jump to first page internet security in perspective yong cao december 2000

12
Jump to first page Internet Security in Perspective Yong Cao December 2000

Upload: stella-hines

Post on 18-Jan-2018

221 views

Category:

Documents


0 download

DESCRIPTION

Jump to first page Growth of the Internet

TRANSCRIPT

Page 1: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Internet Security in Perspective

Yong CaoDecember 2000

Page 2: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Overview Introduction Security threats Integrated security Control measures Summary

Page 3: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Growth of the Internet

Page 4: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Security Threats Unauthorized access User misrepresents identity Access to unauthorized data Data intercepted, read or modified Virus attacks Hackers

Page 5: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Integrated SecuritySecure transaction: Confidentiality: others cannot eavesdrop on an exchange. Integrity: the messages received are identical to the messages sent. Authenticity: you are assured of the persons with whom you are

making an exchange. Non-Repudiability: none of the involved parties can deny that the

exchange took place.

Secure access: Access control: prevent unauthorized users. Audit trials: track down the users.

Page 6: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Control measures Firewalls Cryptography Digital signature Virus control

Page 7: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Firewalls Protect nets with unsafe hosts Single point of control and expertise The firewall is often the only secure

piece of an Internet arrangement Backdoors usually diminish the

effectiveness of a firewall Proxy server

Page 8: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Cryptography Transforming of information into a form

unreadable by anyone without a secret decryption key.

Secret Key (Symmetric) Public Key (Asymmetric) PGP

Page 9: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Digital Signature A digital signature shows that the

person who signed the document had access to the private key and the pass phrase for the key indicated by the signature and that the document has not been modified since it was signed.

PGP

Page 10: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Virus Control Using anti-virus software to scan

known viruses to protect the computers.

Need to update frequently. McAfee VirusScan

Page 11: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Secure Sockets Layer (SSL) Developed by Netscape Communications,

SSL is a security-enhanced abstraction of sockets that provides transaction security at the link or transport level. With SSL, security properties are attached to the link or channel of communication between two parties, not the documents themselves.

Utilizing public and private keys, message digests, digital signatures, and certificates

Page 12: Jump to first page Internet Security in Perspective Yong Cao December 2000

Jump to first page

Summary Security is a big concern in internet use. Integrated security should have

confidentiality, integrity, authenticity, non-repudiability, access control, audit trials.

The common security controls are firewalls, cryptography, digital signature, virus control.