Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Chapter 1: Introduction.
Advertisements

ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Applied Cryptography for Network Security
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
E-Commerce Security and Fraud Issues and Protections
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Securing Information Systems
A First Course in Information Security
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Cryptography and Network Security
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Small Business Security Keith Slagle April 24, 2007.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chap1: Is there a Security Problem in Computing?.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Ingredients of Security
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
MIS323 – Business Telecommunications Chapter 10 Security.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Information Management System Ali Saeed Khan 29 th April, 2016.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Securing Information Systems
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 17 Risks, Security and Disaster Recovery
Information and Network Security
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Malware, Phishing and Network Policies
Chapter 9 E-Commerce Security and Fraud Protection
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture notes Fall 2006 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Announcements New course in Spring - Trusted Computing – –Friday’s at 1PM Final exam –Monday December 11 th at 11:00 AM –Location SGM 124 (Auditorium) –Bring blank paper – optional stapler Paper due today –No penalty if submitted/postmarked by 12/8/06 Course evaluations at break

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Security Systems Lecture 14 – December 1, 2006 Select Topics and Review Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Requested Topics Landscape of attacks (glossary) Risk Analysis How are attacks funded? Security Case Studies –I’ll use these as a basis for review

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Availability –Denial of Service (DoS AND DDoS) ▪Over consumption of resources –Network, ports, etc –Take down name servers, other critical components ▪Exploits to crash system ▪Cache poisoning

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Confidentiality –Eavesdropping –Key Cracking –Exploiting Key Mismanagement –Impersonation ▪Exploiting protocol weakness ▪Discovered passwords ▪Social Engineering –Exploiting mis-configurations

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Integrity –Breaking Hash Algorithms –Exploiting Key Mismanagement –Impersonation ▪Exploiting protocol weakness ▪Discovered passwords ▪Social Engineering –Exploiting mis-configurations

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Glossary of Attacks This is not a complete list Miscellaneous –Spam –Phishing –Malware attacks ▪Spyware ▪Viruses ▪Worms ▪Trojan Horse –Man in the middle

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Risk Management Security is not absolute One must balance: –Likelihood of attack –Defense costs –Cost of lost opportunity –Cost on users –Losses from attack Successful Risk Management –Considers ways to affect all of the above

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Funding of Attacks Used to be unfunded –Bragging rights Now networks and underground economy –Organized crime –Direct gain from attack

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Hypothetical Case Studies Past exams –Electronic voting (Fall 2004) –Medical records (Fall 2003) –Intrusion Detection and Response (Fall 2005)

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Electronic Voting You have been asked to design a system to support the collection and counting of votes for the next election. In particular, you have been asked to design a system that will accurately tabulate votes entered by voters at poling places throughout the state and to transmit those votes to the county clerk of each county where the totals will be tabulated. (a) Threats. What are the threats in such a system? What can go wrong? (b) Requirements. What are the requirements for authentication, authorization, assurance, audit, and privacy? Explain who and what must be authenticated, what authorizations are required, what assurance is needed for the software, and what kind of records must be maintained (as well as what kinds of records should not be maintained). (c) Considering the requirements listed above, and how they relate to the assurance problem, i.e. how can steps taken for authentication, authorization and audit be used to ensure that the software has not been modified to improperly record or transmit votes? (d) What technologies proposed for digital rights management be used to provide stronger assurance that the system’s integrity has not been compromised. What is similar about the two problems, and how would such technologies be applied to the voting problem.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Medical Records You have been hired as a consultant to advise on the design of a security mechanism that will be used to protect patient data in a new medical records system. This system will manage and support the transmission of patient records, including very large images files for X-rays, MRI, CAT-scans and other procedures. The system must provide appropriate levels of protection to meet HIPAA privacy regulations, and it must allow the access to records needed by physicians and specialists to which patients are referred. (a) Describe appropriate requirements for confidentiality, integrity, accountability, and reliability/availability in such a system. (b) In what part's) of the system (e.g., where in the protocol stack would you include support for each of the requirements identified in (a)? Why would you place mechanisms where you suggested; what were the issues you considered? (c) What security mechanisms and approaches to implement those mechanisms would you use to meet the requirements in (a) as implemented in the parts of the system you identified in (b)?

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Intrusion Detection and Response You have been asked to design a system that will provide effective response to new attacks. The system you design will have two components, an intrusion detection component designed to detect attacks, and a dynamic policy enforcement mechanisms that will dynamically adjust policies based on what is learned about attacks from the intrusion detection component. Your system is supposed to provide an effective defense against viruses, worms, as well as attacker targeted penetration attempts to the systems in your organization.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Review - Topics Cryptography Key Management Identity Management (and Authentication) Policy (and Authorization) Attacks –Classic –The human element Defenses –Firewalls, Intrusion Detection and Response, Encryption, Tunnels, Defenses to Malware Architectures and Trusted Computing

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Current Event Could Existing Malware Infect Vista? PC World, November 30, 2006, by Nancy Gohring One security firm says Vista is vulnerable to current threats; another isn't so sure. Microsoft has touted Vista as a more secure version of Windows, but on the day of Vista's official launch, a security company has identified malware already in circulation that can infect computers running the OS. PS: November 30 is “Computer Security Day” first observed in 1988.