Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Operating System Security
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Chapter 19: Network Management Business Data Communications, 5e.
Introduction to Databases
Appendix B: Designing Policies for Managing Networks.
Chapter 1 – Introduction
Security+ Guide to Network Security Fundamentals
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Principles of Information Security, 2nd Edition1 Introduction.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Cryptography and Network Security
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
CS CS 5150 Software Engineering Lecture 18 Security.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Information Systems Security
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
 Focus on various part of the operating system can achieve the security and protection according to the organization’s requirement.  External and internal.
Information Security Training for People who Supervise Computer Users.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Privacy, Confidentiality, and Security Component 2/Unit 8c.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Chapter 10: Rights, User, and Group Administration.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS Instructor Ms. Arwa Binsaleh.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Privilege Management Chapter 22.
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Issues and Protections
CHAPTER FOUR OVERVIEW SECTION ETHICS
Lecture 1: Foundation of Network Security
CHAPTER FOUR OVERVIEW SECTION ETHICS
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Chapter 4: Security Policies
Cryptography and Network Security
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Presentation transcript:

Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users: Authentication, Authorization, Privacy  Security in stand-alone, networked, and internetworked environments

Chapter 1  Introduction 2 Secure Computer System  A security policy specifies exactly what types of actions are and are not permitted on the system  Example security policy o Only authorized users able to use the system o Authorization/Access control o Resources sharing among users  A secure system obeys its security policy

Chapter 1  Introduction 3 Security Breaches  A violation of a system’s security policy is called a security breach  Security breaches can occur o Accidentally – faulty program o Intentionally – virus  Creating a system where security breaches cannot occur can be easy or impossible depending on o What the security policy requires o How the system implements the policy

Chapter 1  Introduction 4 Secure Systems Design  Policy Simplicity Principle o Policy as simple as possible (but no simpler) o Should state what is allowed and forbidden  System Functionality Principle o Include necessary functionality (and no more) o Perform job it was designed to do (and no more)

Chapter 1  Introduction 5 Policy Simplicity  Simpler security policies are easier to get right, reason about and implement  Security breaches caused by policy shortcomings are most often due to o Incomplete or inconsistent policy o Misunderstanding the policy’s requirements o Error in implementation

Chapter 1  Introduction 6 System Functionality  Limiting functionality limits attacks  Security breaches caused by system functionality can be caused by o Software bugs o Unforeseen interactions between components

Chapter 1  Introduction 7 Relative Security  Few useful systems will be absolutely secure  We view security in a relative sense  This does not mean that good security design and implementation is unimportant  Example: safes

Chapter 1  Introduction 8 Cost vs Security  Proper security level depends on value of the items that system is protecting (other concerns?)  Trade-off between cost and security  Select security level appropriate for user needs

Chapter 1  Introduction 9 Cost vs Security (continued)  Example: user authentication o System A - authenticates the user by retinal scan o System B - authenticates users once with password  System A is probably more secure than system B, but more costly and inconvenient  Is added security and expense called for? o Maybe for NSA o Not for an individual

Chapter 1  Introduction 10 Secure System Concerns  Data o Privacy o Integrity o Availability  Users o Authentication o Privacy

Chapter 1  Introduction 11 Data Privacy  Data privacy: access to information is limited to authorized entities  Examples o Certain files only accessible to certain users o Communications between two users cannot be read by some third party  Cryptography for privacy of data

Chapter 1  Introduction 12 Data Integrity  Data has integrity if it can only be modified by authorized principals  Examples o Bank must ensure that only authorized personnel can change account balances o Company must make sure that its freeware program has not been modified  Message-digests used to protect integrity

Chapter 1  Introduction 13 Data Availability  Data availability means that data is accessible in a timely manner as needed  Examples o Non-working laptop brought to open-note test o Student’s laptop notes poorly organized so time wasted finding relevant information  Replication and fault tolerance can be used to ensure the availability of data

Chapter 1  Introduction 14 User Authentication  User authentication means that system accurately determines user’s identity  Examples o Files readable only by their owner o Only certain users should be able to add or delete system accounts  Authenticate by: something you know, something you have, something you are

Chapter 1  Introduction 15 User Privacy  privacy means that users have control over info collected and made available to others  Examples: o User may not want others to know programs they run, who they communicate with, etc. o User may not want to receive spam  Anonymity can protect privacy

Chapter 1  Introduction 16 Network and Internet  Additional challenges o Privacy  Stand-alone system - the operating system is likely to control all communication channels  Networked systems - no host controls the communication medium; eavesdropping usually easy o User authentication  Stand-alone system – user is physically present  Internetworked systems – user may access system over an insecure communication channel

Chapter 1  Introduction 17 Summary  A secure computer system follows security policy  Security concerns involve protecting o Data privacy o Data integrity o Data availability o User authentication o User privacy o Network and internetwork  additional risks