1 / 30

Security

Security. Hiroshi Toyoizumi toyo@u-aizu.ac.jp toyo@aoni.waseda.ac.jp. Social Engineering. Your kindness may put you in danger. You as a team may put you in danger. Your reliable person may put you in danger. What can you do?. Malicious Mobile Codes: Viruses and Worms.

shana
Download Presentation

Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Hiroshi Toyoizumi toyo@u-aizu.ac.jp toyo@aoni.waseda.ac.jp

  2. Social Engineering • Your kindness may put you in danger. • You as a team may put you in danger. • Your reliable person may put you in danger. • What can you do?

  3. Malicious Mobile Codes: Viruses and Worms

  4. Laroux: Excel Macro Virus

  5. Current epidemics

  6. Cracking • Hijacking your machine. • Stepping stone. • Tamper with www pages. • Leak of important information.

  7. Scanning IP addresses

  8. Detect Windows shared folder

  9. How to protect cracking • Anti-virus • Pacth • Encryption • Firewalls • IDS:Intrusion Detection System

  10. BlackICE: An IDS

  11. Secure communication using cryptography • Encrypt important information. • Certify the other party. • Public Key Cryptography • PKI:Public Key Infrustructure

  12. Common key systemCryptograhpy

  13. Give it a try!Cipher communication Bob Alice

  14. Any problems? • It is easy to eavesdropping the key on thei internet.

  15. Public Key Cryptograhpy

  16. Give it a try!Public key cipher communication Bob Alice

  17. Any problems? • Swiching the public key. • Man-in-the-middle-attack. Bob Alice

  18. Digital signature

  19. 電子証明書は印鑑証明

  20. Key with digital signature Bob Alice

  21. Real cipher communication

  22. Public key and digital signature

  23. Certificate authority

  24. e-Government

  25. Topics • Stop Blaming the Victims • The author of Sasser • Adware,Spyware • Spoofing, Backdoor • Personal Firewall • Anti-virus • Spam • Intrusion Detection System • Cookies, Java, Active-x • Biometric

  26. Role Play • Cast • Ohta: Employee of Microsoft • Yamada: Employee of Takada delivery company • Employees of Waseda Hospital • Yamaguchi: accounting section • Yano: freshman in general affair

  27. Scene 1: call from waseda delivery • Yano: Hello, this is Yano, general affair section in Waseda Hospital. • Yamada: Hi, this is Takada delivery calling. It seems that one of our customer wrongly faxed her address to your company. Could you fax it to us? • (after checking the fax machine.) • Yano: No, we haven’t received your fax. • Yamada: You may found it other place… Maybe in your accounting section? If you find it, please fax it to us at 03-1111-1111. • Yano: OK.

  28. Scene 2:call from Microsoft • Ohta: Hello, this Ohta from Microsoft customer service. We found that your PC is sending too much viruses on the internet, and we received many complaints about it. Please download the anti-virus software that I will mention and install it on your PC. • Yano: Sure. Where can I find the software?

  29. Scene 3:call from other section • Tahara: This is Tahara from accounting. Could you do me a favor? • Yamaguchi: Yes. What? • Thara: Our computers are all infected by viruses, but I need the address of a patient, Ryoko Hirosue. Could you call up the data on your screen and fax it to me at accounting section? • Yamaguchi: No problem.

  30. Quiz • Did you find any security problem in the role-play? • Write them down. • Describe the counter measures.

More Related