1 / 12

Internet Security in Perspective

Internet Security in Perspective. Yong Cao December 2000. Overview. Introduction Security threats Integrated security Control measures Summary. Growth of the Internet. Security Threats. Unauthorized access User misrepresents identity Access to unauthorized data

bambi
Download Presentation

Internet Security in Perspective

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Security in Perspective Yong Cao December 2000

  2. Overview • Introduction • Security threats • Integrated security • Control measures • Summary

  3. Growth of the Internet

  4. Security Threats • Unauthorized access • User misrepresents identity • Access to unauthorized data • Data intercepted, read or modified • Virus attacks • Hackers

  5. Integrated Security Secure transaction: • Confidentiality: others cannot eavesdrop on an exchange. • Integrity: the messages received are identical to the messages sent. • Authenticity: you are assured of the persons with whom you are making an exchange. • Non-Repudiability: none of the involved parties can deny that the exchange took place. Secure access: • Access control: prevent unauthorized users. • Audit trials: track down the users.

  6. Control measures • Firewalls • Cryptography • Digital signature • Virus control

  7. Firewalls • Protect nets with unsafe hosts • Single point of control and expertise • The firewall is often the only secure piece of an Internet arrangement • Backdoors usually diminish the effectiveness of a firewall • Proxy server

  8. Cryptography • Transforming of information into a form unreadable by anyone without a secret decryption key. • Secret Key (Symmetric) • Public Key (Asymmetric) • PGP

  9. Digital Signature • A digital signature shows that the person who signed the document had access to the private key and the pass phrase for the key indicated by the signature and that the document has not been modified since it was signed. • PGP

  10. Virus Control • Using anti-virus software to scan known viruses to protect the computers. • Need to update frequently. • McAfee VirusScan

  11. SecureSockets Layer (SSL) • Developed by Netscape Communications, SSL is a security-enhanced abstraction of sockets that provides transaction security at the link or transport level. With SSL, security properties are attached to the link or channel of communication between two parties, not the documents themselves. • Utilizing public and private keys, message digests, digital signatures, and certificates

  12. Summary • Security is a big concern in internet use. • Integrated security should have confidentiality, integrity, authenticity, non-repudiability, access control, audit trials. • The common security controls are firewalls, cryptography, digital signature, virus control.

More Related