Class 5 Privacy Security
Class 5 Privacy Security
CPSC 101
Learning Goals
By the end of this unit, you will be able to:
Define computer security in terms of the C-I-A principles Explain how we uphold the C-I-A principles, and give examples of what that means in simple administrative systems Lists the types of ways in which computer security can be compromised List the risks associated with computers, and the vulnerabilities that have been identified here Describe the differences between viruses, trojans and worms. Describe goals and techniques of hackers and understand basic ways of dealing with them. Differentiate different online activities among associated risk (i.e. online banking is a relatively safe activity-- explain why) Define encryption and the Caesar Cipher; translate an encoded message given a key using this cipher Differentiate between black box and white box security and their relative merits. Respect the danger; be responsible computer users! Explain why computer security is important. Justify your behavior as a responsible computer user.
Integrity
Data remains in the same state as it was left by the last authorized user; cannot be corrupted either accidentally or maliciously
Availability
Data is accessible to authorized users as necessary, in a convenient format, and without unreasonable delay
Authentication
How do I know its really you?
Authorization
Now that you are here, what are you allowed to do?
Accountability
Who did what? Whos responsible? When did they do it?
Authentication
Password
Authorization
Accessibility restrictions
Accountability
Record major actions of the user in the previous 7 days
What is wrong with this? How do I break in?
Authentication
Biometric reader (retina, finger print, voice analysis) Password
Authorization
Accessibility restrictions
Accountability
Record all actions taken by the user indefinitely.
Computer Security
Write the names and student IDs of the 2-4 students participating on one sheet of paper. 2. List 3 examples of computer security threats or issues. 3. List 2 ways of dealing with each type of threat. 4. Come up with a definition of Computer Security.
1.
Types of Threats
Unintentional threats:
Carelessness causes more problems than you might first imagine. In general, more information is lost/compromised through acts of carelessness than through acts of malice!
What are the major threats from carelessness?
Intentional threats:
The reality is the average user is not only incapable of mounting a serious attack on a computer, but likely completely disinterested in doing so. Nonetheless, criminals and vandals who are capable and desirous do exist.
Natural threats
Vulnerability
The onset of broadband-- rapid, personal Internet connections-- has changed our risk factors
Now we have everyday users with computers at home, connected to the Internet, and running 24/7
i.e. targets!
It is estimated that the between the initial set up of a computer and the first attack is < 2 minutes!
This can happen before you have time to install countersoftware! New computers can have viruses within minutes!
Vulnerability
Types of vulnerability:
Physical
Theft, sabotage, vandalism of physical hardware Locks, guards and biometrics can be put in place to reduce
Natural
Environmental threats (dust, humidity, temperature/power fluctuations), natural threats (lightning, fires, floods), natural disasters (floods, earthquakes)
Hardware/software vulnerabilities
Exploitation by hackers/crackers
Vulnerability
Other types of vulnerability:
Media
Lost/damaged backup media; erasing data; media degredation
Communication
Intercepting data/messages (electronic eavesdroppers)
Humans!
What if your network admin decides on a life of crime? What if someone writes down a key password and loses it?
Vulnerability
That is, your system may be participating in illicit behaviour without your knowledge. Examples include:
Distributed Denial of Service attacks (DDoS), where a target is bombarded with requests so as to overwhelm and disable the system Email Relays where your system is used to relay spam or even pornography-- such messages look like they come from you! Illicit Website Hosting where your computer may be hosting web sites that youre not aware of.
Hacking / Cracking
A word with lots of history. Some attempts have been made to differentiate hacking from cracking by emphasizing that hacking is non-destructive. Overall, the key goals for hackers are to:
Gain unrestricted or root access and the installation of a back door which provides easy future access to the system. Search for valuable data like passwords, credit card numbers, or important files. Sometimes and, in the best case, simply entertainment.
Viruses
Virus is a term that is often incorrectly used to describe several varieties of malicious programs:
Virus: fairly uncommon in modern computing. True viruses are programs that spread through human intervention such as infecting an USB drive or email. Commonly and incorrectly used as a name for all malware programs. Trojan: a very common type of malware. Trojans are programs that pretend to be another program. Worm: another common type malware. Worms are malware programs that move automatically from computer to computer.
Email typically contains the address of the sender, however these addresses can be forged
Ever receive spam that looks like its from someone you know?
White (or Clear) box security: Information about the security is publically available.
If you are safe with white box security, your system is truly secure since are not relying on information remaining secret. White box security encourages examination and early detection of threat by ethical hackers.
An encrypt. algorithm takes the original message and the key, and uses the key to alter the original message based on the contents of that key
Thus, even if you have the decryption algorithm, you cannot decrypt a message without the key! Its the keys that must be top secret!
Caesar Cipher
The Caesar Cipher is one of the earliest examples of cryptography supposedly invented by Julius Caesar
A cipher is a means of transforming text in order to contain its meaning
Caesar would take the alphabet and shift it a certain number of spaces
For example, if the shift was 3, then A would become D, B would be E, etc.
The key was then the shift factor (how much you shifted)
Caesar Cipher
For example, a shift-factor of 3 (key == 3) would change the following message THIS IS MY FAVOURITE CLASS! to... WKLV LV PB IDYRXULWH FODWW! If we take out the punctuation and spaces... WKLVLVPBIDYRXULWHFODWW
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
... zeros and ones This key is so powerful that it is currently the highest available (legally) Stealing information encrypted at this level is virtually impossible
Well, unless youre planning on living forever and have a lot of time on your hands... Consider this... using 128-bit keys:
There are 2128 possible keys That is, 340,282,366,920,938,463,463,374,607,431, 768,211,456 possible combinations of ones and zeros If we assume we can test 60 keys a second, thats 567,137,278,201,564,105,722,910,123,862,803,524 seconds Or, 94,522,879,700,260,684,295,381,835,397,713,392 minutes Or, 1,575,381,328,337,678,071,589,697,256,628,556 hours Or, 65,640,888,680,736,586,316,237,385,692,856 days Or, 179,838,051,180,100,236,482,842,152,583 years
Virtually impossible?
Heres where good password choices are important Companies through whom you may purchase or otherwise provide banking information also use direct-modem connections
Direct connections that are not through the Internet
Whats a user to do
Recognize the real threats... The likelihood of your data being stolen through an encrypted site, such as a banking website, or online store, is extremely slim But first do your research and ensure that they have adequate encryption Also check for the padlock before ever entering/submitting data Most data is compromised due to carelessness and irresponsible computer users
Ask yourself: is that you?
Summary
There are different levels of risks associated with computers We must understand those risks and our responsibilities with upholding computer security There are many types of computer vulnerabilities, and many ways to respond to each of those vulnerabilities Still, many aspects of computing are safer than we may initial think, such as online banking
Learning Goals
By the end of this unit, you will be able to:
Define computer security in terms of the C-I-A principles Explain how we uphold the C-I-A principles, and give examples of what that means in simple administrative systems Lists the types of ways in which computer security can be compromised List the risks associated with computers, and the vulnerabilities that have been identified here Differentiate different online activities among associated risk (i.e. online banking is a relatively safe activity-- explain why) Define encryption and the Caesar Cipher; translate an encoded message given a key using this cipher Respect the danger; be responsible computer users! Explain why computer security is important. Justify your behaviour as a responsible computer user.