Tuesday, July 28, 2009
I'll explain how to install PGP and the function of that particular software in network security...PGP is from a word Pretty Good Privacy, it is a public key enryption program originally written by Phil Zimmermann in 1991.Why PGP?For me, it is to secure email on internet because email is personal and it's private, beside that we don't want our private email or confidential documents read by anyone else. The advantages of PGP are language support and is available for many different platforms including Windows, Unix, MS DOS, OS/2, Macintosh and so on. After I do a research, the latest version of international freeware versions of PGP os 6.5.1i for Windows 95/98/NT and MacOS only while 5.0i for other platform.PGP works by combines some of the best features of both conventional and public key cryptography.PGP will compresses the plaintext that had been encrypt by user and creates a session key(secret key). Then after data is encrypted, the session key is then encrypted to the recipient's public key and transmitted along with the ciphertext to the recipient.
We can download PGP installer from www.pgpi.org,version 6.5.8.
Step 1 : Unzipped installer
Step 2 : Double click to start install. At Welcome window.Click [Next].
Step 7 : Click [Next]
Step 8 : The next window asks whether you have existing keyrings you wish to use. Click [No].
Monday, July 27, 2009
There are two type of crptography -> substitution and transportation. Substitution is use by use one letter to refer to another letter. This substitution divided by two type, monoalphabetic(use same letter for the whole message) and polyalphabetic(use different letter in whole message).While transportation is use by change the arragement of text and letter. This method can be divided by key and unkeyed..
example what i learn in class is:
1 2 3 4 5 6 7 8 9 10
1 T H E R E I S N O S
2 E C U R I T Y O N T
3 H I S E A R T H T H
4 E R E I S O N L Y O
5 P P O R T U N I T Y
Conclusion: for unkeyed single transportation can be develop into a matrix of 10(vertical) by 5(horizontal). This step can be try on keyed single transportation just by using matrix 10 but do not in sorting.
this is some terms that need to memorize such as :
- Vigenere Ciphers - we must know the manual polyalphabetic cipher to perform encryption
- Simple substitution ciphers (random) - is use for random aphabet tp improve caesar ciphers.
Other thing that i learn today is about MAC, Message Authentication Codes is key-dependent one way hash function.It accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs.MAC protects both a message's data integrity as well as its authenticity.While digital signiture is use for message from particular sender and cryptography value that depends on message and sender.A digital guarantee that information has not been modified, as if it were protected by a proof seal that is broken if the content were altered.
RSA is the algorithm was publicly described in 1978 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT.The letters RSA are the initials of their surnames, listed in the same order as on the paperis an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography (taken from wikipedia website).
Wednesday, July 22, 2009
What i'm understand about IT security goals is to provide strong network logon authentication and at the same time reduce the and help desk costs that are associated with supporting users who forget their passwords or who let their passwords expire.Besides that, to preventing users from downloading or from using nontrusted and nonsigned content from the Internet. Sometimes, IT security use to provide availability, integrity,confidentiality and nonrepudiation for general business e-mail messages. I will explain about availability, integrity and confidentiality after this. Let me explain about the different between NTFS and Fat32.
Fat 32 is old file system that is simple, but if need to access from DOS or win9x, this Fat32 is suitable. Is also well-documented, readable from a large number of OSs, and supported by a wide range of tools while a newer file system that is faster, safer, space efficient, feature-rich, proprietary, undocumented at the raw bytes level, and subject to change - even within Service Packs of the same OS version. To get detail, refer to this website http://cquirke.mvps.org/ntfs.htm.
The differentiate between availability, integrity,confidentiality :
CONFIDENTIALLY -
Means that, computer or asset cannot being used by other unauthorized person because it is privacy and secrecy.
Example : there are two user had been created. User1 do not have authority to see,modified or do anything to User2 folder or file.Only User2 have authority can do anything to their computer or assets.
AVAILABILITY -
Means that, user can access their own file or information anytime they want without a failure and it remains available or secure.
Example : User1 can access their own information anytime they want but User2 cannot do anything eventhough User1 had been removed or delete by administrator.
INTEGRITY -
Means that, only own user can do any changes to their data.
Example : User1 can added, deleted or updated their data. User1 can only do the task that been set by administrator.
Let me explain how to convert from FAT disk into NTFS.There are a few step :
- Log on Windows 2003 Server as Administrator.
- Click [Start] and after that Click [Run]
- Type cmd to open command line at type chkntfs d: Notes : You will get a message "D: is not dirty"
- Then type convert d: /fs:ntfs. If the drive has a volume label, enter it when prompted.
- Type chkntfs d : to verify that drive is now NTFS.
- Finish.
Monday, July 20, 2009
Some of people is very familiar with authentication, as you know it is something that verification of our identity as security to some data...Such as login for some application which we need to insert our username and password..Besides, we use smart card, passport, biometrics system, signature, retina or use voice to verification. All this kind of technique only for one purpose, protection from atacker.
Below is an example that we need to protect our password..
- 1st thing, do not show password to anybody. Example : cannot write password anywhere and login the password only at a secure places.
- Important to find a password that is easy for us to remember but difficult to guess by others.
- Create password more that six character(especially using combination of number and alphabets)
- Do not use familiar information such as names, birthday,phone number, plate numbers or family names
- Others
What best part of lecture today, we learned how to guess other passwords.
- Use default passwords to guess.
- Use short word and easy character to guess
- Use all the words in an electronic dictionary(60,000).
- Hm how about collect information about the user name, family names, birthday, so on.
- Guess user’s phone number, social security number, street address.
- Guess license plate numbers
- Use a Key Looger or Trojan horse so we can keep track what had been type by users.
- Lastly, tap the line between a remote user and the host system.
General meaning of cryptography is about how to get secret writing..It also about the plaintext and ciphertext.
Sunday, July 19, 2009
En. Zaki
?? IT Security??
For me, IT security is about the need of information which can prevents hackers from attacking our Web site but importance thing, we must know tools such as cryptography and firewall. If we are expert in this area, it is something good because it will become as career opportunities and importance of IT security. From day to day, belong to our country, we can see the increasing demand by government and private industry.
What I’m learned ………………..
WM8S
What IT Security
protection of information, system, software, hardware ffrom danger and hacker.
Method of defense
Prevent, deter , deflect, detect, recover
Control –Encryption, software or program controls, hardware control, policies & procedure control, physical control
Security Trends
Attack Sophistication increase from year to year.
Security Area
Detection(using scanner),prevention(proxy, firewall),recovery(cryptography techniques and proper planning)
Security Architecture
defined by ITU-T Recommendation X.800 or OSI Security Architecture and developed as an international standard to structured definition of services and mechanisms.
Security Principles
Confidentially, integrity and availability
Security Policy
set of rules includes of authorization, access control policy and accountability.
Security Attacks/ Threats
Passive Attack (to obtain data that being transmitted) vs Active Attack (to obtain authorization)
Security Services
defined by X.800 and RFC 2828. Categories : Data Integrity, authentication, data confidentially, non repudiation, access control
Security Mechanisms
Any process that is designed to detect, prevent or recover from a security attack.Two classes :

Wednesday, July 15, 2009
- Download VMware Workstation from http://www.vmware .com/download/ws/
- Double click on VMware launcher to start the installation wizards
- Click on [Next]
- Choose Typical setup type
- Choose location for VMware Workstation installation.Click on [Next].
- Configure the shortcuts for VMware Workstation and Click on [Next].
- Click on [Install]
- Enter serial number of VMware Workstation.
- Click [Finish] and restart the Computer.

1.Create new Virtual Machine to open the Virtual Machine wizard. Click [Next]
2.Choose the typical configuration, click [Next]
3.Choose the type of OS to be installed on the Virtual Machine.
4.Then install Windows Server 2003 to virtual machine, select [Microsoft Windows] as the guest.
5.Select Windows Server 2003 Standard Edition in version list.
6.Click [Next]
7.Name the virtual machine and specify the location where the disk image for virtual machine will be stored in the hard disk.
8.Select [Use host-only Networking], to create LAN between other virtual machine.
9.Select [Use bridged networking]. Click [Next]
10.Specify the disk capacity of the virtual machine depends on your size of PC.
11.Select [Allocate disk space now].
12.Click [Finish]Notes : Virtual Machine residing on the image that can be cloned and copy from one host to another host by simply drag and drop.