Security Chapter 8. Types of Threats Interception Interruption Modification Fabrication.

Презентация:



Advertisements
Похожие презентации
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
Advertisements

Copyright 2003 CCNA 4 Chapter 22 Developing Network Security and Network Management Strategies By Your Name.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Secured Connectivity Introducing IPsec.
© 2006 Cisco Systems, Inc. All rights reserved.CIPT2 v Monitor and Manage IP Telephony Introducing Cisco Unified CallManager Serviceability.
Copyright 2003 CCNA 4 Chapter 23 Virtual Private Networks By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
Copyright 2003 CCNA 4 Chapter 11 Scaling IP Addresses By Your Name.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Three – Exchange 2007.
© 2000, Cisco Systems, Inc. CSPFF Chapter 1 Network Security and the Cisco Secure PIX Firewall.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Configuring IPsec Site-to-Site VPN Using SDM.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Site-to-Site IPsec VPN Operation.
© 2009 Avaya Inc. All rights reserved.1 Chapter Two, Voic Pro Components Module Two – Actions, Variables & Conditions.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Building a Simple Serial Network Understanding the OSI Model.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Structuring and Modularizing the Network Designing the Network Hierarchy.
WEB SERVICES Mr. P. VASANTH SENA. W EB SERVICES The world before Situation Problems Solutions Motiv. for Web Services Probs. with Curr. sols. Web Services.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing VPNs.
Copyright 2003 CCNA 3 Chapter 10 Virtual Trunking Protocol By Your Name.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Транксрипт:

Security Chapter 8

Types of Threats Interception Interruption Modification Fabrication

Security Mechanisms Encryption Authentication Authorization Auditing

Example: Globus Security Architecture Diagram of Globus security architecture.

Focus of Control Three approaches for protection against security threats a)Protection against invalid operations b)Protection against unauthorized invocations c)Protection against unauthorized users

Layering of Security Mechanisms (1) The logical organization of a distributed system into several layers.

Layering of Security Mechanisms (2) Several sites connected through a wide-area backbone service.

Distribution of Security Mechanisms The principle of RISSC as applied to secure distributed systems.

Cryptography (1) Intruders and eavesdroppers in communication.

Cryptography (2) Notation used in this chapter. NotationDescription K A, B Secret key shared by A and B Public key of A Private key of A

Symmetric Cryptosystems: DES (1) a)The principle of DES b)Outline of one encryption round

Symmetric Cryptosystems: DES (2) Details of per-round key generation in DES.

Public-Key Cryptosystems: RSA Generating the private and public key requires four steps: 1.Choose two very large prime numbers, p and q 2.Compute n = p x q and z = (p – 1) x (q – 1) 3.Choose a number d that is relatively prime to z 4.Compute the number e such that e x d = 1 mod z

Hash Functions : MD5 (1) The structure of MD5

Hash Functions : MD5 (2) The 16 iterations during the first round in a phase in MD5.

Authentication (1) Authentication based on a shared secret key.

Authentication (2) Authentication based on a shared secret key, but using three instead of five messages.

Authentication (3) The reflection attack.

Authentication Using a Key Distribution Center (1) The principle of using a KDC.

Authentication Using a Key Distribution Center (2) Using a ticket and letting Alice set up a connection to Bob.

Authentication Using a Key Distribution Center (3) The Needham-Schroeder authentication protocol.

Authentication Using a Key Distribution Center (4) Protection against malicious reuse of a previously generated session key in the Needham-Schroeder protocol.

Authentication Using Public-Key Cryptography Mutual authentication in a public-key cryptosystem.

Digital Signatures (1) Digital signing a message using public-key cryptography.

Digital Signatures (2) Digitally signing a message using a message digest.

Secure Replicated Services Sharing a secret signature in a group of replicated servers.

General Issues in Access Control General model of controlling access to objects.

Access Control Matrix Comparison between ACLs and capabilities for protecting objects. a)Using an ACL b)Using capabilities.

Protection Domains The hierarchical organization of protection domains as groups of users.

Firewalls A common implementation of a firewall.

Protecting the Target (1) The organization of a Java sandbox. 8-27

Protecting the Target (2) a)A sandbox b)A playground 8-28

Protecting the Target (3) The principle of using Java object references as capabilities. 8-29

Protecting the Target (4) The principle of stack introspection.

Key Establishment The principle of Diffie-Hellman key exchange.

Key Distribution (1) Secret-key distribution

Key Distribution (2) Public-key distribution (see also [menezes.a96]).

Secure Group Management Securely admitting a new group member.

Capabilities and Attribute Certificates (1) A capability in Amoeba. 48 bits24 bits8 bits48 bits Server portObjectRightsCheck

Capabilities and Attribute Certificates (2) Generation of a restricted capability from an owner capability.

Delegation (1) The general structure of a proxy as used for delegation.

Delegation (2) Using a proxy to delegate and prove ownership of access rights.

Example: Kerberos (1) Authentication in Kerberos.

Example: Kerberos (2) Setting up a secure channel in Kerberos.

SESAME Components Overview of components in SESAME.

Privilege Attribute Certificates (PACs) The organization of a SESAME Privilege Attribute Certificate. FieldDescription Issuer domainName the security domain of the issuer Issuer identityName the PAS in the issuer's domain Serial numberA unique number for this PAC, generated by the PAS Creation timeUTC time when this PAC was created ValidityTime interval when this PAC is valid Time periodsAdditional time periods outside which the PAC is invalid Algorithm IDIdentifier of the algorithm used to sign this PAC Signature valueThe signature placed on the PAC PrivilegesA list of (attribute, value)-pairs describing privileges Certificate informationAdditional information to be used by the PVF MiscellaneousCurrently used for auditing purposes only Protection methodsFields to control how the PAC i s used

Electronic Payment Systems (1) Payment systems based on direct payment between customer and merchant. a)Paying in cash. b)Using a check. c)Using a credit card.

Electronic Payment Systems (2) Payment systems based on money transfer between banks. a)Payment by money order. b)Payment through debit order.

Privacy (1) Information hiding in a traditional cash payment. MerchantCustomerDateAmountItem MerchantFullPartialFull CustomerFull BankNone ObserverFullPartialFull

Privacy (2) Information hiding in a traditional credit-card system (see also [camp.lj96a]) MerchantCustomerDateAmountItem MerchantFull CustomerFull BankFull None ObserverFullPartialFull Party Information

E-cash The principle of anonymous electronic cash using blind signatures.

Secure Electronic Transactions (SET) The different steps in SET.