Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Chapter 10 Real world security protocols
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lecture 1: Information Security Overview SYCS 653 – Fall 2009 Wayne Patterson.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
CS 483 – SD SECTION (8) AUTHORIZATION. INTRODUCTION The authorization (or access control) process is used to decide if person, program or device X is.
Cryptography and Network Security Chapter 17
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
Conclusion 1 Conclusion Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access.
Part 4  Software 1 Conclusion Part 4  Software 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Conclusion 1 Conclusion Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access.
Intro to Information Security 1 Introduction to Information Security Mark Stamp Department of Computer Science San Jose State University
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Computer & Network Security
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Protocols Part 3  Protocols 1.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Chapter 1  Introduction 1 Chapter 1: Introduction.
Encryption.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Csci5233 computer security & integrity 1 Cryptography: an overview.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Chapter eight: Authentication Protocols 2013 Term 2.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Computer and Information Security Chapter 1 Introduction 1.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Security Protecting information data confidentiality
Security+ All-In-One Edition Chapter 1 – General Security Concepts
OPERATING SYSTEMS CS 3502 Fall 2017
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Faculty of Science IT Department By Raz Dara MA.
Security.
Chapter 1: Introduction
Introduction Security Intro 1.
Computer Security By: Muhammed Anwar.
Operating System Concepts
AIT 682: Network and Systems Security
Presentation transcript:

Chapter 1  Introduction 1 Introduction

Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”

Chapter 1  Introduction 3 Alice’s Online Bank  Alice opens Alice’s Online Bank (AOB)  What are Alice’s security concerns?  If Bob is a customer of AOB, what are his security concerns?  How are Alice and Bob concerns similar? How are they different?  How does Trudy view the situation?

Chapter 1  Introduction 4 CIA  Confidentiality, Integrity and Availability  AOB must prevent Trudy from learning Bob’s account balance  Confidentiality: prevent unauthorized reading of information

Chapter 1  Introduction 5 CIA  Trudy must not be able to change Bob’s account balance  Bob must not be able to improperly change his own account balance  Integrity: prevent unauthorized writing of information

Chapter 1  Introduction 6 CIA  AOB’s information must be available when needed  Alice must be able to make transaction o If not, she’ll take her business elsewhere  Availability: Data is available in a timely manner when needed  Availability is a “new” security concern  In response to denial of dervice (DoS)

Chapter 1  Introduction 7 Beyond CIA  How does Bob’s computer know that “Bob” is really Bob and not Trudy?  Bob’s password must be verified o This requires some clever cryptography  What are security concerns of pwds?  Are there alternatives to passwords?

Chapter 1  Introduction 8 Beyond CIA  When Bob logs into AOB, how does AOB know that “Bob” is really Bob?  As before, Bob’s password is verified  Unlike standalone computer case, network security issues arise  What are network security concerns?  Protocols are critically important  Crypto also important in protocols

Chapter 1  Introduction 9 Beyond CIA  Once Bob is authenticated by AOB, then AOB must restrict actions of Bob o Bob can’t view Charlie’s account info o Bob can’t install new software, etc.  Enforcing these restrictions is known as authorization  Access control includes both authentication and authorization

Chapter 1  Introduction 10 Beyond CIA  Cryptography, protocols and access control are implemented in software  What are security issues of software? o Most software is complex and buggy o Software flaws lead to security flaws o How to reduce flaws in software development?

Chapter 1  Introduction 11 Beyond CIA  Some software is intentionally evil o Malware: computer viruses, worms, etc.  What can Alice and Bob do to protect themselves from malware?  What can Trudy do to make malware more “effective”?

Chapter 1  Introduction 12 Beyond CIA  Operating systems enforce security o For example, authorization  OS: large and complex software o Win XP has 40,000,000 lines of code! o Subject to bugs and flaws like any other software o Many security issues specific to OSs o Can you trust an OS?

Chapter 1  Introduction 13 My Book  The text consists of four major parts o Cryptography o Access control o Protocols o Software

Chapter 1  Introduction 14 Cryptography  “Secret codes”  The book covers o Classic cryptography o Symmetric ciphers o Public key cryptography o Hash functions o Advanced cryptanalysis

Chapter 1  Introduction 15 Access Control  Authentication o Passwords o Biometrics and other  Authorization o Access Control Lists and Capabilities o Multilevel security (MLS), security modeling, covert channel, inference control o Firewalls and Intrusion Detection Systems

Chapter 1  Introduction 16 Protocols  Simple authentication protocols o “Butterfly effect” --- small change can have drastic effect on security o Cryptography used in protocols  Real-world security protocols o SSL, IPSec, Kerberos o GSM security

Chapter 1  Introduction 17 Software  Software security-critical flaws o Buffer overflow o Other common flaws  Malware o Specific viruses and worms o Prevention and detection o The future of malware

Chapter 1  Introduction 18 Software  Software reverse engineering (SRE) o How hackers “dissect” software  Digital rights management o Shows difficulty of security in software o Also raises OS security issues  Limits of testing o Open source vs closed source

Chapter 1  Introduction 19 Software  Operating systems o Basic OS security issues o “Trusted” OS requirements o NGSCB: Microsoft’s trusted OS for PC  Software is a big security topic o Lots of material to cover o Lots of security problems to consider

Chapter 1  Introduction 20 Think Like Trudy  In the past, no respectable sources talked about “hacking” in detail  It was argued that such info would help hackers  Very recently, this has changed o Books on network hacking, how to write evil software, how to hack software, etc.

Chapter 1  Introduction 21 Think Like Trudy  Good guys must think like bad guys!  A police detective o Must study and understand criminals  In information security o We want to understand Trudy’s motives o We must know Trudy’s methods o We’ll often pretend to be Trudy

Chapter 1  Introduction 22 Think Like Trudy  Is all of this security information a good idea?  “It’s about time somebody wrote a book to teach the good guys what the bad guys already know.” --- Bruce Schneier

Chapter 1  Introduction 23 Think Like Trudy  We must try to think like Trudy  We must study Trudy’s methods  We can admire Trudy’s cleverness  Often, we can’t help but laugh at Alice and Bob’s stupidity  But, we cannot act like Trudy

Chapter 1  Introduction 24 In This Course…  Always think like the bad guy  Always look for weaknesses  Strive to find a weak link  It’s OK to break the rules  Think like Trudy!  But don’t do anything illegal…