COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work?...

34
COMPUTER SECURITY Introduction to Computer Engineering 2015 Spring by Euiseong Seo

Transcript of COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work?...

Page 1: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

COMPUTER SECURITY Introduction to Computer Engineering 2015 Spring by Euiseong Seo

Page 2: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Where are we? Chapter 1: The Big Picture Chapter 2: Binary Values and Number Systems Chapter 3: Date Representation Chapter 4. Gates and Circuits Chapter 5. Computing Components Chapter 6. Low-Level Programming Languages and Pseudocode Chapter 7. Problem Solving and Algorithms Chapter 8. Abstract Data Types and Subproblems Chapter 9. Object-Oriented Design and High-Level Programming languages Chapter 10. Operating Systems Chapter 11. File Systems and Directories Chapter 12. Information Systems Chapter 13. Artificial Intelligence Chapter 14. Simulation, Graphics, Gaming, and Other Applications Chapter 15. Networks Chapter 16. The World Wide Web Chapter 17. Computer Security Chapter 18. Limitations and Computing

Page 3: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Contents

¨  Security at all levels ¨  Preventing unauthorized access ¨  Malicious code ¨  Cryptography ¨  Protecting your information online

Page 4: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Information security

¨  Information security ¤ The techniques and policies used to ensure proper

access to data

¨  Confidentiality ¤ Ensuring that data is protected from unauthorized

access

Page 5: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

CIA triad of information security

Ensuring that data can be modified only by appropriate mechanisms

The degree to which authorized users can access information for legitimate purposes

Ensuring that data is protected from unauthorized access

비밀성

무결성 가용성

Page 6: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Information security

¨  Risk analysis ¤ Determining the nature and likelihood of the risks to key

data ¤ Planning for information analysis requires risk analysis ¤ Goal is to minimize vulnerability to threats that put a

system at the most risk

Page 7: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Contents

¨  Security at all levels ¨  Preventing unauthorized access

¨  Malicious code ¨  Cryptography ¨  Protecting your information online

Page 8: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Preventing unauthorized access

¨  Authentication credentials ¤  Information users provide to identify themselves for

computer access n User knowledge: name, password, PIN n Smart card: a card with an embedded memory chip used

for identification n Biometrics: human characteristics such as fingerprints, retina

or voice patterns

Page 9: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Preventing unauthorized access

¨  Guidelines for passwords ¤ Easy to remember, hard to guess ¤ Don’t use family or pet names ¤ Don’t make it accessible ¤ Use combination of uppercase/lowercase letters, digits

and special characters ¤ Don’t leave computer when logged in ¤ Don’t ever tell anyone ¤ Don’t include in an email ¤ Don’t use the same password in lots of places

Page 10: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Preventing unauthorized access

¨  Typical password criteria ¤ Contain six or more characters ¤ Contain at least one uppercase and one lowercase

letter ¤ Contain at least one digit ¤ Contain at least one special character

Page 11: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Good or bad?

nelldale JohnLewis GinderCat Longhorns aatnv.AATNV One2Three 7December1939 red&whIte%blUe7 g&OoD#3PaSs

Page 12: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Preventing unauthorized access

¨  CAPTCHA ¤ Software that verifies that the user is not another

computer

¤ You have to look at a weird set of characters and key them back in

¤ Why does this work?

Page 13: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Preventing unauthorized access

¨  Fingerprint analysis ¤ A stronger level of verification

Page 14: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Contents

¨  Security at all levels ¨  Preventing unauthorized access ¨  Malicious code

¨  Cryptography ¨  Protecting your information online

Page 15: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Computer security

¨  Malicious code ¤ A computer program that attempts to bypass

appropriate authorization and/or perform unauthorized functions n Worm stands alone, targets network resources n Trojan horse disguises as benevolent resource n Virus self-replicates n  Logic bomb sets up to execute at system event

Page 16: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Antivirus software

¨  Software installed to detect and remove malicious code ¤ Example?

¨  Signature detection recognizes known malware and removes

¨  Heuristics are strategies used to identify general patterns

Page 17: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Computer Security

¨  Security attacks ¤ An attack on the computer system itself

n Password guessing: obvious n Phishing: trick users into revealing security information n Spoofing: malicious user masquerades as authorized user n Back door: unauthorized access to anyone who knows it

exists

Page 18: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Computer Security

¨  Buffer overflow ¤ Defect that could cause a system to crash and leave the

user with heightened privileges

¨  Denial-of-service ¤ Attack that prevents authorized user from accessing the

system

¨  Man-in-the-middle ¤ Network communication is intercepted in an attempt to

obtain key data

Page 19: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Contents

¨  Security at all levels ¨  Preventing unauthorized access ¨  Malicious code ¨  Cryptography

¨  Protecting your information online

Page 20: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Cryptography

¨  Cryptography ¤ The field of study related to encoded information

(comes from Greek word for “secrete writing”)

¨  Encryption ¤ The process of converting plaintext into ciphertext

¨  Decryption ¤ The process of converting ciphertext into plaintext

Page 21: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Cryptography

¨  Encrypted(information) cannot be read ¨  Decrypted(Encrypted(information)) can be read

plaintext message

ciphertext message

Encryption

Decryption

Page 22: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Cryptography

¨  Cipher ¤ An algorithm used to encrypt and decrypt text

¨  Key ¤ The set of parameters that guide a cipher

¨  Neither is any good without the other

Page 23: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Cryptography

T+ONDAYMYADOIS+ ? ?

Page 24: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Cryptography

¨  Substitution cipher ¤ A cipher that substitutes one character with another

¨  Caesar cipher ¤ A substitution cipher that shifts characters a certain

number of positions in the alphabet

¨  Transposition ciphers ¤ A cipher that rearranges the order of existing

characters in a message in a certain way (e.g., a route cipher)

Page 25: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Substitution cipher

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

¨  Substitute the letters in the second row for the letters in the top row to encrypt a message

¨  Encrypt(COMPUTER) gives FRPSXWHU ¨  Substitute the letters in the first row for the letters in

the second row to decrypt a message ¨  Decrypt(Encrypt(COMPUTER)) gives COMPUTER

Page 26: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Transposition cipher T O D A Y+ I S + M O N D A Y

¨  Write the letters in a row of five, using ‘+’ as a blank. Encrypt by starting spiraling inward from the top left moving counter clockwise

¨  Encrypt(TODAY IS MONDAY) gives T+ONDAYMYADOIS+

¨  Decrypt by recreating the grid and reading the letters across the row

¨  The key are the dimensions of the grid and the route used to encrypt the data

Page 27: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Cryptanalysis

¨  Cryptanalysis ¤ The process of decrypting a message without knowing

the cipher or the key used to encrypt it ¤ Substitution and transposition ciphers are easy for

modern computers to break ¤ To protect information more sophisticated schemes are

needed

T+ONDAYMYADOIS+ ? ?

Page 28: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Public/private keys

¨  Public-key cryptography ¤ An approach in which each user has two related keys,

one public and one private ¤ One’s public key is distributed freely ¤ A person encrypts an outgoing message, using the

receiver’s public key ¤ Only the receiver’s private key can decrypt the

message

Page 29: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Public/private keys

¨  Digital signature ¤ Data that is appended to a message, made from the

message itself and the sender’s private key, to ensure the authenticity of the message

¨  Digital certificate ¤ A representation of a sender’s authenticated public key

used to minimize malicious forgeries

Page 30: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Contents

¨  Security at all levels ¨  Preventing unauthorized access ¨  Malicious code ¨  Cryptography ¨  Protecting your information online

Page 31: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Protecting online information

¨  Be smart about information you make available!!!!! ¤ 25% of Facebook users don’t make use of its privacy

controls or don’t know they exist ¤ 40% of social media users post their full birthday,

opening themselves up to identify theft ¤ 9% of social media users become victims of information

abuse

Page 32: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Protecting online information

¨  Why are smart people dumb about protecting online information? ¤ The Internet creates a false sense of anonymity ¤ People make assumptions about how securely their

information is being treated ¤ People don’t think about the ramifications of sharing

information n Example?

Page 33: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Security and portable devices

¨  Smartphones, tablets, and laptops combined with GPS capabilities can pose ethical problems ¤ Apple iPhone and Google log and transmit data about

users ¤ Law enforcement makes use of this data in criminal

investigations ¤ U.S. Customs and Border Protection asserted the

authority to seize and copy information in portable electronic devices for any reason

Page 34: COMPUTER SECURITY - AndroBenchcsl.skku.edu/uploads/ICE2010S15/week14.pdf · Why does this work? Preventing unauthorized access! Fingerprint analysis ! ... controls or don’t know

Picture sources of today’s slides

¨  Jones & Barlett Learning’s slides

¨  http://dxdy2x.comze.com/content/pub_rsa.htm

¨  http://ko.wikipedia.org/wiki/%EC%97%90%EB%8B%88%EA%B7%B8%EB%A7%88

¨  http://hulog.co.kr/entry/%EB%82%B4-%EB%A7%98%EB%8C%80%EB%A1%9C-%E2%80%98%EC%9C%84%EB%8C%80%ED%95%9C-%EC%A7%88%EB%AC%B8-%EC%8B%9C%EB%A6%AC%EC%A6%88%E2%80%99-%EB%A6%AC%EB%B7%B0%EB%82%B4%EA%B0%80-%EB%8F%85%EC%9E%90%EB%9D%BC%EB%A9%B4