MELJUN CORTES ICT security communication_security_cryptography
-
Upload
meljun-cortes -
Category
Technology
-
view
125 -
download
0
Transcript of MELJUN CORTES ICT security communication_security_cryptography
Communication Security, Cryptography and Physical Security
Kent Tipan and Romelle Rodrigueza
Graduate School - Masters in Information Technology 1
COMMUNICATION SECURITY
Graduate School - Masters in Information Technology 2
• Communications security (COMSEC) is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.
What is Communications security
Graduate School - Masters in Information Technology 3
COMSEC Specialties• Cryptosecurity: Provision of technically sound cryptosystems and their
proper use. This includes ensuring message confidentiality and authenticity.
• Emission Security (EMSEC): All measures taken to deny unauthorized persons information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic—equipment, information systems, and telecommunications systems.
• Transmission Security (TRANSEC): Application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis (e.g. frequency hopping and spread spectrum).
• Physical security: All physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons.
Graduate School - Masters in Information Technology 4
Where to use COMSEC
• COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.
Graduate School - Masters in Information Technology 5
Popular Hacker Techniques
• Accessing the Log-in Prompt– Physical Access– Dial-in Access
• Obtaining Passwords– Brute Force Attacks– Keystroke Logging– Packet Sniffing– Social Engineering
Graduate School - Masters in Information Technology 6
CRYTOGRAPHY
Graduate School - Masters in Information Technology 7
Questions
• What is Cryptography?• When to use Cryptography?• Why use Cryptography?• Who use Cryptography?• How to use Cryptography?
Graduate School - Masters in Information Technology 8
What is Cryptography?
• Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
Graduate School - Masters in Information Technology 9
When do we use Cryptography
• Everyday
Graduate School - Masters in Information Technology 10
Why use Cryptography
• Cryptography has three major purposes: Encryption, Authentication, and Identification.– Encryption prevents evil people from reading your
data.– Authentication (aka. Signing) prevents evil people
from modifying your data without being discovered.
– Identification prevents evil people from pretending to be you.
Graduate School - Masters in Information Technology 11
How to use Cryptography?
• The plaintext is the data we care about.• The ciphertext is the data evil people get to
see.• A key is used to convert between these.
Sometimes we need several keys.• Symmetric cryptography is when converting
plaintext to ciphertext uses the same key as converting ciphertext to plaintext. Examples are AES (Rijndael), Blowfish, RC4, 3DES, etc.
Graduate School - Masters in Information Technology 12
How to use Cryptography
• Asymmetric(Public/Private Key Cryptography) cryptography is when the two directions use different keys. Examples are DSS (Digital Signature Standard), Paillier cryptosystem, RSA, YAK, etc.
Graduate School - Masters in Information Technology 13
References• https://
en.wikipedia.org/wiki/Communications_security• http://searchcompliance.techtarget.com/definition/CO
MSEC-communications-security• http://www.daemonology.net/papers/crypto1hr.pdf• http://www.laits.utexas.edu/~anorman/BUS.FOR/cours
e.mat/SSim/life.html• http://searchsoftwarequality.techtarget.com/definition
/cryptography• https://en.wikipedia.org/wiki/Cryptography
Graduate School - Masters in Information Technology 14
Thank you!Have a good day
andGod bless!
Graduate School - Masters in Information Technology 15