Pertemuan 5 Points of Exposure Matakuliah :A0334/Pengendalian Lingkungan Online

advertisement
Matakuliah
Tahun
Versi
:A0334/Pengendalian Lingkungan Online
: 2005
: 1/1
Pertemuan 5
Points of Exposure
1
Learning Outcomes
Pada akhir pertemuan ini, diharapkan mahasiswa
akan mampu :
• Mahasiswa dapat menjelaskan Points of
Exposure
2
Outline Materi
• Email
– The Big Question
– Threats to Email
• Confidentiality
• Integrity
• Authenticity
– Consequences
– Reasons to Address The Threats
3
– Reducing The Risks and Eliminating The Threat
• Encryption
• Digital Signature
– Preceived Barriers to securing Email
• Email Encryption and Virus detection Software
– Plugging The Hole
– Reducing The Risks and Eliminating The Threat
• Encryption
• Digital Signature
– Preceived Barriers to securing Email
• Email Encryption and Virus detection Software
– Plugging The Hole
4
Email
• Email is one of the most simple and effective
communication tools available. It is quick,
convenient and cheap, but unless used properly,
fundamentally insecure. It is as public as a
postcard and leaves a written record long after it
has been erased, meaning that any skilled or
knowledgeable person can recover a longforgotten or buried email message from deep
inside a networked system. There is no doubt
that in a business environment the use of email
and the Internet poses a threat to a business’s
ability to protect company intellectual property
and other confidential information.
5
The Big Question
• It is unquestionable that email security is
the next big IT security issue – a fact that
gives rise to the following question: if a
company’s most valuable asset apart from
its workforce is its intellectual property,
why are so many businesses failing to
take the crucial steps towards protecting
that property in its electronic form when it
would be both simple and cost-effective for
them to do so?
6
• It security experts would obviously understand
the issues surrounding treatment of the Internet
in greater depth than the average man in the
street but the need to extend this awareness to
all Internet users is now critical. Letters have
been used as a form of communication for
thousands of years, so there is no wonder that
people have learnt how to deal with them safely.
For the Internet – and consequently email –
there has been far less time for users to absorb
the underlying principles and implications
surrounding its use.
7
Threats to Email
• The main points of exposure within the
process of sending unprotected email are:
– Confidentiality
– Integrity
– Authenticity
8
Confidentiality
• The information sent is vulnerable to being
anonymously read by any unauthorised
person whilst in transit. Hack-attacks of
this kind are very easy to perform by
almost anyone who has the will to do so.
A good analogy for this type of email hack
is the postman who allows another person
to read other people’s postcards before
delivering them to the rightful recipients.
9
Integrity
• The contents of an unprotected email can
also be anonymously modified while they
are in transit and then passed onto the
recipient as if they were the original
message, without either the recipient or
sender being any the wiser.
10
Authenticity
• Emails can be easily and anonymously
forged so that messages appear to be
from a certain person.
11
Consequences
• Cyber-criminals – and it is known that the
majority of them operate covertly within
their own company – go about their
business for a variety of reasons. These
range from an intention to gain a
competitive edge (corporate espionage) to
the desire to exact revenge or to further a
political cause.
12
Reasons to Address The Threats
• While horror stories abound, the average
business or private user of email might
feel they have nothing much to hide and
are unlikely targets for hackers.
13
Reducing The Risks and Eliminating The
Threat
• Whilst it is true that information security has
become a greater priority in the last two years,
especially at board level, the threats have also
increased substantially. Modern cryptography
techniques and services can add substantial
benefits to electronic business arrangements.
These techniques can scramble data to avoid
unauthorised disclosure and also to ensure the
integrity, authenticity and legitimacy of electronic
communication records and computerised
transactions.
14
Encryption
• This is the electronic equivalent of putting
a message in an envelope (see Figure
2.1.1 p. 57). It protects confidentiality and
confirms for the recipient that the message
has arrived in its original state without
having been seen by an unauthorised
person. Good encryption software
ensures that information is only decrypted
as and when needed and then makes
provision for the safe deletion of electronic
messages.
15
Digital Signature
• This is the electronic equivalent of signing and
sealing a letter by hand (see Figure 2.1.2. P. 58).
It maintains the integrity, authenticity and nonrepudiation aspects of an email in much the
same way as a person hand-written signature is
proof on authorship of a letter.
• Cryptographic techniques and digital signatures,
though widely available for both private and
business use and simple in concept, can
nevertheless be technically difficult solutions to
understand for someone with poor IT
knowledge.
16
Perceived Barriers to Securing Email
• Email Encryption and Virus Detection
Software
17
Email Encryption and Virus Detection
Software
• One of the biggest perceived problems
regarding IT security faced by business
users in the widely held belief that
encrypted email messages would bypass
anti-virus and content-checking serverbased software.
18
• There is a very wide range of anti-virus
products available on the market, many of
which are fully compatible with
cryptographic techniques and which can
be installed locally. In cases, where the
anti-virus software cannot be installed
locally, the email rules inherent in
encryption software are so flexible that
users are able to determine which
messages are encrypted and which are
not.
19
• By combining the use of solid encryption
techniques and careful rule-setting with
modern, desktop-based, anti-virus
software, comprehensive and effective
control of email security would lie entirely,
and independently, with the user.
20
Plugging The Hole
• Rather than being baffled by the technology,
businesses need to be clear about their security
needs and to choose modern encryption
software with good functionality that they
understand completely.
• Businesses need to recognise that unprotected
email is a risk. It is a vulnerability that cannot be
fixed by a firewall installation of by anti-virus
implementation. A security policy that does not
address the open nature of emails is falling short
of its purpose.
21
The End
22
Download