Computer Science CSC 474 Information Systems Security Introduction.

Slides:



Advertisements
Similar presentations
Computer Security CIS326 Dr Rachel Shipsey.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.2: IPsec.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.4 Public Key Infrastructure (PKI) Acknowledgment: Slides revised from.
Computer Science CSC 405Dr. Peng Ning1 CSC 405 Introduction to Computer Security Course Introduction.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 3.1 Overview of Authentication.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Computer Science CSC 405Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 6. Database Security.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.5 Transport Layer Security.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
CSC 474 Information Systems Security
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Computer & Network Forensics Introduction Xinwen Fu.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
HIPAA Security Standards What’s happening in your office?
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Applied Cryptography for Network Security
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science 1 CSC 774 Advanced Network Security Dr. Peng Ning
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
A First Course in Information Security
SEC835 Database and Web application security Information Security Architecture.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Computer Network Fundamentals CNT4007C
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Lecture 1 Introduction Basic Security Concepts
Introduction to Network Security J. H. Wang Feb. 24, 2011.
CSCE 727 Information Warfare
IT443 – Network Security Administration Week 1 – Introduction Instructor: Alfred J Bird, Ph.D., NBCT
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
& Selected Topics: Digital Forensics Introduction Xinwen Fu.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 NES554: Computer Networks Defense Course Overview.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Computer Networks CNT5106C
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
CS457 Introduction to Information Security Systems
Lecture 1 Introduction Basic Security Concepts
Computer Network Fundamentals CNT4007C
Computer Networks CNT5106C
Information System and Network Security
Information Security.
Data & Network Security
How to Mitigate the Consequences What are the Countermeasures?
Cryptography and Network Security
Presentation transcript:

Computer Science CSC 474 Information Systems Security Introduction

Computer Science CSC 474By Dr. Peng Ning2 About Instructor Dr. Peng Ning, assistant professor of computer science – –(919) –Office: Room 250 (in Suite 243), Venture III, centennial campus –Office hours: Mondays and Thursdays, 3:00pm – 4:00pm

Computer Science CSC 474By Dr. Peng Ning3 About TA Shu Huang – Office hours: –TBD

Computer Science CSC 474By Dr. Peng Ning4 Course Objectives Understanding of basic issues, concepts, principles, and mechanisms in information systems security. –Basic security concepts –Cryptography –Authentication –Distributed system security –Network security Be able to determine appropriate mechanisms for protecting information systems.

Computer Science CSC 474By Dr. Peng Ning5 Course Styles Descriptive: what is out there. Critical: what is wrong with... Both knowledge and skill oriented Interactive: discussion and questions encouraged. Information sharing: home page and message board in

Computer Science CSC 474By Dr. Peng Ning6 Course Outline Basic Security Concepts –Confidentiality, integrity, availability –Security policies, security mechanisms, assurance Cryptography –Basic number theory –Secret key cryptosystems –Public key cryptosystems –Hash function –Key management

Computer Science CSC 474By Dr. Peng Ning7 Course Outline (Contd) Identification and Authentication –Basic concepts of identification and authentication –Password authentication –Security handshake pitfalls

Computer Science CSC 474By Dr. Peng Ning8 Course Outline (Contd) Network and Distributed Systems –Issues in Network and Distributed Systems Security –Kerberos –IPsec –IPsec key management –IP trace back –SSL/TLS –Firewalls and Virtual Private Network –Secure

Computer Science CSC 474By Dr. Peng Ning9 Course Outline (Contd) Miscellaneous Topics –Malicious Software –Multi-Level Security –Evaluation of Secure Information Systems –Auditing and Intrusion Detection

Computer Science CSC 474By Dr. Peng Ning10 Lab Exercises Network security –Network scanning exercise –VPN exercise Location –Venture II networking lab Time –TBD –Will be given as a part of homework assignments

Computer Science CSC 474By Dr. Peng Ning11 Prerequisites CSC 401 (Data and Computer Communications Networks) Programming in Java Basic knowledge and skills in Discrete Mathematics

Computer Science CSC 474By Dr. Peng Ning12 Textbook and Handouts Required textbook –Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, ISBN:

Computer Science CSC 474By Dr. Peng Ning13 On-line Resources WWW page: –For course materials, e.g., lecture slides, homework files, papers, tools, etc. –Will be updated frequently. So check frequently. Message board: –For discussions, Q&As.

Computer Science CSC 474By Dr. Peng Ning14 Grading CSC 474: Assignments 20%, midterm 40%, final 40%. The final grades are computed according to the following rules: –A+: >= 95%; A: >= 90% and = 85% and < 90%; –B+: >= 80% and = 75% and < 80%; –B-: >= 70% and = 66% and < 70%; –C: >= 63% and = 60% and < 63%; –D+: >= 56% and = 53% and < 56%; –D-: >= 50% and < 53%; –F: < 50%.

Computer Science CSC 474By Dr. Peng Ning15 Policies on incomplete grades and late assignments Homework and project deadlines will be hard. Late homework will be accepted with a 10% reduction in grade for each class period they are late by. Once a homework assignment is discussed in class, submissions will no longer be accepted. All assignments must be turned in before the start of class on the due date.

Computer Science CSC 474By Dr. Peng Ning16 Policies on absences and scheduling makeup work You may be excused from an exam only with a university approved condition, with proof. For example, if you cannot take an exam because of a sickness, we will need a doctor's note. Events such as going on a business trip or attending a brother's wedding are not an acceptable excuse for not taking an exam at its scheduled time and place. You will have one chance to take a makeup exam if your absence is excused. There will be no makeup for homework assignments.

Computer Science CSC 474By Dr. Peng Ning17 Academic integrity The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the NCSU Code of Student Conduct from the Office of Student Conduct, or from the following URL. codeof.htmhttp:// codeof.htm

Computer Science CSC 474By Dr. Peng Ning18 NC State policy on working with students with disabilities Reasonable accommodations will be made for students with verifiable disabilities. –Please schedule an appointment with the instructor. In order to take advantage of available accommodations, students must register with Disability Service for Students at 1900 Student Health Center, Campus Box 7509, – For more information on NC States policy on working with students with disabilities, please see –

Computer Science CSC 474By Dr. Peng Ning19 Check the website for details!

Computer Science CSC 474 Information Systems Security Topic #1. Basic Security Concepts

Computer Science CSC 474By Dr. Peng Ning21 Information Security Problems Public, private, and government networks have been penetrated by unauthorized users and rogue programs Increased volume of security breaches attributed Computer Emergency Response Team (CERT) reports a tremendous increase in cracking incidents Insider attacks

Computer Science CSC 474By Dr. Peng Ning22 Information Security Concerns Distributed Denial of Service (DDOS) attacks Worm attacks (e.g., code red) Monitoring and capture of network traffic –User IDs, passwords, and other information are often stolen on Internet Exploitation of software bugs Unauthorized access to resources –Disclosure, modification, and destruction of resources Compromised system used as hostile attack facility Masquerade as authorized user or end system Data driven attacks –Importation of malicious or infected code forgery

Computer Science CSC 474By Dr. Peng Ning23 Contributing Factors Lack of awareness of threats and risks of information systems –Security measures are often not considered until an Enterprise has been penetrated by malicious users Wide-open network policies –Many Internet sites allow wide-open Internet access Vast majority of network traffic is unencrypted –Network traffic can be monitored and captured

Computer Science CSC 474By Dr. Peng Ning24 Contributing Factors (Contd) Lack of security in TCP/IP protocol suite –Most TCP/IP protocols not built with security in mind –Work is actively progressing within the Internet Engineering Task Force (IETF) Complexity of security management and administration Exploitation of software (e.g., protocol implementation) bugs –Example: Sendmail bugs Cracker skills keep improving

Computer Science CSC 474By Dr. Peng Ning25 Security Objectives Secrecy (Confidentiality) Integrity Availability (Denial of Service)

Computer Science CSC 474By Dr. Peng Ning26 Security Objectives Secrecy Prevent/detect/deter improper disclosure of information Integrity Prevent/detect/deter improper modification of information Availability Prevent/detect/deter improper denial of access to services provided by the system Note the use of improper rather than unauthorized Authorized users are accountable for their actions

Computer Science CSC 474By Dr. Peng Ning27 Commercial Example Secrecy An employee should not come to know the salary of his manager Integrity An employee should not be able to modify the employee's own salary Availability Paychecks should be printed on time as stipulated by law

Computer Science CSC 474By Dr. Peng Ning28 Military Example Secrecy The target coordinates of a missile should not be improperly disclosed Integrity The target coordinates of a missile should not be improperly modified Availability When the proper command is issued the missile should fire

Computer Science CSC 474By Dr. Peng Ning29 A Fourth Objective Securing computing resources Prevent/detect/deter improper use of computing resources including –Hardware Resources –Software resources –Data resources –Network resources

Computer Science CSC 474By Dr. Peng Ning30 Achieving Security Security policy What? Security mechanism How? Security assurance How well?

Computer Science CSC 474By Dr. Peng Ning31 Security Policy Organizational Policy Automated Information System Policy

Computer Science CSC 474By Dr. Peng Ning32 Compusec + Comsec = Infosec Compsec Comsec Infosec Security Computers Communications

Computer Science CSC 474By Dr. Peng Ning33 Security Mechanism Prevention Access control Detection Auditing and intrusion detection Tolerance Practicality Good prevention and detection both require good authentication as a foundation

Computer Science CSC 474By Dr. Peng Ning34 Security Mechanism Security mechanisms implement functions that help prevent, detect, and respond to security attacks Prevention is more fundamental –Detection seeks to prevent by threat of punitive action –Detection requires that the audit trail be protected from alteration Sometime detection is the only option, e.g., –Accountability in proper use of authorized privileges –Modification of messages in a network Security functions are typically made available to users as a set of security services through APIs or integrated interfaces Cryptography underlies (almost) all security mechanisms

Computer Science CSC 474By Dr. Peng Ning35 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content. –Parties involved. –Where they are, how they communicate, how often, etc. Authentication: assurance that an entity of concern or the origin of a communication is authentic - its what it claims to be or from Integrity: assurance that the information has not been tampered with

Computer Science CSC 474By Dr. Peng Ning36 Security Services - Contd Non-repudiation: offer of evidence that a party is indeed the sender or a receiver of certain information Access control: facilities to determine and enforce who is allowed access to what resources, hosts, software, network connections Monitor & response: facilities for monitoring security attacks, generating indications, surviving (tolerating) and recovering from attacks

Computer Science CSC 474By Dr. Peng Ning37 Security Services - Contd Security management: facilities for coordinating users service requirements and mechanism implementations throughout the enterprise network and across the internet –Trust model –Trust communication protocol –Trust management infrastructure

Computer Science CSC 474By Dr. Peng Ning38 Security Assurance How well your security mechanisms guarantee your security policy Everyone wants high assurance High assurance implies high cost –May not be possible Trade-off is needed.

Computer Science CSC 474By Dr. Peng Ning39 Security by Obscurity Security by obscurity says that if we hide the inner workings of a system it will be secure It is a bad idea Less and less applicable in the emerging world of vendor-independent open standards Less and less applicable in a world of widespread computer knowledge and expertise

Computer Science CSC 474By Dr. Peng Ning40 Security by Legislation Security by legislation says that if we instruct our users on how to behave we can secure our systems It is a bad idea For example –Users should not share passwords –Users should not write down passwords –Users should not type in their password when someone is looking over their shoulder User awareness and cooperation is important, but cannot be the principal focus for achieving security

Computer Science CSC 474By Dr. Peng Ning41 Security Tradeoffs SecurityFunctionality Ease of Use COST

Computer Science CSC 474By Dr. Peng Ning42 Threat-Vulnerability-Risk Threats Possible attacks on the system Vulnerabilities Weaknesses that may be exploited to cause loss or harm Risk A measure of the possibility of security breaches and severity of the ensuing damage Requires assessment of threats and vulnerabilities

Computer Science CSC 474By Dr. Peng Ning43 Risk Management Risk analysis –Mathematical formulae and computer models can be developed, but the underlying parameters are difficult to estimate. Risk reduction Risk acceptance –Certification Technical evaluation of a system's security features with respect to how well they meet a set of specified security requirements –Accreditation The management action of approving an automated system, perhaps with prescribed administrative safeguards, for use in a particular environment