Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University

Slides:



Advertisements
Similar presentations
OCTAVESM Process 4 Create Threat Profiles
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Introducing Computer and Network Security
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Introduction to Security Dr.Talal Alkharobi. 2 Why is security important? Computers and networks are the nerves of the basic services and critical infrastructures.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Introduction (Pendahuluan)  Information Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CPSC 6126 Computer Security Information Assurance.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Introduction to Network Defense
Cryptography and Network Security
CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Security Introduction
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 8 – Administering Security
Chapter 1: Introduction
CS 450/650 Fundamentals of Integrated Computer Security
Chapter 1: Introduction
Chapter 19: Building Systems with Assurance
Chapter 1: Introduction
INFORMATION SYSTEMS SECURITY and CONTROL
An Overview of Computer Security
Advanced System Security
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Network Security Ola Flygt Växjö University
Computer Security Introduction
Security.
Security in Computing, Fifth Edition
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University

2 Computer (Systems) Security  the protection of the computer resources against accidental or intentional disclosure of confidential data, unlawful modification of data or programs, the destruction of data, software or hardware, and the denial of one's own computer facilities irrespective of the method together with such criminal activities including computer related fraud and blackmail. [Palmer]

3 Chapter 1: Introduction  Components of computer security  Threats  Policies and mechanisms  The role of trust  Assurance  Operational Issues  Human Issues

4 Basic Components  Confidentiality (concealment) –Keeping data and resources hidden –limiting who can access assets of a computer system  Integrity –Data integrity (integrity) –Origin integrity (authentication) –limiting who can modify assets of a computer system  Availability –Enabling access to data and resources –allowing authorized users access to assets

5 Definitions  vulnerability - weakness in the security system that might be exploited to cause a loss or harm.  threats - circumstances that have the potential to cause loss or harm. Threats typically exploit vulnerabilities.  control - protective measure that reduces a vulnerability or minimize the threat.

6 Vulnerabilities  “Today’s complex Internet networks cannot be made watertight…. A system administrator has to get everything right all the time; a hacker only has to find one small hole. A sysadmin has to be lucky all of the time; a hacker only has to get lucky once. It is easier to destroy than to create.” –Robert Graham, lead architect of Internet Security Systems

7 Types of Threats  interception - some unauthorized party has gained access to an asset.  modification - some unauthorized party tampers with an asset.  fabrication - some unauthorized party might fabricate counterfeit objects for a computer system.  interruption - asset of system becomes lost or unavailable or unusable.

8 Classes of Threats  Disclosure –Snooping  Deception –Modification, spoofing, repudiation of origin, denial of receipt  Disruption –Modification  Usurpation –Modification, spoofing, delay, denial of service

9 Policies and Mechanisms  Policy says what is, and is not, allowed –This defines “security” for the site/system/etc.  Mechanisms enforce policies  Composition of policies –If policies conflict, discrepancies may create security vulnerabilities

10 Goals of Security  Prevention –Prevent attackers from violating security policy  Detection –Detect attackers’ violation of security policy  Recovery –Stop attack, assess and repair damage –Continue to function correctly even if attack succeeds

11 Trust and Assumptions  Underlie all aspects of security  Policies –Unambiguously partition system states –Correctly capture security requirements  Mechanisms –Assumed to enforce policy –Support mechanisms work correctly

12 Types of Mechanisms secure precise broad set of reachable statesset of secure states

13 Assurance  Specification –Requirements analysis –Statement of desired functionality  Design –How system will meet specification  Implementation –Programs/systems that carry out design

14 Operational Issues  Cost-Benefit Analysis –Is it cheaper to prevent or recover?  Risk Analysis –Should we protect something? –How much should we protect this thing?  Laws and Customs –Are desired security measures illegal? –Will people do them?

15 Human Issues  Organizational Problems –Power and responsibility –Financial benefits  People problems –Outsiders and insiders –Social engineering

16 Tying Together Threats Policy Specification Design Implementation Operation

17 Key Points  Policy defines security, and mechanisms enforce security –Confidentiality –Integrity –Availability  Trust and knowing assumptions  Importance of assurance  The human factor

18 Controls  Reduce and contain the risk of security breaches  “Security is not a product, it’s a process” – Bruce Schneier [Using any security product without understanding what it does, and does not, protect against is a recipe for disaster.]