21
Internet Security Sunil Ji Garg GM, Software, UPTEC

Internet Security

  • Upload
    tabib

  • View
    17

  • Download
    0

Embed Size (px)

DESCRIPTION

Internet Security. Sunil Ji Garg GM, Software, UPTEC. Living in a World Of Hackers, Crackers, Thieves & Terrorists. Railway Tickets Fraud. Increase in site visits but decrease in business. Digit Site Redirected Internet British Lottery Fraud. Fake NASA Examination - PowerPoint PPT Presentation

Citation preview

Page 1: Internet Security

Internet Security

Sunil Ji Garg

GM, Software, UPTEC

Page 2: Internet Security

Living in a World Of Hackers, Crackers, Thieves & Terrorists

Railway Tickets Fraud. Increase in site visits but

decrease in business. Digit Site Redirected Internet British Lottery

Fraud. Fake NASA Examination Indian IT Hub-Bangalore

under attack.

Page 3: Internet Security

Remember

It is not your computer when somebody else has a access to it.

It is not your server when it is serving someone you do not know.

Retaining a secret is possible only when the person you shared it with is in the heaven.

Page 4: Internet Security

Sharing Vs. Securing

SHARING is NOT inversely proportional to SECURING.

INTER-NETWORKING makes it SHARABLE

SECURITY makes it RELIABLE

Internetworking + Security

= Win-Win Framework

Page 5: Internet Security

Safe and Secure Inter-networking

Safety relates to Confidentiality and Integrity of information.

Security relates to Authentication and Non-repudiation.

ALL FOUR REQUIREMENTS

COME UNDER “SECURITY” IN THE PRESENT CONTEXT OF NETWORKING.

Page 6: Internet Security

Devices are Vulnerable

Client Computers OS Loopholes, Soft password schemes,

friendliness needs, Application Bugs, Virus attacks

Servers Weak Standards, Casual Administration,

Bugs, Virus Attacks Intermediate Devices

Distributed Administration, Varying Standards

Page 7: Internet Security

Mediums are Vulnerable

Wires Fast, Moderately Secure, Economic

Fibres Extemely Fast, Secure, Economic for bulk

traffic Wire-Less

Moderate Speed, Security Costs, Moderately priced, easy deployment

Page 8: Internet Security

Protocols are Vulnerable

TCP/IP (Spoofing Possible by changing Source-Destination Addresses at packet level).

DNS (Recursive Domain Name Look-up is possible is getting a map of IP addresses and the services each IP station is running).

Open TCP ports can be spidered. Internet Control Message Protocol (ICMP)

message types can be changed. Network can be flooded with junk.

Page 9: Internet Security

Security Fundamentals

Privacy Vs. Security. What is to be

protected?. From whom it is to be

protected?. Motive of Intruders. Threat Perception. Security Methods. Pre and Post-breach

measures.

Page 10: Internet Security

Privacy Vs. Security

Privacy : Ability to maintain selective anonymity

Security : Information Integrity, Uninterrupted service, Information Secrecy.

Security Increase may increase privacy or it may be reduced it due to other

impacts.

Page 11: Internet Security

What is to be protected ?

Computer Information from being damaged.

Computer Information from illegitimate usage.

Computer Access Information from mis-usage (Password, Digital Ids, Account No., Credit Card Nos. etc.)

Page 12: Internet Security

From Whom it is to be protected?

Deliberate Crackers/Hackers. Money Makers of different varieties. People who get allured with open locks. Novice/Accidental error makers. Middlemen. Programmers/Administrators/Security

verifiers. Rule-Makers. Previous Authorities.

Page 13: Internet Security

Motive of Intruders (Active/Passive)

Theft (Financially rewarding) Spying (Positive or negative) Misrepresentation. Revenge. Ignorance (being unaware of implications.) Damage (Sadist) Prank (Just for Fun) Respect (By proving special skills) Analysis (Long term commercial gain)

Page 14: Internet Security

Threat Perception

Email : Primary Medium to Attack Threat from Viruses (Programs that self-replicate to

spread fast, damage information, hog resources or Deny service)

Spywares. Impersonation. Password Insecurity. Sniffers (Programs that take information passively). Alluring methods and Spams. Data Modifiers.

Page 15: Internet Security

Security Methods

Cryptography Audits (Logs, sniffs,

watches, event records)

Barriers (Firewalls, Proxies, network segmentation)

Page 16: Internet Security

Cryptography

Substitution & Transposition based on keys.

DES (Digital Encryption Standards).

Public/Private asymmetric-key methods .

RSA Algorithm. One way Hashing. Digital Signatures. Certification Authorities (For

authentic Public Keys: Certificates).

Page 17: Internet Security

Digital Signature Authentication

One Way Hash

Pvt. Key EncryptionPlain

MessageMessage Digest

Digital Signature

Plain Message

Digital Signature

Message Digest

Message Digest

Create New MD

Decrypt With Public Key

Compare Message Digests to Authenticate

SEND

RECV

Page 18: Internet Security

Security Audits

Sniffing Hearing and recording Traffic for analysis

Logs Recording Information headers

Watches Put sniffers on specific traffic source/dest.

Event Recorders Utilising OS features for analysis.

Page 19: Internet Security

Security Barriers

Firewalls Packet level traffic selection Application level selection.

Proxies Remote Hosts see only the proxy, traffic

behind is proxied by it. Network Segmentation

Permitting Type specific traffic in segmeted local areas.

Page 20: Internet Security

Sharing/Security Experience Extract

Sharing wins customer delight. Trust helps to make a secure design, Secure

design brings more trust. Most vulnerable security holes begin with

human-beings. Security is a continuous process. Emergency measures for security breach

shall be pre-planned.

Page 21: Internet Security

Thank-You

More questions/discussions invited. Follow-up discussions via

Email: [email protected] Website: www.indyan.com