Security and Privacy - UNC Computer Science
Download
Report
Transcript Security and Privacy - UNC Computer Science
Presentation Basics
Speak loudly and clearly
Give the audience something to look at
Show interest even when not speaking
Show passion
This is passion.
This is passion.
This is passion.
This is not.
Demo Basics
Script your demos
Avoid a lot of typing
Avoid silences
Use the “turkey in the oven”
Security and Privacy
Security: the protection of data,
networks and computing power
Privacy: complying with a person's
desires when it comes to handling his or
her personal information
When you walk into the store, the
big-screen displays "Hello Tom,"
your shopping habits, and other
information
from Minority Report
Some Views on Privacy
“All this secrecy is making life harder, more
expensive, dangerous …”
Peter Cochran, former head of BT (British Telecom)
Research
“You have zero privacy anyway.”
Scott McNealy, CEO Sun Microsystems
“By 2010, privacy will become a
meaningless concept in western society”
Gartner report, 2000
Legal Realities of Privacy
Self-regulation approach in US, Japan
Comprehensive laws in Europe,
Canada, Australia
European Union
Limits data collection
Requires comprehensive disclosures
Prohibits data export to unsafe countries
○ Or any country for some types of data
Aspects of Privacy
Anonymity
Security
Transparency and Control: knowing
what is being collected
Privacy and Trust
Right of individuals to determine if, when,
how, and to what extent data about
themselves will be collected, stored,
transmitted, used, and shared with others
Includes
right to browse the Internet or use applications
without being tracked unless permission is
granted in advanced
right to be left alone
True privacy implies invisibility
Without invisibility, we require trust
Privacy Aware Technologies
non-privacy-related
solutions that
enable users to protect their
privacy
Examples
password and file-access security
programs
unsubscribe
encryption
access control
Privacy Enhancing Technologies
Solutions
that help consumers
and companies protect their
privacy, identity, data and actions
Examples
popup blockers
anonymizers
Internet history clearing tools
anti-spyware software
Impediments to Privacy
Surveillance
Data collection and sharing
Cookies – how long are they retained?
Sniffing, Snarfing, Snorting
All are forms of capturing packets as they pass
through the network
Differ by how much information is captured and
what is done with it
P3P (2002)
Platform for Privacy Preference (P3P)
World Wide Web Consortium (W3C) project
Voluntary standard
Structures a web site’s policies in a
machine readable format
Allows browsers to understand the policy
and behave according to a user’s defined
preferences
Short-lived: why?
Do Not Track
Opt
out technology
HTTP header
2012 pledge not honored
Privacy and Wireless
“Wardriver” program: scans for broadcast
SSIDs
broadcasting improves network access, but at a cost
once the program finds the SSID
obtains the IP address
obtains the MAC address
…
Lowe’s was penetrated this way
Stole credit card numbers
Deep Web
Anything that can’t be indexed (estimate
97%!)
Accessible through secure browsers: Tor
Anonymity
Difficulty in tracing
Onion addresses of interest
Consider
1994: Vladimir Levin breaks into Citibank's
network and transfers $10 million dollars
into his accounts
Mid 90’s: Phonemasters
stole tens of thousands of phone card numbers
found private White House telephone lines
1996: Tim Lloyd, disgruntled employee
inserts time bomb that destroys all copies
of Omega Engineering machining code.
Estimated lost: $10 million.
Security “Gospel”
The Morris Internet worm of 1988 cost $98
million to clean up
The Melissa virus crashed email networks
at 300 of the Fortune 500 companies
The Chernobyl virus destroyed up to a
million PCs throughout Asia
The ExploreZip virus alone cost $7.6 billion
to clean up
Security Reality
The Morris Internet worm of 1988 cost $98
under $1 million to clean up
The Melissa virus crashed scared executives
into disconnecting email networks at 300 of
the Fortune 500 companies
The Chernobyl virus destroyed caused
replacement of up to a million PCs throughout
Asia
The ExploreZip virus alone could have cost
$7.6 billion to clean up
Information Systems Security
Deals with
Security of (end) systems
○ Operating system, files, databases,
accounting information, logs, ...
Security of information in transit over
a network
○ e-commerce transactions, online
banking, confidential e-mails, file
transfers,...
Basic Components of Security
Confidentiality
Keeping data and resources secret or hidden
Integrity
Ensuring authorized modifications
Refers to both data and origin integrity
Availability
Ensuring authorized access to data and resources when
desired
Accountability
Ensuring that an entity’s action is traceable uniquely to
that entity
Security assurance
Assurance that all four objectives are met
Info Security 20 Years Ago
Physical security
Information was primarily on paper
Lock and key
Safe transmission
Administrative security
Control access to materials
Personnel screening
Auditing
Information Security Today
Increasing system complexity
Digital information security importance
Competitive advantage
Protection of assets
Liability and responsibility
Financial losses
FBI estimates that an insider attack results in an average loss of $2.8
million
Estimates of annual losses: $5 billion - $45 billion (Why such a big
range?)
Protection of critical infrastructures
Power grid
Air transportation
Government agencies
GAO report (03): “severe concerns” security mgmt & access control
Grade F for most of the agencies
Limkages accerbate
Attack Vs Threat
A threat is a “potential” violation of
security
Violation need not actually occur
Fact that the violation might occur makes it a
threat
The actual violation (or attempted
violation) of security is called an attack
Common security attacks
Interruption, delay, denial of receipt or denial of service
System assets or information become unavailable or are rendered
unavailable
Interception or snooping
Unauthorized party gains access to information by browsing through
files or reading communications
Modification or alteration
Unauthorized party changes information in transit or information stored
for subsequent access
Fabrication, masquerade, or spoofing
Spurious information is inserted into the system or network by making
it appear as if it is from a legitimate source
Repudiation of origin
False denial that the source created something
Denial of Service Attacks
explicit attempt to prevent legitimate users from
using service
two types of attacks
asymmetric attack
denial of service (DOS)
distributed denial of service (DDOS)
attacker with limited resource (old PC and slow modem) may
be able to disable much faster and more sophisticated
machines or networks
methods
Bots or Zombie machines
Trojans or Smurf attack: distributed attack that sends
specified number of data packets to a victim
Phishing (Spoofing)
use 'spoofed' e-mails and fraudulent websites
designed to fool recipients into divulging personal
financial data
credit card numbers
account usernames and passwords
social security numbers
hijacking of trusted brands
banks
online retailers
credit card companies
able to convince up to 5% of recipients to respond
http://www.antiphishing.org/
Goals of Security
Prevention
Prevent someone from violating a security policy
Detection
Detect activities in violation of a security policy
Verify the efficacy of the prevention mechanism
Recovery
Stop attacks
Assess and repair damage
Ensure availability in presence of ongoing attack
Fix vulnerabilities to prevent future attacks
Deal with the attacker
Human Issues
Outsiders and insiders
Which is the real threat?
Social engineering
How much should a company disclose about
security?
Claim more or less security than exists
Honeypots
Setting
up a server to attract hackers
Used by corporations as early warning
system
Used to attract spam to improve filters
Used to attract viruses to improve detection
http://www.honeypots.net/
Security Level of Encrypted Data
Unconditionally Secure
Unlimited resources + unlimited time
Still the plaintext CANNOT be recovered
from the ciphertext
Computationally Secure
Cost of breaking a ciphertext exceeds the
value of the hidden information
The time taken to break the ciphertext
exceeds the useful lifetime of the information
Types of Attacks
Ciphertext only
adversary has only ciphertext
goal is to find plaintext, possibly key
Known plaintext
adversary has plaintext and ciphertext
goal is to find key
Chosen plaintext
adversary can get a specific plaintext
enciphered
goal is to find key
Attack Mechanisms
Brute force
Statistical analysis
Knowledge of natural language
Examples:
○ All English words have vowels
○ There are only 2 1-letter words in English
○ High probability that u follows q
○…
Caesar Cipher
Substitute the letter 3 ahead for each
one
Example:
Et tu, Brute
Hw wx, Euxwh
Quite sufficient for its time
High illiteracy
New idea
Enigma Machine
(Germany, World War II)
Simple Caesar
cipher through each
rotor
But rotors shifted at
different rates
Roller 1 rotated one
position after every
encryption
Roller 2 rotated
every 26 times…
Private Key Cryptography
Sender, receiver share common key
Keys may be the same, or trivial to derive from
one another
Sometimes called symmetric cryptography or
classical cryptography
Two basic types
Transposition ciphers (rearrange bits)
Substitution ciphers
Product ciphers
Combinations of the two basic types
DES (Data Encryption Standard)
A block cipher:
encrypts blocks of 64 bits using a 64 bit key
outputs 64 bits of ciphertext
A product cipher
○ performs both transposition (permutation) and
substitution on the bits
Considered weak
Susceptible to brute force attack
Cracking DES
1998: Electronic Frontier Foundation
cracked DES in 56 hrs using a
supercomputer
1999: Distributed.net cracked DES in 22
hrs
With specialized hardware, DES can be
cracked in less than an hour.
History of DES
IBM develops Lucifer for banking systems (1970’s )
NIST and NSA evaluate and modify Lucifer
(1974)
Modified Lucifer adopted as federal standard (1976)
Name changed to Data Encryption Standard (DES)
Defined in FIPS (46-3) and ANSI standard X9.32
NIST defines Triple DES (3DES) (1999)
Single DES use deprecated - only legacy systems.
NIST approves Advanced Encryption Std. (AES) (2001)
AES (128-bit block)
Attack published in 2009
Current state of the art is AES-256
Public Key Cryptography
Two keys
Private key known only to individual
Public key available to anyone
○ Public key, private key inverses
Confidentiality
encipher using public key
decipher using private key
Integrity/authentication
encipher using private key
decipher using public one
Public Key Requirements
1.
2.
3.
Computationally easy to encipher or
decipher a message given the
appropriate key
Computationally infeasible to derive the
private key from the public key
Computationally infeasible to determine
the private key using a chosen plaintext
attack
RSA
Public key algorithm described in 1977 by
Rivest, Shamir, and Adelman
Exponentiation cipher
Relies on the difficulty of factoring a large
integer
RSA Labs now owned by EMC
A Guide to RSA
Summary
Private key (classical) cryptosystems
encipher and decipher using the same key
Public key cryptosystems
encipher and decipher using different keys
computationally infeasible to derive one from
the other
Both depend on keeping keys secret
Depend on computational difficulty
As computers get faster, …
Photon Cryptography
Use photons for key distribution
Prevents eavesdropping: reading a
photon changes its state
Authentication
Assurance of the identity of the party
that you’re talking to
Primary technologies
Digital Signature
Kerberos
“Using encryption on the Internet is the
equivalent of arranging an armored car to
deliver credit card information from someone
living in a cardboard box to someone living on
a park bench”
– Gene Spafford (Purdue)
Firewall Techniques
Filtering
Doesn’t allow unauthorized messages through
Can be used for both sending and receiving
Most common method
Proxy
The firewall actually sends and receives the
information
Sets up separate sessions and controls what
passes in the secure part of the network
DMZ: Demilitarized Zone
Arrangement of firewalls to form a buffer
or transition environment between
networks with different trust levels
Internet
Fire
wall
Fire
wall
Internal
resources
Three Tier DMZ
Internet
Fire
wall
Fire
wall
Web
Server
Fire
wall
App
Server
Internal
resources