meljun cortes ict security communication_security_cryptography

15
Communication Security, Cryptography and Physical Security Kent Tipan and Romelle Rodrigueza Graduate School - Masters in Information Technology 1

Upload: meljun-cortes

Post on 18-Feb-2017

125 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: MELJUN CORTES ICT security communication_security_cryptography

Communication Security, Cryptography and Physical Security

Kent Tipan and Romelle Rodrigueza

Graduate School - Masters in Information Technology 1

Page 2: MELJUN CORTES ICT security communication_security_cryptography

COMMUNICATION SECURITY

Graduate School - Masters in Information Technology 2

Page 3: MELJUN CORTES ICT security communication_security_cryptography

• Communications security (COMSEC) is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

What is Communications security

Graduate School - Masters in Information Technology 3

Page 4: MELJUN CORTES ICT security communication_security_cryptography

COMSEC Specialties• Cryptosecurity: Provision of technically sound cryptosystems and their

proper use. This includes ensuring message confidentiality and authenticity.

• Emission Security (EMSEC): All measures taken to deny unauthorized persons information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic—equipment, information systems, and telecommunications systems.

• Transmission Security (TRANSEC): Application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis (e.g. frequency hopping and spread spectrum).

• Physical security: All physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons.

Graduate School - Masters in Information Technology 4

Page 5: MELJUN CORTES ICT security communication_security_cryptography

Where to use COMSEC

• COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.

Graduate School - Masters in Information Technology 5

Page 6: MELJUN CORTES ICT security communication_security_cryptography

Popular Hacker Techniques

• Accessing the Log-in Prompt– Physical Access– Dial-in Access

• Obtaining Passwords– Brute Force Attacks– Keystroke Logging– Packet Sniffing– Social Engineering

Graduate School - Masters in Information Technology 6

Page 7: MELJUN CORTES ICT security communication_security_cryptography

CRYTOGRAPHY

Graduate School - Masters in Information Technology 7

Page 8: MELJUN CORTES ICT security communication_security_cryptography

Questions

• What is Cryptography?• When to use Cryptography?• Why use Cryptography?• Who use Cryptography?• How to use Cryptography?

Graduate School - Masters in Information Technology 8

Page 9: MELJUN CORTES ICT security communication_security_cryptography

What is Cryptography?

• Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

Graduate School - Masters in Information Technology 9

Page 10: MELJUN CORTES ICT security communication_security_cryptography

When do we use Cryptography

• Everyday

Graduate School - Masters in Information Technology 10

Page 11: MELJUN CORTES ICT security communication_security_cryptography

Why use Cryptography

• Cryptography has three major purposes: Encryption, Authentication, and Identification.– Encryption prevents evil people from reading your

data.– Authentication (aka. Signing) prevents evil people

from modifying your data without being discovered.

– Identification prevents evil people from pretending to be you.

Graduate School - Masters in Information Technology 11

Page 12: MELJUN CORTES ICT security communication_security_cryptography

How to use Cryptography?

• The plaintext is the data we care about.• The ciphertext is the data evil people get to

see.• A key is used to convert between these.

Sometimes we need several keys.• Symmetric cryptography is when converting

plaintext to ciphertext uses the same key as converting ciphertext to plaintext. Examples are AES (Rijndael), Blowfish, RC4, 3DES, etc.

Graduate School - Masters in Information Technology 12

Page 13: MELJUN CORTES ICT security communication_security_cryptography

How to use Cryptography

• Asymmetric(Public/Private Key Cryptography) cryptography is when the two directions use different keys. Examples are DSS (Digital Signature Standard), Paillier cryptosystem, RSA, YAK, etc.

Graduate School - Masters in Information Technology 13

Page 14: MELJUN CORTES ICT security communication_security_cryptography

References• https://

en.wikipedia.org/wiki/Communications_security• http://searchcompliance.techtarget.com/definition/CO

MSEC-communications-security• http://www.daemonology.net/papers/crypto1hr.pdf• http://www.laits.utexas.edu/~anorman/BUS.FOR/cours

e.mat/SSim/life.html• http://searchsoftwarequality.techtarget.com/definition

/cryptography• https://en.wikipedia.org/wiki/Cryptography

Graduate School - Masters in Information Technology 14

Page 15: MELJUN CORTES ICT security communication_security_cryptography

Thank you!Have a good day

andGod bless!

Graduate School - Masters in Information Technology 15