SECURITY - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

SECURITY

Description:

... \WinNt\Temporary Internet Files\ A nice demo in french on: ... 300.000 servers destroyed trojan horse = hides for other actions Back Orifice logic bomb ... – PowerPoint PPT presentation

Number of Views:83
Avg rating:3.0/5.0
Slides: 26
Provided by: Rudi50
Category:
Tags: security | demo | horse | trojan

less

Transcript and Presenter's Notes

Title: SECURITY


1
SECURITY
  • Bart Vansevenant
  • Who is who?
  • Who can read what?
  • Traces
  • Virusses
  • Safety and confidentiality

2
Who is who?
3
Who can read what ?
  • Telephone line
  • Mail server
  • TCP/IP
  • Echelon Carnivore

4
e-mail using an ISP
POST OFFICE
5
a) Telephone-line
POST OFFICE
6
b) e-mail server
POST OFFICE
7
c) TCP/IP
POST OFFICE
8
Echelon/Carnivore
Source http//www.fbi.gov/hq/lab/carnivore/carnlr
gmap.htm
9
Traces
10
Traces
The IP address of your computer is
213.177.129.120 your DNS address is
adsl-129-120.wanadoo.be We know you use
Microsoft Windows 98 Your navigator has the code
Mozilla/4.78 en (Win98 U) In fact it is
Netscape Communicator 4.x English What you did
is stored  Windows 95 C\Windows\Temporary
Internet Files\ Windows NT C\WinNt\Temporary
Internet Files\
A nice demo in french on www.cnil.fr
11
Virus
  • What is a virus and types?
  • How is a computer infected?
  • Danger

12
a) What is a virus?
  • computer virus a computer program 'I love
    you', 45 million computers infected
  • worm multiplicates itself code Red 300.000
    servers destroyed
  • trojan horse hides for other actions Back
    Orifice
  • logic bomb distroys programs
  • hoax false alarm

13
b) How is a computer infected?
  • files attached to e-mail (attachment)
  • diskettes
  • other

14
c) Danger
  • infecting components of your system
  • effects
  • malfunctions
  • deletion of data
  • wiping of hard disk
  • ...

15
Solutions to provide safety and confidentiality
  • solving identity problem and unauthorised
    reading
  • protection against traces
  • protection against virusses

16
Identity and unauthorised reading
  • Encryption
  • Purpose
  • Functions
  • How?

17
Functions of encryption
  • Authentication
  • Integrity
  • Confidentiality

18
Symmetrical encryption
19
Asymmetrical encryption
confidentiality towards receiver
20
Asymmetrical encryption
authentication of sender
21
Example
22
Example
23
Example
24
Against leaving traces
  • Traces at the ISP
  • Traces on own computer

25
Against virusses
  • anti-virus program Norton, McAfee, eSafe,
    F-Secure,
  • watch out for attachments .exe, .com, .pif,
    .vbs, .doc, .xls,
  • www.bipt.be
Write a Comment
User Comments (0)
About PowerShow.com