COMP 100 Lecture Notes

Chapter 7, Part 2 : Network Security and Risks

Hacking

Identity Theft

How can someone "steal" your identity? Let's focus on those that involve computers

Malicious software: malware

How do you get malware via the network?

How can you prevent this?

WiFi Risks

WiFi is really convenient but beware of the risks

Risks of using WiFi away from your home network

Here's a screen capture I made in November 2009 while waiting in Chicago O'Hare airport (for yet-another late flight)

My WiFi card has detected three available wireless networks:

Risks of operating a Wireless Access Point or Router on your home network

Securing your home wireless access point or router

User authentication methods restrict access based on:

Secure Internet transmission of sensitive data

Have you made a credit card purchase from a Web site?

When a web page prompts you to enter sensitive information, look at the protocol part of the URL (upper left corner of browser window). If it is https:// then the information will be encrypted for transmission, using a secure transmission service called Secure Sockets Layer (SSL). If it is regular http://, do not continue the transaction online.

Cryptography

Encryption methods hide information through combination of Special knowledge called the key is required to encrypt and decrypt

There are two basic strategies concerning keys

Classic example of secret key cryptography is Caesar Cipher

Classic example of public key cryptography is RSA or variation

E-commerce simply would not be possible without public key cryptography! HTTPS is based on it also.

Criminals and terrorists also benefit, since no one can read their encrypted messages