120 likes | 238 Views
Internet Security in Perspective. Yong Cao December 2000. Overview. Introduction Security threats Integrated security Control measures Summary. Growth of the Internet. Security Threats. Unauthorized access User misrepresents identity Access to unauthorized data
E N D
Internet Security in Perspective Yong Cao December 2000
Overview • Introduction • Security threats • Integrated security • Control measures • Summary
Security Threats • Unauthorized access • User misrepresents identity • Access to unauthorized data • Data intercepted, read or modified • Virus attacks • Hackers
Integrated Security Secure transaction: • Confidentiality: others cannot eavesdrop on an exchange. • Integrity: the messages received are identical to the messages sent. • Authenticity: you are assured of the persons with whom you are making an exchange. • Non-Repudiability: none of the involved parties can deny that the exchange took place. Secure access: • Access control: prevent unauthorized users. • Audit trials: track down the users.
Control measures • Firewalls • Cryptography • Digital signature • Virus control
Firewalls • Protect nets with unsafe hosts • Single point of control and expertise • The firewall is often the only secure piece of an Internet arrangement • Backdoors usually diminish the effectiveness of a firewall • Proxy server
Cryptography • Transforming of information into a form unreadable by anyone without a secret decryption key. • Secret Key (Symmetric) • Public Key (Asymmetric) • PGP
Digital Signature • A digital signature shows that the person who signed the document had access to the private key and the pass phrase for the key indicated by the signature and that the document has not been modified since it was signed. • PGP
Virus Control • Using anti-virus software to scan known viruses to protect the computers. • Need to update frequently. • McAfee VirusScan
SecureSockets Layer (SSL) • Developed by Netscape Communications, SSL is a security-enhanced abstraction of sockets that provides transaction security at the link or transport level. With SSL, security properties are attached to the link or channel of communication between two parties, not the documents themselves. • Utilizing public and private keys, message digests, digital signatures, and certificates
Summary • Security is a big concern in internet use. • Integrated security should have confidentiality, integrity, authenticity, non-repudiability, access control, audit trials. • The common security controls are firewalls, cryptography, digital signature, virus control.