internetinės paslaugos ir sauga. linas bukauskas
TRANSCRIPT
1 / 17
Internet Services and Security
Vilnius UniversityFaculty of Mathematics and Informatics
dr. Linas Bukauskas
2 / 17
Outline
● Essentials of internet
● Internet services
● How does internet work?
● Practical examples
– How you are tracked by cookies
– How you can be spied
– other
3 / 17
History
● 1962 - J.C.R. Licklider of MIT discussing his "Galactic Network" concept
● 1969-1970 – ARPANET 50 kbit/s
● 1971 – Email with 75% of bandwidth
● 1973 – FTP
● 1977 – NVP predecessorof VoIP.
● 1980-1990 – CommercialISP
4 / 17
History (cont‘d)
● 1983 – TCP/IP
● 1980 – Hypertext concept (Gopher)
● 1980 – FDDI predecessors (CDDI)
● 1990 – web browser Mosaic/Netscape
● 1991 – UUCP/DMAIL in Lithuania (HoP-Seimas)
● 2015 – RAIN Lithuana FiberTo The Home (FTTH)
● Now – 2/3/4G LTE radio
5 / 17
Broadband Internet
● According to ES/EEC documents from 244 kB/s
– Cisco suggest that: the monthly traffic of the world’s average Internet user will increase from 3.36 gigabytes in 2012 to 24.8 gigabytes by 2015;
– global IP traffic is set to increase from 30.7 exabytes per month to 109.5 exabytes per month from 2011 to 2016.
– 1 EB = 10^18 bytes = 1000000000000000000B
6 / 17
Broadband Internet FTTH
7 / 17
OSI Layer
8 / 17
By design is non-secure
● Internet by design is not secure environment
● 90% of services are simple WebSites
● Additional software is needed „to be secured“
9 / 17
Layer Encapsulation
BOB
ALICE
10 / 17
MITM
BOB
ALICEPIRATE
11 / 17
Global View
12 / 17
Global View
13 / 17
National View (FO + GRID)
14 / 17
15 / 17
Internet Over Sattelite
http://www.thinglink.com
16 / 17
Practical examples
● How you are tracked what you browse
– Cookies and hidden elements of website ● How you can be spied when you use network
– Mounting a „Man in the middle“ attack● Other
17 / 17
Conclusions● By design, internet is non-secure place
● Internet connectivity is increasing rapidly
● You have to be aware of „how you work ...“