Security in It: Shikhar Agarwal
Security in It: Shikhar Agarwal
~Shikhar Agarwal
DEFINITION
• Computer security is a branch of computer
science that addresses enforcement of 'secure'
behavior on the operation of computers.
Physical Computing
Security Security
Confidentiality Availability
Non-
repudiation
Integrity
Digital
Credentials
Authenticatio
n
Auditing
Risk
assessment
Compliance/
Regulations
Administratio
Governance
n
Common Fraudulent
Practices
Online Fraud
Phishing
Identity theft
Man-In-the-Middle Attacks
Password Attack
Data Theft
Securing Systems
To Secure Systems we need
– Physical Security
– Technological Security
• Technological Security
– Network security:
• To secure systems over network
• Only valid packets delivered to web server
– Application security: Web servers, Apps are secure
– Operating system security
1. Authentication
Authentication
• Authentication
– Verifies identity
– is a process by which an entity proves that it is
who it claims to be
• Three general ways of authentication:
– Something we know (i.e., Passwords)
– Something we have (i.e., Tokens)
– Something we are (i.e., Biometrics)
Something we KNOW
• Something we know
– Example:
• Passwords, Pass phrase, PIN
• Pros
– Simple to implement
– Simple for us to understand
• Cons
– Easy to crack (unless we choose strong ones)
• Hacker can try common login names, concatenations of
words etc.
• We need to be forced to choose strong passwords for
example, by setting password policies
– Passwords are reused many times
• Each time we enter a password to access the system,
the attacker listens-in every time
Something we HAVE – A Token
• Smart Cards
• ATM Cards
• SecurID
• USB Tokens
Something we ARE
• Biometrics
– Techniques used:
• Palm scan
• Retinal scan
• Iris scan
• Fingerprint
• Voice Id
• Facial Recognition
• Signature Dynamics
– Pros
• Provides a strong authentication solution
– Raise the bar for authentication
– Cons
• Difficulty in terms of deployment and management
• Social acceptance
• Key management
– If a bad guy is able to copy a fingerprint – then how are the secret pieces of info
actually managed?
Two Factor Authentication
• Two Factor Authentication (T-FA) requires two independent
ways to establish identity and privileges
• Combination of “what we know” and “what we have” factors
– Example: ATM Cards
+
What we have What we know
Types of Authentication
• Person to computer
• Computer to Computer
6. Availability
Availability
• The period for which the system / network is
available to the user
– Example
• Dial tone availability, System Downtime limit,
Web server response time
• Solutions
– Add redundancy to eliminate single point of
failure
– Impose limits that legitimate users can use
Key Concepts
7. Non-Repudiation
Non-Repudiation
• Non-repudiation provides evidence of the message
source, so that the sender cannot refuse its origin.