Key To Personal Information Security
Download
Report
Transcript Key To Personal Information Security
Lesson Four
Data Privacy and Encryption
Copyright © Center for Systems Security and Information Assurance
Lesson Objectives
• Define the term cryptology and discuss the types and
applications of cryptology.
• Identify the components of a cryptography systems.
• Identify and discuss common approaches to
cryptography.
• Compare and contrast symmetric and asymmetric
encryption.
• Define the term digital signature and explain its function.
• Define the term Public-Key Infrastructure and explains it
uses.
• List the most common secure applications and explain
there function.
Copyright © Center for Systems Security and Information Assurance
Protecting Your Personal Information
• Every day you share personal information about yourself
with others
• It is so routine that you may not even realize you are
doing it
write a check at the grocery store,
charge tickets to a ball game,
rent a car,
mail your tax returns,
buy a gift online,
call home on your cell phone,
schedule a doctors appointment
or apply for a credit card.
Copyright © Center for Systems Security and Information Assurance
Protecting Your Personal Information
Each transaction requires you to share personal
information:
your bank and credit card account numbers
your income
your Social Security number (SSN)
or your name
address and phone numbers
Copyright © Center for Systems Security and Information Assurance
What happened with my personal
information?
Its important to find out what happens to the personal
information you and your children provide to
companies, marketers and government agencies.
These organizations may use your information simply
to process your order; to tell you about products,
services, or promotions; or to share with others.
Copyright © Center for Systems Security and Information Assurance
Identity Theft – Fastest Growing Crime
Identity thieves, who want your information to commit
fraud
Identity theft is the fastest-growing white-collar crime
in America
Occurs when someone steals your personal
identifying information to
open new charge accounts,
order merchandise
or borrow money
Consumers targeted by identity thieves usually don’t
know they’ve been victimized.
Copyright © Center for Systems Security and Information Assurance
FTC Tips to Avoid Identity Theft
Before you reveal any personally
identifying information, find out
how it will be used and whether it
will be shared with others
Read the privacy policy on any
website directed to you or your
children
Minimize the identification
information and the number of
cards you carry to what you’ll
actually need
Copyright © Center for Systems Security and Information Assurance
FTC Tips to Avoid Identity Theft
Don’t put all your identifying
information in one holder in
your purse, briefcase, wallet
or backpack
Keep items with personal
information in a safe place
Protect yourself against
dumpster diving
Use a secure browser when
shopping online to guard
Employ encryption when
transferring sensitive or
confidential data
Copyright © Center for Systems Security and Information Assurance
Cryptography
• Cryptography
The art and science of keeping information secure
from unintended audiences, of encrypting it
• Cryptanalysis
The art and science of breaking encoded data
• Cryptology
The branch of mathematics encompassing both
cryptography and cryptanalysis
• Cryptography
Plays a crucial role in the transfer of confidential
information across local networks and the Internet
Copyright © Center for Systems Security and Information Assurance
Cryptography Components
• Encryption Algorithm
A set of mathematically expressed processes for
encrypting information
• Ciphertext
Encrypted text
• Plaintext
What you have before encryption, and ciphertext is the
encrypted result
• Key
Information used to change the operations performed in
crypto-equipment for the purpose of encrypting or
decrypting electronic signals.
Copyright © Center for Systems Security and Information Assurance
Cryptography
Copyright © Center for Systems Security and Information Assurance
Applying Cryptography
• Encrypts data residing on storage devices or traveling
through communication channels to ensure that any
illegal access is not successful
• Secures the process of authenticating different parties
attempting any function on the system
• Presents a party wishing be granted certain functionality
on the system a way to prove that they indeed who they
say they are
• Ensures that credentials are only used by their rightful
owner
Copyright © Center for Systems Security and Information Assurance
Principles of Modern Cryptography
• Emphasis that security should not depend on the
secrecy of the encryption method (or algorithm), only the
secrecy of the keys
• Revelation of the secret keys must not occur when
plaintext and ciphertext are compared, and no person
should have knowledge of the key
• Execution of today's algorithms are by computers or
specialized hardware devices, and in most cases are
implemented in computer software
Copyright © Center for Systems Security and Information Assurance
Symmetric Encryption
• The message can be encrypted and decrypted using the
same key
• Symmetric encryption is faster compared to asymmetric
encryption
• Both the sender and the recipient must have an access
to (same) encryption key (a disadvantage)
• Secure distribution of the (encryption) key between the
parties is required
• The most commonly used symmetric encryption method
is Data Encryption Standard
Copyright © Center for Systems Security and Information Assurance
Symmetric Encryption
Copyright © Center for Systems Security and Information Assurance
Asymmetric Encryption
• Based on the usage of key pairs
• Exchangeable keys
• The recipient's private key is only in the recipient's
possession, no third party is able to decrypt the message
encrypted with the recipient's public key
• Management of keys is a big advantage
• Time-consuming
• Referred to as public key encryption.
Copyright © Center for Systems Security and Information Assurance
Asymmetric Encryption
Copyright © Center for Systems Security and Information Assurance
Digitals Signatures
Extra data is appended to a message which identifies and
authenticates the sender and message data using publickey encryption
The sender uses a one-way hash function to generate
a hash-code of about 32 bits from the message data
The sender then encrypts the hash-code with his
private key
The receiver re-computes the hash-code from the
data and decrypts the received hash with the sender's
public key
If the two hash-codes are equal, the receiver can be
sure that data has not been corrupted and that it
came from the given sender
Copyright © Center for Systems Security and Information Assurance
Digitals Signatures
Copyright © Center for Systems Security and Information Assurance
RSA
• A public key cipher which can be used both for
encrypting messages and making digital signatures
• The company RSA Data Security Inc. takes its
name from this algorithm, and has acquired the
rights to the patents which cover it
Copyright © Center for Systems Security and Information Assurance
Public-key Infrastructure (PKI)
• Combine software, encryption technologies, and
services to enable enterprises to protect the security of
their communications and business transactions on the
Internet
• Integrate digital certificates, public-key cryptography, and
certificate authorities into a total, enterprise-wide network
security architecture
Copyright © Center for Systems Security and Information Assurance
Virtual Private Network (VPNs)
• Connect a group of two or more computer systems to a
private network with limited public-network access, that
communicates securely over a public network, such as
the internet
• Include encryption, authentication of remote users or
hosts, and mechanisms for hiding or masking
information about private network topology from potential
attackers on the public network
Copyright © Center for Systems Security and Information Assurance
Secure Application Protocols
• Secure/MIME (S/MIME)
A version of the MIME protocol that supports
encryption of messages. S/MIME is based on RSA's
public-key encryption technology
• Secure Electronic Transaction (SET)
A standard that will enable secure credit card
transactions on the Internet
• Secure Shell (SSH)
A program to log into another computer over a network,
to execute commands in a remote machine, and to
move files from one machine to another
Copyright © Center for Systems Security and Information Assurance
Secure Application Protocols
• SHTTP
An extension to the HTTP protocol to support sending
data securely over the World Wide Web
• IP Security (IPSec)
A set of protocols developed by the IETF to support
secure exchange of packets at the IP layer
Copyright © Center for Systems Security and Information Assurance
Exercise 4.1
Using PGP
Copyright © Center for Systems Security and Information Assurance
Exercise 4.2
Using Token Generator
Copyright © Center for Systems Security and Information Assurance
Exercise 4.3
VPN Demonstration
Copyright © Center for Systems Security and Information Assurance
Exercise 4.4
Using SHTTP
Copyright © Center for Systems Security and Information Assurance
Exercise 4.5
Viewing a Digital Certificate
Copyright © Center for Systems Security and Information Assurance
Exercise 4.6
Protecting Word Documents
Copyright © Center for Systems Security and Information Assurance