1 / 25

SECURITY

SECURITY. Bart Vansevenant Who is who? Who can read what? Traces Virusses Safety and confidentiality. Who is who?. Who can read what ?. Telephone line Mail server TCP/IP Echelon & Carnivore. e-mail using an ISP. POST. SMTP. MAIL. POP3. POST OFFICE. a) Telephone-line.

inga
Download Presentation

SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY Bart Vansevenant • Who is who? • Who can read what? • Traces • Virusses • Safety and confidentiality

  2. Who is who?

  3. Who can read what ? • Telephone line • Mail server • TCP/IP • Echelon & Carnivore

  4. e-mail using an ISP POST SMTP MAIL POP3 POST OFFICE

  5. a) Telephone-line POST SMTP MAIL POP3 POST OFFICE

  6. b) e-mail server Everything on the servers can be read or copied POST SMTP MAIL POP3 POST OFFICE

  7. c) TCP/IP POST SMTP Not readable – following different ways MAIL POP3 POST OFFICE

  8. Echelon/Carnivore Source: http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm

  9. Traces

  10. Traces The IP address of your computer is : 213.177.129.120 your DNS address is : adsl-129-120.wanadoo.be We know you use : Microsoft Windows 98 Your navigator has the code: Mozilla/4.78 [en] (Win98; U) In fact it is: Netscape Communicator 4.x English What you did is stored : Windows 95 C:\Windows\Temporary Internet Files\ Windows NT C:\WinNt\Temporary Internet Files\ A nice demo in french on: www.cnil.fr

  11. Virus • What is a virus and types? • How is a computer infected? • Danger

  12. a) What is a virus? • computer virus = a computer program'I love you', 45 million computers infected • worm = multiplicates itself code Red: 300.000 servers destroyed • trojan horse = hides for other actionsBack Orifice • logic bomb = distroys programs • hoax = false alarm

  13. b) How is a computer infected? • files attached to e-mail (attachment) • diskettes • other

  14. c) Danger • infecting components of your system • effects: • malfunctions • deletion of data • wiping of hard disk • ...

  15. Solutions to provide safety and confidentiality • solving identity problem and unauthorised reading • protection against traces • protection against virusses

  16. Identity and unauthorised reading Encryption • Purpose • Functions • How?

  17. Functions of encryption • Authentication • Integrity • Confidentiality

  18. Symmetrical encryption SAME KEY Sender Receiver A=A+1 A=A-1 Ubizen Vcjafo Vcjafo Ubizen Untrusted network Encryption E(…) Decryption D(…)

  19. Asymmetrical encryption Sender Receiver Public Key Receiver Private Key Receiver Ubizen Go#st$ Go#st$ Ubizen Encryption E(…) Decryption D(…) Untrusted network confidentiality towards receiver

  20. Asymmetrical encryption Sender Receiver Private Key Sender Public Key Sender Ubizen Go#st$ Go#st$ Ubizen Encryption E(…) Decryption D(…) Untrusted network authentication of sender

  21. Example

  22. Example

  23. Example

  24. Against leaving traces • Traces at the ISP • Traces on own computer

  25. Against virusses • anti-virus program Norton, McAfee, eSafe, F-Secure, … • watch out for attachments.exe, .com, .pif, .vbs, .doc, .xls, … • www.bipt.be

More Related