1 Security-Overview FM Brief Review of Security. 2 Security-Overview FM Acknowledgments u Annie Anton u Charles Pfleeger u E. Spafford.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CPSC 6126 Computer Security Information Assurance.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
SEC835 Database and Web application security Information Security Architecture.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Security Computer System Life Cycle Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Architecture
Introduction to Information Security Annie I. Antón College of Engineering NC STATE UNIVERSITY.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.
Information Systems Security Operations Security Domain #9.
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
R R R CSE870: Advanced Software Engineering: Security Intro Information Security An Introduction.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Risk Assessment and Risk Management James Taylor COSC 316 Spring 2008.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Welcome to the ICT Department Unit 3_5 Security Policies.
CS457 Introduction to Information Security Systems
Security
CSE870: Advanced Software Engineering (Cheng, Sp2003) An Introduction
INFORMATION SYSTEMS SECURITY and CONTROL
Mohammad Alauthman Computer Security Mohammad Alauthman
CSE870: Advanced Software Engineering (Cheng, Sp2003) An Introduction
Presentation transcript:

1 Security-Overview FM Brief Review of Security

2 Security-Overview FM Acknowledgments u Annie Anton u Charles Pfleeger u E. Spafford

3 Security-Overview FM Outline u Terminology u Brief Introduction u Security Planning u Threats, Attacks & Services

4 Security-Overview FM Terminology u “A computer is secure if you can depend on it and its software to behave as you expect.” u ‘Trust describes our level of confidence that a computer system will behave as expected.’ [Garfinkel & Spafford]

5 Security-Overview FM What is secure? u Does not disclose information u Does not allow unauthorized access u Does not allow unauthorized change u Maintains QoS despite input and load u Preserves audit, authenticity, control u No surprises! [Spafford]

6 Security-Overview FM Why Worry? u Information has value when combined when altered when disclosed u Resource use has value unauthorized use denial of service u Damage to reputation damage to your personal reputation damage to your group damage to your company u Your system is not alone other machines on the network shared resources and files indirect liability [Spafford]

7 Security-Overview FM Three Common Failures u Organization has no formal policy. Thus, personnel cannot consistently make necessary decisions. u Organization has no reasonable response plans for violations, incidents, and disasters. u Plans don’t work when needed -- haven’t been regularly: tested, updated, and rehearsed. (E.g., failure of operational security) [Spafford]

8 Security-Overview FM The Challenge u Without assurance that our systems will stay secure, we endanger: our economies, our privacy, our personal safety and privacy, and our social institutions. [Spafford]

9 Security-Overview FM How do we get there? u Understand the needs of the users Narrow focus better than broad u Understand basic tenets of security Paucity of programs and experts u Capture requirements for design and validation u Design with care using good tools and methods u Validate & Verify [Spafford]

10 Security-Overview FM Understanding Security u Good security means Limiting what happens Limiting who can make it happen Limiting how it happens Limiting who can change the system u Users don’t tolerate limits unless there is a paradigm shift E.g., Palm computers [Spafford]

11 Security-Overview FM Psychological Acceptability u Easy to use Should be as easy to use as to not use u False alarms should be avoided u Frequent changes and updates are bad u Should not require great expertise to get correct …Doesn’t match user population [Spafford]

12 Security-Overview FM Patches u Fixes for flaws that require an expert to install are not a good fix. u Fixes that break something else are not a good fix. u Frequent fixes may be ignored. u Goal should be design, not patch [Spafford]

13 Security-Overview FM Source of Problems Source: Securityfocus.com About 30% are buffer overflows or unchecked data Over 90% are coding/design flaws. [Spafford]

14 Security-Overview FM What can we do? u Understand that there is no “average user” u Understand balance between features and security u Employ better testing u Manage complexity and change u Build in security from the start u Understand policy differences. [Spafford]

15 Security-Overview FM Planning Your Security Needs u Confidentiality u Data Integrity u Availability u Consistency u Control u Audit [Garfinkel & Spafford]

16 Security-Overview FM Critical Concerns for Various Industries? u Banking environment? u National defense-related system that processes classified information? u University? u E-Commerce?

17 Security-Overview FM Risk Assessment u Three questions to answer: What am I trying to protect? What do I need to protect against? How much time, effort and money am I willing to expend to obtain adequate protection? u Three key steps: Identify assets Identify threats Calculate risks [Garfinkel & Spafford]

18 Security-Overview FM Risk Assessment Step 1: Identify Assets u Tangibles Computers, disk drives, proprietary data, backups and archives, manuals, printouts, commercial software distribution media, communications equipment & wiring, personnel records, audit records u Intangibles Safety & health of personnel, privacy of users, personnel passwords, public image & reputation, customer/client goodwill, processing availability, configuration information [Garfinkel & Spafford]

19 Security-Overview FM Risk Assessment Step 2: Identify Threats u Illness of key people u Loss of key personnel u Loss of phone/network services u Loss of utilities (hone water, electricity) for a short or prolonged time u Lightening or flood u Theft of disks, tapes, key person’s laptop or home computer u Introduction of a virus u Computer vendor bankruptcy u Bugs in software u Subverted employees or 3rd party personnel u Labor unrest u Political terrorism u Random “hackers” [Garfinkel & Spafford]

20 Security-Overview FM Broad Categories of Threats u Interruption u Interception u Modification u Fabrication

21 Security-Overview FM Interruption u Asset becomes lost, unavailable, unusable u Ex: Malicious destruction of HW device Erasure of program or data Malfunction of OS (e.g., cannot find a file)

22 Security-Overview FM Interception u Unauthorized party gained access to an asset Outside party: person, program, system u Ex: Illicit copying of program/data files Wiretapping to obtain data in network u Loss may or may not be detected (I.e., leave no traces)

23 Security-Overview FM Modification u Unauthorized access tampers with asset u Ex: Change values in database Add computation to a program Modify data during transmission Modify hardware u Detection may be difficult

24 Security-Overview FM More Modification u Trojan horse: Overtly does one task, covertly does something else u Virus: example of trojan horse; Spread infection from one computer to next u Trapdoor: program has secret entry point u Information leaks: (in program) Make info accessible to unintended people/programs

25 Security-Overview FM Fabrication u Unauthorized party produce/generate counterfeit objects on computing system u Ex: Insert spurious transactions to a network Add records to an existing database u Detection and authentication are problems

26 Security-Overview FM Risk Assessment Step 3: Quantify Threats u Estimate likelihood of each threat occurring u If an event happens on a regular basis, you can estimate based on your records u Other sources: Power company: official estimate of likelihood for power outage during coming year Insurance company: actuarial data on probabilities of death of key personnel based on age & health Etc. u Example: Earthquake once in 100 years (1% of your list) vs. discovery of 3 serious bugs in sendmail during next year (300%) [Garfinkel & Spafford]

27 Security-Overview FM Security Goals u Computer security objective: Maintain 3 characteristics u Confidentiality: Assets are accessible only by authorized parties Read-type access: read, view, print, existence AKA: secrecy and privacy u Integrity: Modified only by authorized parties in authorized ways Modification: write, change, change status, delete, create u Availability: Assets accessible to authorized parties AKA: denial of service

28 Security-Overview FM Vulnerabilities u Reverse the 3 security objectives u Major assets: Hardware Software Data u Their interconnection is also an asset

29 Security-Overview FM Threats to Software u Computing Equipment worthless without software u Deletion: easy to delete Motivate need for configuration management u Modification: Trojan horse: overtly does one task, covertly does something else Virus: type of Trojan horse; spread infection from one computer to another Trapdoor: program has secret entry point Information leaks: makes information accessible to unintended people/programs u Theft: unauthorized copying of SW

30 Security-Overview FM Threats to Data u Printed data can be readily interpreted by general public u Data attack more widespread than either HW or SW u Data has cost: Confidential data has value to competitors Incorrectly modified data lead to loss of human life Poor security can lead to financial liability  Personal data is leaked to publich u Data may have short life: High value: (e.g., economic data and effect on stock market)

31 Security-Overview FM Threats to Data u Principle of Adequate Protection: Computer items must be protected only until they lose their value. They must be protected to a degree consistent with their value. [Plfeeger 2000]

32 Security-Overview FM Threats to Data u Confidentiality: Preventing unauthorized disclosure Problems: wiretapping, bugs in output devices, monitoring electromagnetic radiation, bribing key employees. (Data is often human readable.) u Integrity: Preventing unauthorized modification Problems: malicious programs, erroneous file system utilities or flawed communication systems  Salami attack u Availability: Preventing denial of authorized access

33 Security-Overview FM Other threatened entities u Storage media Need backups of data and physical protection of backups u Networks: Involve HW, SW, and data u Access: access to computing equipment (unauthorized use of processing cycles, network, etc.) u Key People Crucial weak points

34 Security-Overview FM People Involved u Amateurs: Observed flaw in security Normal/regular employees Exploit system (innocently?) u Crackers: Students who attempt to access facilities “victimless” crime? Serious offense: caused millions of dollars in damage u Career Criminals: Start as computer professionals who engage in computer crime and have good payoffs Electronic spies Response: lack of criminal prosecution trend

35 Security-Overview FM Methods of Defense u Controls: Encryption: transform data to unintelligible format to outside observers. SW controls:  Internal program controls: parts of program enforce security restrictions (e.g., access limits)  Operating system controls: limitations enforced by OS to protect users from each other  Development controls: quality standards for design, code, test, and maintenance. May use HW components, encryption, or info collection.  Affect users directly, so is usually first solution considered  Care must be taken in design because it affects the way systems are used  Balance between ease of use and effectiveness.

36 Security-Overview FM Methods of Defense (cont’d) Hardware Controls:  HW or smartcard implementations of encryption  Locks limiting access  Circuit boards that control access to disks in PCs Policies:  Added HW or SW features  Frequent changes of passwords  Must have training and administration  Legal and ethical controls (lack of understanding and standards for both) Physical Controls:  Locks on doors, guards at entry points,  backup copies of important artifacts,  physical site planning to avoid natural disasters

37 Security-Overview FM Effectiveness of Controls u Awareness of problem People using controls must understand the need u Likelihood of Use: Principle of Effectiveness: Controls must be used to be effective. They must be efficient, easy to use, and appropriate. u Overlapping Controls: Security for a PC may involve security for access to data, physical access to machine/storage media, and file locking mechanisms. u Periodic Review: Few controls are permanently useful. Need to review and update.

38 Security-Overview FM Creating Policy u Defines what you consider to be valuable and what steps should be taken to safeguard those assets. u General Policy u Policy for Different Sets of Assets , personnel data, etc. [Garfinkel & Spafford]

39 Security-Overview FM The Role of Policy u Makes clear what is being protected and why u States the responsibility for that protection u Provides grounds upon which to interpret and resolve any later conflicts that might arise u Should be general and change little over time u Should not list specific threats, machines or individuals by name [Garfinkel & Spafford]

40 Security-Overview FM Policy Example u “Information to be protected is any information discovered, learned, derived, or handled during the course of business that is not generally known outside of company X. This includes trade secret information (ours, and that of other organizations), patent disclosure information, personnel data, financial information, information about business opportunities, and anything else that conveys an advantage to company X so long as it is not disclosed. Personnel information about employees, customers and vendors is also to be considered confidential and protectable. [Garfinkel & Spafford]

41 Security-Overview FM Guidelines u “Should” statements in policies u Interpret standards for a particular environment u Guidelines may be violated u Guide behavior u Example: Once per week, the administrator will pick a file at random from some backup made that week. The operator will be required to recover that file as a test of the backup procedures. [Garfinkel & Spafford]

42 Security-Overview FM Goals for Security Policies u Ensure users authorized users have access u Prevent unauthorized users from gaining access u Protect sensitive data from unauthorized access u Prevent accidental damage to HW or SW u Prevent intentional damage to HW or SW u Create an environment that can recover quickly u Communicate employee responsibilities [J.B. Earp]

43 Security-Overview FM Threat Categories u Data disclosure Unauthorized access to an IS containing sensitive data (e.g., attacks resulting in data disclosure - eavesdropping) u Fraud Misrepresentation of identities (need to authenticate credit cards, etc.) u Data insertion, removal, and modification If it is possible to modify the data during transit, then it is possible to alter the financial transactions. [Cyganski]

44 Security-Overview FM Attack Methods u DoS (Denial of Service) attacks involve restricting a shared resource from privileged users maliciously causing a Net server to go down unlawful under state and federal laws u bombs series of mail messages sent as an annoyance. u Viruses u Spoofing impersonation to gain unauthorized access [J.B. Earp]

45 Security-Overview FM Security Services - 1 u Privacy protect against unauthorized access to data. u Authentication positively identify an object or identity. u Access Control restrict access to an object or resource to only privileged identities. [Cyganski]

46 Security-Overview FM Security Services - 2 u Integrity ensure that the data has not been altered since its creation. u Non-repudiation: Origin: message sender cannot deny being source msg Submission: a provider can’t deny submitting an order (time) Delivery: can’t deny receiving an item (for a customer) Receipt: can’t deny receiving a message/order u Replay Prevention ensure that data previously deemed valid can not resent by an attacker and mistakenly validated by a system a second time. [Cyganski]