SlideShare a Scribd company logo
1 of 23
Security 
DBIT05206
Learning Objectives 
• Clarify need for security (what are we 
trying to protect?) 
• Identify fundamental security objectives 
• Review basic network attacks 
• Classify typical attackers 
• Examine technical safeguards 
• Explore firewall options
Internet Security Needs 
• “While non-technical publications are 
obsessed with the Internet, technical 
publications are obsessed with security” 
• Information view: marvelous technological 
advance in information dissemination with a 
major danger to pollute and destroy 
• Transaction view: major deterrent to E-Commerce 
growth
What do we Need to 
Protect? 
• Data 
 Information we keep on computers (product 
design, financial records, personnel data) 
 Lost time, lost sales, lost confidence 
• Resources 
 Unauthorized use of computer time & space 
• Reputation 
 Misrepresentation, forgery, negative publicity
Fundamental Security 
Objectives 
• Four fundamental objectives of Info Security 
 Confidentiality - Protection from unauthorized 
persons 
 Integrity - consistency of data; no unauthorized 
creation, alteration or destruction 
 Availability - ensuring access to legitimate users 
 Legitimate use - ensuring appropriate use by 
authorized users
Basic Security Attacks 
• Intrusion - unauthorized access and use of 
systems 
• Denial of service - an attack aimed at preventing 
use of company computers 
 email bomb or flooding/Internet worm 
 disabled, rerouted or replaced services 
• Information theft - network taps, database access, 
hacking into sites to give out more info or to 
wrong parties
Technical Safeguards 
• Security Services 
 Authentication (entity, data origin) 
 Access control (prevent unauthorized access) 
 Confidentiality (disclosure, encryption) 
 Data integrity (value of data item) 
 Non-repudiation (falsely denying a transaction)
Security Models 
• No Security - not an option 
• Security thru Obscurity - don’t tell anyone 
where your site is 
• Host Security - enforced security on each host; 
progressively difficult to manage as number of 
hosts increase 
• Network Security - control network access to 
hosts and services; firewalls, strong 
authentication, and encryption
Firewall Solutions 
• Definition - hardware &/or software components 
that restrict access between a restricted network & 
the Internet or between networks 
• Logically - a separator, restricter, analyzer 
• Rarely a single object 
 Restricts people to entering at a controlled point 
 Prevents attackers from getting close to other defenses 
(host controls) 
 Restricts people to leaving at a controlled point
Firewall Capabilities 
• Focus security decisions - single point to 
leverage control 
• Enforce security policy - minimize 
exceptions 
• Log Internet activity - analysis 
• Limit exposure - separate sensitive areas of 
one network from another or outside world
Firewall Limitations 
• Can’t protect against 
 malicious insiders 
 connections that don’t go through it 
 new threats 
 viruses 
• scans for source & destination addresses & 
port numbers, not details of data
Types of Firewalls 
• Simple traffic logging systems 
 audit log file of files accessed (HTTPD) 
 site usage/demand hours/links/browsers used 
• IP Packet Screening Routers (packet filtering 
gateway) 
 not only looks at ‘can’ it route, but ‘should’ it 
 selectively routes or blocks packets based on rules 
 based on protocols, destination (port 80), known source 
IP addresses
Types of Firewalls (cont.) 
• Hardened Firewall Host (hardware) 
 Halts unauthorized users 
 Concentrates security, hides internal system 
names, centralizes & simplifies net 
management 
• Proxy Server (software) 
 Deals with external server requests on behalf of 
internal clients 
 May limit certain HTTP methods (CGI or Java 
applets)
Futures 
• Third-generation Firewalls 
 combined features of packet filtering & proxy systems 
• Client & server applications with native support 
for proxied environments 
• Dynamic packet filtering 
 Packet rules modified “on the fly” in response to 
triggers 
• Underlying Internet protocol undergoing revisions 
- IPv6
Internet Security 
• Three levels (Network, application, system) 
 Network - data packet integrity in-transit 
(Authentication/confidentiality/access controls) 
• IP layer/ headers + data = IP datagram 
• Not inherently secure (IP Spoofing - attacks w/false 
source addresses) 
• Authentication headers - integrity check values to 
indicate source & transit integrity of datagram 
 Security Association / Security Parameter Index
Internet Security (Network) 
• Packet Encryption - Encapsulating Security Payload (ESP) provides 
confidentiality + integrity 
 Algorithm (transforms) 
 Tunnel-mode encryption (entire datagram encrypted) 
 Transport-mode encryption (data only encrypted) 
• Key Management - no single standard 
 Host-oriented - all users share same association & key 
 Potential for decrypt another’s messages 
 User-oriented - user has 1 or more association & keys 
 Lower risk / Superior method 
• Firewalls - screening routers/proxy servers, perimeter networks
Internet Security (Network) 
 Virtual Private Networks (VPN) 
• Secure groups of network sites using Inet backbone 
 IP tunneling / firewalls 
• Messaging - special security needs above network 
measures 
 E-mail / mail enabled applications 
• Writer to reader protection via user agent 
• Message Transfer Agents (MTAs) = message 
transfer backbone (originating & delivering)
Internet Security 
(Messaging) 
• Basic Message Protection Services 
 Message origin authentication / content 
integrity / content confidentiality / non-repudiation 
of origin 
• Enhanced Message Protection Services 
 Confirmation services (proof of delivery & 
submission, non-repudiation of delivery & 
submission) 
 Other - I.e. security labeling service
Internet Security 
(Messaging) 
• Secure Messaging Protocols 
 PEM - Privacy Enhanced Mail (basic services) 
• Wraps itself around standard mail message 
 MIME Security Multi-parts 
• Multi-purpose Internet Extensions - supports structuring of 
message body 
• Different body parts - text, image, audio, etc 
• 1995 specifications: 
 Security Multi-parts for MIME 
 MIME Object Security Services (MOSS) 
 Transforms messages into standard representation for transport
Web Security 
• Web Risks - server content / communications 
• Solutions - SSL / S-HTTP / SET (evolving stds) 
• SSL (Secure Sockets Layer) - session protection 
 Developed by Netscape to add communication 
protection 
 New layer protocol operating above TCP protocol 
 Protects any application protocol normally operating 
over TCP (HTTP, FTP, TELNET) 
 HTTPs represents SSL communication handling 
 Services: server authentication / client authentication / 
integrity (check values) / confidentiality (encryption)
Web Security (SSL cont.) 
• SSL has two sub-protocols 
 SSL Record Protocol - defines basic format 
• Compression/MAC/encryption/data length 
• Assumes pre-existing keys 
 SSL Handshake Protocol - coordination 
• Negotiates protection algorithms between client and server for 
authentication, transmission of key certificates, establish 
session keys for use in integrity check and encryption 
 Domestic (128-bit) and intern’l (40-bit)
Web Security - S-HTTP 
• Secure HTTP - security extension 
 Protects individual transaction request or 
response messages, similar to e-mail 
 Services: authentication, integrity, 
confidentiality + digital signatures (adds non-repudiation) 
 Flexibility in how messages are protected and 
key management
Web Security Threats 
• Executable Programs - no foolproof defense 
 Java Applets - execution occurs on client system 
• Trusted execution environment (sandbox) 
• Should not: inspect or alter client files, run system commands or 
load system s/w libraries 
• Should: contact only originating server 
• Potential for hostile applets to send forged e-mail, crash browsers, 
kill running applets, consume resources 
 Active-X - reusable software components 
• Source Authentication Programs -read signed code

More Related Content

What's hot

3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityEryk Budi Pratama
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access controlLeo Mark Villar
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
Software Security
Software SecuritySoftware Security
Software SecurityAkNirojan
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
L4 internet security
L4   internet securityL4   internet security
L4 internet securitylistergc
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgEric Vanderburg
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTCIgor Zboran
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIgor Zboran
 

What's hot (20)

3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
fire walls
fire wallsfire walls
fire walls
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Software Security
Software SecuritySoftware Security
Software Security
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
 

Viewers also liked

Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...nick_hans
 
Legacy Software Maintenance And Management
Legacy Software Maintenance And ManagementLegacy Software Maintenance And Management
Legacy Software Maintenance And ManagementValueCoders
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect ManagementAjay K
 
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Maintenance,Re-engineering &Reverse Engineering in Software EngineeringMaintenance,Re-engineering &Reverse Engineering in Software Engineering
Maintenance, Re-engineering &Reverse Engineering in Software EngineeringManish Kumar
 
Clean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code CampClean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code CampTheo Jungeblut
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineeringParminder Singh
 
Documentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaibDocumentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaibmohd zuhaib dar
 
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCEObject Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCEVipin Kumar
 
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - ProcessArchitectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - ProcessGalala University
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMSkoolkampus
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practicePharmaceutical
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing BasicsBelal Raslan
 

Viewers also liked (20)

SYSTEM MODELLING
SYSTEM MODELLINGSYSTEM MODELLING
SYSTEM MODELLING
 
Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...Maintenance: the cost for software vendors and what it means to your organiza...
Maintenance: the cost for software vendors and what it means to your organiza...
 
Legacy Software Maintenance And Management
Legacy Software Maintenance And ManagementLegacy Software Maintenance And Management
Legacy Software Maintenance And Management
 
Sidra Agile Software Process
Sidra Agile Software ProcessSidra Agile Software Process
Sidra Agile Software Process
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
 
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Maintenance,Re-engineering &Reverse Engineering in Software EngineeringMaintenance,Re-engineering &Reverse Engineering in Software Engineering
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
 
Clean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code CampClean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
Clean Code - Design Patterns and Best Practices at Silicon Valley Code Camp
 
Slides chapter 9
Slides chapter 9Slides chapter 9
Slides chapter 9
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineering
 
Slides chapter 8
Slides chapter 8Slides chapter 8
Slides chapter 8
 
Documentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaibDocumentation and maintenance of records ppt by zuhaib
Documentation and maintenance of records ppt by zuhaib
 
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCEObject Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
Object Oriented Software Engineering (OOSE) presentation on SOFTWARE MAINTENANCE
 
software engineering
 software engineering software engineering
software engineering
 
Sw Software Design
Sw Software DesignSw Software Design
Sw Software Design
 
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - ProcessArchitectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
Architectural Design 1 Lectures by Dr. Yasser Mahgoub - Process
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practice
 
Html Ppt
Html PptHtml Ppt
Html Ppt
 
Software Testing Basics
Software Testing BasicsSoftware Testing Basics
Software Testing Basics
 
An introduction to software engineering
An introduction to software engineeringAn introduction to software engineering
An introduction to software engineering
 

Similar to Security chapter6

network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxsalutiontechnology
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure InfrastructuresPROIDEA
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationDavid Hoen
 

Similar to Security chapter6 (20)

CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Unit08
Unit08Unit08
Unit08
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 

More from FLYMAN TECHNOLOGY LIMITED

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFLYMAN TECHNOLOGY LIMITED
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)FLYMAN TECHNOLOGY LIMITED
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5FLYMAN TECHNOLOGY LIMITED
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADMFLYMAN TECHNOLOGY LIMITED
 

More from FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Security chapter6

  • 2. Learning Objectives • Clarify need for security (what are we trying to protect?) • Identify fundamental security objectives • Review basic network attacks • Classify typical attackers • Examine technical safeguards • Explore firewall options
  • 3. Internet Security Needs • “While non-technical publications are obsessed with the Internet, technical publications are obsessed with security” • Information view: marvelous technological advance in information dissemination with a major danger to pollute and destroy • Transaction view: major deterrent to E-Commerce growth
  • 4. What do we Need to Protect? • Data  Information we keep on computers (product design, financial records, personnel data)  Lost time, lost sales, lost confidence • Resources  Unauthorized use of computer time & space • Reputation  Misrepresentation, forgery, negative publicity
  • 5. Fundamental Security Objectives • Four fundamental objectives of Info Security  Confidentiality - Protection from unauthorized persons  Integrity - consistency of data; no unauthorized creation, alteration or destruction  Availability - ensuring access to legitimate users  Legitimate use - ensuring appropriate use by authorized users
  • 6. Basic Security Attacks • Intrusion - unauthorized access and use of systems • Denial of service - an attack aimed at preventing use of company computers  email bomb or flooding/Internet worm  disabled, rerouted or replaced services • Information theft - network taps, database access, hacking into sites to give out more info or to wrong parties
  • 7. Technical Safeguards • Security Services  Authentication (entity, data origin)  Access control (prevent unauthorized access)  Confidentiality (disclosure, encryption)  Data integrity (value of data item)  Non-repudiation (falsely denying a transaction)
  • 8. Security Models • No Security - not an option • Security thru Obscurity - don’t tell anyone where your site is • Host Security - enforced security on each host; progressively difficult to manage as number of hosts increase • Network Security - control network access to hosts and services; firewalls, strong authentication, and encryption
  • 9. Firewall Solutions • Definition - hardware &/or software components that restrict access between a restricted network & the Internet or between networks • Logically - a separator, restricter, analyzer • Rarely a single object  Restricts people to entering at a controlled point  Prevents attackers from getting close to other defenses (host controls)  Restricts people to leaving at a controlled point
  • 10. Firewall Capabilities • Focus security decisions - single point to leverage control • Enforce security policy - minimize exceptions • Log Internet activity - analysis • Limit exposure - separate sensitive areas of one network from another or outside world
  • 11. Firewall Limitations • Can’t protect against  malicious insiders  connections that don’t go through it  new threats  viruses • scans for source & destination addresses & port numbers, not details of data
  • 12. Types of Firewalls • Simple traffic logging systems  audit log file of files accessed (HTTPD)  site usage/demand hours/links/browsers used • IP Packet Screening Routers (packet filtering gateway)  not only looks at ‘can’ it route, but ‘should’ it  selectively routes or blocks packets based on rules  based on protocols, destination (port 80), known source IP addresses
  • 13. Types of Firewalls (cont.) • Hardened Firewall Host (hardware)  Halts unauthorized users  Concentrates security, hides internal system names, centralizes & simplifies net management • Proxy Server (software)  Deals with external server requests on behalf of internal clients  May limit certain HTTP methods (CGI or Java applets)
  • 14. Futures • Third-generation Firewalls  combined features of packet filtering & proxy systems • Client & server applications with native support for proxied environments • Dynamic packet filtering  Packet rules modified “on the fly” in response to triggers • Underlying Internet protocol undergoing revisions - IPv6
  • 15. Internet Security • Three levels (Network, application, system)  Network - data packet integrity in-transit (Authentication/confidentiality/access controls) • IP layer/ headers + data = IP datagram • Not inherently secure (IP Spoofing - attacks w/false source addresses) • Authentication headers - integrity check values to indicate source & transit integrity of datagram  Security Association / Security Parameter Index
  • 16. Internet Security (Network) • Packet Encryption - Encapsulating Security Payload (ESP) provides confidentiality + integrity  Algorithm (transforms)  Tunnel-mode encryption (entire datagram encrypted)  Transport-mode encryption (data only encrypted) • Key Management - no single standard  Host-oriented - all users share same association & key  Potential for decrypt another’s messages  User-oriented - user has 1 or more association & keys  Lower risk / Superior method • Firewalls - screening routers/proxy servers, perimeter networks
  • 17. Internet Security (Network)  Virtual Private Networks (VPN) • Secure groups of network sites using Inet backbone  IP tunneling / firewalls • Messaging - special security needs above network measures  E-mail / mail enabled applications • Writer to reader protection via user agent • Message Transfer Agents (MTAs) = message transfer backbone (originating & delivering)
  • 18. Internet Security (Messaging) • Basic Message Protection Services  Message origin authentication / content integrity / content confidentiality / non-repudiation of origin • Enhanced Message Protection Services  Confirmation services (proof of delivery & submission, non-repudiation of delivery & submission)  Other - I.e. security labeling service
  • 19. Internet Security (Messaging) • Secure Messaging Protocols  PEM - Privacy Enhanced Mail (basic services) • Wraps itself around standard mail message  MIME Security Multi-parts • Multi-purpose Internet Extensions - supports structuring of message body • Different body parts - text, image, audio, etc • 1995 specifications:  Security Multi-parts for MIME  MIME Object Security Services (MOSS)  Transforms messages into standard representation for transport
  • 20. Web Security • Web Risks - server content / communications • Solutions - SSL / S-HTTP / SET (evolving stds) • SSL (Secure Sockets Layer) - session protection  Developed by Netscape to add communication protection  New layer protocol operating above TCP protocol  Protects any application protocol normally operating over TCP (HTTP, FTP, TELNET)  HTTPs represents SSL communication handling  Services: server authentication / client authentication / integrity (check values) / confidentiality (encryption)
  • 21. Web Security (SSL cont.) • SSL has two sub-protocols  SSL Record Protocol - defines basic format • Compression/MAC/encryption/data length • Assumes pre-existing keys  SSL Handshake Protocol - coordination • Negotiates protection algorithms between client and server for authentication, transmission of key certificates, establish session keys for use in integrity check and encryption  Domestic (128-bit) and intern’l (40-bit)
  • 22. Web Security - S-HTTP • Secure HTTP - security extension  Protects individual transaction request or response messages, similar to e-mail  Services: authentication, integrity, confidentiality + digital signatures (adds non-repudiation)  Flexibility in how messages are protected and key management
  • 23. Web Security Threats • Executable Programs - no foolproof defense  Java Applets - execution occurs on client system • Trusted execution environment (sandbox) • Should not: inspect or alter client files, run system commands or load system s/w libraries • Should: contact only originating server • Potential for hostile applets to send forged e-mail, crash browsers, kill running applets, consume resources  Active-X - reusable software components • Source Authentication Programs -read signed code