Introduction To Computer Security
Introduction To Computer Security
COMPUTER
SECURITY
Security Terminology, Password
Guidelines, E-mail and Web Security
Lecturer | Kasawuli Bawonga | [email protected] |
TOPICS OF CONVERSATION
Common Security Terminology
0712-925247 | 0700124500
Password Security
E-mail Security
Web Security
0712-925247 | 0700124500
Biometrics
Public Key Cryptography
SSL
Man-in-the-Middle Attack
Zombies
Denial of Service Attack
Key Logging Software
Firewalls
Security Exploit
Lecturer | Kasawuli Bawonga | [email protected] |
TERMINOLOGY
Password Cracking
0712-925247 | 0700124500
Password Cracker
An application that tries to obtain a password by
repeatedly generating and comparing encrypted
passwords or by authenticating multiple times to an
authentication source.
Repeatedly trying to access your accounts
0712-925247 | 0700124500
Passwordsare usually stored in an encrypted
form with a one way encryption algorithm
If this data is compromised, password cracking can be
moved to a standalone system for easier control and
speed of cracking.
Lecturer | Kasawuli Bawonga | [email protected] |
TERMINOLOGY
Biometrics
0712-925247 | 0700124500
Science and technology of measuring and
statistically analyzing biological data
0712-925247 | 0700124500
Two Keys, “certificates”, are available for each
resource, one public and one private
As the names imply, the public key can be shared
freely while the private key is kept secret
Items encrypted using the public key are
decrypted using the private key and conversely
anything encrypted with the private key can be
decrypted with the public key
This method of encryption is used to ensure
secure communication is only between a valid,
“known”, sender and recipient
Lecturer | Kasawuli Bawonga | [email protected] |
TERMINOLOGY
SSL
0712-925247 | 0700124500
“Secure Sockets Layer”
Uses Public Key Cryptography
Negotiates a method to encrypt communication
between a client and server
Allows other network protocols to connect “over
top” of it, such as web browsing and e-mail
protocols
“Transport Layer Security” (TLS) is a variant of
SSL used to negotiate encryption within the
network protocol being used
Lecturer | Kasawuli Bawonga | [email protected] |
TERMINOLOGY
Man-in-the-Middle Attack
0712-925247 | 0700124500
A system between two hosts that either passively
watches traffic to gain information used to
“replay” a session or actively interferes with the
connection, potentially imitating the remote
system
Lecturer | Kasawuli Bawonga | [email protected] |
TERMINOLOGY
Zombies
0712-925247 | 0700124500
Computer system infected by a virus or Trojan
horse that allows the system to be remotely
controlled for future exploits
0712-925247 | 0700124500
Sendinglarge amounts of data and requests to a
remote system in order to inundate the remote
computer or network
0712-925247 | 0700124500
Software installed on a system to capture and log
all keystrokes
Hardware installed between the keyboard and
computer used to capture and log all keystrokes
Security Exploit
A software bug, or feature, that allows access to
a computer system beyond what was originally
intended by the operator or programmer
Lecturer | Kasawuli Bawonga | [email protected] |
TERMINOLOGY
Firewall
0712-925247 | 0700124500
Network hardware device or software used to
filter traffic to and from the connected
resources
0712-925247 | 0700124500
definitions
www.webopedia.com
www.whatis.com
www.techweb.com
www.computeruser.com
www.google.com
Lecturer | Kasawuli Bawonga | [email protected] |
PASSWORD SECURITY
Password limitations
0712-925247 | 0700124500
Reasons for complex passwords
0712-925247 | 0700124500
Response Team / Coordination Center)
approximately 80% of all network security
issues are caused by bad passwords
0712-925247 | 0700124500
Password Expiration
Decreases the chances of your password being cracked
Complex Passwords
Requiring complexity actually increases the possible
character combinations required by brute-force
cracking
Password Length Requirements
The longer your password the more possible character
combinations are present and the harder it is to crack
Lecturer | Kasawuli Bawonga | [email protected] |
PASSWORD SECURITY
Dealing with Password Limitations
0712-925247 | 0700124500
Password lockouts
If a certain number of login attempts fail within a
given timeframe the account is automatically locked
out for a preset amount of time
Using this limitation stops brute force authentication
attempts
Dictionary Checks
Simple checks against common dictionaries are used
to increase password complexity
Lecturer | Kasawuli Bawonga | [email protected] |
PASSWORD SECURITY
Are Password rules too complex?
0712-925247 | 0700124500
Withthe increase of computer hardware speed
and the decrease of computer prices, we can use
more advanced methods to keep security high
Post-it Notes
Is your computer in a locked room?
Who has physical access to your system?
A majority of system attacks originate through the
network.
Lecturer | Kasawuli Bawonga | [email protected] |
PASSWORD SECURITY
Suggestions for Complex Passwords
0712-925247 | 0700124500
Thinkof a phrase and use the first characters of
each word, mixing case and adding numbers and
special characters
It is good to change your password every 6 months =
Iig2cyPe6m
UI vandals are number one = UiVdlsR#1
Usinga favorite word or phrase and breaking it
up with numbers and special characters
Happy = Hap3py1
Motorcycle = M0tor6cyc!e
Lecturer | Kasawuli Bawonga | [email protected] |
PASSWORD SECURITY
Possible Future Password Requirements
0712-925247 | 0700124500
Decreasing password expiration time
Certificate authentication
Use of Biometrics
0712-925247 | 0700124500
Don’t leave yours lying around
Be mysterious
Lecturer | Kasawuli Bawonga | [email protected] |
E-MAIL SECURITY
Some common E-mail protocols
0712-925247 | 0700124500
Secure E-mail protocols at the UI
Lecturer | Kasawuli Bawonga | [email protected] |
E-MAIL SECURITY
Common E-mail protocols
0712-925247 | 0700124500
POP
Post Office Protocol
Older protocol for downloading messages from an INBOX
IMAP
Internet Message Access Protocol
Full featured mail folder access
SMTP
Simple Mail Transfer Protocol
Standard for sending and receiving e-mail between clients and
servers, and from server to server
MAPI
Mail Application Programming Interface
A set of communication methods and standards used
predominately between Microsoft e-mail clients and servers
Lecturer | Kasawuli Bawonga | [email protected] |
E-MAIL SECURITY
Secure protocols in place at the University of
0712-925247 | 0700124500
Idaho
POPS
Pop mail over an SSL connection
IMAPS
IMAP over an SSL connection
SMTP+TLS
Negotiation of a TLS/SSL connection after connecting
All
popular e-mail clients support the use of
these protocols
Lecturer | Kasawuli Bawonga | [email protected] |
WEB SECURITY
Web specific definitions
0712-925247 | 0700124500
HTTP
URL
SSL
Spyware/ Adware
Web browser updates
0712-925247 | 0700124500
Modern web browsers are capable of using
multiple protocols to download content although
most data transfers use HTTP
0712-925247 | 0700124500
Veryimportant on insecure networks such as
wireless
0712-925247 | 0700124500
Certificate Authorities
A “CA” is an entity that issues certificates
0712-925247 | 0700124500
Spyware is software designed to intercept or
take partial control of a computer with out the
express consent of the operator
Adware is similar to spyware except it is used
primarily for advertising purposes and may have
provided the user with information about its
operation
Regardless of the network level security, when
browsing, spyware will have access to your data
Lecturer | Kasawuli Bawonga | [email protected] |
WEB SECURITY
Web Browser Software Updates
0712-925247 | 0700124500
Update, Update, Update
0712-925247 | 0700124500
Common applications
0712-925247 | 0700124500
software to facilitate the transfer of data
between two systems without the need for a
central file server
0712-925247 | 0700124500
Copyright issues
Spyware / Adware
Zombies
Remote control
Key logging
Security exploits
0712-925247 | 0700124500
Install Antivirus
Symantec Antivirus
0712-925247 | 0700124500
Finding sources of technology terminology
www.webopedia.com
Password Security
Remember Iig2cyPe6m
Web Security
Remember update, update, update
Peer-to-Peer File sharing
Get some Antivirus and some anti-spyware
software