370 likes | 922 Views
Fundamentals of Information Systems Security Chapter 9 Cryptography. Learning Objective. Explain how businesses apply cryptography in maintaining information security. Key Concepts. History of cryptography Secret key and public key cryptography Encryption mechanisms and techniques
E N D
Fundamentals of Information Systems Security Chapter 9 Cryptography
Learning Objective • Explain how businesses apply cryptography in maintaining information security.
Key Concepts • History of cryptography • Secret key and public key cryptography • Encryption mechanisms and techniques • Business applications of cryptography • Impact of compliance laws on maintaining confidentiality of privacy data
Cryptography History • People have used cryptography to protect information for at least 4,000 years. • Early information security was as simple as hiding it. This is known as steganography. • Steganography is not the same as cryptography.
Cryptography History Examples • Histiaeus sent a message tattooed on the scalp of his slave. • Cryptography altered thecourse of English history. • World War I • World War II
Cryptography in Business • Increasing concern about the security of data • More sophisticated attacks • Tremendous growthof computer-relatedfraud and data theft • Data protection as a business priority
Applications and Uses • Cryptography uses can be found in categories, such as: • Anti-malware • Compliance or auditing • Forensics • Transaction security • Wireless security
Secure Sockets Layer (SSL) • Ad-hoc secure communications are basis of Internet e-commerce. • One of the most frequently used forms of cryptography today. • With an asymmetric key, ad-hoc communications are straightforward. • SSL is one of the most commonly used cryptographic protocols for managing secure communication between a client and server over the Web.
SSL Encryption • It is also known as Hypertext Transfer Protocol Secure (HTTPS) encryption. • It is shown in the address bar of Web browsers as https://. • A lock icon is also displayed. • SSL handshake creates first secure session between a client and server.
SSL Handshake Process • Server authentication • Server sends its certificate. • Encrypted master key is then sent to the server. • Optional client authentication • Server sends a challenge to the client.
Symmetric Key Principles • The same key encrypts and decrypts. • Symmetric algorithms can be fast and are well suited to encrypting lots of data. • They are often used once and then discarded.
Business Implementations • Classifications of products and services: • Authentication/access control/authorization • Security management products • Perimeter/network security/availability • Encryption • Administration/education/outsource services/consultants
Business Implications: Q&A Considering the information security objectives, which business tools and services satisfy which security objectives? Which of these can be addressed with cryptography?
PKI Components • Certification authority(CA) • Registration authority(RA) • Certificates and policies
PKI Components (Continued) • Certificate practicestatement (CPS) • Revocation • Trust mode
Summary • People have used cryptography to protect information for at least 4,000 years. • Businesses apply cryptography in maintaining information security. • SSL is one of the most frequently used forms of cryptography today.