470 likes | 1.17k Views
Security and Ethical Challenges. Prof. Dr. Yang Dehua School of Economics and Management Tongji University. Outlines. Security Challenges Societal Challenges Ethical Issues Security Management Security Measures. Security, and Societal Challenges of IT. Some Important Aspects Crime
E N D
Security and Ethical Challenges Prof. Dr. Yang Dehua School of Economics and Management Tongji University
Outlines • Security Challenges • Societal Challenges • Ethical Issues • Security Management • Security Measures
Security, and Societal Challenges of IT • Some Important Aspects • Crime • Privacy • Employment • Health • Individuality • Working conditions • Computer monitoring
Security Attacks • Normal Flow of Data Interruption • Interception
Security Attacks • Modification • Fabrication
Computer Crime Types • Virus and Malicious Code • Denial of Service • Spam E-Mail • Unauthorized Access by an Insider • Phishing • Unauthorized Access by an Outsider • Fraud
Computer Crime Types • Theft of Intellectual Property • Theft of Other Proprietary Info • Employee Identity Theft • Sabotage by An Insider • Sabotage by An Outsider • Extortion by An Insider • Extortion by An Outsider • Other
Computer Crime Categories • Computer Crime Categories • Hacking • Cyber theft • Unauthorized use at work • Software piracy • Piracy of intellectual property • Computer viruses and worms
Ethical Responsibility of Business Professionals • Ethical Responsibility of Business Professionals • Business ethics • Equity • Rights • Honesty • Exercise of corporate power
Technology Ethics • Technology Ethics • Proportionality • Informed Consent • Justice • Minimized risk
Privacy Issues • Privacy Issues • Privacy on the Internet • Computer matching • Privacy laws • Computer libel and censorship • Some examples
Other Challenges • Other Challenges • Employment • Computer monitoring • Working conditions • Individuality • Health • Society
Security Services • Conerstones of Security • Confidentiality • Authenticity • Integrity • Nonrepudiation • Access Control • Availability/Survivability
Security Management • Managerial Issues • Enterprise Security Policies • Security Processes and Procedures • Enterprise Best Practices • Security Life Cycle Management
Security Management • Security Knowledge in Practice
Security Management • Technical Security Measures • Firewalls • Encryption • Access control • Intrusion detection • Monitoring • Others
Firewalls • Protecting Intranets from Attacking • Using Proxies • Application Level Proxy • Circuit Level Proxy • Packet Filtering
Firewalls • Two-Homed Bastion
Firewalls • Screened Subnet Bastion
Intranet Router Internet Routing Table Filtering via Routers • Filtering
Encryptions • Symmetric encryption • Asymmetric encryption • Cryptography • Reviews of encryption issues • Strength • Key length • Algorithm
Asymmetric Encryptions • Public key encryption principle • PKI components • Plaintext • Encryption algorithm • Public/Private key • Ciphertext • Decryption algorithm
Encryption and Decryption • Public Key Cryptography Encryption Decryption Public Key Private Key Plaintext Plaintext Ciphertext
Public Key Encryptions • CA and certificate • Public key cryptography algorithms • RSA • Digital Signature standard(SHA-1, DSA) • Elliptic-Curve cryptography(ECC) • Diffie-Hellman key exchange • Many others
Public Key Encryptions • Applications of public key cryptosystem • Encryption/Decryption • Digital signature • Key exchange • Authentication • Integrity checkup
Encryption Protocols • Security Protocols • SSL • SET • Characteristics • VPN • IPSec VPN • SSL VPN
SSL Protocol Message Digest Digital Signature Digital Envelope Message Digest Secret Key Message Message Private Key Private Signature Key Compare Secret Encrypted Encrypted Key Message Message Sender Certificate Message Digital Signature Receiver Certificate Digital Sender Public Public Key Digest Envelope Signature Key
VPN • An Example of IPSec VPN
RAID Disks Anti-Virus Server Network Mgmt Fiber Switch App/Data Server IDS SSL VPN Gateway Switch Apps and Data Area FTP Server Firewall Web Server Router E-Mail Server DMZ Area InternetSSL VPN Tunnel VPN • Example of SSL VPN
Other Defense Measures • Other Defense Measures • Protection from denial of service • E-Mail monitoring • Anti-Virus • Implementation of security codes • Backup systems • Intrude detection system • Biometric security measures
Defense Measures • Failure controls • Fault tolerant systems • Disaster recovery • BPCM
System Controls and Auditing • System Data Input • System Auditing and Logging • System Controls • Hardware • System software • Applications • Utilities