Top Banner
Information Security SINA BAGHERINEZHAD 1 University of Tehran Faculty of Management
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information security

Information SecuritySINA BAGHERINEZHAD

1

University of TehranFaculty of Management

Page 2: Information security

Some Statistics

2

Page 3: Information security

Agenda

History

Definitions

Basic principles

Controls

Access Control

Cryptography

3

Page 4: Information security

History

ATBASH (600 BC)

Scytale (486 BC)

Caesar cipher (50 BC)

Alberti cipher (1466)

4

Page 5: Information security

Definitions of Information Security

Preservation of confidentiality, integrity and availability of information.

(ISO/IEC 27000:2009)

The protection of information and information systems from unauthorized

access, use, disclosure, disruption, modification, or destruction in order to

provide confidentiality, integrity, and availability. (CNSS, 2010)

Ensures that only authorized users (confidentiality) have access to

accurate and complete information (integrity) when required

(availability). (ISACA, 2008)

5

Page 6: Information security

Basic Principles

Confidentiality

Integrity

Availability

Authenticity

Non-repudiation

6

Page 7: Information security

Controls

Administrative

Logical

Physical

7

Page 8: Information security

Access Control

Identification

Authentication

Something you know: things such as a PIN, a password, or your mother's maiden

name.

Something you have: a driver's license or a magnetic swipe card.

Something you are: biometrics, including palm prints, fingerprints, voice prints

and retina (eye) scans.

Authorization (run, view, create, delete, or change)

8

Page 9: Information security

Cryptography

9

Page 10: Information security

Symmetric-key Cryptography

10

Page 11: Information security

Man-in-the-middle attack (MITM)

11

Page 12: Information security

Diffie-Hellman key exchange

12

Page 13: Information security

Public-key (Asymmetric) Cryptography

13

Page 14: Information security

RSA (cryptosystem)

Key generation:

1. Choose two distinct prime numbers p and q.

2. Compute n = pq.

3. Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1)

4. Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1

5. Determine d as d.e ≡ 1 (mod φ(n))

Public key: (n, e)

Private key: (n, d)

14

Page 15: Information security

RSA (cryptosystem)

Encryption

1. Bob wishes to send message M to Alice.

2. He first turns M into an integer m, such that 0 ≤m < n

3. He then computes the ciphertext c corresponding to 𝐶 ≡ 𝑚𝑒 (mod n)

4. Bob then transmits c to Alice.

Decryption

1. Alice can recover m from c via computing 𝑚 ≡ 𝑐𝑑 (mod n)

2. Given m, she can recover the original message M.

15

Page 16: Information security

Digital signature

16

Page 17: Information security

17

Page 18: Information security

References:

www.wikiperdia.com

www.scmagazine.com

www.comodo.com

www.billatnapier.com

www.noweco.com

www.ibm.com

www.iso.org

www.27000.org

نشر نص/ دکتر علی ذاکرالحسینی، دکتر احسان ملکیان /امنیت داده ها

18