1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
The University of Adelaide, School of Computer Science
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 1 – Introduction
CSA 223 network and web security Chapter one
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Introducing Computer and Network Security
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
CPSC 6126 Computer Security Information Assurance.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 7: E-Commerce Security and Payment system
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction to Computer Security
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Is There a Security Problem in Computing?
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Issues and Protections
Security
Threats By Dr. Shadi Masadeh.
CS 450/650 Fundamentals of Integrated Computer Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Presentation transcript:

1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY

2 INTRODUCTION Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.

3 INTRODUCTION Computer security can be seen as a sub field of security engineering, which looks at broader security issues in addition to computer security. In a secure system the legitimate users of that system are still able to do what they should be able to do. While one might be able to secure a computer beyond misuse using extreme measures (locked in a vault without any means of power or communication for example), this would not be regarded as a useful secure system because of the above requirement.

4 SECURITY DEFINITION Security Value How do we protect our most valuable assets? One of the options to place them in a safe place. Characteristics of Computer Intrusion: An intruder must be expected to use any available means of penetration. The penetration may not necessarily be by the most obvious means. This principle implies and considers all possible means ofpenetration.

5 COMPUTER SECURITY PURPOSE What is Computing System? A collection of hardware, software, storage media, data and people that an organization uses to perform computing task. Security Purpose The purpose of the security is to devise ways to prevent the weaknesses from being exploited.

6 COMPUTER SECURITY GOALS  Three important aspect of any computer- related system: –Confidentiality –Integrity –Availability

7 CONFIDENTIALITY  Confidentiality is sometimes called secrecy or privacy.  Only authorized entities may read info.  Means the property that data or information is not made available or disclosed to unauthorized persons or processes  Confidentiality ensures that computer related assets are accessed only by authorized parties.

8 INTEGRITY  Assets can be modified only by authorized parties or only in authorized ways.  Also means different things in different contexts:  Item in Integrity: –Precision –Accuracy - Degree of conformity of a measure to a standard or true value. –Unmodified –Consistency –Only modified in acceptable ways by authorized entities  Welke & Mayfield recognize three particular aspects of integrity: –Authorized actions –Separation & protection of resources –Error detection & correction

9 AVAILABILITY  Availability means that assets are accessible to authorized parties at appropriate times.  Implies to both data and services and it is similarly complex.  The property of a system or a system resource that ensures it is accessible and usable upon demand by an authorized system user.  Usability  Capacity to meet needs  Timely access/results  Fairness

10 Figure: Relationship between Confidentiality, Integrity and Availability

11 Figure: Security of Data

THREAT  A threat to a computing system is a set of circumstances or agents that could cause loss or harm.  Each threat exploits vulnerabilities of the assets in computing system; the threats are illustrated in figure above. 12

SYSTEM SECURITY THREATS 13

THREAT  Four types of threats are: –Interception Some authorized party has gained access to an asset. Example: illicit copying a program or data files, or wiretapping to obtain data in a network. –Interruption An asset of the system becomes lost, unavailable or unusable. Example: Malicious destruction of a hardware device, erasure of a program or data files, or malfunction of operating system. –Modification An authorized party not only accesses but tampers with an asset. Example: Someone might change the values in a database, alter the program or modify the data. –Fabrication Unauthorized party might create a fabrication of counterfeit objects on a computer system. Example: The intruder may insert spurious transactions to network communications system. 14

15 PROTECTING YOUR PRIVACY  Privacy advocates agree that the key lies in giving citizens the right to be informed when personal information is being collected as well as the right to refuse to provide this information.  In the European Union (EU): –Consumer must be informed exactly what information is being collected and how it will be used. –Consumer must be allowed to choose whether they want to divulge the requested information and how collected information will be used. –Consumer must be allowed to request that information about themselves be removed from marketing and other databases

16 COMPUTER CRIMINALS  Some computer criminals are mean and sinister types.  But many more wear business suit, have university degrees and appear to be pillars of their communities.  Computer Crime is any crime involving a computer or aided by the use of one.  It allows us to consider ways to protect ourselves, our business and our communities against those who use computer.  Cybercriminals are individuals who use computers, networks and the Internet to perpetrate crime.  Anyone with a computer and the wherewithal to arm themselves with the appropriate knowledge can be cybercriminal.

17 COMPUTER CRIMINALS HACKERS  Person who gains access to computer systems illegally, usually from a personal computer.  We can differentiate the hackers into three groups: –White Hat –Black Hat –Grey Hat

18 White Hat Hackers Upon finding vulnerability in a system, will report the vulnerability to the vendor of that system.  For example: if they discover some flaw in Red Hat Linux, they would then the Red Hat company and explain exactly what the flaw is and how it was exploited.

19 Black Hat Hackers  The people normally depicted in the media.  Once they gain access to a system, their goal is to cause some type of harm.  Sometimes are referred to as crackers.  Example: stealing data, erase file or deface Web sites.

20 Gray Hat Hackers  Typically law-abiding citizens, but in some cases will venture into illegal activities.  They may do so for a wide variety of reasons. Example: hacking into a system belonging to a corporation that the hackers feels is engaged in unethical activities.

21

22 METHOD OF DEFENSE  Harm occurs when a threat is realized against vulnerability.  To protect against harm, then, we can neutralize the threat, close the vulnerability, or both.  Ways to deal with harm: –Prevent it. –Deter it. –Deflect it. –Detect it. –Recover from its effects.

23 METHOD OF DEFENSE  Generally, method of defense can be grouped into fivemethod: –Controls –Encryption –Software Control –Hardware Control –Policies and Procedures

24 EFFECTIVENESS OF CONTROLS  A control is an action, device, procedure or technique that removes or reduces vulnerability.  Several aspect that can enhance the effectiveness of controls:  Awareness of Problem  Many user unaware of the need of security.  Likehood of Use The lock on a computer room door does no good if people block the door open. Refer to the article below:

25

EFFECTIVENESS OF CONTROLS –Overlapping Controls Several different controls may apply to address a single vulnerability. For example, we may choose to implement security for a microcomputer application by using a combination of controls on program access to the data, on physical access to the microcomputer and storage media, and even by file locking to control access to the processing programs. –Periodic Review Article above reports on periodic review of computer security. 26

27

28 Security Concept & Term  Exposure - form of loss.  Vulnerability is a weakness that may be exploited for loss in the security system. –Hardware vulnerabilities User can see what devices are hooked to the system. It is rather simple to attack by adding devices, changing them, intercepting the traffic. Computer can be attacked physically (spilled soft drink, burned, etc). –Software vulnerabilities. Software can be replaced, changed, destroyed, modified and deleted. Example: Virus attack and software theft. –Data Vulnerabilities. The general public however can readily interpret data. Data attack is a more widespread and serious problem than either

29 WHY IS COMPUTER SECURITY NECESSARY?  Because a lot of money is handled by computers.  Because a lot of important information is stored on and handled by computers.  Would you want anyone to find your credit history, medical history?  Because society is increasingly dependent on the correct information of computers.

30 CONCLUSION  Please take note the following terms: –Security Value –Security Purpose –Security Goals –Threat –Computer Criminals –Method of Defense –Computer Security Controls