information security

40
1 Information Security DR. HIMANSHU GUPTA, SENIOR FACULTY MEMBER, AMITY UNIVERSITY, NOIDA (INDIA)

Upload: dr-himanshu-gupta

Post on 21-Jul-2015

84 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: Information Security

1

Information Security

DR. HIMANSHU GUPTA, SENIOR FACULTY MEMBER, AMITY UNIVERSITY, NOIDA (INDIA)

Page 2: Information Security

What is a network?

A network consists of two or more devices that are linked in order to share resources or allow communications.

Can you think of various forms of a network?

2

Page 3: Information Security

Computer Networks

3

INTERNET

email

facebook

Downloadmusic

chat

Send in homework

Page 4: Information Security

Phone Networks

4

Transmitter tower

call mum

Text messaging

businesscall

call friend

call friend

Transmitter tower

Text messaging

Text messaging

call daughter

businesscall

Page 5: Information Security

Satellite Networks

5Football game in Europe

Dish network

Watching the gameIn Bryan Texas, USA

Page 6: Information Security

What is Security?

Security is the act of protecting a person, property or organization from an attack.

6

• Examples of attack on a person?

• Examples of attack on a property?

• Examples of attack on a organization?

Page 7: Information Security

Why do we need Information Security

7

INTERNET

email

School Nurse

Name: ALICE JACKAddress: 1 BALL STRPhone Number: 888-9191DOB: 01/21/1993SSN: 999-111-2323Credit Card No:. 9988 5321Medical Records, Test scores

bad guy listens to the communication

sensitive data

Page 8: Information Security

Information Security Issues

Can you think of ways a bad guy can use the data he obtains to cause harm or attack?

Answer: Security Attacks

Can you think of what you can do to prevent a bad guy from having access to your private data or information?

Answer: Security Services 8

Page 9: Information Security

9

Security Attacks

Page 10: Information Security

10

Security Attacks

Informationsource

Informationdestination

Normal Flow

Page 11: Information Security

11

Security Attacks

Informationsource

Informationdestination

Interruption

• Attack on availability

Page 12: Information Security

12

Security Attacks

Informationsource

Informationdestination

Interception

• Attack on confidentiality

Page 13: Information Security

13

Security Attacks

Informationsource

Informationdestination

Modification

• Attack on integrity

Page 14: Information Security

14

Security Attacks

Informationsource

Informationdestination

Fabrication

• Attack on authenticity

Page 15: Information Security

15

Classify Security Attacks

passive attacks - eavesdropping on, or monitoring of, transmissions to:

obtain message contents, ormonitor traffic flows

active attacks – modification of data stream to:masquerade of one entity as some otherreplay previous messagesmodify messages in transitdenial of service

Page 16: Information Security

16

Security Attacks

Release of message contents

Trafficanalysis

• eavesdropping, monitoring transmissions

Passive threats

Page 17: Information Security

17

Passive Attacks

Page 18: Information Security

18

Security Attacks

Masquerade Denial ofservice

• some modification of the data stream

Active threats

Replay Modification of message contents

Page 19: Information Security

19

Active Attacks

Page 20: Information Security

20

Security Services

Confidentiality – protection from passive attacks

Authentication – you are who you say you are

Integrity – received as sent, no modifications, insertions, shuffling or replays

Page 21: Information Security

21

Security Services

Nonrepudiation – can’t deny a message was sent or received

Access Control – ability to limit and control access to host systems and apps

Availability – attacks affecting loss or reduction on availability

Page 22: Information Security

22

Network Security Model

Page 23: Information Security

23

Cryptography

Cryptography -- from the Greek for “secret writing” -- is the mathematical “scrambling” of data so that only someone with the necessary key can “unscramble” it.

Cryptography allows secure transmission of private information over insecure channels (for example packet-switched networks).

Cryptography also allows secure storage of sensitive data on any computer.

Page 24: Information Security

CryptographyThe process of converting a message into a secret code called CIPHER TEXT, and changing the encoded message back to regular text called PLAIN TEXT.

(1) EncryptionThe conversion of the original message into a secret code or CIPHER TEXT using a key.

(2) DecryptionThe conversion of the encoded message or PLAIN TEXT back to the original message using the same key.

24

Cryptography

Page 25: Information Security

Its All About Keys !!!

25

My name is

Alice Jack.

Encryption

Plain text

Wi xkwo sc kvsmo tkmuWi xkwo sc kvsmo tkmu

key

My name is

Alice Jack.

Decryption

cypher text

Wi xkwo sc kvsmo tkmuWi xkwo sc kvsmo tkmu

key

Page 26: Information Security

Cryptography Wheel

You are meeting your friend for lunch at a restaurant. Which one? – it’s a secret!

26

XA B

CD

ZY

P

G

M

E

R

Q

O

S

F

N

JI

H

K

W

VU

T

L

CIPHERTEXT PLAINTEXT

ENCRYPTIONKey = 4

X

AB

C

D

ZY

P

G

M

E

R

Q

O

S

F

N

J

I

H

K

W

V

U

T

L

Golden Corral

Page 27: Information Security

Cryptography Wheel

Golden Corral

27

XA B

CD

ZY

P

G

M

E

R

Q

O

S

F

N

JI

H

K

W

VU

T

L

CIPHERTEXT PLAINTEXT

ENCRYPTION

Key = 4

X

A

B

C

D

ZY

P

G

M

E

R

Q

O

S

F

N

J I

H

K

WV

U

T

L

Jroghq Fruudo

DECRYPTION

Golden Corral

Page 28: Information Security

Cryptography Wheel

28

XA B

CD

ZY

P

G

M

E

R

Q

O

S

F

N

JI

H

K

W

VU

T

L

CIPHERTEXT PLAINTEXT

Key = 7

X

AB

CD

ZYP

G

M

E

R

Q

O

S

F

N

J

I H

K

W

V

UT

L

Lyx Fivmnyl

DECRYPTION

Red Lobster

Page 29: Information Security

29

The language of cryptography

symmetric key crypto: sender, receiver keys identical

public-key crypto: encryption key public, decryption key secret

(private)

plaintext plaintextciphertext

KA

encryptionalgorithm

decryption algorithm

KB

Page 30: Information Security

30

Public-Private key Cryptography

Page 31: Information Security

31

Secret/Symmetric-key Cryptography

Page 32: Information Security

32

Secure Communication over Insecure Medium

Page 33: Information Security

33

RSA Encryption Algorithm

For example. make p = 7and q = 13

We then calculate N = 7∗13 = 91 and (p−1)(q−1) = 72

We next select ke relatively prime to 72 and< 72, yielding 5

Finally,we calculate kd such that ke*kd mod 72 = 1, yielding 29

We how have our keys

Public key, ke, N = 5, 91

Private key, kd , N = 29, 91

Encrypting the message 69 with the public key results in the cyphertext 62

Cyphertext can be decoded with the private key

Public key can be distributed in cleartext to anyone who wants to communicate with holder of public key

Page 34: Information Security

34

Encryption and Decryption using RSA Asymmetric Cryptography

Page 35: Information Security

35

What is a Firewall?

a choke point of control and monitoring interconnects networks with differing trustimposes restrictions on network services

only authorized traffic is allowed

auditing and controlling accesscan implement alarms for abnormal behavior

is itself immune to penetrationprovides perimeter defence

Page 36: Information Security

36

Firewall: Technical Concept

Page 37: Information Security

37

Firewall Configurations

Page 38: Information Security

Secure Online Transaction Using Digital Signature

38

Page 39: Information Security

39

Thank You!!!!

Page 40: Information Security

40

Have A Nice Week!!!