An Introduction to Information Assurance COEN 150 Spring 2007.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
1 Network Security Ola Flygt Växjö University
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 cs691 chow C. Edward Chow Overview of Computer Security CS691 – Chapter 1 of Matt Bishop.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Defining Security Issues
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Cryptography, Authentication and Digital Signatures
Overview of Key Security Concepts and Vocabulary This Document was Funded by the National Science Foundation Federal Cyber Service Scholarship For Service.
Network security Network security. Look at the surroundings before you leap.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Computer Security By Duncan Hall.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
CIT-460 Chapter 1 : Basic Terminologies Lecture #1-Week 1 Dr.Khalid, Dr. Mohannad Computer and Information Security 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Network Security Overview
Computer Security Introduction
CS 395: Topics in Computer Security
Data & Network Security
Information and Network Security
Chapter 1: Introduction
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Security.
Information Security: Terminology
Computer Security Introduction
Security.
Introduction to Cryptography
Mohammad Alauthman Computer Security Mohammad Alauthman
Cryptography and Network Security
Presentation transcript:

An Introduction to Information Assurance COEN 150 Spring 2007

Reading Assignment Read section 3 of faq CERT is a coordination center for Internet security operated by Carnegie Mellon. Read CERT article on security

This course is part of the SCU Information Assurance curriculum which was recently certified by the Committee on National Systems Security of the National Security Agency as meeting the standards of the National INFOSEC Education and Training Program.

4011 Certificate Requirements BSCE: AMTH 387, COEN 250; 12 units from COEN 150, 178, 252, 253, 350, 351; and approved senior design project. MSCE: AMTH 387, COEN 250, 252, 253, 351 and either COEN 350, 254, or 352.

Terminology Overview Attacks, Services and Mechanisms Security Services Threats, Attacks and Vulnerabilities Security Policies and Mechanisms for Defense Readings, standards, etc.

Definitions Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Security Services (Goals) Confidentiality – concealment of information or resources. Includes whether or not data exists. Implies “authorization” so that only authorized people can access confidential data.

Security Services (cont) Integrity – the trustworthiness and the correctness of data or resources.  Usually in terms of preventing improper or unauthorized change. Can have several types of integrity: data integrity and origin integrity  Was the spoofed? Two types of integrity services: prevention and detection.

Security Services (cont) Availability – the ability of authorized entities to use the information or resource. Denial of service attacks inhibit this service CIA: Confidentiality, Integrity, Availability

Vulnerabilities, Threats and Attacks A vulnerability is a weakness in the system that might be exploited to cause loss or harm (and a violation of security services). A threat is a potential violation of security. Security services counter threats. An attack is the actual attempt to violate security. It is the manifestation of the threat.

Classifying Communication Attacks

Types of Attacks Interruption: This is an attack on availability Interception: This is an attack on confidentiality Modification: This is an attack on integrity Fabrication: This is an attack on integrity

Additional Threats/Attacks Repudiation of origin – a false denial that an entity sent or created something (I didn’t send that order to but Enron stock the day before it crashed). Attack on integrity Denial of receipt – a false denial that an entity received some information or message. (I didn’t receive the diamond shipment). Attack on integrity and availability. Denial of Service – long term inhibition of information or service. Attack on availability.

Passive and Active Threats

Security Policy and Mechanisms A security policy is a statement of what is and is not allowed. A security mechanism is a method, tool, or procedure for enforcing security policy. These should clearly be separate things.

Policy and Mechanism Example Policy – only the systems administrator is allowed to access the password file and then only in encrypted form Mechanism – the password file is not stored in clear text, but only in encrypted form with algorithm XYZ. The O.S. checks the access authorization of any process attempting to read the password file immediately before the access; whenever access is denied, that attempt is recorded in a log of suspicious activity.

Security Mechanisms Prevention, Detection, Recovery Prevention:  Encryption  Software Controls (DB access limitations, operating system process protection)  Enforce policies (frequent password change)  Physical Controls Detection: Intrusion detection systems (IDS)

Prevention Mechanisms Adequate prevention means that an attack will fail. Prevention usually involves mechanisms that the user cannot override. Prevention mechanisms are often cumbersome and do not always work perfectly or fail because they are circumvented. Passwords are a prevention mechanism to prevent unauthorized access. They fail when the password becomes known to a person other than the owner.

Detection Mechanisms Detection is used when an attack cannot be prevented and it also indicates the effectiveness of prevention measures. The goal is to determine that an attack is underway or has occurred and report it. Audit logs are detection mechanisms. When you log into the design center’s unix servers, it gives you the IP address of the last successful login.

Recovery Recovery has several aspects. The first is to stop an attack and repair the damage. Another is to trace the evidence back to the attacker and discover the identity of the attacker (this could result in legal retaliation). Yet another aspect is to determine the vulnerability that was exploited and fix it or devise a way of preventing a future attack.

Example: Private Property Prevention: locks at doors, window bars, walls round the property Detection: stolen items are missing, burglar alarms, closed circuit TV Recovery: call the police, replace stolen items, make an insurance claim …

Example E-Commerce Prevention: encrypt your orders, rely on the merchant to perform checks on the caller, don’t use the Internet (?) … Detection: an unauthorized transaction appears on your credit card statement Recovery: complain, ask for a new card number, etc. Footnote: Your credit card number has not been stolen. Your card can be stolen, but not the number. Confidentiality is violated.

Problems with Security Mechanisms Laws and Customs - is it legal? Might not be legal to retaliate against an attacker. Is it acceptable practice? How many hoops do we have to jump through to authenticate? Is it convenient? Users with security needs are often not aware of vulnerabilities and will not put up with excessive cost and inconvenience.

Other Terminology CompuSec: computer security (protect computers and the information in them) ComSec: communication security (protect information as it is transmitted) OpSec: operations security (security policies and procedures)

Non-required but Worth a Glance Common vulnerabilities and Exposures SANS top 20 vulnerabilities NIST Computer Security Resource Center

What the Government is Doing National Strategy to Secure Cyberspace

What you can do Scholarships for IA study designated CAE IA at SCU AMTH 387 Cryptology COEN 250 Info Security Management COEN 252 Computer Forensics COEN 253 Secure Systems Development COEN 350 Secure Distributed Systems COEN 351 Internet and E-Commerce Security