Security and Privacy: IBU 020 Computer Engineering Orientation
Security and Privacy: IBU 020 Computer Engineering Orientation
Security
Privacy
Basic Terminology
Methods of Defense
Defense of Computer System
Cryptography
Security
Availability
Make sure that the content/data is available when needed to authorized users
Security and Reliability
The privacy is the right of every person to control his/her personal data/information
Privacy
E.g. you might share personal information with your bank when you open a checking
account. What happens after that? Here are three possible outcomes, all related to your
personal information:
Your privacy and security are maintained. The bank uses your information to open your account
and provide you products and services. They go on to protect that data.
Your privacy is compromised, and your security is maintained. The bank sells some of your
information to a marketer. Note: You may have agreed to this in the bank’s privacy disclosure.
The result? Your personal information is in more hands than you may have wanted.
Both your privacy and security are compromised. The bank gets hit by a data breach.
Cybercriminals penetrate a bank database, a security compromise. Your information is exposed
and could be sold on the dark web. Your privacy is gone. You could become the victim of cyber
fraud and identity theft.
Basic Terminology
Cryptography
Protecting data by making it unreadable to an attacker
Authenticating users with digital signatures
Authenticating transactions with cryptographic protocols
Ensuring the integrity of stored data
Aid customers' privacy by having their personal information automatically become unreadable
after a certain length of time
Defense of Computer System
Software Controls
Passwords and other forms of access control
Operating systems - separate users' actions from each other
Virus scanners for some kinds of malware
Personal firewalls that run on your desktop
Defense of Computer System
Hardware Controls
Fingerprint readers
Smart tokens
Firewalls
Intrusion detection systems
Cryptography
Symmetric-key Cryptography:
Both the sender and receiver share a single key.
The sender uses this key to encrypt plaintext and send the cipher text to the receiver.
On the other side the receiver applies the same key to decrypt the message and recover the plain
text.
Cryptography
Symmetric-key Cryptography:
Cryptography
Symmetric-key Cryptography:
Famous algorithms are
DES 56 bits,
Triple DES 112 bits,
AES (Rijndael algoritam) 128, 192 and 256 bits
IDEA
Blowfish
RC6
TEA
Cryptography
Public-Key Cryptography:
two related keys (public and private key) are used.
Public key may be freely distributed, while its paired private key, remains a secret.
The public key is used for encryption and for decryption private key is used.
Cryptography
Public-Key Cryptography:
Cryptography
Public-Key Cryptography:
Famous algorithms:
DSA
RSA (Rivest, Shamir, Adleman)
PGP
GNUPG (GNU Privacy Guard)
Cryptography
Hash Functions:
No key is used in this algorithm.
A fixed-length hash value is computed as per the plain text that makes it impossible for the
contents of the plain text to be recovered.
Hash functions are also used by many operating systems to encrypt passwords.
Cryptography
Cryptography Applications:
Email encryption
File encryption
Disc encryption
Network traffic protection
Database protection