DOC PREVIEW
Pitt IS 2150 - LECTURE NOTES

This preview shows page 1-2-3-4-25-26-27-52-53-54-55 out of 55 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

November 8, 2005ISO/OSI ModelProtocolsElectronic MailSecurity at the Application Layer: Privacy-enhanced Electronic Mail (PEM)Design Considerations/goals for PEMPEM Basic DesignSlide 8ISO/OSI Model SSL: Security at Transport LayerSecurity at the Transport Layer Secure Socket Layer (SSL)Secure Socket Layer (SSL)SSL ArchitectureSSL Record Protocol OperationHandshake ProtocolOther protocolsISO/OSI Model IPSec: Security at Network LayerIPSecCases where IPSec can be usedCases where IPSec can be used (2)IPSec ProtocolsSecurity Association (SA)Security Association (2)Security Association DatabasesIPSec ModesAuthentication Header (AH)Preventing replayTransport Mode AHTunnel Mode AHESP – Encapsulating Security PayloadDetails of ESPTransport mode ESPTunnel mode ESPPerimeter DefenseSlide 34FirewallsWhat Firewalls can’t doVirtual Private Networks What is it?What is a VPN? (2)Tunneling in VPN“Typical” corporate networkSlide 41What is Authentication?Authentication System: Formal DefinitionAuthentication System: PasswordsPasswordsAuthentication SystemAttacks on PasswordsPassword SelectionSlide 49Slide 50Authentication Systems: Challenge-ResponseSlide 52Authentication Systems: BiometricsAttacks on BiometricsAuthentication Systems: Location1IS 2150/TEL 2810: Introduction of Computer SecurityNovember 8, 2005November 8, 2005Network Security Network Security Authentication & IdentityAuthentication & IdentityLecture 9Lecture 92IS 2150/TEL 2810: Introduction of Computer SecurityISO/OSI ModelISO/OSI ModelApplication LayerApplication LayerPresentation LayerPresentation LayerSession LayerSession LayerTransport LayerTransport LayerNetwork LayerNetwork LayerData Link LayerData Link LayerPhysical LayerPhysical LayerApplication LayerApplication LayerPresentation LayerPresentation LayerSession LayerSession LayerTransport LayerTransport LayerNetwork LayerNetwork LayerData Link LayerData Link LayerPhysical LayerPhysical LayerNetwork LayerNetwork LayerData Link LayerData Link LayerPhysical LayerPhysical LayerPeer-to-peerFlow of bits3IS 2150/TEL 2810: Introduction of Computer SecurityProtocolsProtocolsEnd-to-end protocolEnd-to-end protocolCommunication protocol that involves end systems with one or more intermediate systemsIntermediate host play no part other than forwarding messagesExample: telnet Link protocolLink protocolProtocol between every directly connected systemsExample: IP – guides messages from a host to one of its immediate hostLink encryptionLink encryptionEncipher messages between intermediate hostEach host share a cryptographic key with its neighborAttackers at the intermediate host will be able to read the messageEnd-to-end encryption End-to-end encryption Example: telnet with messages encrypted/decrypted at the client and serverAttackers on the intermediate hosts cannot read the message4IS 2150/TEL 2810: Introduction of Computer SecurityElectronic Mail Electronic Mail UA interacts with UA interacts with the senderthe senderUA hands it to a UA hands it to a MTAMTAMTAUAMTAUAMTAUAMessage TransferAgentsUser AgentAttacker can read email Attacker can read email on any of the computer on any of the computer with MTAwith MTAForgery possibleForgery possible5IS 2150/TEL 2810: Introduction of Computer SecuritySecurity at the Application Layer:Security at the Application Layer:Privacy-enhanced Electronic Mail (PEM)Privacy-enhanced Electronic Mail (PEM)Study by Internet Research Task Force on Study by Internet Research Task Force on Privacy or Privacy Research Group to develop Privacy or Privacy Research Group to develop protocols with following servicesprotocols with following servicesConfidentiality, by making the message unreadable except to the sender and recipientsOrigin authentication, by identifying the sender preciselyData integrity, by ensuring that any changes In the message are easy to detectNon-repudiation of the origin (if possible)6IS 2150/TEL 2810: Introduction of Computer SecurityDesign Considerations/goalsDesign Considerations/goalsfor PEMfor PEMNot to redesign existing mail system Not to redesign existing mail system protocolsprotocolsTo be compatible with a range of MTAs, To be compatible with a range of MTAs, UAs and other computersUAs and other computersTo make privacy enhancements available To make privacy enhancements available separately so they are not requiredseparately so they are not requiredTo enable parties to use the protocol to To enable parties to use the protocol to communicate without prearrangementcommunicate without prearrangement7IS 2150/TEL 2810: Introduction of Computer SecurityPEMPEMBasic DesignBasic DesignDefines two keysDefines two keysData Encipherment Key (DEK) to encipher the message sentGenerated randomlyUsed only onceSent to the recipientInterchange key: to encipher DEKMust be obtained some other way than the through the message8IS 2150/TEL 2810: Introduction of Computer SecurityProtocolsProtocolsConfidential message (DEK: Confidential message (DEK: ks))Authenticated, integrity-checked messageAuthenticated, integrity-checked messageEnciphered, authenticated, integrity Enciphered, authenticated, integrity checked messagechecked messageAlice Bob{m}ks || {ks}kBobAlice Bobm || {h(m)}kAliceAlice Bob{m}ks || {h(m)}kAlice || {ks}kBob9IS 2150/TEL 2810: Introduction of Computer SecurityISO/OSI ModelISO/OSI ModelSSL: Security at Transport LayerSSL: Security at Transport LayerApplication LayerApplication LayerPresentation LayerPresentation LayerSession LayerSession LayerTransport LayerTransport LayerNetwork LayerNetwork LayerData Link LayerData Link LayerPhysical LayerPhysical LayerApplication LayerApplication LayerPresentation LayerPresentation LayerSession LayerSession LayerTransport LayerTransport LayerNetwork LayerNetwork LayerData Link LayerData Link LayerPhysical LayerPhysical LayerNetwork LayerNetwork LayerData Link LayerData Link LayerPhysical LayerPhysical LayerPeer-to-peerFlow of bits10IS 2150/TEL 2810: Introduction of Computer SecuritySecurity at the Transport LayerSecurity at the Transport LayerSecure Socket Layer (SSL)Secure Socket Layer (SSL)Developed by Netscape to provide security in Developed by Netscape to provide security in WWW browsers and serversWWW browsers and serversSSL is the basis for the Internet standard SSL is the basis for the Internet standard protocol – Transport Layer Security (TLS) protocol – Transport


View Full Document

Pitt IS 2150 - LECTURE NOTES

Documents in this Course
QUIZ

QUIZ

8 pages

Assurance

Assurance

40 pages

Load more
Download LECTURE NOTES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view LECTURE NOTES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view LECTURE NOTES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?