SlideShare ist ein Scribd-Unternehmen logo
1 von 68
Computer Security 101 ,[object Object],[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object]
Risks ,[object Object],[object Object],[object Object],[object Object]
Computer Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Non-networked System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The user/pass dilemma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a strong password? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networked Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Meet Alice and Bob ,[object Object],[object Object],[object Object],[object Object],[object Object],ALICE BOB EVE TRUDY
User Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],Who?
Authentication case ,[object Object],ALICE EVE TRUDY BOB
Different approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Doing it right ,[object Object],[object Object],[object Object],[object Object],[object Object]
Confidentiality ,[object Object],[object Object],[object Object],[object Object],[object Object]
Message Integrity ,[object Object],[object Object],ALICE TRUDY BOB
Integrity ,[object Object],[object Object],[object Object],[object Object]
Ensuring Message Integrity ,[object Object],[object Object],[object Object],[object Object],ALICE BOB message +  MIC verify MIC MIC is a 1-way function
Message Encryption ,[object Object],[object Object],[object Object]
Encryption algorithms ,[object Object],[object Object],[object Object],[object Object],Caesar DES AES RC4 Enigma Navajo RSA
Secret Key Ciphers ,[object Object],ALICE BOB EVE ???
Basic Ciphers ,[object Object],1 1 1 1 0 0 0 0 0 1 1 0 0 0 1 0 substitution look-up table SUBSTITUTION 1 1 1 1 0 0 0 0 0 1 0 0 1 1 0 1 TRANSPOSITION
Substitution ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Caesar's still being used ... ... wrote notes using an encryption scheme similar to the one used by Julius Caesar  more than 2,000 years ago ...
Some common ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ciphertext = f ( data , key )
Algorithms secrecy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distribution of the keys ,[object Object],[object Object],[object Object],ALICE BOB EVE
Public Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],private  key (secret)
Public Key algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RSA algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RSA details ,[object Object],[object Object],[object Object],private  key (secret) ALICE BOB
Digital signature ,[object Object],[object Object],[object Object],[object Object],[object Object],public  key ALICE BOB Warning:  Anyone can decipher this special ciphertext.
Message digest ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SHA1("The quick brown fox jumps over the lazy dog")  = 2fd4e1c67a2d28fced849ee1bb76e7391b93eb12
Public Key Distribution problem ,[object Object],[object Object],BOB EVE public key Bob, This is Alice. Let me send you my public key
Identity certificates ,[object Object],[object Object],[object Object],[object Object],ALICE + fa54a1234
Certificates in your browser
Crypto wars ,[object Object],[object Object],[object Object],[object Object],[object Object]
What layer Security is on? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wi-Fi security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brief history of Wi-Fi security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is WEP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RC4 algorithm ,[object Object],i := 0 j := 0 while GeneratingOutput: i := (i + 1) mod 256 j := (j + S[i]) mod 256 swap(S[i],S[j]) output S[(S[i] + S[j]) mod 256]
RC4 in WEP ,[object Object],IV RC4 WEP key IV ciphered packet original packet checksum
Risks in WEP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WEP authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More authentication problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WEP encryption blues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How bad is it? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Life after WEP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802.1x corporate network + Internet Authentication network 802.1x ,[object Object]
Virtual Private Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network VPN server
WPA-PSK users beware! ,[object Object],[object Object],[object Object],[object Object]
Meet the bad guys ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attacker's tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a sniffer? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Ethereal screenshot
What is ARP poisoning? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is a network scanner? ,[object Object],[object Object],[object Object],[object Object]
What is a Wi-Fi scanner? ,[object Object],[object Object],[object Object],[object Object]
What is a WEP cracker? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is a security scanner? ,[object Object],[object Object],[object Object]
What is a security mail list? ,[object Object],[object Object]
What is social engineering? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What can we do then? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anything else? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Isn't my FW/AV/... the fix? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
5.5.1.2 packet tracer configure ios intrusion prevention system (ips) using...
5.5.1.2 packet tracer   configure ios intrusion prevention system (ips) using...5.5.1.2 packet tracer   configure ios intrusion prevention system (ips) using...
5.5.1.2 packet tracer configure ios intrusion prevention system (ips) using...
Salem Trabelsi
 

Was ist angesagt? (20)

3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Spoofing
SpoofingSpoofing
Spoofing
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Information and data security cryptography and network security
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network security
 
5.5.1.2 packet tracer configure ios intrusion prevention system (ips) using...
5.5.1.2 packet tracer   configure ios intrusion prevention system (ips) using...5.5.1.2 packet tracer   configure ios intrusion prevention system (ips) using...
5.5.1.2 packet tracer configure ios intrusion prevention system (ips) using...
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
 
Ipsec
IpsecIpsec
Ipsec
 
Firewalls
FirewallsFirewalls
Firewalls
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 

Ähnlich wie Network Security

aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
Kai Koenig
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 

Ähnlich wie Network Security (20)

Crypt
CryptCrypt
Crypt
 
Crypt
CryptCrypt
Crypt
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
13
1313
13
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Criptography
CriptographyCriptography
Criptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Network Security

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Caesar's still being used ... ... wrote notes using an encryption scheme similar to the one used by Julius Caesar more than 2,000 years ago ...
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.