COEN 350 Network Security Introduction Computer Networks n

  • Slides: 14
Download presentation
COEN 350 Network Security Introduction

COEN 350 Network Security Introduction

Computer Networks n OSI Reference Model n n n n Application Layer Presentation Layer

Computer Networks n OSI Reference Model n n n n Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

OSI Reference Model n n n Useful to establish terminology Not implemented Upper layer

OSI Reference Model n n n Useful to establish terminology Not implemented Upper layer implemented in terms of lower layer.

OSI Reference Model n Application Layer n Locus of applications that use networking n

OSI Reference Model n Application Layer n Locus of applications that use networking n n P 2 P HTTP ftp Presentation Layer n n Encodes application data into a canonical form Decodes it into system-dependent format at the receiving end.

OSI Reference Model n Session Layer n n n Extra functions over reliable one-to-one

OSI Reference Model n Session Layer n n n Extra functions over reliable one-to-one connection RPC Transport Layer n n Reliable communication stream between a pair of systems. IP, UDP, TCP, ICMP

OSI Reference Model n Network Layer n n Computes paths across an interconnected mesh

OSI Reference Model n Network Layer n n Computes paths across an interconnected mesh of links and packet switches Forwards packets over multiple links from source to destination

OSI Reference Model n Data Link Layer n n Organizes physical layer’s bits into

OSI Reference Model n Data Link Layer n n Organizes physical layer’s bits into packets and controls who on a shared link gets each packet. Physical Layer n Delivers an unstructured stream of bits across a single link of some sort.

TCP/IP Suite

TCP/IP Suite

Protocol Layers and Security n Security measures often layer network protocols. n Protect contents

Protocol Layers and Security n Security measures often layer network protocols. n Protect contents of packages is protection at layer 2. n n Still allows traffic analysis. IPSec protects (encrypts) packages at layer 4 n Does not work with NAT.

Goals n Authentication n n Authorization n n Are you allowed to do that?

Goals n Authentication n n Authorization n n Are you allowed to do that? Integrity n n Who are you? Is this the real message? Privacy n Does anyone else know about it?

Zone of Control n n The zone that needs to be secured in order

Zone of Control n n The zone that needs to be secured in order to prevent eavesdropping. Physical access needs to be prevented. n Tempest program (US military) n All computer systems radiate information. n n Wireless access point rated for e. g. 50 ft radius for receiving data. Special antenna (built from a Pringles box, etc. ) can read traffic from a mile away. Define a perimeter of a commercial wired network: n n Possible to reconstruct image on a monitor from 20 ft. Need to include backdoor channels like modems, etc. Tempest: Set of standards for limiting electric or electromagnetic radiation emanations from electronic equipment. n Shortcut for filed of compromising emanations / Emissions Security

Legal Issues n Patent Law n First inventor has the right to invention. n

Legal Issues n Patent Law n First inventor has the right to invention. n n Patents issued based on what inventors present regarding n n n Novelty ( Prior Art) Importance (“Aha” effect) Patent process flawed since Reagan under-funding, but slowly getting better n n In other countries: First one to file. Patent decision needs to be made within a day. Many cryptography algorithms are / were patented. n n Are now moving into the public domain. Still, many standards are built around patented methods. n Kerberos uses secret key encryption instead of public key encryption.

Legal Issues n Export Control n n Cryptographic algorithms and tools were considered to

Legal Issues n Export Control n n Cryptographic algorithms and tools were considered to be restricted technology. Treated like ammunition. Taking a laptop to Mexico for a week-end could be a violation of export control. Government gave up after PGP fiasco n n Zimmermann invented PGP 1. 0 in 1991. PGP fell under the ammunition clause. Zimmermann circumvented export restriction by publishing code in book form (under first amendment protection) Book was intended to be bought by exactly one person in Norway to scan in code and publish PGP outside of US (for free downloads).

Legal Issues n Key Escrow n n n Cryptography algorithms became unbreakable in the

Legal Issues n Key Escrow n n n Cryptography algorithms became unbreakable in the nineties. Prevent wiretaps, computer forensics, etc. National security efforts sponsored Clipper: n n 1993 Encryption chip with secret key. User gets chip, secret key is broken up and stored at two different agencies. Two different agencies needed to cooperate to recover secret key. n n Considered to be almost impossible if cooperation were legal and impossible if cooperation were illegal. Government gave up.