EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
The University of Adelaide, School of Computer Science
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 1 Page 1 CS 236, Spring 2008 What Are Our Security Goals? Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering.
CPSC 6126 Computer Security Information Assurance.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Storage Security and Management: Security Framework
Cryptography and Network Security
What does “secure” mean? Protecting Valuables
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Architecture
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Network security Network security. Look at the surroundings before you leap.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Building Dependable Distributed Systems Chapter 1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Lecture 1 Page 1 CS 236 Online What Are Our Security Goals? CIA Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer Security By Duncan Hall.
Fall 2008CS 334 Computer Security1 CS 334: Computer Security Fall 2008.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
Is There a Security Problem in Computing?
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Chapter 1: Introduction
Security
CS 450/650 Fundamentals of Integrated Computer Security
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Security in Computing, Fifth Edition
What Are Our Security Goals?
Cyber Security For Civil Engineering
Presentation transcript:

EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Outline Introduction to computer security  Security concept  Vulnerabilities, threats, attacks, and Controls Computer Security: Art and Science, by Matt Bishop, Addison-Wesley Professional, 2002  Security in Computing, 4th Edition By Charles P. Pfleeger, Shari Lawrence Pfleeger 

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao The Meaning of Computer Security The purpose of computer security is to devise ways to protect valuable computer-related asset  Computer-related asset (valuable components): Hardware, software, and data What we mean when we say that a system is secure:  Confidentiality: computer-related assets are accessed only by authorized parties. Confidentiality is sometimes called secrecy or privacy  Integrity: assets can be modified only by authorized parties or only in authorized ways  Availability: assets are accessible to authorized parties at appropriate times

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Confidentiality Confidentiality is the concealment of information  Conceal the content of the information  Conceal the very existence of information The need for keeping information secret arises from the government and the industry  Enforce “need to know” principle Achieve confidentiality: access control mechanisms  Cryptography: users without the cryptographic key cannot access unscrambled information  Other access control mechanisms may conceal the mere existence of data, such as Steganography

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Integrity Integrity refers to the trustworthiness of information, usually phrased in terms of preventing improper or unauthorized change  Data integrity: the content of the information  Origin integrity: the source of the data, i.e., authentication Integrity mechanisms:  Prevention mechanisms: Blocking any unauthorized attempts to change the data Blocking any attempts to change the data in unauthorized ways  Detection mechanisms: report that the data’s integrity is no longer trustworthy Analyze system events to detect problems Analyze the data itself to see if required or expected constraints still hold

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Working with Confidentiality & Integrity With confidentiality, the data is either compromised or it is not With integrity, both the correctness and the trustworthiness of the data must be considered  Origin of the data  How well the data was protected before it arrived at the current machine  How well the data is protected on the current machine Evaluating integrity is often very difficult

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Availability Availability refers to the ability to use the information desired  An aspect of reliability  Also an aspect of system design: an unavailable system is at least as bad as no system at all Why availability is relevant to security?  Someone may deliberately arrange to deny access to data or to a service by making it unavailable  Denial of service attacks: attempts to block availability  It is very difficulty to detect denial of service attacks Must determine if the unusual access patterns are attributable to deliberate manipulation of resources or of environment (i.e., an atypical event)

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Availability The security community is just beginning to understand what availability implies and how to ensure it A small, centralized control of access is fundamental to preserving confidentiality and integrity, but it is not clear that a single access control point can enforce availability Much of computer security's past success has focused on confidentiality and integrity; full implementation of availability is security's next great challenge

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Relationship of Security Goals A secure system must meet all three requirements The challenge is how to find the right balance among the goals, which often conflict  For example, it is easy to preserve a particular object's confidentiality in a secure system simply by preventing everyone from reading that object  However, this system is not secure, because it does not meet the requirement of availability for proper access => There must be a balance between confidentiality and availability

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Relationship of Security Goals

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Vulnerabilities, Threats, Attacks, & Controls A vulnerability is a weakness in the security system A threat to a computing system is a set of circumstances that has the potential to cause loss or harm A human who exploits a vulnerability perpetrates an attack on the system. How do we address these problems? We use a control as a protective measure  A control is an action, device, procedure, or technique that removes or reduces a vulnerability  A threat is blocked by control of a vulnerability

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Threats, Vulnerabilities, and Controls

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Type of Threats An interception means that some unauthorized party has gained access to an asset In an interruption, an asset of the system becomes lost, unavailable, or unusable If an unauthorized party not only accesses but tampers with an asset, the threat is a modification An unauthorized party might create a fabrication of counterfeit objects on a computing system

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Type of Threats

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Threats: Methods, Opportunity, and Motive A malicious attacker must have three things:  Method: the skills, knowledge, tools, and other things with which to launch an attack  Opportunity: the time and access to accomplish the attack  Motive: a reason to want to perform this attack against this system

5/22/2015 EEC688/788: Secure & Dependable Computing Wenbing Zhao Vulnerabilities

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Threats in Networks Networks are specialized collections of hardware, software, and data  Each network node is itself a computing system  It experiences all normal security problems A network must also confront communication problems that involve the interaction of system components and outside resources

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao What Makes a Network Vulnerable A network's lack of physical proximity Use of insecure, shared media, and The inability of a network to identify remote users positively

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Methods of Defense Harm occurs when a threat is realized against a vulnerability To protect against harm, we can neutralize the threat, close the vulnerability, or both The possibility for harm to occur is called risk

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Methods of Defense We can deal with harm in several ways. We can seek to  Prevent it, by blocking the attack or closing the vulnerability  Deter it, by making the attack harder, but not impossible  Deflect it, by making another target more attractive (or this one less so)  Detect it, either as it happens or some time after the fact  Recover from its effects Intrusion tolerance is also a form of recovery because it enables the system to continue operating correctly despite attacks

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Methods of Defense – Multiple Controls

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Countermeasures / Controls Encryption  Scrambling process Software controls  Internal program controls, OS controls, development controls Hardware controls  hardware or smart card implementations of encryption Policies and Procedures  Example: change password periodically Physical Controls  Example: Locks on doors, guards at entry points

Security Principles Principle of easiest penetration Principle of adequate protection Principle of effectiveness

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Principle of Easiest Penetration An intruder may use any available means of penetration  The penetration may not necessarily be by the most obvious means  Nor is it the one against which the most solid defense has been installed

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Principle of Easiest Penetration This principle implies that  Computer security specialists must consider all possible means of penetration  The penetration analysis must be done repeatedly, and especially whenever the system and its security changes  Strengthening one aspect of a system may simply make another means of penetration more appealing to intruders

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Principle of Adequate Protection Principle of Adequate Protection:  Computer items must be protected only until they lose their value  They must be protected to a degree consistent with their value

5/22/2015 EEC688: Secure & Dependable Computing Wenbing Zhao Principle of Effectiveness Principle of Effectiveness: Controls must be used — and used properly — to be effective. They must be efficient, easy to use, and appropriate