Download Presentazione di PowerPoint

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Peering wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Computer security wikipedia , lookup

Hacker wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Computer networks
Network administrators
are here to help you!
Open a ticket on
http://support.unibz.it
11 Aug 2014
Computer networks
1
Computer networks

What is a network







Computers
External connection
Terminals
Printers
Stand-alone hard disks
VoIP telephones
Server-client architecture
11 Aug 2014
Computer networks
2
Transfer speed

Network areas








Local Area Network (LAN, Intranet)
Wide Area Network (WAN, Internet)
Virtual Private Network (VPN)
Speed in “bits per second” (bps)
Ethernet 10 Mbps
Fast Ethernet 100 Mbps
Gigabit Ethernet 1 Gbps
Wireless 30-300 Mbps
11 Aug 2014
Computer networks
3
Communication programs

Web browser





Mail reader



Chrome (55% of the market)
Mozilla Firefox (25% of the market)
Internet Explorer (10% of the market)
Safari
Outlook, Mozilla Thunderbird, Windows Live Mail
Webmail and Microsoft Outlook Web App
http://webmail.unibz.it
Voice over IP


11 Aug 2014
Costs
WhatsApp
Computer networks
4
Posta Elettronica Certificata – PEC

Standard email







No
No
No
No
No
No
guarantee of sender’s e-mail address identity
guarantee of sender’s identity
guarantee that content has not been altered
sent proof
dispatched proof
read proof
PEC to PEC: like a raccomandata con ricevuta di
ritorno



11 Aug 2014
Sent proof
Dispatched proof
(in practice also) sender’s address identity and unaltered content
Computer networks
5
Posta Elettronica Certificata – PEC

PEC to standard email: like a raccomandata semplice

Sent proof

Standard email to PEC: like a normal letter

Sent and dispatched proves are legal proves

Every citizen may have a free PEC address to
communicate with public administration
11 Aug 2014
Computer networks
6
Search engines



Crawler technique (8 billions web pages!)
Google scoring system
Search tricks:




11 Aug 2014
Use many keywords
Quotations
Advanced search
Search for images
Computer networks
7
Slow connections
Names
Equipment
Effective
speed
Notes
PSTN
analogical
dial-up
telephone line
and modem
56 Kbps
Telephone is busy during
connection
128 Kbps
Telephone is busy during
full speed connection
100 Kbps
Telephone is busy during
connection
ISDN
GPRS
2G
EDGE
2.5 G
11 Aug 2014
ISDN
telephone line
and modem
GSM mobile
phone
modern GSM
phone
300 Kbps
Computer networks
8
Broadband connections
Name
Equipment
Effective speed
Notes
ADSL
telephone line
and modem
500 Kbps in upload
8-20 Mbps download
Congestion
Internet
special contract
cable
UMTS
3G
3G mobile phone
HSDPA
LTE
LTE mobile phone
4G
Wireless
wireless card
Wi-Fi
WiMax
11 Aug 2014
antenna in line of
sight and modem
some Gbps
5 Mbps in upload
40 Mbps in download
Speed depends strongly on
environment
up to 100 Mbps
Depends on coverage and
contract
Speed depends on wireless
generation
30-300 Mbps
40 Mbps
Computer networks
Speed depends strongly on
distance
9
Broadband connections

ADSL Congestion


“minimum band guaranteed” contract
Digital divide

5,400,000 Italians not covered by broadband

WiMax

10 Kilometers range

“line of sight” problem
11 Aug 2014
Computer networks
10
Law 196/2003 on privacy

Data are divided into:

personal data

sensitive data



race and ethnicity,
religious / philosophical / political opinions,
belonging to religious / philosophical / political / workers
organization

sensitive data about health and sex
justice data (handled as sensitive data)

genetic data (need extremely particular procedures)

11 Aug 2014
Computer networks
11
Law 196/2003 on privacy


To personal users who do not communicate data
security requirements still apply
Requirements






11 Aug 2014
authentication with login + password or alternatives
permission
training or instructions
backup every week all data
security programs updated every 12 months (6 if sensitive)
sensitive data must be encrypted or unidentifiable
Computer networks
12
Encryption

Scrambling technique to make text
unreadable



Public key for encrypting
Private key for decrypting
128 bits to be sure
11 Aug 2014
Computer networks
13
Encryption for information exchange
11 Aug 2014
message 1
encrypt
G#4hg!
decrypt
message 1
message 2
encrypt
f@çd*s
decrypt
message 2
message 3
encrypt
È^£(iw,
decrypt
message 3
message 1
encrypt
G#4hg!
decrypt
Trb:-ò°§
message 2
encrypt
f@çd*s
decrypt
Dr4^\|ò9
message 3
encrypt
decrypt
%$&/òL
È^£(iw,
Computer networks
14
Encryption for data storage
secret
data
secret
data
11 Aug 2014
encrypt
encrypt
D(£ò§*
+]dH
decrypt
secret
data
D(£ò§*
+]dH
decrypt
%£)(“84
jhgds?ì
Computer networks
15
Digital signature







Law 82/2005
Private key for encrypting
Public key for decrypting
Keys given by certification authorities
Combination with PEC
Keys expiration
Temporal mark
11 Aug 2014
Computer networks
16
Digital signature
document
document
encrypt
G#4$h
&à?-2y
decrypt
document
document
2?=zx:-ki
false
document
encrypt
Y&”:ò[
fgj?’^d
decrypt
2?=zx:-ki
2?=zx:-ki
11 Aug 2014
Computer networks
17
Comparison with handwritten signature
Who can sign
Digital signature
Handwritten signature
Needs keys from certification
authority and proper tools
Everybody instantly
Who can verify Everybody (with proper tools)
Handwriting analysts
Verification
reliability
Sure for some years
Subjective in dubious cases,
no time limit
Temporal
duration
Some years (can be renewed)
Until other reliable signatures
are available
Mass
signatures
Some seconds for all
documents (with proper tools)
Some seconds per document
Objective if temporal mark
Based on other subjective
elements (paper’s and ink’s
age)
Date reliability
11 Aug 2014
Computer networks
18
Electronic vs digital signature

Electronic signature


Qualified electronic signature


automatic signature through username and
password
and a certification authority guarantees it
Digital signature

and uses encryption
11 Aug 2014
Computer networks
19
Passwords
11 Aug 2014
Computer networks
20
Passwords

What can be done with your password?






11 Aug 2014
Steal personal data
Steal other people’s data
Steal money
Delete and modify data
Steal identity
Start illegal activities
Computer networks
21
Passwords


Most people have the following passwords:
password
dragon
monkey
123456
pussy
696969
12345678
baseball
abc123
1234
football
12345
qwerty
letmein
A standard computer can try 4 billion passwords per
second
11 Aug 2014
Computer networks
22
Passwords

Law 196/2003




Better also:






Avoid personal data in the password
Change password every 6 months (3 if sensitive data)
Minimum 8 characters
Mix letters, strange characters and numbers
Do not use words
Use different passwords for different purposes
Beware of passwords stored in programs
Test your password robustness on
https://howsecureismypassword.net
What to do in case of employee’s absence
11 Aug 2014
Computer networks
23
Alternatives to password

Law 196/2003 allows biometric identification methods

fingerprints

hand palm

retina scanning

voice identification
11 Aug 2014
Computer networks
24
Extra security

Adding physical methods to standard password

smartcard

token key

OTP with display

OTP USB

phone SMS

phone call
11 Aug 2014
Computer networks
25
Viruses

What does a virus do?





Infect
Survive
Duplicate
Damage
Virus infection symptoms



11 Aug 2014
computer is slow to start
unwanted and annoying pop-ups
many system errors
Computer networks
26
Viruses

User’s responsible behaviors







downloaded files and email attachments
CD, DVD, USB pendrives
strange websites
updated programs
updated antivirus
beware when installing free programs!
Anti-viruses



11 Aug 2014
Checking the whole hard disk
Checking suspect files
Always running
Computer networks
27
Types of viruses

Trojan horse


Key logger


displays advertisement
Spyware


opens a port on your computer (to let external users in)
Adware


records your keyboard activity (to get passwords)
Back door


looks like a good program
spies your activity (to get passwords or for spam targeting)
Ransomware

11 Aug 2014
demands money to avoid damage or justice problems
Computer networks
28
Spam

“unsolicited” “unwanted” “bulk” email








Advertisement: gambling, pornographic websites,
medicines, risky investments, software…
Chain letters
Frauds
Phishing
Sender is always counterfeited
Do not click on links! Do not answer!!!
Where do they get my email address?
Antispam and blacklists
11 Aug 2014
Computer networks
29
Phishing
11 Aug 2014
Computer networks
30
Phishing
11 Aug 2014
Computer networks
31
Phishing example






2,000,000 emails sent
5% arrive to existing users: 100,000
5% of users read the email: 5,000
2% of readers believe in the email: 100
$1,200 from each user
 Gain: $120,000
In 2005 Mr. David Levi gained $360,000 from 160
people using Phishing on eBay website
11 Aug 2014
Computer networks
32
Safe navigating

Navigation security


Phishing
Viruses




Intercept your data

11 Aug 2014
Download  Save  Antivirus  Open
Avoid visiting and downloading from untrustworthy
websites
Keep Explorer and Windows up-to-date
Secure connection SSL: httpS
Computer networks
33
Attacks from outside

Denial of Service


Firewall





zombie computers
which internal program
which external address
what amount of traffic
which kind of data
Windows Seven Firewall
11 Aug 2014
Computer networks
34
Backup

Why backup?
9%
3%
Hardware failure
6%
Human error
40%
Software corruption
Viruses
13%
Theft
Hardware destruction
29%
Source: The Cost of Lost Data. The importance of investing in that “ounce of prevention” by David M. Smith
11 Aug 2014
Computer networks
35
Backup

Law 196/2003


What to backup?





backup every week
Your data files
emails, contacts, calendar
Program configuration files
Difficult-to-find stuff
Where to backup?



11 Aug 2014
another hard disk
online backup systems: Dropbox, GoogleDrive, Box, Amazon
RAID techniques
Computer networks
36
RAID – Redundant Array of Independent Disks

JBOD – Just a Bunch Of Disks


RAID 0



2 disks but space as for 1, safe vs crash, 24h service
Most common solution
RAID 10


2 disks, fast
RAID 1


2 disks
4 disks but space as for 2, fast, safe vs crash , 24h service
None of these techniques is safe versus viruses or
human errors!
11 Aug 2014
Computer networks
37
JBOD
11 Aug 2014
Computer networks
38
RAID 1
11 Aug 2014
Computer networks
39
RAID 0
11 Aug 2014
Computer networks
40
RAID 10
11 Aug 2014
Computer networks
41