SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Cryptography and Network Security Chapter 1
1 cs691 chow C. Edward Chow Overview of Computer Security CS691 – Chapter 1 of Matt Bishop.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
1 An Overview of Computer Security computer security.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
CS461/ECE422 — Computer Security I — Spring 2012.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Slide #1-1 Introductory Computer Security CS461/ECE422 Fall 2010 Susan Hinrichs.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Module 11: Designing Security for Network Perimeters.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Computer Security By Duncan Hall.
Fall 2008CS 334 Computer Security1 CS 334: Computer Security Fall 2008.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
CIT-460 Chapter 1 : Basic Terminologies Lecture #1-Week 1 Dr.Khalid, Dr. Mohannad Computer and Information Security 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Network Security Overview
Computer Security Introduction
CS 395: Topics in Computer Security
Introduction to Information Assurance
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 1: Introduction
Chapter 1: Introduction
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Information Security: Terminology
Computer Security Introduction
Security.
Chapter 1: Introduction
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

SECURITY Professor Mona Mursi

ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components, abstractly: computer NETWORK computer computer NETWORK computer Each component is uniquely vulnerable to attack Each component is uniquely vulnerable to attack S/W Internet R

Security Information Security Information Security Cryptography and Information Security Cryptography and Information Security Cryptography: Basic building blocks of security Cryptography: Basic building blocks of security Using cryptography to protect information Using cryptography to protect information System Security System Security Attack and defense of individual computer systems Attack and defense of individual computer systems Focus on software security Focus on software security Applications, Operating System Applications, Operating System Network Security Network Security Attack and defense of entire networks Attack and defense of entire networks Focus on network protocol security and protecting network infrastructure devices Focus on network protocol security and protecting network infrastructure devices

Security Goals Security Goals Confidentiality Confidentiality Concealment of information Concealment of information Integrity Integrity Trustworthiness of information Trustworthiness of information Availability Availability Access to information Access to information

Threats Vocabulary Vocabulary Threat: potential security vulnerability Threat: potential security vulnerability Attack: action exploiting security vulnerabilities Attack: action exploiting security vulnerabilities Adversary: one who implements attacks Adversary: one who implements attacks Types of threats Types of threats Disclosure: unauthorized access to information Disclosure: unauthorized access to information Threat to CONFIDENTIALITY Threat to CONFIDENTIALITY Deception: acceptance of false data Deception: acceptance of false data Threat to INTEGRITY Threat to INTEGRITY Disruption: interruption of correct operation Disruption: interruption of correct operation Threat to AVAILABILITY Threat to AVAILABILITY Usurpation: unauthorized system control Usurpation: unauthorized system control Threat to ALL Threat to ALL

Threats Types of attacks Types of attacks  Snooping, aka wiretapping  Modification, unauthorized change of information  Masquerading, aka spoofing, impersonation  Repudiation of Origin, false denial that an entity sent/created something  Denial of Receipt, false denial that an entity received something  Delay  Denial of service

Entire Taxonomy ConfidentialityAvailabilityIntegrity Disclosure Deception Snooping Usurpation Disruption ModificationSpoofing Repudiation of Origin Denial of Receipt Delay Denial of Service

Threat Models Threat models define a hypothetical adversary ’ s capabilities Threat models define a hypothetical adversary ’ s capabilities Based on capabilities, we can determine the types of attacks Based on capabilities, we can determine the types of attacks Given attacks we can determine threats Given attacks we can determine threats Given threats we can determine the necessary security goals Given threats we can determine the necessary security goals Adversary Capabilities Security Goals ThreatsAttacks

Adversary Capabilities Can vary depending on the application, environment, system Can vary depending on the application, environment, system Examples … Examples … Crypto / Information Security Crypto / Information Security Access to keying material Access to keying material Computational capabilities (i.e. laptop vs supercomputer) Computational capabilities (i.e. laptop vs supercomputer) System Security System Security Access to operating system, applications Access to operating system, applications User vs administrator access User vs administrator access Physical access to system Physical access to system Network Security Network Security On-path vs off-path On-path vs off-path Active vs passive Active vs passive

Policy vs. Mechanism How are security goals achieved? How are security goals achieved? Security Policy: statement as to what is or is not allowed Security Policy: statement as to what is or is not allowed Security Mechanism : method, tool, or procedure to enforce policy Security Mechanism : method, tool, or procedure to enforce policy Example 1: Example 1:  Bank policy requires that all home banking transactions have confidentiality and integrity  Bank website encrypts communications to web browsers and requires that users log in before accessing accounts Example 2: Example 2:  University policy requires that users who forget their password be authenticated before having their password reset  University requires users to bring a photo ID to the helpdesk to reset passwords

Assumptions  Two key assumptions: Policy correctly and unambiguously partitions the set of system states into secure and nonsecure Policy correctly and unambiguously partitions the set of system states into secure and nonsecure Security mechanisms prevent the system from entering a nonsecure-state Security mechanisms prevent the system from entering a nonsecure-state

Dealing with Attacks Prevention Prevention Mechanisms prevent attack from being effective Mechanisms prevent attack from being effective Detection Detection Mechanisms to detect an attack has occurred Mechanisms to detect an attack has occurred Recovery Recovery Mechanisms to allow a system to be restored to its pre-attack state after an attack is detected Mechanisms to allow a system to be restored to its pre-attack state after an attack is detected Mechanisms to allow a system to function correctly in spite of an attack (more difficult) Mechanisms to allow a system to function correctly in spite of an attack (more difficult)

Trust Implementing policy typically requires some level of trust Implementing policy typically requires some level of trust Example: Example: Opening a door requires a key Opening a door requires a key Trusted parties have keys Trusted parties have keys Trusted parties can open the door Trusted parties can open the door What about lock pickers? We assume they are trustworthy, and do not open doors without permission. What about lock pickers? We assume they are trustworthy, and do not open doors without permission. Example: Example: Reading your requires a password Reading your requires a password Only you know your password, so only you can read your Only you know your password, so only you can read your What about system administrators? We assume they are trustworthy and do not use their system access to read our . What about system administrators? We assume they are trustworthy and do not use their system access to read our .

Assurance Trust is imprecise, and rarely “ yes ” or “ no ” Trust is imprecise, and rarely “ yes ” or “ no ” Assurance is a trust metric: specifies how much you trust a system, and what do you trust it to do? Assurance is a trust metric: specifies how much you trust a system, and what do you trust it to do? Examples Examples Who on the Internet do you trust with your credit card information? Who on the Internet do you trust with your credit card information? Would you trust a computer system more if it had up-to-date anti- virus software installed? Would you trust a computer system more if it had up-to-date anti- virus software installed?

Assurance Operational Issues Enterprise networks: information assurance is based on a cost-benefit analysis Enterprise networks: information assurance is based on a cost-benefit analysis Weigh the value of the information with the expense of protecting it Weigh the value of the information with the expense of protecting it Financial cost of a security policy violation Financial cost of a security policy violation Theft of funds, intellectual property, state secrets Theft of funds, intellectual property, state secrets Loss of revenue or reputation Loss of revenue or reputation Cost of recovering from the attack Cost of recovering from the attack Financial cost of implementing mechanisms Financial cost of implementing mechanisms Additional staff to audit computer networks Additional staff to audit computer networks Cost of firewalls, secure servers, physical security, etc Cost of firewalls, secure servers, physical security, etc Cost of increased system complexity Cost of increased system complexity

Overall Determine Adversary Capabilities Determine Adversary Capabilities Determine Possible Attacks Determine Possible Attacks Develop Overall System Security Policy Establish Security Goals for System Components (i.e. confidentiality, integrity, availability) Enumerate Threats Implement Security Mechanisms consistent with the required level of Assurance