• Nenhum resultado encontrado

Network Security

N/A
N/A
Protected

Academic year: 2023

Share "Network Security"

Copied!
14
0
0

Texto

(1)

Network Security

Alexandre Barbosa Augusto

CRACS/INESCTEC, DCC-FCUP

(2)

Agenda

Basic Tenets of Security

Good Security is Hard

Massively Deploy-able Security is Even Harder.

Problems with Passwords

Level of Authentication

Public Key Infrastructure (PKI)

X.509

PGP

Smartcard

(3)

Basic Tenets of Security

Identity

RW (RealWorld): My Name

DW(DigitalWorld): Login

Authentication

RW: My Voice

DW: Password

Authorization

RW: Money

DW: Cookie Session

Privacy

RW: My thoughts

DW: Encrypted data

(4)

Good Security is Hard

Always a compromise between:

Easy of Use (convenience for the user)

Effectiveness (Confidentiality, Integrity, Privacy and Non-repudiation)

Cost

It must be preceded by a comprehensive Analysis of Risk.

Otherwise security could end up being more costly then what needs to be protected.

(5)

Massively Deployable Security is Even Harder.

What can you do when you have an installed base of thousands/millions ?

Security mechanisms must be extremely:

Cheap to deploy

Easy to use

Configurable by the user

There is one such popular mechanism.

The LOGIN/PASSWORD

(6)

Problems with Passwords

Selection

Good secure passwords are hard to find

Memorization

It is easy to forget infrequently used passwords

It is hard to remember secure passwords

Reuse

To many different passwords to memorize

People reuse the same password all over

(7)

Online Banking is one prime example of management of highly valuable assets on the Internet.

Online Banks are very convenient for the costumer and save of lot money to the Banks.

“Phishing” attacks became widespread and are quite effective at stealing user credentials.

Banking dedicated Malware provides high returns to the attacker

Risk Analysis tell us that Login/Password is not appropriate to protect these assets.

Problems with Passwords

(8)

Level of Authentication

Are based on:

Something you know (password/PIN)

Something you have (Token, Smartcard)

Something you are (Biometric)

The typically single-factor authentication is the

"username/password".

The two-factor authentication adds something

else, usually something you have.

(9)

Public Key Infrastructure (PKI)

Is responsible to:

bind an identity to a public key by the usage of digital signature(s) in order to create the certificate.

Manage the digital certificates (create, store, distribute and revoke)

Grants a two-factor authentication

There are different concepts in order to manage a

PKI.

(10)

X.509 certificate

Is issued by a certificate authority (CA).

Hierarchical approach

Supports only one signature.

Massively deployed over computer systems:

On browsers to prove web site authenticity and to establish a secure channel for data exchange.

On single sign-on (SSO) systems to give

temporary access to a resource.

(11)

PGP (pretty good privacy) cert.

Is issued by its creator (self-signed) .

Supports multiple signatures in order to grant a greater trust on network

Based on a web of trust

Widely used on emails systems in order to prove an identity or cypher information

It is free

(12)

Smartcard

Grants a non tampering security feature

Provide the necessary crypto components allowing:

Secure personal and cryptographic data

Identification

Strong authentication

Digital signature

Encrypt data

(13)

Smartcard

Grants:

a two-factor authentication

Data integrity

Privacy

Non-repudiation

It is widely deployed on the world:

Citizen card

Bank cards

Universities

(14)

Question ?

Referências

Documentos relacionados

No caso considerado aqui, a pequena produção (definida quanto ao volume de produção, não quanto à área) compra os insumos por preços mais eleva- dos e vende a produção

DEMONSTRAÇÃO DE RESULTADOS DESPESAS Administrativas Salários Encargos sociais Impostos e taxas Alugueis Serviços gerais Manutenção Depreciação Materiais de consumo

Para abordar a atuação da Organização do Tratado do Atlântico Norte (OTAN), na cri- se da Ucrânia, mais especificamente no movimento de anexação da província da Crimeia

Analisando os jornais podemos averiguar a repercussão dos torpedeamentos no âmbito nacional e em Sergipe, percebemos como os meios de comunicação, atendendo aos interesses do

This log must identify the roles of any sub-investigator and the person(s) who will be delegated other study- related tasks; such as CRF/EDC entry. Any changes to

importante para o intérprete conhecer a estrutura da mesma e criar referências para a construção do discurso musical. Outro elemento que consideramos

Em 1977, Marques de Melo idealizou e fundou, junto com colegas pesquisadores, tais como Anamaria Fadul, José Salvador Faro, Isaac Epstein e outros, a Sociedade Brasileira de

Anna Carolina foi matriculada no Centro de Desenvolvimento e Criatividade – Recreio. Nessa epoca não se falava em inclusão como hoje, apesar da escola ser uma escola inclusiva.