Computer & Web Security

Download Report

Transcript Computer & Web Security

Computer & Web Security
 Security
Problems in Computer Use
 Privacy-Protecting Techniques
 Privacy-Protecting Technologies:
cryptography,
digital signatures & certificates, etc.
1
Computer Security: Basic Issues
 Different
dimensions of the security problem:
 Securing
hardware (e.g. via locks or tags) vs. securing
software
 Preventing damage through system failure (software or
hardware) vs. preventing damage through malicious
intentional actions (security attacks, theft)
 We
will mainly focus on preventing malicious
intentional actions on the software level
2
Types of System Failure
 Hardware:
power outage, corrupted disks, hard
drive crashes, etc.
 Software:
 Software
crashes – a common problem (have you
noticed?)
 Software does not perform as intended/desired; note
that this could be caused by user errors
 While
these problems cannot be completely
avoided, damage can be greatly reduced…
3
Avoiding Severe Damage: Backups
 Types
of backup:
 Level-zero
backup: copy of the original system when
first installed
 Full backup: copy of every file on the computer
 Incremental backup: copy of all modified files
 Possible
security risks: with automatic backup
systems, deleting a file does not put it out of
existence
4
Intentional Security Attacks
 Security
risks have greatly increased due to the
Internet; no computer is an island
 We focus on security issues related to the Internet,
but this will also include basic security for the
user’s computer
5
What do attackers want?
 Scan
your system for confidential documents
 Corrupt information on your computer
 Modify your operating system by creating security
loopholes
 Steal credit card numbers
 Block access to your system (coordinated attack)
 Press coverage
6
Big Brother is watching you traces you leave in the Web
I) User-provided information
 Setting up an account with an online shop, purchasing
tickets via the web



What legal restrictions govern the use of the information
provided? (in the US: few)
What privacy policy does the vendor have? (the vendor’s web
site should have some information about this!)
Note: even simple demographic information may be
sufficient for identification (e.g. ZIP-code + birthday)
7
Further traces you leave
II) Log files
 Ubiquitous; lots of applications and network programs
create log files of various activities the user performs
 Web logs: files which are created on remote web server
when a page is downloaded; information stored includes:
IP address of the computer that downloaded the web page,
time of requrest, URL requested, username (sometimes),
refer link, web browser used
 Mail logs: created by mail servers, contain at least to: and
from:
8
III) Cookies
 Text file left by a remote web server on your
computer; the cookie is sent to the web server
every time a web page from that server is
requested
 Allows the user to maintain a certain state while
requesting different pages; example: shopping cart
9
 Where
are cookies stored?
 Netscape
Navigator: ~/.netscape/cookies
 Microsoft Explorer: folder Cookies
 Browser
preferences can be adjusted so that you
can refuse cookies when they are sent
10
IV) Web Bugs
 Simple to program in HTML
<img src=“http://…” width=1 height=1 border=0>
 This will alert the specified web server every time the
page is viewed; outsourced web site monitoring
 Useful for gathering web use statistics
 Can also be used to check when HTML e-mails are read,
or to send personal information encoded in URL (like
Google puts search strings in URL)
11
Privacy-Protecting Techniques
Picking a good password (and not writing it down)
 Passwords can be captured by password sniffers when
they are transmitted over the network; beware of protocols
which do NOT use encryption:

FTP (File Transfer Protocol)
 HTTP (Hypertext Transfer Protocol)
 POP (Post Office Protocol)
 TELNET (Remote Terminal Protocol)
 RLOGIN (Remote Login for UNIX machines)

12
More Privacy-Protecting Techniques
 Avoiding
Spam and Junk Mail
 Don’t
put your e-mail address on your home page, or
write “pauly (and now this strange symbol) csc.liv.ac in
you know which country)”
 Take your e-mail out of online directories
 Don’t post to public mailing lists
 Pick an unusual username
 Address Munging: [email protected]
13
Privacy-Protecting Technologies
 Antispam
Services: analyse your e-mail to check
whether it is spam, using AI technology, whitelists
+ confirmation e-mails, etc.
 Antispam Software: does the same, but runs on
your computer; your mail stays where it belongs
 Browsers allow you to refuse cookies
14
More Privacy-Protecting Technology
 Anonymous
Browsing – protecting your IP address
 Use
a public terminal (e.g. at a library)
 Use a proxy server of your internet service provider; in
this case, the proxy servers IP address is passed on
 Use anonymous web browsing services; they usually
work as proxy servers
 Secure
E-mail: encrypt messages before sending
15
Secure Sockets Layer (SSL)
 Uses
a cryptographic protocol for sending
information over the web
 Main usage with web pages
https://…
 Browsers
will usually tell you whether the current
page/document is “secure”
 Example: Booking a flight with a credit card…
16
Cryptography
Encryption
Algorithm
Encryption
Decryption
17
Symmetric Key Algorithms





The same key is used for both encryption and
decryption
Sometimes also called private key algorithms
Used for the bulk encryption of data
Algorithms are very fast & easy to implement
There are a large number of possible keys, hence
encryption is difficult to crack, hence high level
of secrecy
18
 Example:
using an 80-bit key, and assuming that 1
million keys per second can be searched, it will
take approx. 38 billion years to try all keys
 Common algorithms: DES, Blowfish, RC2, RC4,
RC5
 Problems:
parties have to share a secret & private key
 Both parties need to have a copy of the key
 I need a different key for every person I want to
communicate with; (N2-N)/2 keys for N different users

19
Asymmetric Key Algorithms
Encryption and Decryption key differ
 For encrypted messaging, encryption key is public and
decryption key private
 Public key can be published on your web page (see e.g.
Benjamin Hirsch)
 Also called public key algorithms
 Algorithms are slower & more difficult to implement and
analyse
 Easier to attack than symmetric key algorithms
 Common algorithms: DSA/DSS, RSA
20

 A further
advantage: asymmetric keys can be used
for digital signatures, simply make the encryption
key private and the decryption key public
 Most “secure” protocols will use a mixture of both
symmetric and asymmetric key cryptography
 Example: Use asymmetric key cryptography to
exchange a symmetric key, and use that key for
encrypting the main data
21
Conclusions
 Keys
are still stored somewhere on the system
 Hence, in spite of everything that’s been said, there
is no perfect security
 Still, you can be aware of the security risks, and of
some of the ways to improve security
22