Keamanan Informasi 2 Pertemuan 5
Keamanan Informasi 2 Pertemuan 5
PERTEMUAN 5
REFERENCES
1. CRYPTOGRAPHY BASIC BY William Stallings
Computer and Network Security
Techniques
To guard against the baneful influence exerted by
strangers is therefore an elementary dictate of savage
prudence. Hence before strangers are allowed to enter a
district, or at least before they are permitted to mingle
freely with the inhabitants, certain ceremonies are often
performed by the natives of the country for the purpose of
disarming the strangers of their magical powers, or of
disinfecting, so to speak, the tainted atmosphere by which
they are supposed to be surrounded.
—The Golden Bough
Sir James George Frazer
—The Art of War
Sun Tzu
Virtual Private Networks and IPSEC
Host B
Host A IPSEC Outer IP
Processing Header is
Needed? Stripped
Key Management
IPSEC key management involves the
determination and distribution of secret
keys.
IPSEC supports 2 types of key management
• Manual – requires a system administrator
to manually configure the systems and
corresponding keys
• Automated – no human intervention needed
and enables on-demand creation of keys
IPSEC and VPNs
thereis a driving need for users and organizations to be
able to:
secure their networks
receive traffic over the internet while still meeting the need to
secure the network
Ipsec and VPNs
IPsec
provides • can be implemented in
the network routers or firewalls owned
manager and operated by the
with organization
• a service provider can
complete simplify the job of planning,
control implementing, and
over the maintaining Internet-based
security VPNs for secure access and
aspects of secure communication
VPN
Application layer security
SSL – Secure Socket TLS – Transport
Layer Layer Security
general purpose service RFC 2246
designed to provide a basically an updated
reliable end-to-end secure service from SSL that
service provides reliable end-
set of protocols that relies to-end secure data
on TCP transfer
• could be provided as part of
the underlying protocol suite
and transparent to
applications
• can be embedded in specific
packages
SSL Architecture
(Two Important SSL Concepts)
SSL Connection
SSL Session
Pending
Alert and Handshake
Protocols (see Fig. 24.2 shown previously)
Alert Protocol (ex. Incorrect MAC)
conveys SSL related alerts to the peer entity
compressed and encrypted
Handshake Protocol
most complex part of SSL
allows server and client to authenticate
negotiates encryption and MAC algorithm as
well as the keys
used before the transmission of any
application data
Wi-Fi Protected Access
Wi-Fi Protected Access is also known as
WPA
is the Wi-Fi standard
a set of security mechanisms created to
accelerate the introduction of
strong security into WLANs
WPA
Based on the IEEE requires the use of an
802.11i standard Authentication Server
addresses 3 main (AS)
security areas PSK (pre-shared key)
does not require an AS
defines a more robust
Authentication authentication
protocol
Key management Supports AES with
128-bit keys and 104-
Data transfer privacy bit RC4 encryption
schemes
802.11i Operational Phases
3 Main Ingredients for WPA
Access
Control Pr
i
it o
n M vac
t ic a In ess y w
n te ag i th
the gr e
ity
Au
802.11i Access Control
Privacy with Message Integrity
IEEE 80211i defines two schemes
both add a message integrity code (MIC)
to the 802.11 MAC Frame
monitors monitors
characteristics of characteristics of
events on a single events on the
host network
IDS Components
Authentication facilities
Access Control facilities
Firewalls
IDS
Intruder Behavior Profiling
Host-Based IDS Techniques
can detect both external and internal intrusions.
Direction Control
User Control
Behavior Control
A GD scanner contains:
• CPU Emulator
• Virus Signature Scanner
• Emulation Control Module
Digital Immune System
Behavior-Blocking Software