Computer Security Security Concepts September 20, 2018

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Cryptography, Authentication and Digital Signatures
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
Data & Network Security
Cryptography and Network Security
Information System and Network Security
Information Security.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
CNET334 - Network Security
Introduction Of Information Security
Information and Network Security
10CS835 Information Security
S/MIME T ANANDHAN.
NET 311 Information Security
Computer and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Security in SDR & cognitive radio
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Security Mechanisms Network Security.
Security Attacks Network Security.
Message Authentication
Presentation transcript:

Computer Security Security Concepts September 20, 2018 ©2004, Bryan J. Higgs

What is Computer Security? X.800* Security Services: Authentication Access Control Data Confidentiality Data Integrity Non-repudiation * International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T) Recommendation X.800, Security Architecture for OSI (Open Systems Interconnection), RFC 2828 (http://www.ietf.org/rfc/rfc2828.txt)

Authentication Is a communication authentic? For messages: Assures recipient of a message that the message really is from the source it claims to be from. For connections: Assures both entities involved in a connection that each entity is authentic (determined at connection initiation) Assures no interference with a connection during the life of that connection Assures that no third party can masquerade as one of the two entities.

Access Control Can an entity (user, computer) access resources? Host systems Communications links Applications Files etc. Typically, access rights are tailored to each individual entity Clearly depends on accurate authentication of an entity!

Data Confidentiality Is data (for example, in messages) held confidential to the appropriate set of entities? Once accessed, is the data readable by a third party? Can file contents be read? Can a third party eavesdrop on messages sent between entities?

Data Integrity Is data secure from accidental or deliberate changes? If an entity sends a series of messages, do they arrive in the proper order, and do they contain the original contents? Can a third party change the contents of a message, file, database, etc?

Non-repudiation* Can an entity deny that a completed action never took place, when it really did? Like someone trying to deny having signed a contract Assures that the sending or receiving of a message by the entity can be proven to have actually happened *re·pu·di·ate 1 : to divorce or separate formally from (a woman) 2 : to refuse to have anything to do with 3 a : to refuse to accept; especially : to reject as unauthorized or as having no binding force b : to reject as untrue or unjust <repudiate a charge> 4 : to refuse to acknowledge or pay

What is Computer Security? X.800 Security Mechanisms, including: Encipherment (or Encryption) Digital Signature Access Control Data Integrity Authentication Exchange Notarization Audit Trails

Encipherment (or Encryption) The use of mathematical algorithms to transform data into a form that is not readily readable by third parties. The original data is readily readable, and is known as cleartext, or plaintext The enciphered data is not readily readable, and is known as ciphertext. Transforming ciphertext back into its original cleartext is known as decipherment or decryption.

Digital Signature Data attached to, or a cryptographic transformation of, data which allows the recipient to ensure the source and integrity of the data, and to protect against forgery. Corresponds to a handwritten signature on an official document

Access Control Mechanisms to enforce access rights to resources Typically implemented (usually by an operating system) as access control lists (ACLs) associated with each resource (such as a file) An ACL specifies which entities have what kind of access (read only, read-write, etc.) to the resource.

Data Integrity Mechanisms used to assure the integrity of data. In communications, assures that a series of messages sent to a recipient arrive in the proper order, and containing the original contents In databases. assures that the relationships among data items within a database are valid (correspond to the business rules of the organization), and remain valid over time, despite updates to the database.

Authentication Exchange and Notarization Mechanism to ensure the identity of one or more entities by appropriate exchange of information Notarization: The use of a trusted third party to assure authentication and data integrity Analogous to a Notary Public in signing public documents.

Audit Trails Data collected to track security-related events in a system Can be used to verify (or otherwise) the security of a system in a security audit. Essential for security experts to be able to detect a security breach, and track down the perpetrator(s)

Security Attacks Passive Attack Active Attack Attempt to gain information without changing contents of messages or state of system Active Attack Attempt to change contents of messages or change the state of a system or impact its operation.

Passive Attack Eavesdropping or monitoring of transmissions Direct: Reading message contents Indirect: Use of traffic analysis to determine patterns which can help the perpetrator to guess the nature of the communication. More subtle Very difficult to detect Usually, encryption used for prevention

Active Attack Involves modification or alteration of message or system Types: Masquerade Replay Modification of Messages Denial of Service Easier to detect, but harder to prevent.