Obfuscation - CompTIA Security+ SY0-701 - 1.4

Professor Messer
2 Nov 202308:00

Summary

TLDRThis video script delves into the concept of obfuscation, illustrating how data can be intentionally obscured while remaining in plain sight. It explores steganography, the art of hiding information within images or other media, and discusses its vulnerabilities. The script also covers tokenization, a method of replacing sensitive data with tokens for secure transmission, and data masking, which conceals parts of sensitive information to protect it from unauthorized access. The explanation of these techniques provides insight into the balance between security and accessibility.

Takeaways

  • πŸ”’ Obfuscation is the process of making something difficult to understand that was originally clear.
  • πŸ”„ Knowing the method of obfuscation allows one to reverse the process and retrieve the original data.
  • πŸ‘€ Information can be hidden in plain sight, recognizable only to those who know the hiding method.
  • πŸ–ΌοΈ Steganography is a form of obfuscation that hides data within images, like a 'covertext'.
  • πŸ” Security through obscurity is not reliable as the data can be easily recovered if the hiding process is known.
  • 🌐 Steganography extends beyond images, including media like network traffic, audio, and video files.
  • πŸ–¨οΈ Printers use nearly invisible yellow dots, or machine identification codes, for steganographic purposes.
  • πŸ’³ Tokenization replaces sensitive data with a token, which can be safely transmitted without encryption.
  • πŸ›’ Mobile payments often use one-time-use tokens derived from credit card numbers for secure transactions.
  • πŸ”„ Token service servers provide and manage tokens for secure transactions, invalidating them after use.
  • πŸ’³ Data masking, such as showing only the last four digits of a credit card number, is used to protect sensitive information from being exposed.

Q & A

  • What is obfuscation and why is it used?

    -Obfuscation is the process of making something that is normally easy to understand more difficult to comprehend. It is used to hide information in plain sight, so that only those who know how it was obfuscated can access the original data.

  • How does one reverse the process of obfuscation?

    -If you know the method used to obfuscate the data, you can reverse the process and regain access to the original information.

  • What is steganography and where does its name originate from?

    -Steganography is a type of obfuscation where information is hidden within an image or other media. The term comes from the Greek language and means 'concealed writing'.

  • How is security through obscurity different from actual security?

    -Security through obscurity relies on the secrecy of the process used to hide data. If someone discovers this process, the data can be easily recovered, making it not a secure method of protection.

  • What is meant by 'covertext' in the context of steganography?

    -In steganography, 'covertext' refers to the document or medium that contains the hidden data.

  • Can steganography be used in forms other than images?

    -Yes, steganography can be applied to various types of media, including network traffic, audio files, and video files.

  • What are machine identification codes and how are they used?

    -Machine identification codes, often represented by yellow dots on printed pages, are used to identify the printer used for printing. If one knows the format of these dots, they can match them back to the specific printer.

  • How does audio steganography work?

    -Audio steganography involves hiding information within an audio file or track, making it undetectable to the human ear but recoverable if one knows the method of embedding.

  • What is tokenization and how is it used to protect sensitive data?

    -Tokenization is a process where sensitive data is replaced with a token, a stand-in value. This token can be used in transactions instead of the actual sensitive data, protecting it from being misused if intercepted.

  • How does the credit card tokenization process work during a mobile payment?

    -During mobile payments, a temporary token is created from the credit card number and sent across the network for the transaction. This token is one-time use and cannot be reused, ensuring the security of the transaction.

  • What is data masking and why is it used on receipts?

    -Data masking is a technique where parts of sensitive information, like a credit card number, are hidden, typically showing only the last four digits. It is used to prevent unauthorized access to the full number and protect the customer's information.

  • How does a company limit access to sensitive credit card information?

    -Companies can limit access to sensitive information by allowing only certain employees to view the full credit card number, while others may only see a portion of it or have it masked.

  • What are some alternative methods to data masking using asterisks?

    -Alternative methods to data masking include rearranging the numbers or replacing certain digits with others that can be reversed later on, ensuring the original data remains secure.

Outlines

00:00

πŸ”’ The Art of Data Obfuscation and Steganography

This paragraph introduces the concept of obfuscation as a method to intentionally complicate the understanding of easily comprehensible information. It explains that while data is hidden in plain sight, those familiar with the obfuscation technique can reverse the process to retrieve the original data. Steganography is highlighted as a popular form of obfuscation, with its Greek origin meaning 'concealed writing'. The paragraph also discusses the use of steganography in various media, including images, network traffic, and printer identification codes, and touches on the limitations of security through obscurity.

05:00

πŸ’³ Credit Card Tokenization and Data Masking

The second paragraph delves into the process of credit card tokenization, a security measure where sensitive data is replaced with a non-sensitive token. It describes the registration of a credit card with a mobile phone, the generation of tokens by a token service server, and the use of these tokens during transactions. The paragraph also explains the one-time use of tokens and the subsequent disposal after a transaction. Additionally, it covers data masking techniques used on receipts and in customer service interactions to protect credit card information, illustrating the importance of limiting access to sensitive data and the methods employed to obscure it.

Mindmap

Keywords

πŸ’‘Obfuscation

Obfuscation refers to the deliberate act of making something that is normally clear and understandable more difficult to comprehend. In the context of the video, it is a technique used to hide information in plain sight, where only those who know the method of obfuscation can decode the original message. The script discusses various forms of obfuscation, such as steganography and tokenization, as methods to conceal data.

πŸ’‘Steganography

Steganography is a technique used to conceal information within another medium, such as an image, audio, or video file. It is derived from the Greek language, meaning 'concealed writing.' The video script explains that data can be hidden within an image, making it invisible to the naked eye but recoverable if one knows the method of embedding. It is an example of security through obscurity, which is not considered robust security on its own.

πŸ’‘Covertext

In the context of steganography, 'covertext' refers to the document or medium that contains the hidden data. The video script uses the term to describe an image that appears normal but actually contains embedded information. The covertext serves as a disguise for the true content, which can only be revealed through the knowledge of the specific steganographic technique used.

πŸ’‘Machine Identification Codes

Machine Identification Codes, as mentioned in the script, are nearly invisible watermarks that are printed by certain printers, such as laser printers. These yellow dots contain information that can be used to identify the specific printer used for the output. The script uses this as an example of how steganography can be applied in physical documents, with the dots being an example of data hidden in plain sight.

πŸ’‘Tokenization

Tokenization is a process where sensitive data, such as a Social Security number or credit card number, is replaced with a non-sensitive equivalent, known as a token. The video script explains that this process allows for the secure transmission of data across networks without the need for encryption, as the token has no practical use to an unauthorized party. It is used in everyday transactions, such as mobile payments, to enhance security.

πŸ’‘Data Masking

Data masking is a security technique that involves hiding parts of sensitive information, such as a credit card number, while still allowing the essential parts to be visible for verification purposes. The script illustrates this with the example of a receipt showing only the last four digits of the credit card number. This practice helps protect sensitive data from being misused if the receipt is lost or stolen.

πŸ’‘Credit Card Token

A credit card token, as described in the script, is a temporary and unique identifier that replaces the actual credit card number during a transaction. This token is used to ensure that even if the data is intercepted during transmission, it cannot be used for fraudulent activities because it is not the actual credit card number. The script explains that this token is a one-time use and is discarded after the transaction is completed.

πŸ’‘Near-Field Communication (NFC)

Near-Field Communication, or NFC, is a technology that enables the transfer of data between devices over a short distance. In the context of the video, NFC is used during the checkout process to transfer the payment token from a mobile device to the payment system. This contactless technology facilitates secure and convenient transactions without exposing the actual credit card information.

πŸ’‘Token Service Server

The Token Service Server, as mentioned in the script, is a remote server responsible for generating and managing tokens for sensitive data. When a credit card is registered for mobile payments, this server provides a series of tokens that are stored on the user's device. The script explains that the merchant sends the token to this server during a transaction, which then performs a reverse lookup to determine the actual credit card number for processing the payment.

πŸ’‘Security Through Obscurity

Security through obscurity is a term used to describe a security measure that relies on the secrecy of the implementation or the algorithm rather than on the strength of the security measures themselves. The script points out that while steganography can be a form of security through obscurity, it is not considered a strong security practice because if the method of hiding the data is discovered, the data can be easily retrieved.

πŸ’‘Audio Steganography

Audio steganography is a form of steganography where information is hidden within an audio file or track. The script briefly mentions this as another medium where data can be concealed, similar to how it is done with images. This method takes advantage of the human auditory system's inability to detect slight alterations in sound that can encode data.

πŸ’‘Video Steganography

Video steganography is the practice of hiding information within a video file. The script suggests that a video can contain a significant amount of hidden data, which can be extracted if one knows the specific method used for embedding. This form of steganography is an example of how multimedia content can be used to conceal data for various purposes.

Highlights

Obfuscation is the process of making something difficult to understand that would normally be easy to comprehend.

If you know how obfuscation is done, you can reverse the process to access the original data.

Obfuscation hides information in plain sight, only recognizable if you know how it was hidden.

Steganography is a popular form of obfuscation that hides data within an image.

Steganography has Greek roots meaning 'concealed writing'.

Security through obscurity is not real security as the data can be easily recovered if the hiding process is known.

Covertext refers to the document containing hidden data, like an image with embedded information.

Steganography can be applied to various media forms beyond images, like network traffic or audio/video files.

Yellow dots on printed pages are machine identification codes used for steganography.

Inverting an image can make the yellow machine identification dots more visible.

Audio and video steganography can hide information within sound or visual media.

Tokenization is a form of obfuscation that replaces sensitive data with a token that references the original data.

Tokenization is used in mobile payments to transfer a one-time-use token instead of the actual credit card number.

Token service servers generate tokens and perform a reverse lookup to validate transactions.

Data masking on receipts hides parts of the credit card number for security.

Companies limit access to full credit card numbers to enhance security.

Different methods can be used for data masking, such as rearranging or replacing numbers.

Transcripts

play00:02

Obfuscation is a process, where you take something

play00:04

that normally would be very easy to understand,

play00:07

and you make it much more difficult to understand.

play00:10

As we step through this video, you'll

play00:12

get an idea of all of the different ways

play00:14

that you could take a bit of information or data

play00:17

and turn it into something that's not quite as

play00:20

clear as it could be.

play00:21

One of the interesting aspects of obfuscation

play00:24

is that if you know how the obfuscation is done,

play00:27

you're able to reverse the process and gain

play00:30

access to the original data.

play00:32

With obfuscation, you're effectively hiding information,

play00:35

but it's in plain sight.

play00:36

And only if you know how it was hidden,

play00:39

would you recognize that there's actually

play00:40

data contained within that object.

play00:43

One very popular kind of obfuscation

play00:45

is steganography, where we can hide information

play00:48

within an image.

play00:49

And somewhere in this image is some data

play00:52

that we would be able to recover if we knew how that data was

play00:55

originally stored.

play00:57

Steganography has its roots in the Greek language.

play01:00

And it stands for "concealed writing."

play01:02

It's a way to hide data in an image such as this one.

play01:05

We often refer to steganography as a type of security

play01:09

through obscurity, which means that if the process that

play01:12

was used to hide the data, you can very easily recover

play01:16

the data.

play01:17

And that's why we often mention that security through obscurity

play01:20

is not really security at all.

play01:22

So in this example, we've used a third party utility

play01:25

to take a bit of information and hide that information

play01:28

within the image itself.

play01:30

Obviously, looking at the image, you

play01:32

can't see any of the data that's stored within it.

play01:34

But it is really stored within the data containing

play01:38

this particular image.

play01:39

Sometimes you'll hear this image referred to as the covertext.

play01:43

The covertext is the document that contains the data

play01:46

that you're hiding.

play01:47

Of course, hiding information within an image

play01:49

is only one type of steganography.

play01:51

You can use steganography in many different types

play01:54

of media and forms.

play01:56

For example, you can hide information

play01:57

within network traffic and embed messages within TCP packets

play02:01

that you're sending across the network.

play02:03

This data is obviously sent a few bits or bytes at a time.

play02:07

And if you know how the data is being sent,

play02:09

you can reconstruct that data on the other side.

play02:12

We've already mentioned how easy it is to use steganography

play02:15

with an image to hide data.

play02:17

And one of the more interesting ways to hide information

play02:20

is by putting dots on a piece of paper.

play02:23

These are almost invisible watermarks

play02:25

that are included with laser printers

play02:27

and other types of printers.

play02:28

And if you look very closely at the printed page,

play02:31

you'll start to see little yellow dots appear.

play02:35

These yellow dots are referred to as machine identification

play02:38

codes.

play02:38

And if you know the format of these yellow dots,

play02:41

you can match that back to the printer that

play02:43

was used to print this output.

play02:45

This is a little bit difficult to see with the yellow dots

play02:48

on a white page.

play02:49

So let's invert the image.

play02:50

And now, you'll see blue dots on this black page.

play02:53

If you look closely at a laser printer output

play02:56

from your printer, you should be able to find those yellow dots

play02:59

somewhere on the printed page.

play03:01

Well.

play03:02

If you can store information inside of an image,

play03:04

you could certainly store information

play03:06

in other types of media.

play03:07

For example, you can have audio steganography,

play03:10

where you're hiding information within an audio file

play03:12

or an audio track.

play03:14

We can also use video steganography.

play03:16

So a video, such as this one can be

play03:18

used to hide a great deal of information

play03:21

within that particular file.

play03:23

A very popular form of obfuscation that we

play03:26

use every day is tokenization.

play03:28

This is where we take something that is sensitive data,

play03:31

and we replace it with a token of that sensitive data.

play03:35

For example, we can take a Social Security number, which

play03:37

is relatively sensitive information,

play03:39

change it into a completely different number.

play03:42

But behind the scenes, we're matching those two together.

play03:45

This means we can transfer the modified

play03:47

number across the network.

play03:48

And on the other side, it will make that switch

play03:51

to what the actual number might be.

play03:53

If someone did happen to capture information

play03:55

containing that token, they would not

play03:58

be able to use it for anything practical,

play04:00

because it is not an actual Social Security number.

play04:03

You may not realize it, but this is the same process

play04:06

that's occurring when you pay for items at the store

play04:08

with your mobile phone or your smartwatch.

play04:10

There is a temporary token that is created from your credit

play04:14

card number.

play04:14

And that token is what's sent across the network.

play04:17

This is a one-time use token, which

play04:19

means if somebody does capture that token during the transfer

play04:22

and then they try to use it again,

play04:24

that token will be denied because it can only

play04:27

be used once.

play04:28

This means that we can transfer this data across the network

play04:31

without needing to encrypt any of the data.

play04:34

Since we've replaced the sensitive credit card

play04:36

information with a one-use token,

play04:39

we can send this information across the network

play04:41

without needing to encrypt or hash any information.

play04:44

If anyone got their hands on this data,

play04:46

they wouldn't be able to do anything with it.

play04:48

And since it doesn't have any mathematical relationship

play04:51

back to your credit card number, it's completely safe

play04:54

to send across the network.

play04:56

Here's how this credit card tokenization process

play04:58

works behind the scenes.

play05:00

The first step is to register a credit card

play05:02

number on our mobile phone.

play05:04

When you perform that registration process,

play05:06

it reaches out to a remote token service server

play05:09

to register this credit card.

play05:11

At that time, this server is going

play05:12

to provide you with a series of tokens that will

play05:15

be stored on your local phone.

play05:17

Notice that the token is a very different number

play05:20

than the actual credit card number

play05:21

that we've registered on our phone.

play05:23

In most cases, we usually don't see this token at all.

play05:27

Although if you do look at a receipt,

play05:28

you may notice that the receipt is showing a credit card

play05:31

number that doesn't match the actual credit card number.

play05:34

Now that we've received these tokens,

play05:36

our phone is ready to be used during checkout.

play05:38

So we'll go to a store.

play05:40

And during the checkout process, we'll

play05:41

use near-field communication to transfer that token

play05:45

into the payment system.

play05:46

So instead of sending our actual credit card number,

play05:49

we are now paying with one of the tokens

play05:51

that we originally received from the token service server.

play05:55

The merchant then sends that token

play05:57

to the token service server.

play05:58

And it does a reverse lookup to determine

play06:01

what the actual credit card number happens to be.

play06:03

Now that this system knows the actual credit card number,

play06:06

it can check to validate that you have the proper funds

play06:09

or credit to be able to perform this transaction.

play06:12

It validates the token and approves the transaction

play06:15

for the merchant.

play06:16

Now that this token has been used,

play06:18

your phone is going to throw that token away.

play06:20

It can no longer be used for any future transactions.

play06:23

Your phone then readies the next token

play06:25

that's in your list or it requests

play06:27

a new token from the token service server.

play06:29

And that's the token that will be

play06:30

used for the next transaction.

play06:33

When you get the receipt for your payment,

play06:35

you may notice there's additional obfuscation that

play06:37

is used on the receipt itself.

play06:39

If you look at the credit card number on your receipt,

play06:41

you'll usually see a string of asterisks and usually,

play06:45

the last four digits of the credit card.

play06:47

This is called data masking, where

play06:49

we are hiding parts of the original number

play06:52

and only showing you a portion of that number on the receipt.

play06:56

This is obviously preventing someone

play06:58

from gaining access to your receipts

play07:00

and being able to use those credit card numbers to make

play07:02

their own payments.

play07:04

Obviously, the entire credit card number

play07:06

is known by your credit card company.

play07:08

But for the purposes of printing a receipt,

play07:10

only a portion of that number is shown.

play07:13

This type of data masking might also

play07:14

be used for a customer service representative.

play07:17

So if you call in to your credit card company,

play07:19

they may tell you, we're looking at the credit card

play07:22

with the last four digits of 2512.

play07:25

To protect the security of the entire number,

play07:27

it's not uncommon for companies to limit who

play07:29

has access to that information.

play07:31

And the person you're calling on the phone

play07:33

may only be able to see a portion of your credit card

play07:36

number.

play07:37

There are a number of different ways to mask a number.

play07:39

You don't have to use asterisks.

play07:41

We could simply rearrange the numbers

play07:43

or replace certain numbers with others that we could then

play07:46

reverse later on.

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Obfuscation TechniquesSteganography BasicsData HidingInformation SecurityCovert CommunicationImage SteganographyNetwork TrafficAudio SteganographyTokenization ProcessData Masking