0% found this document useful (0 votes)
130 views42 pages

Information Security: DR Ritu Yadav

This document discusses various aspects of information security including client side security, server side security, message level security, and corporate systems security. It defines key terms like security and controls. It then covers topics such as wireless security challenges, web application architecture, client end risks and solutions, server end risks like malware and computer crimes, and solutions like firewalls. It also provides an example around ensuring message security goals of confidentiality, authentication, integrity and non-repudiation when sending a message to a stock broker.

Uploaded by

sudhanshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views42 pages

Information Security: DR Ritu Yadav

This document discusses various aspects of information security including client side security, server side security, message level security, and corporate systems security. It defines key terms like security and controls. It then covers topics such as wireless security challenges, web application architecture, client end risks and solutions, server end risks like malware and computer crimes, and solutions like firewalls. It also provides an example around ensuring message security goals of confidentiality, authentication, integrity and non-repudiation when sending a message to a stock broker.

Uploaded by

sudhanshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Information Security

Dr Ritu Yadav
In Today’s Session
• Client Side Security
• Server Side Security
• Message Level Security
• Corporate Systems Security
Definitions
• Security
• Policies, procedures, and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems
• Controls
• Methods, policies, and organizational procedures that ensure safety of
organization’s assets; accuracy and reliability of its accounting records; and
operational adherence to management standards
Revisiting Client Server Computing
Wireless Security Challenges
• Why Wi-Fi is vlunerable
• Radio frequency bands easy to scan
• SSIDs (service set identifiers)
• Identify access points, broadcast multiple times, can be identified by sniffer programs
• The Wi-Fi Protocols
• What type of threats are there
• War driving
• Eavesdroppers drive by buildings and try to detect SSID and gain access to network and resources
• Once access point is breached, intruder can gain access to networked drives and files
• Rogue access points/Evil Twin
• Solutions
• Use the best Protocol available with you
• Mac Address Control
• Turn off automatic connections to known WiFi networks
Web-based Application Architecture

• The Client
• The various
servers
• The message
• Or the transaction
Client-End Security
• What are the risks that clients on the Internet face?
• Active Content
• Program embedded in an HTML page or an email attachment or as a plugin for your
browser
• The benign – Java Applets – famous “client side” computing revolution
• The malicious
• Trojan Horse – malicious programs which gets an access to your computer under the guise of a totally
different purpose
• Solution
• Java categorises applets into two categories – Trusted Applets and Non-trusted Applets
• Use of Digital certificates (we’ll see!) to identify the trusted sources
• What if we wish to use an applet that is not in the list of trusted Applets?
• Sand Box!
Client-End Security
• Running applets in Sand Box
• Java may ask such untrusted applets to run in a sand box
• i.e. Applets have no access to the PC resources
• They can simply operate on the data that comes in from the web server from
which they were downloaded
Client-End Security
• What are the risks that clients on the Internet face? Contd…
• Active Content
• Malwares
• Viruses
• Rogue software program that attaches itself to other software programs or data files in order to be executed
• Worms
• Independent programs that copy themselves from one computer to other computers over a network.
• Worms and viruses spread by
• Downloads (drive-by downloads)
• E-mail, attachments
• Downloads on Web sites and social networks
• Smartphones as vulnerable as computers
• Study finds 13,000 types of smartphone malware
• Trojan horses
• Software that appears benign but does something other than expected. Ex : MMarketPay.A
Client-End Security
• What are the risks that clients on the Internet face? Contd…
• Active Content
• Malwares
• Ransomware
• Tries to extort money from users by taking control of their computer or mobiles or displaying annoying pop-up
messages
• Spyware
• Install themselves surreptitiously on computers to monitor user web-surfing activity and serve up advertising or
worse!
• Keyloggers
• Identity theft
• Theft of personal Information (social security ID, driver’s license, or credit card numbers) to impersonate someone
else
• Evil twins
• Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
Client-End Security
• What are the risks that clients on the Internet face? Contd…
• Active Content
• Malwares
• Solution
• Anti-virus Softwares
• Scan your PC for several known viruses and “disinfects” it
• Continuously and regularly updated
• Safe Habits
• Not installing pirated software, or downloading files from untrusted sources
• Inserting diskettes into your PCs without scanning
• Reading e-mails from unknown sources – especially with attachments
Client-End Security
• Client End Security
• Active Content
• Trusted Applets, Sand Box
• Malwares
• Anti-virus Software
• Safe Habits
• Server End Security
Server End Security
Malwares

• Malwares contd…
• SQL injection attacks
• Hackers submit data to Web forms that exploits site’s unprotected software and sends
rogue SQL query to database
• Spoofing
• Misrepresenting oneself by using fake e-mail addresses or masquerading as someone
else
• Redirecting Web link to address different from intended one, with site masquerading as
intended destination
• Sniffer
• Eavesdropping program that monitors information traveling over network
• Enables hackers to steal proprietary information such as e-mail, company files, and so on
Server End Security
DDoS Attacks

• Denial-of-service attacks (DoS)


• Flooding server with thousands of false requests to crash the network
• Distributed denial-of-service attacks (DDoS)
• Use of numerous computers to launch a DoS
• Botnets
• Networks of “zombie” PCs infiltrated by bot malware
• Deliver 90% of world spam, 80% of world malware
• Grum botnet: controlled 560K to 840K computers
Server End Security
Computer Crime

• Computer crime
• Defined as “any violations of criminal law that involve a knowledge of
computer technology for their perpetration, investigation, or prosecution”
• Computer may be target of crime, for example:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, for example:
• Theft of trade secrets
• Using e-mail for threats or harassment
Server End Security
Computer Crime

• Hackers and computer crime


–Hackers vs. crackers
–Activities include:
• System intrusion
• System damage
• Cybervandalism
– destruction of Web site or corporate information system
Server End Security
Computer Crime

• Phishing
• Setting up fake Web sites or sending e-mail messages that look like legitimate
businesses to ask users for confidential personal data.
Server End Security
Computer Crime
• Pharming
– Redirects users to a bogus Web page, even when individual types correct Web
page address into his or her browser
• Click fraud
– Occurs when individual or computer program fraudulently clicks on online ad
without any intention of learning more about the advertiser or making a
purchase
• Cyberterrorism and Cyberwarfare
Server End Security
Computer Crime

• Failed computer systems can lead to significant or total loss of


business function.
• Firms now are more vulnerable than ever.
• Confidential personal and financial data
• Trade secrets, new products, strategies
• A security breach may cut into a firm’s market value almost
immediately.
• Inadequate security and controls also bring forth issues of liability.
Server End Security
• The Solution
• Firewall
• Combination of hardware and software that prevents unauthorized users from accessing private networks
• Identifies names, IP addresses, applications and other traffic characteristics
• Technologies include:
• Static packet filtering
• Examines selected fields in the headers of data packets flowing between trusted network and the Internet
• Stateful inspection
• Determining whether packets are part of an ongoing dialogue between a sender and a receiver
• Network address translation (NAT)
• Conceals IP addresses of the organization’s internal host computers to prevent the sniffers
• Application proxy filtering
• Examines the application content of packets
• Firewalls can deter but not completely prevent network penetration by outsiders
Server End Security
• The Solution
• Firewall

The firewall is placed


between the firm’s private
network and the public
Internet or another distrusted
network to protect against
unauthorized
traffic.
The Message Security
• EXAMPLE: We want to buy TATAMOTORS stocks from our broker
– and hence, send a letter for the same on the broker’s address.
• What are the message level risks we’ll face?
Confidentiality
• Only the broker should be able to read the message, and no one else!
Authentication
• Broker should know that it is you who have sent the letter, and no
one else. Integrity
• Broker should be confident that the message he/she received is the
message you had sent! Non-repudiation

• Broker should make sure that in future you may not deny having sent
such a request.
The Message Security
• EXAMPLE: We want to buy TATAMOTORS stocks from our broker – and hence, send a
letter for the same on the broker’s address.

• What are the message level risks we’ll face?


• Confidentiality
• To ensure that only you, as the person to whom the message has been sent, are able to read the message
• Authentication
• Whether the person/site that you are dealing with is actually the person/site it claims to be
• Integrity
• The message received is actually the message sent
• Non-Repudiation
• The problem where one person or the site or the organization denies having sent the message he did
send
The Message Security
• What are the message level risks we’ll face?
• Confidentiality
• To ensure that only you, as the person to whom the
message has been sent, are able to read the message
• The Solution
• Encryption
The Message Security
• Encryption
• Transforming the message such that it makes sense only when it is
decrypted back – Decryption
• Science of encryption – Cryptography
• Encryption algorithm is also referred as the cipher
• Publicly available
• Common to huge number of people. Some of the commonly used ones are
DES, Triple DES etc.
• Anybody can decrypt the message! – Use of a key
• How will you share the key with the receiver
• Use of public key cryptography
The Message Security

A public key encryption system can be viewed as a series of public and private keys that lock data when
they are transmitted and unlock the data when they are received. The sender locates the recipient’s public
key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet
or a private network. When the encrypted message arrives, the recipient uses his or her private key to
decrypt the data and read the message.
The Message Security
• Encryption
• Encryption-Decryption (Cipher)
• Concept of Key
• Public Key Cryptography
• Works both ways
• Symmetric key cryptography
The Message Security
• What are the message level risks we’ll face?
• Confidentiality
• Integrity
• The message received is actually the message sent
• The Solution
• ……….. Signatures
• The Digital Signatures
The Message Security
Sender Received
Message Message

The Internet Receiver


HASH FUNCTION
HASH FUNCTION

Encryption Received
Algorithm Re-computed
Message Digest Message Digest
Message Digest
HASH FUNCTION – publicly available Decryption
Algorithm
Sender’s Private Key
Sender’s Public Key
The Message Security
• What are the message level risks we’ll face?
• Confidentiality
• Integrity
• Authentication
• Whether the person/site that you are dealing with is actually
the person/site it claims to be
• The Solution
• Digital Certificates
The Message Security
• Digital Certificates
• Issued by Trusted Third Parties, also referred as Certificate
Authority (CA)
• Charge fee for this service
• Issues a pair of keys – public key and the private key
• Public key is share with the CA, which is used to create your
digital signature
• 40 bit and 128 bit keys
Digital certificates help
establish the identity of people
or electronic assets. They
protect online transactions by
providing secure, encrypted,
online communication.
The Message Security
• What are the message level risks we’ll face?
• Confidentiality
• Encryption
• Integrity
• Digital Signature
• Authentication
• Digital Certificate
• What about Non-Repudiation?
• What does non-repudiation require?
• The message
• Proof that the message came from you – or your certificate
• Proof that the message has not been tampered with – or your digital signature
• All your broker needs to do is store the message, your certificate, and your digital signature
The Message Security
• What are the message level risks we’ll face?
• Confidentiality
• Encryption
• Integrity
• Digital Signature
• Authentication
• Digital Certificate
• Non-Repudiation

• The Protocol
• Secure Socket Layer (SSL)
• A protocol that permits encryption, digital signatures, digital certificates to be exchanged between the hosts
• The most popular protocol of this kind for the Internet, developed by Netscape
• It ensure that the server has the digital certificate, does not insist on client authentication
• Non-repudiation is not built into the SSL protocol
• Secure Electronic Transaction (SET)
• Developed by VISA and MasterCard (along with many other companies) to handle credit card transactions
Server End Security
• The Solution
• Firewall
• Intrusion detection systems:
• Monitors hot spots on corporate networks to detect and deter intruders
• Examines events as they are happening to discover attacks in progress
• Unified threat management (UTM) systems
Corporate Security

• Legal and regulatory requirements for electronic records management and privacy
protection
– HIPAA: Medical security and privacy rules and procedures

– Gramm-Leach-Bliley Act: Requires financial institutions to ensure the security and


confidentiality of customer data
– Sarbanes-Oxley Act: Imposes responsibility on companies and their management to safeguard
the accuracy and integrity of financial information that is used internally and released
externally

• Security policy
• Ranks information risks, identifies acceptable security goals, and identifies mechanisms for
achieving these goals
Corporate Security

• Identity management
– Business processes and tools to identify valid users of system and
control access
• Identifies and authorizes different categories of users
• Specifies which portion of system users can access
• Authenticating users and protects identities
– Identity management systems
• Captures access rules for different levels of users
Corporate Security
These two examples represent
two security profiles or data
security patterns that might be
found in a personnel system.
Depending on the security
profile, a user would have
certain restrictions on access to
various systems, locations, or
data in an organization.
Corporate Security

• MIS audit
• Examines firm’s overall security environment as well as controls governing
individual information systems
• Reviews technologies, procedures, documentation, training, and personnel.
• May even simulate disaster to test response of technology, IS staff, other
employees
• Lists and ranks all control weaknesses and estimates probability of their
occurrence
• Assesses financial and organizational impact of each threat
Corporate Security
Corporate Security

• Identity management
– Automates keeping track of all users and privileges
– Authenticates users, protecting identities, controlling access
• Authentication
– Password systems
– Tokens
– Smart cards
– Biometric authentication

You might also like