Presentation is loading. Please wait.

Presentation is loading. Please wait.

12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.

Similar presentations


Presentation on theme: "12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure."— Presentation transcript:

1 12/18/20151 Computer Security Introduction

2 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure of information). 2.Integrity: Trustworthiness of data/resources (prevent unauthorized modifications). Data integrity Origin integrity (authentication) 3.Availability: Ability to use information/resources. (prevent unauthorized withholding of information/resources).

3 12/18/20153 Basic Components Additionally: Authenticity, accountability, reliability, safety, dependability, survivability...

4 12/18/20154 Confidentiality Historically, security is closely linked to secrecy. Security involved a few organizations dealing mainly with classified data. However, nowadays security extends far beyond confidentiality. Confidentiality involves: privacy: protection of private data, secrecy: protection of organizational data.

5 12/18/20155 Integrity “Making sure that everything is as it is supposed to be.” For Computer Security this means: Preventing unauthorized writing or modifications.

6 12/18/20156 Availability For Computer Systems this means that: Services are accessible and useable (without undue Delay) whenever needed by an authorized entity. For this we need fault-tolerance. Faults may be accidental or malicious ( Byzantine ). Denial of Service attacks are an example of malicious attacks.

7 12/18/20157 Relationship between Confidentiality Integrity and Availability Integrity Confidentiality Secure Availability

8 12/18/20158 Other security requirements Reliability – deals with accidental damage, Safety – deals with the impact of system failure caused by the environment, Dependability – reliance can be justifiably placed on the system Survivability – deals with the recovery of the system after massive failure. Accountability -- actions affecting security must be traceable to the responsible party. For this, –Audit information must be kept and protected, –Access control is needed.

9 12/18/20159 Basic Components Threats – potential violations of security Attacks – violations Attackers – those who execute the violations

10 12/18/201510 Threats Disclosure or unauthorized access Deception or acceptance of falsified data Disruption or interruption or prevention Usurpation or unauthorized control

11 12/18/201511 More threats Snooping (unauthorized interception) Modification or alteration –Active wiretapping –Man-in-the-middle attacks Masquerading or spoofing Repudiation of origin Denial of receipt Delay Denial of Service

12 12/18/201512 Policy and Mechanisms 1.A security policy is a statement of what is / is not allowed. 2.A security mechanism is a method or tool that enforces a security policy.

13 12/18/201513 Assumptions of trust Let P be the set of all possible states of a system Q be the set of secure states A mechanism is secure if P ≤ Q A mechanism is precise if P = Q A mechanism is broad if there are states in P which are not in Q

14 12/18/201514 Assurance Trust cannot be quantified precisely. System specifications design and implementation can provide a basis for how much one can trust a system. This is called assurance.

15 12/18/201515 Goals of Computer Security Security is about protecting assets. This involves: Prevention Detection Reaction (recover/restore assets)

16 12/18/201516 Computer Security How to achieve Computer Security: 1.Security principles/concepts: explore general principles/concepts that can be used as a guide to design secure information processing systems. 2.Security mechanisms: explore some of the security mechanisms that can be used to secure information processing systems. 3.Physical/Organizational security: consider physical & organizational security measures (policies)

17 12/18/201517 Computer Security Even at this general level there is disagreement on the precise definitions of some of the required security aspects. References: Orange book – US Dept of Defense, Trusted Computer System Evaluation Criteria. ITSEC – European Trusted Computer System Product Criteria. CTCPEC – Canadian Trusted Computer System Product Criteria

18 12/18/201518 Fundamental Dilemma: Functionality or Assurance Security mechanisms need additional computational Security policies interfere with working patterns, and can be very inconvenient. Managing security requires additional effort and costs. Ideally there should be a tradeoff.

19 12/18/201519 Operational issues –Cost-benefit analysis Example: a database with salary info, which is used by a second system to print pay checks –Risk analysis Environmental dependence Time dependence Remote risk

20 12/18/201520 Laws and Customs Export controls Laws of multiple jurisdiction Human issues –Organizational problems (who is responsible for what) –People problems (outsiders/insiders)

21 12/18/201521 Tying it all together: how ????


Download ppt "12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure."

Similar presentations


Ads by Google