CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 18: Computer and Network Security Threats
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 1: Overview.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Editied by R. Newman.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Cryptography and Network Security Chapter 1
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Network Security Essentials Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Introduction to Computer and Network Security
Network Security Essentials Chapter 1
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Copyright © 2013 – Curt Hill Computer Security An Overview.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
COMPUTER SECURITY COMP424 1 ST LECTURE OVERVIEW AND TERMINOLOGIES Dr. Sarah Mustafa Eljack
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
Information Management System Ali Saeed Khan 29 th April, 2016.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Network Security Overview
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
CS457 Introduction to Information Security Systems
Computer and Network Security
Information Security, Theory and Practice.
Information System and Network Security
COMPUTER SECURITY CONCEPTS
Data & Network Security
CNET334 - Network Security
BINF 711 Amr El Mougy Sherif Ismail.
NET 311 Information Security
Computer and Network Security
Introduction to Cryptography
Cryptography and Network Security
Definition Of Computer Security
Presentation transcript:

CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi

Course Details Instructor: Amr El Mougy Office: C7.207 Assessment: TA: Mouaz Alabsawi Office: C7.220

Course Details Text books and lecture slides: Authors: William Stallings and Lawrie Brown Title: Computer Security, Principles and Practice Publisher: Pearson Education, Inc., 2008 Author: William Stallings Title: Cryptography and Network Security, 4 th Edition Publisher: Pearson Education, Inc., 2006 Note: These slides are not meant to be comprehensive lecture notes! They are only remarks and pointers. The material presented here is not sufficient for studying for the course. Your main sources for studying are the text and your own lecture notes

Course Details Security concepts Classic cryptography Symmetric encryption Public-key cryptography Applications of public-key cryptography Security protocols Security attacks (malware and DOS) User authentication and access control Internet security Key management

Lecture (1) Introduction and Key Security Concepts

Definitions The US-based National Institute for Standards and Technology (NIST) defines computer security as follows: [Computer security is] the protection afforded to an automated information system in order to attain the applicable objectives of preserving integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications) Definition (Computer Security)

Key Security Concepts CIA Triad

Confidentiality Confidentiality covers two concepts:  Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals  Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

Integrity Integrity as a security goal also covers two related concepts:  Data integrity: Assures that information and programs are changed only in a specified and authorized manner  System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system

Availability Availability ensures that a system works promptly and service is not denied to authorized users. A loss of availability is the disruption of access to or use of information or an information system

Further Considerations Some additional aspects are often mentioned:  Authenticity: The property of being genuine and able to be verified Confidence in the validity of a transmission, verifiability of a message originator, inputs arriving from trusted sources Verifiability of a user’s identity  Accountability: Actions can be uniquely traced to their originator Essential for nonrepudiation, deterrence, fault isolation, intrusion detection, after action recovery, legal action Truly secure systems are not achievable, so security breaches must be traceable

DAD Triad The complement of CIA Denial Alternation Disclosure Unauthorized individuals gain access to confidential information Data is modified or destroyed through some unauthorized mechanism Authorized users can not gain access to a system for legitimate purposes DAD activities may be malicious or accidental

Levels of Security Breaches Low Moderate High Limited adverse effect System performs its primary functions Minor damages to assets and individuals Serious adverse effect System performs its primary functions with lower efficiency Significant damage to assets and individuals (no loss of life) Catastrophic adverse effect System unable to perform its primary functions Major damage to assets and individuals

Layered Security Aspects Security considerations include:  Physical security  Operating system security Windows, Mac OS, Unix/Linux (Sun OS, Solaris, Open BSD,... )  Application layer security Browser, client,...  Communication security Encryption Firewalls Intrusion detection systems

Computer Security Challenges 1.not simple 2.must consider potential attacks 3.procedures used counter-intuitive 4.involve algorithms and secret info 5.must decide where to deploy mechanisms 6.battle of wits between attacker / admin 7.not perceived on benefit until fails 8.requires regular monitoring 9.too often an after-thought 10.regarded as impediment to using system

Security Vocabulary  System resource: (Asset) Data, services, capabilities (processing power, communication bandwidth), equipment, etc.  Adversary: An entity that attacks or is a threat to a system  Attack: An assault from an intelligent threat; an intelligent act manifesting a deliberate attempt to breach security  Vulnerability: A flaw or weakness that could be exploited to violate a system’s security  Threat: A potential to violate security; a possible danger that might exploit a vulnerability  Risk: Probability of a particular threat exploiting a particular vulnerability  Security policy: A set of rules and practices that regulate how a system provides security for their assets  Countermeasure: An action or device to reduce a threat/vulnerability/attack by eliminating or preventing it or by minimizing adverse effects

Security Vocabulary Countermeasures Owners Vulnerabilities Threat Agents Threats Risk Assets to value wish to minimize impose to reduce that may posses that may be reduced by may be aware of Wish to abuse and/or may damage give rise to that exploit leading to that increase

Example The water flowing to the right is a threat to the man (he might catch a cold) Example: The existence of a particular virus The crack in the wall is a vulnerability Example: Open ports on a computer Vulnerability + Threat = Risk! VulnerabilityThreatRisk

Vulnerabilities and Attacks  System resource vulnerabilities may be corrupted (loss of integrity) become leaky (loss of confidentiality) become unavailable (loss of availability)  Attacks are threats carried out and may be passive active insider outsider

Typical Threats  Hacker Anyone who attempts to penetrate the security of an information system, regardless of intent Early definition included anyone very proficient in computer use  Malicious insider Someone from within the organization that attempts to go beyond the rights and permissions that they legitimately hold Security professionals and system administrators are particularly dangerous

Typical Threats Malicious code object  Virus: A program that attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels  Worm: A program that takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system (e.g., sending itself to all of the list in your computer)  Trojan horse: A program that at first glance will appear to be useful software but will actually do damage once installed or run on your computer. It usually appears that is coming from a trusted source

Countermeasures  Means used to deal with security attacks prevent detect recover  May result in new vulnerabilities  Will have residual vulnerability  Goal is to minimize risk given constraints

Threat Consequences Unauthorized Disclosure Exposure Interception Inference Intrusion Deception Masquerade Falsification Repudiation Disruption Incapacitation Corruption Obstruction Usurpation Misappropriation Misuses

Attacks on Communication Networks We distinguish:  Passive attacks Attempts to learn or make use of information from the system but does not affect system resources Eavesdropping or monitoring of transmissions  Active attacks Attempts to alter system resources or affect their operation.

Passive Attacks  Release of message contents / snooping  Traffic analysis / spoofing  Passive attacks are hard to detect!

Active Attacks  Masquerade: One entity pretends to be a different entity  Replay attack: Passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect

Active Attacks  Modification attack: Some portion of a legitimate message is altered or messages are reordered to produce an unauthorized effect  Denial of service: Prevents or inhibits the normal use or management of communications facilities

Security Tradeoffs Security can be seen as a tradeoff between risks and benefits  Cost of implementing the security mechanism vs. the amount of damage it may prevent  Tradeoff considerations: user convenience business goals expenses

Security Services

Security Mechanisms