded attempts to obtain corporate or government secrets • Depending on the value of the data, and the perceived adversary, – more resources may be provided to secure the system – less convenient methods of access may be tolerated by users COMP3231 9
  • 10. Data Loss • Protecting against data loss is an important part of any security policy • Examples: 1. Acts of God - fires, floods, wars 2. Hardware or software errors - CPU malfunction, bad disk, program bugs 3. Human errors - data entry, wrong tape mounted - General approach is off-site backups COMP3231 10
  • 11. User Authentication • Thus far, we have described various concepts with reference to authorised users • Assume we can decide whether a given user is authorised to perform an operation, but how can we determine if the user is who he says he is? ⇒ How can we authenticate the users? COMP3231 11
  • 12. Approaches to User Authentication • Three general approaches to identifying a user – Based on some unique property they possess 1. Something the user knows 2. Something the user has 3. Something the user is – Each approach has its own complexities and security properties COMP3231 12
  • 13. Authentication Using Passwords • Most common form of authentication is entering a login name and password – The password entered is not displayed for obvious reasons – Windows 2K/XP/Vista/7 is broken in this regard • Prints ‘*’ for each character typed – Reveals the length of password • Also remembers the last login name – UNIX approach is much better • In security, the less revealed the better COMP3231 13
  • 14. Example: Less is More • Careless login program can give away important information a) Successful login b) Valid login ID revealed c) No useful information revealed COMP3231 14
  • 15. Problems with Password Security • One study from 1979 – Given a list of first name, last names, street names, moderate dictionary, license plate number, some random strings, the previous spelt backwards, etc.. – A comparison with a password file obtained 86% of all passwords • A more recent study (1990) produced similar results COMP3231 15
  • 16. RockYou Passwords Dec 2009 COMP3231 16
  • 17. The Importance Password Security • Good password security is vital if computer is publicly accessible . – Connected to a network or the Internet • It’s common for intruders probe internet connect machines for weakness, including poor (default) passwords. COMP3231 17
  • 18. Approaches to improving password security • Passwords are are stored encrypted – Avoids sysadmins, and potentially unwanted computer “maintainers” from obtaining passwords • Example: from backup tapes • Example: RockYou attack yielded unencrypted passwords. • Login procedure takes user-supplied string, – encrypts it – compares result to stored encrypted password COMP3231 18
  • 19. An Attack on Encrypted Passwords • Take the dictionary of words, names, etc, and encrypt all of then using the same encryption algorithm • Simply match pre-encrypted list with password file to get matches – Assumes you have access to encrypted passwords • One did by default in old versions of Linux/Unix COMP3231 19
  • 20. Improving Password Security with a Salt • Idea: – Encrypt the password together with a n-bit random number (the salt) and store both the number and encrypted result – Example result = encrypt(‘Dog1234’), 1234 • Cracker must encrypt each dictionary word 2n different ways – Make pre-computed list 2n times larger • UNIX “crypt” takes this approach with n = 12 • Additional security via making encrypted passwords unreadable (shadow passwords) COMP3231 20
  • 21. Improving Password Security • Storing passwords more securely does not help if user ‘homer’ has the password ‘homer’ • User must be educated (or forced) to choose good passwords – Approaches: • Warn users who choose poor passwords • Pick passwords for users – easy to remember nonsense words • Force them to change the password regularly COMP3231 21
  • 22. Issues with ‘Good’ Passwords • By forcing frequent password changes, users tend to choose simpler passwords • By choosing too ‘good’ a password for users, users put them on post-it notes on the monitor • Still many attacks involving intercepting password between user and service, and re-using it. – phishing COMP3231 22
  • 23. Aside: One-Way Functions • Function such that given formula for f(x) – easy to evaluate y = f(x) • But given y – computationally infeasible to find x COMP3231 23
  • 24. One-time Passwords • Password changing in the extreme • Advantage: – Snooping login provides no useful information • Only a stale previous password • Approach - S/KEY, author: Leslie Lamport – Choose a secret phrase and the number of one time passwords required. – Each password is generated via re-applying a one- way function – Passwords are then used in reverse order • Easy to compute the previous password, but not the next. COMP3231 24
  • 25. One-time Password: Example • P0=f(f(f(f(s)))) • On home PC • P1=f(f(f(s))) – Compute one-time • P2=f(f(s)) password to supply via 3 • P3=f(s) iterations of 1 way function – Subsequent via 2, 1, 0 • Server initially stores P0 • Server receives O-T password • Note (P) and computes f(P) – Server never stores secret • If f(P) matches P0, login (s) successful, server stores P (= – Home PC store number of P1) passwords used, but does not need to store secret either. COMP3231 25
  • 26. Challenge-Response • Server and client both know secret key (k) • Server sends a challenge random number (c) to client • Client combines the secret key (k) with random number (c) and applies a publicly-known function r = f(c,k) • Client sends the response to server • On server, if supplied r equals f(c,k) we have successful login COMP3231 26
  • 27. Challenge-Response • Advantage: – Secret Key is never transmitted on potentially insecure networks – Eavesdropping is fruitless • Assuming function (f) is such that k cannot be easily deduced from a large number of observed challenge-responses • Con: – Need a ‘computer’ present to login (compute response) • PDA, phone, etc. COMP3231 27
  • 28. COMP3231 28
  • 29. Authentication Using a Physical Object • Magnetic cards – magnetic stripe cards – chip cards: stored value cards, smart cards COMP3231 29
  • 30. Authentication Using Biometrics • A device for measuring finger length. • Alternatives: – Retina scans – Voice analysis – Analysing signature dynamics COMP3231 30
  • 31. Issue: User Acceptance • Low user acceptance results in: – Users themselves compromising the system • Example: using post-it notes – Refusal to login • E.g. login using a blood sample • Challenge: – To find a secure, unobtrusive, simple scheme COMP3231 31
  • 32. Authentication Summary • Authentication is an important component of security • Password-based schemes only modestly robust to attack. Many attacks possible – Insecure user behaviour – Password storage – Attacks on cryptographic algorithms (for storage or transfer) – Snooping Networks • Physical and Biometric authentication improves security – Attacks still possible, but more resources required. COMP3231 32
  • 33. Software Threats • Given an reasonable authentication mechanism, many other software threats exist. • Software Exploits – Trojan Horses – Login Spoofing – Logic Bombs – Backdoors (Trapdoors) – Buffer Overflows • Self replicating – Viruses COMP3231 33
  • 34. Trojan Horses • Seemingly innocent program executed by an unsuspecting user – Either directly or indirectly • Program can then do anything the user can – Modify or delete files, send them elsewhere on the net. • Sample exploit – If a user has “.”, “:/bin” or similar in their PATH, place a file called ls in your directory (or /tmp). COMP3231 34
  • 35. Login Spoofing • Write a program that emulates the login screen – Login, run the program to collect password of unsuspecting user, then exit to the real login prompt. • Windows 2K/XP provides a key combination (CTRL- ALT-DEL) that can’t be bypassed to produce the real login program COMP3231 35
  • 36. Logic Bombs • Code secretly embedded in an application or the OS that goes off when certain conditions are met. – Example: Payroll programmer embeds code that checks he is on the payroll, if not, the payroll software becomes malicious • Variant: Time Bombs COMP3231 36
  • 37. Backdoors • Code inserted by the programmer to bypass some check. – Example: The login program COMP3231 37
  • 38. Buffer Overflows • Main calls A which has a local buffer • Overflow the buffer with code + starting address of the code • Good for both local and remote attacks • Caused by programmers not checking buffer bounds COMP3231 38
  • 39. Viruses • A program that reproduces itself by attaching its code to another program. • Can do anything the normal program could do – Print harmless message – Destroy all files on hard disk – Send all your data to the net – Trash the EEPROM BIOS to make your computer inoperable – Denial of service attack COMP3231 39
  • 40. How Viruses Work • Virus written in assembly language • Inserted into another program – use tool called a “dropper” • Virus dormant until program executed – then infects other programs – eventually executes its “payload” COMP3231 40
  • 41. How Viruses Work • Parasitic Viruses – Add their code to various locations in the executable – Redirect the start address in the header – On execution, it may replicate by modifying another executable file (and other malicious activities). COMP3231 41
  • 42. How Viruses Work • Boot Sector Viruses – Copies original boot block to different location – Replaces boot block with itself – When machine boots, virus is loaded into RAM – It installs itself, and then boots OS via original boot block • How does it regain control later? COMP3231 42
  • 43. How Viruses Work • Virus installs interrupt handlers which rely on OS not installing all its own handlers prior to next interrupt occurring – Older versions of Windows behaved that way • Virus reinstalls trap handlers at next opportunity COMP3231 43
  • 44. How Viruses Work • Memory Resident Viruses – Install themselves in main memory – Typically redirect the exception/interrupt handlers to itself • Still calls the real code to remain undetected • checks and reinstalls redirections changed • Replicate during, or manipulate and spy-on on syscalls COMP3231 44
  • 45. How Viruses Work • Macro Viruses – Rely on overly powerful/feature overloaded macro languages – MS office uses visual basic – complete programming language that can read/write files – Opening a Word document is like running a program (it could do anything) • Most people ignore warnings about macros COMP3231 45
  • 46. How Viruses Spread • Virus placed where it’s likely to be copied • When copied – infects programs on hard drive, USB stick – may try to spread over LAN • Attach to innocent looking email – when it runs, use mailing list (address book) to replicate COMP3231 46
  • 47. Antivirus Approach • Scanning – Search each file and check if virus present • 10,000 potential viruses and 10,000 files • Hard to make fast – Use fuzzy searches to catch small changes in known viruses • Slower, false positives – Trade-off between accuracy and acceptable performance COMP3231 47
  • 48. Antivirus and Anti-Antivirus Techniques (a) A program (b) Infected program Change in file length a give away COMP3231 48
  • 49. Antivirus and Anti-Antivirus Techniques (c) Compressed infected program Presence of virus code still a give away COMP3231 49
  • 50. Antivirus and Anti-Antivirus Techniques (d) Encrypted virus Presence of (de)compressor a give away COMP3231 50
  • 51. Antivirus and Anti-Antivirus Techniques (e) Compressed virus with encrypted compression code Can still search for remaining decryptor code COMP3231 51
  • 52. Antivirus and Anti-Antivirus Techniques Examples of a polymorphic virus All of these examples do the same thing X=A+B+C-4 52
  • 53. Antivirus and Anti-Antivirus Techniques • Integrity checkers – Scan the disk and determine checksums for all executable files – Check checksums, if changed we have a virus – Counter, viruses can hack checksum database is • Behavioral checkers – Look for virus like behaviour • Example: overwriting executable file – False alarms (e.g. a compiler) COMP3231 53
  • 54. Antivirus and Anti-Antivirus Techniques • Virus avoidance – good OS • Separate user/system mode/protection to minimise damage – Run/install only reputable software – use antivirus software – Do not open attachments to email – frequent backups • Recovery from virus attack – halt computer, reboot from safe disk, run antivirus – restore from backups COMP3231 54
  • 55. Running Foreign Code • We can see that running foreign code can be dangerous (trojan horse, viruses, simply malicious, etc.) • Problem is that all the code we run has all the privileges we do • We need a method of running untrusted code safely COMP3231 55
  • 56. Principle of Least Privilege • A guiding principle we would like to apply • Idea: – Give the suspicious program only the privileges required to complete the task you expect, nothing more – Example: • Can only perform file related system calls • Can only access files within a specified directory COMP3231 56
  • 57. Example: Active Web Content • We’d like to browse “active” web content – Run content in the web browser – The browser has all the privileges we do • Some approaches – Sandboxing – Interpretation – Code Signing COMP3231 57
  • 58. Sandboxing • Idea: – Code runs within a sandbox within a browser (or some other larger application) – The applet can access only the data contained within its sandbox, and nothing else. – It can only jump to code within its sandbox (and cannot modify the code) • How can we create a sandbox within a process? COMP3231 58
  • 59. Sandbox Implementation • Firstly, assume we can restrict access to code to avoid problem of self modifying code • To restrict code to the code segment – Scan the code – Check all jumps and branches jump to addresses within the sandbox • Handle both absolute and relative addresses – For computed (dynamic jumps) we insert extra instruction into the code to check the destination addresses are within the code • Involves fairly complex code rewriting, but it is doable • To restrict data access to data section, we do the some thing we did for code COMP3231 59
  • 60. Sandbox Implementation • What about system calls – We use a reference monitor that • Intercepts all system calls • Determine whether the call is allowed to succeed or not – Based on the type of call, or the arguments supplied. – Reference monitor restricts the system calls to a safe subset COMP3231 60
  • 61. Interpretation • Instead of running code directly (natively), we run it using an interpreter – Interpreter can apply addressing restrictions – Can consider the interpreter as implementing a sandbox – Example: JAVA COMP3231 61
  • 62. Code Signing • Authenticity of the code is guaranteed • Issues – Does not protect you against bad or buggy code – Example: Shockwave has had various “authentic” security problems COMP3231 62
  • 63. Summary • Even given strong authentication, there are many software threats to data security policies. • The affect of exploiting those threats can be minimised by adopting the principle of least privilege. COMP3231 63