Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
1 cs691 chow C. Edward Chow Overview of Computer Security CS691 – Chapter 1 of Matt Bishop.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Cryptography, Authentication and Digital Signatures
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
12/13/20151 Computer Security Security Policies...
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Fall 2008CS 334 Computer Security1 CS 334: Computer Security Fall 2008.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Introduction (Pendahuluan)  Information Security  Criptography.
Computer Security Introduction
Cryptography and Network Security
CS 395: Topics in Computer Security
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 1: Introduction
Information Security.
Data & Network Security
Information and Network Security
Chapter 1: Introduction
Chapter 1: Introduction
Another perspective on Network Security
Cryptography and Network Security
An Overview of Computer Security
Advanced System Security
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Chapter 4: Security Policies
Information Security: Terminology
Computer Security Introduction
Security in SDR & cognitive radio
Information and Network Security
Chapter 4: Security Policies
Cryptography and Network Security
Chapter 1: Introduction
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Security

Part I-1 Components of Computer Security

Confidentiality Keeping data and resources hidden. Government, military, online financial transactions, e-commerce, medical record, .... Confidentiality is a protection of information from unauthorized parties Can be achieved by access control. Cryptography is used in access control. Encryption scrambles data to make it incomprehensible. Original data can be recovered by decryption. Demo: Encryption using AES

Integrity Data integrity is to provide assurance so that data has not been altered (for example, by an unauthorized entity). Unauthorized tampering can be detected by tracking a message digest. MD5/SHA-1 Example Origin integrity (of the source of data) , is also called authentication. Counter measures include prevention and detection.

Availability Availability—Enabling access to data and resources. It is aspect of reliability and system design. Attackers can make data or service unavailable (deny access). Some systems are designed based on some (statistical) model. Attackers can do something so that the assumptions of the model is invalid.

Part I-2 Threats

Disclosure Unauthorized access of information. It is a passive attack and has the following form: Snooping (e.g., wiretapping).

Deception Acceptance of false data. The forms are: Modification (or alteration)—unauthorized change of information (e.g., active wiretapping, man-in-the-middle attack). Spoofing (or masquerading)—impersonation Repudiation of the origin—deny previously authorized action. Denial of receipt

Policies and Mechanisms Components of Computer Security Threats Policies and Mechanisms Trust and Assumptions Assurance Operational Issues Hum Part I-3 Policies and Mechanisms

Policies and Mechanisms Policy says what is, and is not, allowed. 1 A policy defines “security” for site/system/etc. Formal definition (e.g., algebraic characterization) v.s. informal definition (plain description in English). 2 Mechanisms enforce policies. 1 Mechanisms can be methods, tools or procedures. Be careful with composition of policies. Inconsistent policies may be a source of security flaws. 1 Example. MS Outlook can be configured to include “Don’t download pictures”, but in IE “Show picture” is chosen.

Goals of Security Prevention—prevent attackers from violating security policy. Detection—detect attackers’ violation of security policy. Recovery—stop attack, assess and repair damage; continue to function correctly even if attack succeeds

Part I-4 Trust and Assumptions

Trust and Assumptions Underlie all aspects of security. Two assumptions: 1 Policies should unambiguously partition system states into “secure” set and “non secure” set, and correctly capture security requirements. Mechanisms are assumed to enforce policy and implemented correctly. 2

Types of Mechanisms P = set of all states. Q = set of secure states specified by a policy. Q is a subset of P, i.e., Q ⊂ P. Suppose that a mechanism restricts the system to some set of states, say R ⊂ P. Then the security mechanism is 1 secure if R ⊂ Q. precise if R = Q. broad if R − Q is not empty, i.e., there is some state of R which is not in Q. 2 3

Types of Mechanisms...(2) Secure Precise Broad Set Q ( secure ) Set R ( reachable )

Components of Computer Security Threats Policies and Mechanisms Trust and Assumptions Assurance Operational Issues Hum Part I-7 Human Issues

Human Issues People problems: Outsiders and insiders 1 1 Outsiders and insiders Some statistics indicates high percentage of security threats are from insiders. 2 2