Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 cs691 chow C. Edward Chow Overview of Computer Security CS691 – Chapter 1 of Matt Bishop.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cryptography and Network Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Security Architecture
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Slide #1-1 Introductory Computer Security CS461/ECE422 Fall 2010 Susan Hinrichs.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Fall 2008CS 334 Computer Security1 CS 334: Computer Security Fall 2008.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Network Security Celia Li Computer Science and Engineering York University.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Computer Security Introduction
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 1: Introduction
I have many checklists: how do I get started with cyber security?
Chapter 1: Introduction
Chapter 1: Introduction
An Overview of Computer Security
Advanced System Security
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Information Security: Terminology
Computer Security Introduction
Security.
Security in SDR & cognitive radio
Chapter 1: Introduction
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive fields (military, industry) –Examples: encryption (protect the key), access control, existence of the data, resource hiding (configuration, google 1.7 – 2.4 M servers.) Integrity: prevent unauthorized or improper changes, is directly related to trustworthiness of data and sources –Include data integrity and origin integrity (has impact on trust), therefore, related to credibility –Prevention: prevent unauthorized changes changes in unauthorized ways –Detection Report integrity violation (confine dirty data??)

Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability (continued) Availability: ability to use the data or resources –Example of highway –DoS or DDoS attacks (SMS for cell phone) –Very difficult to detect Is it attack or we are unlucky today Attacker will mess with the security methods as well (packet tracing)

Threats: –A potential violation of security (not necessarily occur at this moment). The actions that cause such violations are called attacks. 4 classes of threats: –Disclosure: unauthorized access to data –Deception: acceptance of false data –Disruption: interruption or prevention of correct operation –Usurpation: unauthorized control of the system

Examples of threats: –Snooping: unauthorized interception, is a kind of disclosure (eavesdrop on wireless). Countered by confidentiality or other information hiding methods. –Modification: unauthorized change of data, may lead to deception, disruption, and usurpation. Countered by integrity. –Spoofing: impersonation, may lead to deception and usurpation. Countered by integrity. Difference b/w impersonation and delegation –Denial of receipt or origin: is a kind of deception Interesting questions: simultaneous contract signing

Policy and mechanism –Policy is a statement of what is and what is not allowed. Can be presented formally (in mathematical way) Can be described in plain English When two communicating parties have different policies, they may need to compromise (example b/w univ. and industry) –Mechanism is a method to enforce a policy. May impact the system performance Prevention: to fail an attack Detection Recovery: fix not only data, but also vulnerabilities Tolerance

Assumptions: –Security rests on assumptions of the required security and application environments –Assumptions of a security policy A policy can correctly and unambiguously partitions system states into secure and insecure A security mechanism will prevent a system from entering a insecure state Define a security mechanism as secure, precise, or broad (the example of highway) In real life, security mechanisms are usually broad (Why?)

Assurance: –The level of trust that we put on a system is based on its specification, design, and implementation Specification: desired function of the system Design: translate specifications into components that will implement them. Need to determine whether the specifications are satisfied Implementation: create a system that should satisfy the specification and design –Verification: complexity, input, assumptions –Testing: what to test, how to test

Operational issues: –An isolated PC will not be attacked through network, but it cannot access network either –We must balance the benefit of protection against the cost of designing, implementation, and usage of a system –Cost-benefit analysis: Protect data or regenerated data? Which is cheaper? There are after-impacts as well. (view of company?)

Operational issues (continued): –Risk analysis: We must understand the kinds and levels of threats, and their likelihood to happen to determine the levels of protection Risk is a function of environment Risk changes with time Low probability attacks still exist You must act on the analysis results

Operational issues (continued): –Laws and customs The selection of policy and mechanisms must consider legal issues: Example of encryption export and monitor A legal security mechanism is not necessarily acceptable: submit your DNA so we have bio- based authentication A good technology is not necessarily being widely adopted: security is beyond technology

Human issues: –Get the security tools from right hands, and put them into right hands –Organizational issues: Security does not directly generate profit, but reduce potential losses It often reduces performance Power and responsibility must be properly linked Shortage in people and resources

Human issues (continued): –People issues: People is heart of any security system Attacks from outsider and insiders Under trained workers and administrators Social engineering based break-ins (in a bar at SV you can learn a lot) The problem of misconfiguration (Example of SigComm)

Putting them together: –Feedback and maintenance is important –Pay close attention to figure 1-1 on page 20