Internet Security - Homepages | The University of Aberdeen

advertisement
CS5038
GROUP I
Author: Ye TIAN
Internet Security
Should Be Implemented by both Technique and Law
Introduction
Can you imagine what would the Internet world be like if there is not any protection
to it? Hackers can modify or acquire any resources of Internet as they like. What is
even worse, without any protection hacking would be an easy-learn and easy-use
technology and anybody can be a hacker. So Internet Security is a necessary safeguard
against hacking. In this article, I will introduce not only what is Internet Security but
also how to implement security.
Internet Security
Obviously, Internet Security is the security of the Internet. However, when we talk
about the Internet Security, there are mainly three areas we care about. First is
physical security. It is about your computer. Is there anybody who uses your computer?
And is there a password to protect your computer? For example, if you write down
your password just on a piece of paper, and even worse you stick the paper on a
corner of your computer monitor, this is something bad for the physical security
because anybody with intentions can access your computer physically. The second
area is data security. In fact, it is not necessary for some hackers to steal your data by
intruding into your computer. Instead, they can use some network-monitor tools to
capture your data packages that transferred at the Transport Layer in the ISO/OSI
model. If your data packages are transported in plain text, the text could be emails or
password or your credit card information, or you are not using a secure web
connection such as Secure Socket Layer (SSL), the data security is really on a low
level. And the third one is server and software security. This area is related to a third
party. Do you trust the software delivered by the third party? Is it a real vendor as
described on the prompt window? Most of us know that some software you
downloaded will sent your information such as emails or addresses to the vendors.
Sever and software security is a complicated problem since it is difficult to identify
CS5038
GROUP I
Author: Ye TIAN
the servers or vendors for most common users.
One of the most important aspects about Internet Security is data protection. There are
three main issues about data protection. First, privacy issue is that you must make the
private data inaccessible to others without your permit. And data encryption can help
you protect the private data from being seen by hackers. Integrity is the second issue.
If hackers capture your packages and modify them, and then send them to you, the
integrity of data is destroyed. The worse situation is that most of the time you will not
find your data has been modified and maybe get into a trap. Also, encryption or digital
signature would be a solution to this issue because hackers can hardly analyze the
content although they capture your data packages. And the third issue is authenticity.
Like I describe previously, it is difficult for users to verify the senders of data or the
vendors of software. Fortunately, digital signature technology can help us verify the
senders’ identity.
Internet Security - Technology
According to a variety of attacks and security issues, I list some types of techniques
that strengthen Internet Security.
1. Encryption.
Encryption is also known as cryptography. It is about encoding our data or data
packages with a code or cipher. The famous Morse code1 is an early and simple
encryption method which is created for electric telegraph by Samuel Morse in 1830s.
Because charges of telegraph based on length of messages, common phrases were
encoded in five letters that stood for a single word. Examples: BYOXO means “Are
you trying to crawl out of it?”, and AYYLU means “Not clearly coded, repeat more
clearly.” Morse code is just like binary code in computer technology. Of course with
the development of Internet, Morse code is obsolete. But the idea of data encryption is
1
Wikipedia.org., 2006. Morse Code. [online] Available from: http://en.wikipedia.org/wiki/Morse_code [cited 12
December 2006].
CS5038
GROUP I
Author: Ye TIAN
used in computer network nowadays. Encryption can protect our data even though
packages are captured by hackers. And there are mainly two types of encryption:
symmetric and asymmetric2. Symmetric cryptography is an encryption method in which both
the sender and receiver use the same key to encode or decode. For example, Data Encryption
Standard (DES) that uses 56-bit keys to encode is a symmetric encryption. However, symmetric
cryptography has its limitation that key management has to use the keys securely since it is the
same key to encode and decode. Asymmetric cryptography which uses different keys to encode
and decode does not have such limitation. In this method, two different but related keys are used, a
public key and a private key. The public key is published and the private key that would never
leave the senders is kept secret, so it can avoid the problems of exchanging keys.
2. Firewall.
When we talk about firewall, the most common word in Internet Security terminology,
it can be either hardware or software firewall. A firewall’s basic function is to separate
the trust areas and control the traffic between different areas. And this kind of traffic
control is bidirectional, which means it can not only block the unsecured traffic from
the public network but also block the private network from using unauthorized web
resources. For example, many companies use firewalls to prevent their employees
viewing web pages not related to their work. Of course, firewalls can block transfer
protocols as well as block data. Most universities such as Aberdeen University make
their firewalls block all P2P software transfer protocol. On the other hand, personal
firewalls are widely used by most of private users, such as Norton and the firewall
build-in Window XP. Such anti-virus software can help Internet users keep away from
hackers’ attacks efficiently.
3. Digital Certificate.
Digital Certificate is also known as public key certificate or identity certificate. It is a
2Wikipedia.org.,
December 2006]
2006. Cryptography. [online] Available from: http://en.wikipedia.org/wiki/Cryptography [cited 12
CS5038
GROUP I
Author: Ye TIAN
useful technique of Internet applications. And X.5903 is the Internet standard of
digital certificate. A certificate includes a public key with a digital signature of a
trusted third party or a Certificate Authority (CA). Besides the public key, a certificate
should also have a name that refers to a person or a computer or an organization, a
validity period due to which certificates can be revoked, and a location of a revocation
center. It is important for users to check the certificate’s validity at times, and this can
be done by two ways. One is comparing it with a Certificate Revocation List, and the
other is using Online Certificate Status Protocol to check the validity. If there is any
related private key has been compromised or certificate found incorrect, the certificate
should be revoked.
4. Secure Socket Layer
Secure Socket Layer (SSL) is “a cryptographic protocol which provides secure
communications on the Internet for such things as web browsing, e-mail, Internet
faxing, and other data transfers.”4 SSL is the most famous encryption type that
encrypts data within TCP/IP. It is just like a secure tunnel that connects the web
clients and severs. All traffics in the tunnel are encoded, and the authentication and
the integrity of the data will be checked at both entrance and exit of the tunnel. Early
days, because the U.S. government restricted the export of encryption technique, SSL
used 40-bit length symmetric keys which are easily broken by brute-force attack to
encode. A few years later, new implementations use more than 128-bit to encode
instead of the 40-bit keys. This absolutely strengthens the security of SSL.
5. Network Security Scan.
Network Security Scanning is technology that can help network administrators know
the vulnerabilities of the system thus reduce the Internet Security risk. There is a lot of
such scanning software in the Internet Security market. And these products are mainly
3
Herardian, R., 1998. Introduction to Internet Security Standards. [online] Available form:
http://www.dominopower.com/issues/issue199808/securitystand002.html [cited 12 December 2006]
4 Wikipedia.org., 2006. Transport Layer Security. [online] Available from:
http://en.wikipedia.org/wiki/Transport_Layer_Security [cited 12 December 2006]
CS5038
GROUP I
Author: Ye TIAN
divided into four types5. The first type is remote networking security scan. This kind
of software can check and analyze the holes of the system. In fact, most hackers use
this software as well to find the holes to attack. The second type is firewall system
scan. The software provides the firewall configuration scan and operating system scan.
The third one is website security scan. The security of CGI applications that run on
websites is a primary threat to Internet Security. And website security scan can
recover the secure holes by detecting web services, CGI applications and web
configurations. The last type is system security scan. It scans the target host’s system
configuration and reports the vulnerabilities of the system.
6. Intrusion Detection.
It is also called networking real-time monitoring. It uses software or hardware to
detect the network traffics and compares the data flow to the intrusion features
database. For example, Intrusion Detection System (IDS) is a system that performs
the detection automatically. Once the system discovers an intrusion-like object, it will
log the relevant information to a database and send an alert to administrator. However,
the intrusion detection is good at discovering intrusion rather than preventing
intrusion. So we should combine the intrusion detection with firewall technology to
realize the Internet Security.
Internet Security - Legislation
Legislation is an effective means to fight against Internet crime. It can help us not
only protect our private data, but also improve our public data accessing. Although
security technology often keeps us away from being attack, it can not always work as
well as we expect. When the loss has already been caused by hacking, technical things
can do nothing with the crime. However, we could use law to punish the criminals and
to reduce the loss by fines. Examples6: the creator of virus ‘Melissa’ was sentenced to
5
Jin, H., 1998. Introduction to networking security. [online] Available form:
http://www.positivecn.com/Tech/technic/jslw/Safe.htm [cited 13 December 2006]
6 Cybercrime.gov, 2006., Computer Crime Cases. [online]
Available from: http://www.justice.gov/criminal/cybercrime/cccases.html [cited 13 December 2006]
CS5038
GROUP I
Author: Ye TIAN
20 months in Federal Prison and faced 150,000 dollars fine; the Russian man who
hacked into computers in U.S. was sentenced to a term of imprisonment of 48 months,
to be followed by three years of supervised release in 2003. Maybe the fines can not
cover the loss caused by hacking, but the legislation related to Internet Security does
limit the ascending trends of Internet crime.
There are some important Acts we should know about. The first one is the Computer
Misuse Act 1990. It was designed to prevent hackers and defined as “An Act to make
provision for securing computer material against unauthorized access or modification;
and for connected purposes.”7 In this Act, computer misuse offences and jurisdiction
were defined. The second one is Data Protection Act 1998 which is “An Act to make
new provision for the regulation of the processing of information relating to
individuals, including the obtaining, holding, use or disclosure of such information.”8
This Act defined sensitive data and introduced the data protection principles. The data
protection mainly protects private data such as credit card information held by a third
party. The last Act introduced is Freedom of Information Act 2000 defined as “An Act
to make provision for the disclosure of information held by public authorities or by
persons providing services for them and to amend the Data Protection Act 1998 and
the Public Records Act 1958; and for connected purposes.”9 This Act is different from
the previous two as it gains the rights of users to access the public resources.
Conclusion
Internet Security should be implemented by both technical method and legislative
method, since neither of them will completely prevent Internet crime independently. It
is obvious that hacking technology is developing with the development of security
technology. Nobody dare to say his system is so robust that hackers can never intrude
7
Office of Public Sector Information, 2006. Computer Misuse Act 1990 (c.18). [online] Available from:
http://www.opsi.gov.uk:80/acts/acts1990/Ukpga_19900018_en_1.htm [cited 13 December 2006]
8 Office of Public Sector Information, 2006. Data Protection Act 1998. [online] Available from:
http://www.opsi.gov.uk:80/ACTS/acts1998/19980029.htm [cited 13 December 2006].
9 Office of Public Sector Information, 2006. Freedom of Information Act 2000. [online]Available from:
http://www.opsi.gov.uk:80/actsacts2000/20000036.htm [cited 13 December 2006].
CS5038
GROUP I
Author: Ye TIAN
into it. So legislation seems more and more important besides the technology.
Unfortunately, legislation is often ineffective because different counties have different
laws about Internet crime while hacking does not have such a limitation of
international boundaries. Should we make a tradeoff between these two methods thus
that they can be strong enough to fight against hacking? The answer is absolutely yes.
Reference
Jin, H., 1998. Introduction to networking security. [online]
Available from:
http://www.positivecn.com/Tech/technic/jslw/Safe.htm
[cited 13 December 2006].
Cybercrime.gov, 2006., Computer Crime Cases. [online]
Available from:
http://www.justice.gov/criminal/cybercrime/cccases.html
[cited 13 December 2006].
U.S. Department of Justice., 2002. Creator of Melissa Computer Virus Sentenced to
20 Months in Federal Prison. [online]
Available from:
http://www.justice.gov/criminal/cybercrime/melissaSent.htm
[cited 13 December 2006].
U.S. Department of Justice., 2003. Russian Man Sentenced for Hacking into
Computers in the United States. [online]
Available from:
http://www.justice.gov/criminal/cybercrime/ivanovSent.htm
[cited 13 December 2006].
Stringer, G., 2006. Conceptual Issues in Cyberspace.[online]
Available from:
http://www.services.ex.ac.uk/cmit/modules/cyberspace/slides/index.html
[cited 12 December 2006]
Download