1 Introduction to Security Dr.Talal Alkharobi. 2 Why is security important? Computers and networks are the nerves of the basic services and critical infrastructures.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
K. Salah1 Introduction to Security Overview of Computer Security.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Lecture 11 Reliability and Security in IT infrastructure.
Introduction (Pendahuluan)  Information Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Network security policy: best practices
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Introduction to Network Defense
SEC835 Database and Web application security Information Security Architecture.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
Cryptography and Network Security
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
What does “secure” mean? Protecting Valuables
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice
Security Architecture
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Computer Security By Duncan Hall.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Copyright © 2013 – Curt Hill Computer Security An Overview.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
CS457 Introduction to Information Security Systems
Chapter 1: Introduction
Chapter 1: Introduction
INFORMATION SYSTEMS SECURITY and CONTROL
An Overview of Computer Security
Advanced System Security
Mohammad Alauthman Computer Security Mohammad Alauthman
Cryptography and Network Security
Basic Security Concepts
Chapter 1: Introduction
Presentation transcript:

1 Introduction to Security Dr.Talal Alkharobi

2 Why is security important? Computers and networks are the nerves of the basic services and critical infrastructures in our society Financial services and commerce Transportation Power grids Etc. Computers and networks are targets of attacks by our adversaries

3 Why is security so hard? The complexity of computers and networks Increases Internet usage User expectation Lack of awareness of threats and risks Software by peopleware Social engineering Defense is inherently more expensive Offense only needs the weakest link Ample cracking tools

4 Type of Attackers Amateurs: regular users, who exploit the vulnerabilities of the computer system Less experienced Motivation: easy access to vulnerable resources

5 Type of Attackers Hackers/Crackers: attempt to access computing facilities for which they do not have the authorization Experts Motivation: enjoy challenge, curiosity

6 Type of Attackers Career criminals: professionals who understand the computer system and its vulnerabilities Motivation: personal gain (e.g., financial)

7 Methods of Defense block attackPrevent make the attack harderDeter make other targets more attractive, e.g. is honeypots Deflect identify misuseDetect function under attackTolerate restore to correct stateRecover

8 Computer Security Domains Physical security Operational/procedural security Personnel security System security Network security Information Security

9 Computer Security Domains Physical security Controlling the comings and goings of people and materials Protection against the elements and natural disasters Operational/procedural security Covering everything from managerial policy decisions to reporting hierarchies

10 Computer Security Domains Personnel security Hiring employees, background screening, training, security briefings, monitoring, and handling departures

11 Computer Security Domains System security User access and authentication controls, assignment of privilege, maintaining file and filesystem integrity, backups, monitoring processes, log-keeping, and auditing. OS and database systems.

12 Computer Security Domains Network security Protecting network and telecommunications equipment, protecting network servers and transmissions, combating eavesdropping, controlling access from untrusted networks, firewalls, and detecting intrusions

13 Computer Security Domains Information Security Hiding of information (cryptography) security of information in transit over a network. e-commerce transactions, online banking, confidential s, file transfers, record transfers, authorization messages, etc.

14 What is Security? Keeping something (e.g. information) secure against Someone stealing it Someone destroying it Someone changing it Someone preventing me from using it

15 What is Security? More Specifically Confidentiality: nobody else can see it Integrity: nobody else can change it Availability: I can get at it whenever I want

16 Basic Components of Security Confidentiality: Keeping data and resources secret or hidden Integrity: Ensuring authorized modifications Availability: Ensuring authorized access to data and resources when desired Accountability: Ensuring that an entity ’ s action is traceable uniquely to that entity Security assurance: Assurance that all four objectives are met

17 What “ secure ” means Confidentiality Integrity Availability Secure

18 Information security today Emergence of the Internet and distributed systems Increasing system complexity Digital information needs to be kept secure Competitive advantage Protection of assets Liability and responsibility Financial losses There are reports that the annual financial loss due to information security breaches is between 5 and 45 billion dollars

19 Information security today National defense Protection of critical infrastructures: Power Grid; Air transportation Interlinked government agencies Severe concerns regarding security management and access control measures

20 Attack Vs Threat A threat is a “ potential ” violation of security The violation does not need actually occur The fact that the violation might occur makes it a threat It is important to guard against threats and be prepared for the actual violation “ being paranoid ” The actual violation of security is called an attack

21 Common security attacks Interruption, delay, denial of receipt or denial of service System assets or information become unavailable or are rendered unavailable Interception or snooping Unauthorized party gains access to information by browsing through files or reading communications

22 Common security attacks Modification or alteration Unauthorized party changes information in transit or information stored for subsequent access Fabrication, masquerade, or spoofing Spurious information is inserted into the system or network by making it appear as if it is from a legitimate entity

23 Goals of Security Prevention To prevent someone from violating a security policy Ideal, because then there are no successful attacks.

24 Goals of Security Detection To detect activities in violation of a security policy Verify the efficacy of the prevention mechanism occurs after someone violates the policy The mechanism determines that a violation of the policy has occurred (or is underway), and reports it. The system (or system security officer) must then respond appropriately.

25 Goals of Security Recovery Stop policy violations (attacks) Assess and repair damage Ensure availability in presence of an ongoing attack Fix vulnerabilities for preventing future attack Retaliation against the attacker

26 Goals of Security Recovery Recovery means that the system continues to function correctly, possibly after a period during which it fails to function correctly. If the system functions correctly always, but possibly with degraded services, it is said to be intrusion tolerant.

27 Goals of Security Recovery Usually, recovery means that the attack is stopped, the system fixed (which may involve shutting down the system for some time, or making it unavailable to all users except the system security officers), and then the system resumes correct operations.

28 Operational Issues Security does not end when the system is completed. Its operation affects security. A “ secure ” system can be breached by improper operation (for example, when accounts with no passwords are created). The question is how to assess the effect of operational issues on security.

29 Operational Issues Cost-Benefit Analysis Benefits vs. total cost Is it cheaper to prevent or recover? The cost of protecting data and resources vs. the costs associated with losing the data.

30 Operational Issues Cost-Benefit Analysis The overlap of mechanisms ’ effects (one mechanism may protect multiple services, so its cost is amortized) The non-technical aspects of the mechanism (will it be impossible to enforce), and Ease of use (if a mechanism is too cumbersome, it may cost more to retrofit a decent user interface than the benefits would warrant).

31 Operational Issues Risk Analysis Should we protect something? How much should we protect this thing? Risk depends on environment and change with time what happens if the data and resources are compromised? This tells you what you need to protect and to what level. Cost-benefit analyses help determine the risk here, but there may be other metrics involved (such as customs).

32 Operational Issues Laws Are desired security measures illegal? Will people do them? Affects availability and use of technology.

33 Human Issues Organizational Problems Power and responsibility Financial benefits the key here is that those responsible for security have the power to enforce security.

34 Human Issues Organizational Problems This arises when system administrators, for example, are responsible for security, but only security officers can make the rules. Preventing this problem (power without responsibility, or vice versa) is tricky and requires capable management. Security is not a direct financial incentive for most companies because it doesn ’ t bring in revenue. It merely prevents the loss of revenue obtained from other sources.

35 Human Issues People problems Outsiders and insiders Which do you think is the real threat? People problems are by far the main source of security problems. Outsiders are attackers from out the organization; Insiders are people who have authorized access to the system and, possibly, are authorized to access data and resources, but use the data or resources in unauthorized ways.

36 Human Issues People problems It is speculated that insiders account for 80-90% of all security problems, but the studies generally do not disclose their methodology in detail, so it is hard to know how accurate they are. There are many slightly different definitions of the term “ insider, ” causing the studies to measure slightly different things!) Social engineering, or lying, is quite effective, especially if the people gulled are inexperienced in security (possibly because they are new, or because they are tired).

37 Threats The internet provides different sources of information on known security flaws in hardware and software. Using almost any search engine on the internet, average internet users can quickly find information describing how to break into various systems by exploiting known security weaknesses. Attackers may also breach security by using automated tools to probe network systems, then exploiting any identified security weaknesses to gain unauthorized access to the network.

38 Threats Apart from attacks originated from external parties, many break-ins occur due to poor information security policies and procedures, or internal misuse of information systems. Also, new security risks could arise from evolving attack methods or newly detected holes and bugs in existing software and hardware.

39 Threats Different types of attackers could pose a potential threat to an institution's information security. Attackers may be serious hackers, interested computer novices, dishonest vendors, disgruntled current employees or former employees

40 Stay updated Organizations should therefore stay abreast of new security threats and vulnerabilities, and the latest security patches and version upgrades that are available to fix security flaws and bugs.