320 likes | 332 Views
Security. Hiroshi Toyoizumi toyoizumi@waseda.jp. Today ’ s Contents. Examples of Security Threats Computer Virus Cracking Phishing Basic of Cryptography. Malicious Mobile Codes: Viruses and Worms. Viruses. crackings. Laroux: Excel Macro Virus. Current epidemics. Cracking.
E N D
Security Hiroshi Toyoizumi toyoizumi@waseda.jp 情報科学
Today’s Contents • Examples of Security Threats • Computer Virus • Cracking • Phishing • Basic of Cryptography 情報科学
Malicious Mobile Codes: Viruses and Worms Viruses crackings 情報科学
Current epidemics 情報科学
Cracking • Hijacking your machine. • Stepping stone. • Tamper with www pages. • Leak of important information. 情報科学
Phishing eBay (phishing) Asking you to go to the fake eBay site and submit your information of password of eBay. From http://www.cobb.com/phish/ebay.html 情報科学
Detail of Phishing The scammers typically send out an e-mail that appears to come from a trusted company such as a bank or an e-commerce Web site. The phishing messages attempt to lure people to a bogus Web site, where they're asked to divulge sensitive personal information. The attackers can then use those details to steal money from the victims' accounts. According to a report from online privacy watchdog Truste, 7 out of 10 people who go online have received phishing e-mails, and 15 percent of those have successfully been duped into providing personal information. From CNET NEWS http://news.com.com/Caught+in+a+phishing+trap/2100-1029_3-5453203.html 情報科学
How to protect cracking • Anti-virus • Pacth • Encryption • Firewalls • IDS:Intrusion Detection System 情報科学
BlackICE: An IDS 情報科学
Secure communication using cryptography • Encrypt important information. • Certify the other party. 情報科学
Common key systemCryptograhpy Cipher text Plain text Same key for encrypt and decrypt 情報科学
Give it a try!Cipher communication Bob Alice 情報科学
Any problems? • It is easy to eavesdropping the key on thei internet. 情報科学
Public Key Cryptograhpy Unique keys for encrypt and decrypt Cipher text Plain text 情報科学
Give it a try!Public key cipher communication Bob Alice 情報科学
Any problems? • Swiching the public key. • Man-in-the-middle-attack. Bob Alice 情報科学
Digital signature Plain text Cipher text A makes a cipher text using the key only known to A. B decrypts the cipher text with the public key of A This is the proof of the plain text is made by A! 情報科学
Key with digital signature Bob Alice 情報科学
e-Government 情報科学
Examples of Topics • Stop Blaming the Victims • The author of Sasser • Adware,Spyware • Spoofing, Backdoor • Personal Firewall • Anti-virus • Spam • Intrusion Detection System • Cookies, Java, Active-x • Biometric • Examples of Phishing • Bots 情報科学
Role Play • Cast • Ohta(太田): Employee of Microsoft • Yamada(山田): Employee of Takada delivery • Employees of Waseda Hospital • Tahara(田原): accounting section • Yano(矢野): freshman in general affair • Yamaguchi(山口): freshman in general affair 情報科学
Scene 1: Call from Takada delivery • Yano: Hello, this is Yano, general affair section in Waseda Hospital. • Yamada: Hi, this is Takada delivery calling. It seems that one of our customer wrongly faxed her address to your company. Could you fax it to us? • (after checking the fax machine.) • Yano: No, we haven’t received your fax. • Yamada: You may found it other place… Maybe in your accounting section? If you find it, please fax it to us at 03-1111-1111. • Yano: OK. 情報科学
Scene 2:Call from Microsoft • Ohta: Hello, this Ohta from Microsoft customer service. We found that your PC is sending too much viruses on the internet, and we received many complaints about it. Please download the anti-virus software that I will mention and install it on your PC. • Yano: Sure. Where can I find the software? 情報科学
Scene 3:Call from accounting section • Tahara: This is Tahara from accounting. Could you do me a favor? • Yamaguchi: Yes. What? • Thara: Our computers are all infected by viruses, but I need the address of a patient, Ryoko Hirosue. Could you call up the data on your screen and fax it to me at accounting section? • Yamaguchi: No problem. 情報科学
Quiz • Did you find any security problem in the role-play? • Write them down. • Describe the counter measures. 情報科学
Steps to obtain the address of Hirosue. • By pretending Tahara of accounting section, have Yamaguchi to fax the address to accounting section. • By pretending a wrong fax, asking Yano to send the fax to Takada delivery. Each employee did what seems to be OK, but as a whole it would make a leak of private information. 情報科学