250 likes | 437 Views
Lecture 8 - Security. 10 Laws of Security Cryptography Virus vs. Worm vs. Trojan Firewalls Checksums Passwords. 10 Laws of Security. If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.
E N D
Lecture 8 - Security • 10 Laws of Security • Cryptography • Virus vs. Worm vs. Trojan • Firewalls • Checksums • Passwords
10 Laws of Security • If a bad guy can persuade you to run his program on your computer, it's not your computer anymore. • If a bad guy can alter the operating system on your computer, it's not your computer anymore. • If a bad guy has unrestricted physical access to your computer, it's not your computer anymore . • If you allow a bad guy to upload programs to your website, it's not your website any more. • Weak passwords trump strong security. • A computer is only as secure as the administrator is trustworthy • Encrypted data is only as secure as the decryption key • An out of date virus scanner is only marginally better than no virus scanner at all. • Absolute anonymity isn't practical, in real life or on the Web. • Technology is not a “cure-all” paradigm
Cryptography • We’ve talked a bit about this with respect to ssh • Let’s cover it a little more
Symmetric vs. Non-symmetric • Symmetric • One “shared” key to encrypt and decrypt • Asymmetric • Two “private” keys • Encryption with one requires decryption with the other
Symmetric Algorithms • DES (Data Encryption Standard) • 56-bit key to encrypt 64-bit blocks • IDEA (International Data Encryption Algorithm) • 128-bit key to encrypt 64-bit blocks • Uses subkeys created from 128-bit key • Blowfish • Variable-length key (32-448 bits) • Unpatented and license-free
Asymmetric Algorithms • DSA • Digital Signature Authority • RSA • Rivest, Shamir, and Adelman • “Magic” • Not really… • …but beyond scope of the class • …(and not on exam)
Secure Communications • Public-key systems (asymmetric keys) too slow • Use public-key system to distribute symmetric keys • Remind you of anything?
Digital Signatures • I need to know that the PDF someone sent me: • …really came from them • …has not been altered
Digital Signatures • Chell computes a one-way hash of a document • One-way hash means AB is easy, but BA is hard, computational complexity-wise
Digital Signatures • Chell encrypts hash with private key. • This is the signature
Digital Signatures • Chell sends both items to Cave • Original document • Signature (private-key encrypted hash)
Digital Signatures • Cave produces one-way hash of Chell’s document • Cave decrypts signature with Chell’s public key • Cave makes sure both hashes match
Digital Certificates • We want to bind info (name, email, etc) to a public key • We want to distribute package to others • Why should anyone trust us?
Digital Certificates • Certification Authority (CA) • Independent 3rd party • Pretend it’s a broker/arbitrator • Two purposes to certificates • Provides key so public can encrypt stuff for us only • Provides reassurance that we (as certificate holder) are really us
Virus vs. Worm vs. Trojan • No OS is immune to the above • Linux/Apple do better • Newer? No! • Different security protocols? Nope! • Popularity? Yes!
Terminology • Virus • Malicious “program” that modifies other programs • Spreads itself to them • It’s in ELF format • Not stand-alone (so not really a program) • Requires a host program to leech from
Terminology • Worm • Malicious program that modifies other programs • Copies itself entirely • If it becomes part of another program, it’s a virus again • May contain viruses and other programs as the “payload”
Terminology • Trojan • Program that appears to have one use, but actually has another • That ‘another’ thing is malicious • May actually do the intended things
Terminology • Back door • Intentional software hole • Left by developers/administrators • Exploited by hackers* *Coming up in a second
Terminology • Hackers • People that find weaknesses in computers and systems • Motivated by profit, protest, moral/ethical reasons, thrills, boredom, etc
Terminology • Black hats • “Bad” guys • Criminals, etc • White hats • “Good” guys • Security experts, etc
Terminology • Is pinging okay? • …maybe • Like knocking on everyone’s front door • Trying to make connection? • …probably not • Like going through front doors and looking around • If store, okay. If home, not at all!
Terminology • Script kiddies • Run existing tools • They press the “Attack!” button and cackle endlessly • Understand what tool does • Little to no idea of the details
Discussion topics • Right to privacy • Browsing history • Encrypted content • Hacking a banking system to prove it can be done?
Discussion Topics • I am system admin at Bank XYZ • Found un-patchable hole • Do I • …turn off service? • Keep customer’s accounts secure but unusable • …leave service on? • Accounts useable, but vulnerable • …tell boss? …customers? …anyone?