Lecture 1 Introduction Basic Security Concepts

Slides:



Advertisements
Similar presentations
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Advertisements

Is There a Security Problem in Computing? Network Security / G. Steffen1.
CSCE 201 Introduction to Information Security Fall 2010.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Security Controls – What Works
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Introduction (Pendahuluan)  Information Security.
CPSC 6126 Computer Security Information Assurance.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
SEC835 Database and Web application security Information Security Architecture.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Lecture 1 Introduction Basic Security Concepts
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
C8- Securing Information Systems
CSCE 727 Information Warfare
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Lecture 1 1. Introduction 2. Basic Security Concepts.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Lecture 3 Basic Security Concepts cont.. Homework 1. Score: 10 points Due: September 12, :00 am via dropbox Last day to submit with 4%/day penalty:
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CSCE 548 Introduction Basic Security Concepts. APOGEE Students Download recorded lectures Contact instructor if needed via – Phone: during office hours.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Security Management in Practice
CS457 Introduction to Information Security Systems
Computer and Network Security
CS 395: Topics in Computer Security
Issues and Protections
Information System and Network Security
Data & Network Security
BINF 711 Amr El Mougy Sherif Ismail.
CSCE 548 Secure Software Development Test 1 Review
Computer and Network Security
INFORMATION SYSTEMS SECURITY and CONTROL
Cyber security Policy development and implementation
Cyber Security For Civil Engineering
Introduction to Course
Basic Security Concepts
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Lecture 1 Introduction Basic Security Concepts

What is Cyber Security? Highly Technical People, processes, and technology Legislation and Regulation Risk management

Copyright of Information Security Incorporated © 2008–2014 Lecture 1 CSCE 522 - Farkas Copyright of Information Security Incorporated © 2008–2014

What Can I Do?

Class Information Class Homepage: https://cse.sc.edu/~farkas/csce522/csce522.htm Instructor: Csilla Farkas Office: Swearingen 3A43 Office Hours: Tuesday, Thursday 10:30 – 11:30 am (Swearingen 3A43) , 2:30 – 3:00 pm (WMBB) E-mail: farkas@cec.sc.edu Lecture 1 CSCE 522 - Farkas

Teaching Assistant Tieming Geng, Office hours: Monday/Wednesday 2 – 4 pm Office location: Swearingen 2D19 Email: TGENG@email.sc.edu Lecture 1 CSCE 522 - Farkas

Text Books Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing (5th Edition) (Hardcover), Prentice Hall PTR; ISBN: 9780134085043 Handouts Lecture 1 CSCE 522 - Farkas

Course Objective Understanding of Information Security Industry + Academics Managerial + Technical Leadership and Communication DEFENSE! Lecture 1 CSCE 522 - Farkas

TENTATIVE SCHEDULE Basic security concepts Cryptography, Secret Key Cryptography, Public Key Identification and Authentication, key-distribution centers, Kerberos Security Policies -- Discretionary Access Control, Mandatory Access Control Access control -- Role-Based, Provisional, and Logic-Based Access Control The Inference Problem Network and Internet Security, E-mail security, User Safety Program Security -- Viruses, Worms, etc. Firewalls Intrusion Detection, Fault tolerance and recovery Information Warfare Security Administration, Economic impact of cyber attacks Lecture 1 CSCE 522 - Farkas

Assignments Homework assignments: there will be several homework assignments during the semester.  Homework should be individual work! There will be a late submission penalty of 10%/day after the due date.    Cutoff date for the assignments is one week after due date. Exams: three closed book tests will cover the course material.  Final exam is accumulative.  Lecture 1 CSCE 522 - Farkas

Grading Midterm 1: 20%, Midterm 2: 20%, Final exam: 30%,  Homework: 30% Grades: 90 < A , 85 < B+ <=90, 80 < B <= 85, 75 < C+ <= 80, 65 < C <= 75, 60 < D+ <= 65, 50 < D <= 60, F <= 50 Graduate students must perform additional assignments to receive full credit. Lecture 1 CSCE 522 - Farkas

Reading Assignment Reading assignments for this class: Pfleeger: Ch 1 Reading assignments for next class: Pfleeger: Ch 2 Lecture 1 CSCE 522 - Farkas

Security Objectives Confidentiality: prevent/detect/deter improper disclosure of information Integrity: prevent/detect/deter improper modification of information Availability: prevent/detect/deter improper denial of access to services Lecture 1 CSCE 522 - Farkas

Military Example Confidentiality: target coordinates of a missile should not be improperly disclosed Integrity: target coordinates of missile should be correct Availability: missile should fire when proper command is issued Lecture 1 CSCE 522 - Farkas

Commercial Example Confidentiality: patient’s medical information should not be improperly disclosed Integrity: patient’s medical information should be correct Availability: patient’s medical information can be accessed when needed for treatment Lecture 1 CSCE 522 - Farkas

Fourth Objective Securing computing resources: prevent/detect/deter improper use of computing resources Hardware Software Data Network Lecture 1 CSCE 522 - Farkas

What is the trade off between the security objectives? Lecture 1 CSCE 522 - Farkas

Achieving Security Policy Mechanism Assurance What to protect? How to protect? Assurance How good is the protection? Lecture 1 CSCE 522 - Farkas

Security Policy Organizational Policy Computerized Information System Lecture 1 CSCE 522 - Farkas

Why do we need to fit the security policy into the organizational policy? Lecture 1 CSCE 522 - Farkas

Security Mechanism Prevention Detection Tolerance/Recovery Lecture 1 CSCE 522 - Farkas

Security by Obscurity Hide inner working of the system Bad idea! Vendor independent open standard Widespread computer knowledge Lecture 1 CSCE 522 - Farkas

Security by Legislation Instruct users how to behave Not good enough! Important Only enhance security Targets only some of the security problems Lecture 1 CSCE 522 - Farkas

Security Tradeoffs Security Functionality Ease of Use COST Lecture 1 CSCE 522 - Farkas

Threat, Vulnerability, Risk Threat: potential occurrence that can have an undesired effect on the system Vulnerability: characteristics of the system that makes is possible for a threat to potentially occur Attack: action of malicious intruder that exploits vulnerabilities of the system to cause a threat to occur Risk: measure of the possibility of security breaches and severity of the damage Lecture 1 CSCE 522 - Farkas

Distinguish among vulnerability, threat, and control (protection). Lecture 1 CSCE 522 - Farkas

Types of Threats (1) Errors of users Natural/man-made/machine disasters Dishonest insider Disgruntled insider Outsiders Lecture 1 CSCE 522 - Farkas

Types of Threats (2) Disclosure threat – dissemination of unauthorized information Integrity threat – incorrect modification of information Denial of service threat – access to a system resource is blocked Lecture 1 CSCE 522 - Farkas

Types of Attacks (1) Interruption – an asset is destroyed, unavailable or unusable (availability) Interception – unauthorized party gains access to an asset (confidentiality) Modification – unauthorized party tampers with asset (integrity) Fabrication – unauthorized party inserts counterfeit object into the system (authenticity) Denial – person denies taking an action (authenticity) Lecture 1 CSCE 522 - Farkas

Types of Attacks (2) Passive attacks: Eavesdropping Monitoring Active attacks: Masquerade – one entity pretends to be a different entity Replay – passive capture of information and its retransmission Modification of messages – legitimate message is altered Denial of service – prevents normal use of resources Lecture 1 CSCE 522 - Farkas

Computer Crime Any crime that involves computers or aided by the use of computers U.S. Federal Bureau of Investigation: reports uniform crime statistics Lecture 1 CSCE 522 - Farkas

How can defense influence these aspects of attacks? Malicious Attacks Method: skills, knowledge, tools, information, etc. Opportunity: time and access Motive: reason to perform the action How can defense influence these aspects of attacks? Lecture 1 CSCE 522 - Farkas

Computer Criminals Amateurs: regular users, who exploit the vulnerabilities of the computer system Motivation: easy access to vulnerable resources Crackers: attempt to access computing facilities for which they do not have the authorization Motivation: enjoy challenge, curiosity Career criminals: professionals who understand the computer system and its vulnerabilities Motivation: personal gain (e.g., financial) Lecture 1 CSCE 522 - Farkas

Methods of Defense Prevent: block attack Deter: make the attack harder Deflect: make other targets more attractive Detect: identify misuse Tolerate: function under attack Recover: restore to correct state Lecture 1 CSCE 522 - Farkas

Information Security Planning Organization Analysis Risk management Mitigation approaches and their costs Security policy Implementation and testing Security training and awareness Lecture 1 CSCE 522 - Farkas

Risk Management Lecture 1 CSCE 522 - Farkas

Risk Assessment RISK Threats Vulnerabilities Consequences Lecture 1 CSCE 522 - Farkas

Optimal level of security Risk Assessment Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Cost Security level 0 % 100% Optimal level of security at a minimum cost Security Investment Cost of Breaches

Real Cost of Cyber Attack Damage of the target may not reflect the real amount of damage Services may rely on the attacked service, causing a cascading and escalating damage Need: support for decision makers to Evaluate risk and consequences of cyber attacks Support methods to prevent, deter, and mitigate consequences of attacks Lecture 1 CSCE 522 - Farkas

Risk Management Framework (Business Context) Understand Business Context Identify Business and Technical Risks Synthesize and Rank Risks Define Risk Mitigation Strategy Carry Out Fixes and Validate Measurement and Reporting Lecture 1 CSCE 522 - Farkas

Risk Acceptance Certification Accreditation How well the system meet the security requirements (technical) Accreditation Management’s approval of automated system (administrative) Lecture 1 CSCE 522 - Farkas

The science and study of secret writing Next Class Cryptography The science and study of secret writing Lecture 1 CSCE 522 - Farkas