250 likes | 394 Views
SECURITY. Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality. Who is who?. Who can read what ?. Telephone line Mail server TCP/IP Echelon & Carnivore. e-mail using an ISP. POST. SMTP. MAIL. POP3. POST OFFICE. a) Telephone-line.
E N D
SECURITY Bart Vansevenant • Who is who? • Who can read what? • Traces • Virusses • Safety and confidentiality
Who can read what ? • Telephone line • Mail server • TCP/IP • Echelon & Carnivore
e-mail using an ISP POST SMTP MAIL POP3 POST OFFICE
a) Telephone-line POST SMTP MAIL POP3 POST OFFICE
b) e-mail server Everything on the servers can be read or copied POST SMTP MAIL POP3 POST OFFICE
c) TCP/IP POST SMTP Not readable – following different ways MAIL POP3 POST OFFICE
Echelon/Carnivore Source: http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm
Traces The IP address of your computer is : 213.177.129.120 your DNS address is : adsl-129-120.wanadoo.be We know you use : Microsoft Windows 98 Your navigator has the code: Mozilla/4.78 [en] (Win98; U) In fact it is: Netscape Communicator 4.x English What you did is stored : Windows 95 C:\Windows\Temporary Internet Files\ Windows NT C:\WinNt\Temporary Internet Files\ A nice demo in french on: www.cnil.fr
Virus • What is a virus and types? • How is a computer infected? • Danger
a) What is a virus? • computer virus = a computer program'I love you', 45 million computers infected • worm = multiplicates itself code Red: 300.000 servers destroyed • trojan horse = hides for other actionsBack Orifice • logic bomb = distroys programs • hoax = false alarm
b) How is a computer infected? • files attached to e-mail (attachment) • diskettes • other
c) Danger • infecting components of your system • effects: • malfunctions • deletion of data • wiping of hard disk • ...
Solutions to provide safety and confidentiality • solving identity problem and unauthorised reading • protection against traces • protection against virusses
Identity and unauthorised reading Encryption • Purpose • Functions • How?
Functions of encryption • Authentication • Integrity • Confidentiality
Symmetrical encryption SAME KEY Sender Receiver A=A+1 A=A-1 Ubizen Vcjafo Vcjafo Ubizen Untrusted network Encryption E(…) Decryption D(…)
Asymmetrical encryption Sender Receiver Public Key Receiver Private Key Receiver Ubizen Go#st$ Go#st$ Ubizen Encryption E(…) Decryption D(…) Untrusted network confidentiality towards receiver
Asymmetrical encryption Sender Receiver Private Key Sender Public Key Sender Ubizen Go#st$ Go#st$ Ubizen Encryption E(…) Decryption D(…) Untrusted network authentication of sender
Against leaving traces • Traces at the ISP • Traces on own computer
Against virusses • anti-virus program Norton, McAfee, eSafe, F-Secure, … • watch out for attachments.exe, .com, .pif, .vbs, .doc, .xls, … • www.bipt.be