web browsing cryptography vpn pgp
play

Web Browsing, Cryptography, VPN, PGP Week 5 Frank Chen | Spring - PowerPoint PPT Presentation

Keybase, a company that strives to provide everyone with GPG CS 88S Web Browsing, Cryptography, VPN, PGP Week 5 Frank Chen | Spring 2017 Frank Chen | Spring 2017 Agenda Review last weeks material How the Internet Works, abridged


  1. Keybase, a company that strives to provide everyone with GPG CS 88S Web Browsing, Cryptography, VPN, PGP Week 5 Frank Chen | Spring 2017 Frank Chen | Spring 2017

  2. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  3. Mid-Quarter Feedback & Final Project Frank Chen | Spring 2017

  4. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  5. A typical Authentication Session AUTHENTICATED! PASSWORD If YES Proceed to your personal STORED ONLINE information/profile LOGIN SCREEN (SHA-1 HASH) Username : fc1995 Hash the fc1995: Password : earl123 Input 4cf39465730e75ebbec21 Password c67facaba7a08d82f0f DENIED! If NO Do the two match? Try again. Frank Chen | Spring 2017

  6. A typical Dictionary Attack RETRIEVED THE PASSWORD PASSWORD FROM If YES PASSWORD File Proceed to use the DICTIONARY password to login to your (SHA-1 HASH) account ...Dog, Dogs, Dogcatcher, Hash the fc1995: Dogcatchers, Dogberry, Input 4cf39465730e75ebbec21 Dogberries, Dogma, CONTINUE! c67facaba7a08d82f0f Password Dogmatic, Dogmatized, If NO Dog1. Dog2, Dog3, Dog4... Dictionary Attacks can Do the two hashes match? submit up to 1000 attempts per minute Frank Chen | Spring 2017

  7. Password Managers Frank Chen | Spring 2017

  8. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  9. What happens when you type www.google.com ? Frank Chen | Spring 2017

  10. 1 2 3 4 5 6 7 What happens when you type www.google.com ? Frank Chen | Spring 2017

  11. 1 2 3 4 5 6 7 Using a Browser Def: A Program installed on your computer that allows you to visit websites. Frank Chen | Spring 2017 Source: http://bit.ly/2oX9Gwr

  12. 1 2 3 4 5 6 7 There are many Browsers Frank Chen | Spring 2017

  13. 1 2 3 4 5 6 7 Browser checks cache Def: The browser cache is a temporary storage location on your computer for files downloaded by your browser to display websites. Frank Chen | Spring 2017

  14. 1 2 3 4 5 6 7 Browser checks cache Frank Chen | Spring 2017

  15. 1 2 3 4 5 6 7 Browser asks OS for IP Address Def: Operating System (OS) is the software that supports a computer's basic functions Frank Chen | Spring 2017

  16. 1 2 3 4 5 6 7 Browser asks OS for IP Address Def: Internet Protocol (IP) Address is a unique string of numbers separated by periods that identifies each computer Ex. 172.217.11.78 (Google's IP Address) Frank Chen | Spring 2017

  17. 1 2 3 4 5 6 7 OS makes DNS Lookup for IP Def: Domain Name System (DNS) Lookup translates the domain name into an IP address your browser can use Frank Chen | Spring 2017 Video: http://bit.ly/1jld0uV

  18. 1 2 3 4 5 6 7 Browser sends HTTP request Def: The Hypertext Transfer Protocol (HTTP) is the foundation of data communication for the World Wide Web Note: OSI Model-related subjects, TCP and UDP are out of scope for this course. Frank Chen | Spring 2017

  19. 1 2 3 4 5 6 7 Browser reads response from server Def: Client/Server Model - A server host runs programs to share resource with clients. A client does not share resources, but requests a server's content or service function. Frank Chen | Spring 2017

  20. 1 2 3 4 5 6 7 Browser reads response from server Def: The server's Response to the client includes the status code, such as 404 Not Found, or 200 Successful. Frank Chen | Spring 2017 List of HTTP Status Code: http://bit.ly/2ptqwnG

  21. 1 2 3 4 5 6 7 Frank Chen | Spring 2017 List of HTTP Status Code: http://bit.ly/2ptqwnG

  22. 1 2 3 4 5 6 7 Browser renders page to display Def: The response from server contains HTML, CSS, Javascript, images, and all resources needed to render a webpage for the client. Frank Chen | Spring 2017

  23. 1 2 3 4 5 6 7 Frank Chen | Spring 2017

  24. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  25. Cryptography Def: Constructing and analyzing protocols that prevent third parties or the public from reading private messages Frank Chen | Spring 2017

  26. Symmetric Key Cryptography Def: Algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext Frank Chen | Spring 2017 Source: http://bit.ly/2ppmeiW

  27. The Key Exchange Problem Frank Chen | Spring 2017

  28. The Trust Problem Frank Chen | Spring 2017

  29. Scalability Frank Chen | Spring 2017

  30. Public Key Cryptography Def: Cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. Frank Chen | Spring 2017

  31. Public Key Cryptography Authentication Encryption Public key is used to whereby only the holder of verify that a holder of the paired private key can the paired private key decrypt the message sent the message encrypted with the public key Frank Chen | Spring 2017

  32. Symmetric Key Key used to unlock and lock the drawer Frank Chen | Spring 2017 Source: http://bit.ly/1I2YUeS

  33. Public/Private Key Private Key turns Public Key turns only only clockwise counter-clockwise Frank Chen | Spring 2017 Image Source: http://bit.ly/1I2YUeS

  34. How do you verify someone on the Internet? Frank Chen | Spring 2017

  35. Pretty Good Privacy (PGP) Def: PGP is a program used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications GnuPG is the free version of PGP Frank Chen | Spring 2017 Source: http://bit.ly/2pCWEp7

  36. Demo Frank Chen | Spring 2017 Source: http://bit.ly/2qrJgDs

  37. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  38. Virtual Private Network (VPN) Def: VPNs allow users to securely access a private network and share data remotely through public networks. Much like a firewall protects your data on your computer, VPNs protect it online. Frank Chen | Spring 2017

  39. Virtual Private Network (VPN) Internet Websites, You Service Resources Provider (ISP) Frank Chen | Spring 2017

  40. Virtual Private Network (VPN) Internet Websites, You Service Resources Provider (ISP) VPN Tunnel Frank Chen | Spring 2017 Source: http://bit.ly/2qBrNZh

  41. UCLA VPN Demo Frank Chen | Spring 2017

  42. Should you use a VPN? Frank Chen | Spring 2017

  43. Pro Con ● ISPs cannot track you ● Ads on free VPNs ● Good for protection in ● VPNs still log your public Wi-Fi setting activity ● Network traffic ● Slow Internet Traffic always encrypted Frank Chen | Spring 2017 Source: http://bit.ly/2qyFTuD

  44. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  45. Proxy Server Def: A server set up as intermediary for the client and server Using a Proxy can allow a user to spoof their IP address Frank Chen | Spring 2017

  46. Hide My Ass Demo Frank Chen | Spring 2017 Source: https://www.hidemyass.com/proxy

  47. Difference between Proxy and VPN? Frank Chen | Spring 2017 Source: http://bit.ly/2pS9liS

  48. Agenda ● Review last week’s material ● How the Internet Works, abridged ● Cryptography/PGP ● How does a VPN Work? ● What is Proxy Browsing? ● Wireshark Demo Frank Chen | Spring 2017

  49. Wireshark Frank Chen | Spring 2017

  50. S�f��� �� ��� C���� T�� Always use HTTPS or VPN Source: Source: https://www.eff.org/ http://bit.ly/2p5R4KX https-everywhere Frank Chen | Spring 2017

  51. Authy, a 2-Factor Authentication Application Next Week... Frank Chen | Spring 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend