240 likes | 406 Views
IS 605 Fall 2000. 2. Network Security. $ 10 billion worth of data stolen every yearHuge number of credit card numbers get stolen50% of the computer crimes are committed by insiders"Many cases are not reportedNetwork security is a major issueStill, not accorded the priority it deserves - low bu
E N D
1. IS 605 Fall 2000 1 Network and E-commerce Security Somendra Pant
2. IS 605 Fall 2000 2 Network Security $ 10 billion worth of data stolen every year
Huge number of credit card numbers get stolen
50% of the computer crimes are committed by “insiders”
Many cases are not reported
Network security is a major issue
Still, not accorded the priority it deserves - low budget allocations, for example.
Enterprise network security goals need to be set at the highest level
3. IS 605 Fall 2000 3 Main Issues Security of Internal Networks
Security of Networks Connected to the Internet
Secure E-commerce Issues
Network Security
Transaction Security
Privacy – no unauthorized access
Confidentiality – deletion after use
Integrity – no tampering
4. IS 605 Fall 2000 4 Internet Security Terms Authentication – a way to verify that message senders are who they say they are
Integrity – ensuring that information will not be accidentally or maliciously altered or destroyed
Reliability – ensuring that the system will perform consistently and at an acceptable level of quality
Encryption – a process of making information indecipherable except to those with a decoding key
5. IS 605 Fall 2000 5 Internet Security Terms Firewall – a filter between a corporate network and the Internet that keeps the corporate network secure from intruders but allows authenticated corporate users access to the Internet
Spoofing – a way of creating counterfeit packets with private IP (Intranet) addresses in order to gain access to private networks and steal information
Denial of service – an attack on the information and communication services by a third party that prevents legitimate users from using the infrastructure
6. IS 605 Fall 2000 6 Figure 13-4 Security vs. Productivity Balance
7. IS 605 Fall 2000 7 Network Security Essentials of Network Security Policy
Identification/authorization - authorized users access resources
Access control - even authorized users allowed appropriate access
Privacy - no eavesdropping
Data integrity - that data is genuine and cannot be altered without proper controls
Non-repudiation - users do not deny occurrence of given events or transactions
8. IS 605 Fall 2000 8 Network Security Steps in security policy development
Identify assets
Identify threats
Identify vulnerabilities
Consider the risks
Take protective measures
9. IS 605 Fall 2000 9 Network Security Policy Development Process Executive’s and Management’s Responsibility for Protection of Information Resources
Set acceptable-use policy for the entire organization
State the value of information as a corporate resource
Require security awareness training
Assess the consequences of security breach
Find optimal balance between security and productivity needs
Lead by example
10. IS 605 Fall 2000 10 Virus Protection Virus - a malicious computer program
Computer viruses are most common microcomputer security breach
Frequent occurrences
Complete recovery from a virus infection costs on an average of $8100 and 44 hr over 10 working days
Over 10,000 known viruses, 200 new viruses per month
Viruses need some kind of a trigger (time bomb, logic bomb)
Logic bomb may appear as a button in a program
Trojan Horses hide viruses (e.g. Concept, Melissa)
11. IS 605 Fall 2000 11 Virus Protection Different categories of virus
File infectors: attach themselves to a variety of executable files
System/boot infectors: attack the files of the operating system or boot sector
Antivirus Strategies
Install virus scanning software at possible points of attack
Scan diskettes at stand-alone PCs
Outsider lap-tops – same as diskettes
Prohibit, control, or scan shareware programs
Vendors must run their demos on own machines
12. IS 605 Fall 2000 12 Figure 13-17 Virus Infection Points of Attack and Protective Measures
13. IS 605 Fall 2000 13 Virus Protection Antivirus Technology Relies On
Virus scanning - primary method - checks for unique signatures of known viruses and removes them
Emulation technology - runs programs to examine and identify potentially unknown viruses
Programs are run in a safe environment to detect virus-like activities
14. IS 605 Fall 2000 14 Authorization and Access Control Assures that only authorized users are able to access those files, directories, and applications to which they are entitled
Simplest method is requiring users to use passwords
Further security can be enforced by making the users choose passwords with certain features, requiring them to change passwords at intervals
Modern authentication systems use smart cards
Future trends - biometric authentication (fingerprints and retinal patterns)
Access to resources can be restricted by giving different levels of access permissions
15. IS 605 Fall 2000 15 Figure 13-18a Packet Filters
16. IS 605 Fall 2000 16 Firewalls (Packet Filtering) Specialized software, usually runs on a dedicated server
Prevents outsiders from accessing the corporate network
All packets entering the firewall are filtered (examined) to determine: (a) that users have authority to access resources (b) that messages are appropriate for forwarding over the internal network
17. IS 605 Fall 2000 17 Figure 13-18b Application Gateway
18. IS 605 Fall 2000 18 Firewalls (Application Gateways) Firewalls can also be created through software known as proxy service
Host computer running the proxy service is known as application gateway – sits between Internet and internal network – provides “proxy” services
Provides safe access to authorized people to internal resources
Example: user connects to proxy FTP software which in turn allows connection to internal machines. Connections are created after establishing the legitimacy of the request
Even after establishing legitimacy, only proxy clients and servers actually communicate - actual internal IP addresses or names are not transported across the Internet
19. IS 605 Fall 2000 19 Encryption Encryption involves changing of data into an indecipherable form
Decryption - changing the code back into original message
DES (Data Encryption Standard) - Private Key Encryption
64 bit encryption - 2 to the 64th power number of combinations
Both the sender and the receiver must know the private key
If private key is intercepted, encryption system is compromised
20. IS 605 Fall 2000 20 Encryption RSA Standard (Rivet-Shamir-Alderman) - Public Key Encryption
Makes use of a public/private key combination
Digital Signature Encryption
An original document is processed using a hash algorithm
The unique hash string is encoded using the sender’s private key
Recipient re-generates the original document to compare it with the document received
21. IS 605 Fall 2000 21 Figure 13-23 Private Key Encryption, Public Key Encryption, and Digital Signature Encryption
22. IS 605 Fall 2000 22 Figure 13-23a Private Key (Symmetric) Encryption
23. IS 605 Fall 2000 23 Figure 13-23b Public Key Encryption
24. IS 605 Fall 2000 24 Figure 13-23c Digital Signature Encryption