6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

An Overview of Computer and Network Security Nick Feamster CS 6262 Spring 2009.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
1 Network Security Ola Flygt Växjö University
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 An Overview of Computer Security computer security.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography COS 461: Computer Networks Princeton University 1.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Overview of Security Dr. Sriram Chellappan These slides are available at BlackBoard.
Introduction to Computer and Network Security
C8- Securing Information Systems
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
1 Introduction to Information Security Spring 2012.
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.
Ch 13 Trustworthiness Myungchul Kim
Network Security Introduction
Jump to first page Internet Security in Perspective Yong Cao December 2000.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
Information System and Network Security
Threats By Dr. Shadi Masadeh.
Information and Network Security
Introduction to Cryptography
Cryptography and Network Security
Presentation transcript:

6/9/2015Madhumita. Chatterjee1 Overview of Computer Security

6/9/2015Madhumita. Chatterjee2 Security concerns on the Internet Highly contagious viruses Defacing web pages Credit card no theft On-line scams Intellectual property theft Wiping out data Denial of service Spam s Etc etc etc………….

6/9/2015M. Chatterjee3 Who are the attackers? Unintended blunders Hackers driven by technical challenges Disgrunted employees or customers Petty criminals Organized crimes Organized terror groups Information warfare

6/9/2015M. Chatterjee4 Vulnerabilities Application security Buggy code Buffer overflows Host security Server side Client side Transmission security Network Security

6/9/2015M. Chatterjee5 Security Requirements Confidentiality Protection from disclosure to unauthorized persons Authenticity is the identification and assurance of the origin of information. Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes. Non-Repudiation: Originator cannot deny sending the message

6/9/2015M. Chatterjee6 Security Requirements…… Availability refers to the ability to use the information or resource desired. Access control Anonymity

6/9/2015M. Chatterjee7 Security Mechanisms System security: “ Nothing bad happens to my computers and equipment ” Virus, trojan horse, logic/time bombs. Network Security: Authentication Mechanisms: “you say who you say you are” Access control: Firewalls, proxies…..who can do what? Data Security: “ For your eyes only” Encryption, digests, signatures…..

Security Mechanisms…. Encipherment Hiding or covering data Data Integrity Appends a checkvalue to data Digital Signature Electronic signature Authentication exchange Two parties exchange messages to prove their identities 6/9/2015 Madhumita. Chatterjee 8

Security Mechanisms…. Traffic padding Inserting bogus data into traffic Routing control Changing different available routes between sender and receiver Notarization Selecting a trusted third party to control communication Access control 6/9/2015Madhumita. Chatterjee9

6/9/2015M. Chatterjee10 Security Threats and Attacks A threat is a potential violation of security. Flaws in design, implementation, and operation. An attack is any action that violates security. Active adversary.

Threat to confidentiality Snooping Traffic Analysis Threat to Integrity Modification Masquerading Replaying Repudiation 6/9/2015Madhumita. Chatterjee11

Threat to availibility Denial of Service 6/9/2015Madhumita. Chatterjee12

6/9/2015M. Chatterjee13 Eavesdropping - Message Interception (Attack on Confidentiality) Unauthorized access to information Packet sniffers and wiretappers Illicit copying of files and programs S R Eavesdropper

6/9/2015M. Chatterjee14 Integrity Attack - Tampering With Messages Stop the flow of the message Delay and optionally modify the message Release the message again S R Perpetrator

6/9/2015M. Chatterjee15 Authenticity Attack - Fabrication Unauthorized assumption of other’s identity Generate and distribute objects under this identity S R Masquerader: from S

6/9/2015M. Chatterjee16 Attack on Availability Destroy hardware (cutting fiber) or software Modify software in a subtle way (alias commands) Corrupt packets in transit Blatant denial of service (DoS): Crashing the server Overwhelm the server (use up its resource) S R

6/9/2015M. Chatterjee17 Impact of Attacks Theft of confidential information Unauthorized use of Network bandwidth Computing resource Spread of false information Disruption of legitimate services All attacks can be related and are dangerous!

Passive vs Active Attacks AttacksPassive/ActiveThreatening Snooping,Traffic Analysis PassiveConfidentiality Modification,Masquerad ing,Replaying,Repudiati on ActiveIntegrity Denial of ServiceActiveAvailibility 6/9/2015Madhumita. Chatterjee18

6/9/2015M. Chatterjee19 Close-knit Attack Family who to impersonate sniff for content traffic analysis - who is talking re-target jam/cut it capture & modify pretend re-target I need to be Bill Passive attacks Active Attacks

6/9/2015M. Chatterjee20 Security Policy and Mechanism Policy: a statement of what is, and is not allowed. Mechanism: a procedure, tool, or method of enforcing a policy. Security mechanisms implement functions that help prevent, detect, and respond to recovery from security attacks. Security functions are typically made available to users as a set of security services through APIs or integrated interfaces. Cryptography underlies many security mechanisms.

6/9/2015M. Chatterjee21 Security Services Confidentiality: protection of any information from being exposed to unintended entities. Information content. Parties involved. Where they are, how they communicate, how often, etc.

6/9/2015M. Chatterjee22 Security Services - Cont’d Authentication: assurance that an entity of concern or the origin of a communication is authentic - it’s what it claims to be or from Integrity: assurance that the information has not been tampered with Non-repudiation: offer of evidence that a party indeed is the sender or a receiver of certain information

6/9/2015M. Chatterjee23 Security Services - Cont’d Access control: facilities to determine and enforce who is allowed access to what resources, hosts, software, network connections Monitor & response: facilities for monitoring security attacks, generating indications, surviving (tolerating) and recovering from attacks

6/9/2015M. Chatterjee24 Security Services - Cont’d Security management: facilities for coordinating users’ service requirements and mechanism implementations throughout the enterprise network and across the Internet Trust model Trust communication protocol Trust management infrastructure

Relation between security services and mechanisms Security Service Security Mechanisms Data Confidentiality Encipherment and routing control Data IntegrityEncipherment, digital signature, data integrity AuthenticationEncipherment, digital signature, authentication exchanges Non-repudiationDigital signature, data integrity and notarization Access controlAccess control mechanisms 6/9/2015Madhumita. Chatterjee25

6/9/2015M. Chatterjee26 Integrity Confidentiality Avalaibility Security Goals Security Goals

Security Techniques Cryptography Symmetric key encipherment Asymmetric key encipherment Hashing Steganography Covered writing 6/9/2015Madhumita. Chatterjee27

6/9/2015M. Chatterjee28

6/9/2015M. Chatterjee29

6/9/2015M. Chatterjee30 Methods of Defence Encryption Software Controls (access limitations in a data base, in operating system protect each user from other users) Hardware Controls (smartcard) Policies (frequent changes of passwords) Physical Controls