threats and solutions of information security - confidentiality, integrity and availability hyunsung...

17
Threats and Solutions of Threats and Solutions of Information Security Information Security - Confidentiality, Integrity and - Confidentiality, Integrity and Availability Availability Hyunsung Kim Hyunsung Kim

Upload: amy-norman

Post on 18-Jan-2018

233 views

Category:

Documents


1 download

DESCRIPTION

Cyber Security Kyungil University Why Information Security 3  Stand-alone -> Secure enough

TRANSCRIPT

Page 1: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Threats and Solutions of Threats and Solutions of Information SecurityInformation Security

- Confidentiality, Integrity and - Confidentiality, Integrity and AvailabilityAvailability

Hyunsung KimHyunsung Kim

Page 2: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

IndexIndex

Why Information SecurityWhy Information Security

ThreatsThreats of Information Security of Information Security

SolutionsSolutions of Information Security of Information Security

Example of Internet Banking Example of Internet Banking

Conclusion Conclusion

2

Hacking InformationSecurity

Page 3: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Why Information SecurityWhy Information Security

3

http://www.123rf.com/ Stand-alone -> Secure enoughStand-alone -> Secure enough

Page 4: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Why Information SecurityWhy Information Security To improve usageTo improve usage

4

=> Multi-user case

To improve connectivityTo improve connectivity=> Networked-computer case

HackingInformationSecurity

Page 5: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

ThreatsThreats of Information Security of Information Security Definition from Wikipedia Definition from Wikipedia A possible danger that might exploit a vulnerability

to breach security and thus cause possible harm

Threats

5

eavesdropping

traffic analysis

modification

masquerading

replaying

repudiationdenial of service

Page 6: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Threats to Integrity

Threats Threats of Information Securityof Information Security

6

eavesdropping

traffic analysis

modification

masquerading

replaying

repudiationdenial of service

Threats to Confidentiality

Threat to Availability

Classification of Threats

Page 7: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Solutions Solutions of Information of Information SecuritySecurity

ConfidentialityConfidentiality

7

IntegrityIntegrity

AvailabilityAvailability

Page 8: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Solutions Solutions of Information of Information SecuritySecurity ConfidentialityConfidentiality

AttacksAttacks Eavesdropping and traffic analysisEavesdropping and traffic analysis

DefinitionDefinitionA set of rules or a promise that limits access or A set of rules or a promise that limits access or places restrictions on certain types of informationplaces restrictions on certain types of information

SolutionSolutionEncryption, traffic paddingEncryption, traffic padding

8

Function()

Page 9: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Solutions Solutions of Information of Information SecuritySecurity IntegrityIntegrity

AttacksAttacks Modification, masquerading, replayingModification, masquerading, replaying and repudiation and repudiation

DefinitionDefinitionInternal consistency or state of being uncorrupted Internal consistency or state of being uncorrupted in electronic datain electronic data

SolutionSolutionEncryption, digital signature, authenticationEncryption, digital signature, authentication

9

Function()

Page 10: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Solutions Solutions of Information of Information SecuritySecurity AvailabilityAvailability

AttacksAttacks Denial of serviceDenial of service

DefinitionDefinitionThe degree to which a system is in a specified The degree to which a system is in a specified operable and committable state at the start of a operable and committable state at the start of a missionmission

SolutionSolutionPacket filtering, complex schemesPacket filtering, complex schemes

10

Function()Threshold

Page 11: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

ExampleExample - Internet Banking - Internet Banking AuthenticationAuthentication

11

Internet

Page 12: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

ExampleExample - Internet Banking - Internet Banking AuthenticationAuthentication

Threat scenario 1 -> authentication with Threat scenario 1 -> authentication with {ID, PW}{ID, PW}

12

{ ID, PW }

eavesdropping masquerading

Page 13: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

ExampleExample - Internet Banking - Internet Banking AuthenticationAuthentication

Threat scenario 2 -> authentication with Threat scenario 2 -> authentication with EEkk(ID, PW)(ID, PW)

13

Ek(ID, PW)

eavesdropping

E (ID, PW)k

k

k

replaying modification

Page 14: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

ExampleExample - Internet Banking - Internet Banking AuthenticationAuthentication

Threat scenario 3 -> authentication with Threat scenario 3 -> authentication with EEkk(ID, PW, (ID, PW, TimeTime))

14

k

k

replayingTimesync

Timesync

other threats

verifier with MACk(Ek(ID, PW, Time))

k

Ek(ID, PW, Time) Function() MACk(Ek(ID, PW, Time))

modification

Ek(ID, PW, Time), MACk(Ek(ID, PW, Time))

Page 15: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

ExampleExample - Internet Banking - Internet Banking AuthenticationAuthentication

Current usage scenario -> authentication with Current usage scenario -> authentication with CertificateCertificate

15

Certificateuser

Certificateserver

Secret cardDevice auth.

Page 16: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University

Modification

Integrity Masquerading Replaying Repudiation

Eavesdropping Confidentiality

Traffic analysis

ConclusionConclusionThreats Services

16

Denial of service Availability

Encryption, traffic padding

Encryption, digital signature,authentication

Page 17: Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim

Cyber SecurityKyungil University 17