Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.

Slides:



Advertisements
Similar presentations
Computer Security CIS326 Dr Rachel Shipsey.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Mr C Johnston ICT Teacher
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Blekinge Institute of Technology, Sweden
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
CPE 5002 Network security. Look at the surroundings before you leap.
CSE2500 System Security and Privacy. CSE2500 System Security and Privacy  Nandita&Srini 2 Lecturers Prof B Srinivasan Phone: Room No: C4.47.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Incident Response Updated 03/20/2015
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
SEC835 Database and Web application security Information Security Architecture.
Cryptography and Network Security
What does “secure” mean? Protecting Valuables
Computer & Network Security
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Presented by: Dr. Munam Ali Shah
CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Network Security and Cryptography
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Chapter 40 Internet Security.
Computer Security Introduction
Business Risks of Insecure Networks
Cryptography and Network Security Chapter 1
Cybersecurity Am I concerned?
Computer Security CIS326 Dr Rachel Shipsey.
Security network management
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction Security services – tools and programs that prevent/detect/react the attacks. many combine mechanism/services into method(s) for thwarting security threats.

Security Attack Types Interruption – attack on availability Function Property Interruption – attack on availability Interception – attack on confidentiality Modification – attack on integrity Fabrication – attack on authenticity Various kinds of attacks can be classified into 4 different categories. User a transmits a fiel to User B.The file contains sensitive information that should be protected from disclosure. User C who is not authorised to read the file able to monitor the transmission and capture a copy of the file during transmission. 2. A network manager D transmits a message to a computer E under its management. The message instruct computer E to update an authorisation file. User F intercepts the messages, alter the message and sends it to E which accepts as if it came from D and modifies the authorisation file. 3. Rather then intercepting the message, user constructs his own message and sends it as if it came from D. A fired employee intercepts a message from personal manager which will invalidate his

Security is defined as Computer security deals with the prevention and detection of unauthorised actions by users of a computer system AND deals with the ready availability of valuable assets by authorised agents, and the denial of that access to all others

The security dilemma security deals with the ready availability of valuable assets by authorised agents, and the denial of that access to all others. One mechanism may interfere with the other e.g: shutting down or bringing a system to a single user mode, say for consistency verification forcing users to change password every week. What we mean by unauthorsised actions. The dilemma here is whether we should make the it available or not? On the contrary we have another problem too – namely real users do not know much about security requirements!!

Example Regular backing up the system and/or user data files (say everyday at midnight) What kind of attack for which this service will be appropriate? Interruption (file being deleted by an un-authorised person!) Modification – file content is modified (e.g. by a virus) mechanism – detection (and not prevention) how and when you detect? See the Q!

Example – contd Service – backup and restore program complete backup revolving backup selective or incremental backup explain these terms – tutorial class

Q You discover that your computer system has been infected by a piece of malicious code which modified certain files of the system. You have NO idea when the infection has occurred. You do have backups performed every week since the system was put into operation. How could you use the backups to construct a “clean” version of your system?

Another Q Assume that a bank shuts down its customer accounts database at 5 pm and restarts it the next day at 9 am. How the bank can verify whether the state (contents) of the database at 9 am is same as the one when the shutdown occurred at the previous day? in other words how to detect any change (by modification and fabrication) in the contents of a file (database file)? Note that the file size may be large (say in giga-bytes, if not in tera bytes!!)

One method of defence By controls What should be the focus of the controls? For example: should protection mechanisms focus on data or operations on that data or on the users who use the data? Since there are layers of technology, where controls should apply? Applications, services, operating systems, kernel, hardware. As I mentioned in the first lecture, the method of defence is either by controls or by making the data readable by the authorised users but not by others. Let us look at control more here as it is only thing that is applicable to computer security. Controls can be applied various layers and what component of the system it should apply?

Layers of technology (and Onion Model) In which layer should security mechanisms be placed ? Should controls be placed in more that one layer ? See slide 46 too. Operating System Kernel Hardware Services Applications

Controls Can be applied at hardware, software, physical or polices. Simple mechanisms or lots of features? Should defining and enforcing security mechanism be a centralised function? How to prevent access to the layer below the security mechanism? This slides tells in in more details what I mentioned in the previous slide.

Layers The presence of layers is a feature of technology Separate layers often perform very different functions Similar functions are combined in one layer The boundary between two layers is usually easily defined Layers can often be independently implemented

Effectiveness of Controls Merely having controls does no good unless they are used properly. The factors that affect the effectiveness are Awareness of protection Likelihood of users Overlapping controls Periodic review Having controls alone is not enough but also it has to be effective. Effectiveness comes from the users of the system. How to improve the effectiveness: Awareness, who are the users who need to be educated, probably overlapping controls to cross impose and verification and periodic evaluation of the effectiveness of the controls.

The security dilemma The costs of additional resources to implement security mechanisms can be quantified. Security mechanisms interfere with users, and can lead to loss of productivity. Managing security also costs. Need to perform risk analysis (which will be the next topic) The security dilemma need resource and hence it costs money!!