CIS/TCOM 551 Computer and Network Security Slide Set 2 Carl A. Gunter Spring 2004.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

IT Security Policy Framework
Computer Security Computer Security is defined as:
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
1 Network Security Ola Flygt Växjö University
Chapter 9: Privacy, Crime, and Security
Lecture 1: Overview modified from slides of Lawrie Brown.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
FIT3105 Security and Identity Management Lecture 1.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Threats and Attacks Principles of Information Security, 2nd Edition
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CPSC 6126 Computer Security Information Assurance.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
An Introduction to Information Assurance COEN 150 Spring 2007.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Engineering Security Requirement
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 9 Slide 1 Critical Systems Specification 2.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 5 Network Security
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
CONTROLLING INFORMATION SYSTEMS
Computer threats, Attacks and Assets upasana pandit T.E comp.
Copyright © 2013 – Curt Hill Computer Security An Overview.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Security Threats
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Network Security Overview
CS457 Introduction to Information Security Systems
Risk management.
Security
CS 450/650 Fundamentals of Integrated Computer Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
NET 311 Information Security
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Network Security Ola Flygt Växjö University
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

CIS/TCOM 551 Computer and Network Security Slide Set 2 Carl A. Gunter Spring 2004

Introduction to Security l Goals  Availability  Integrity  Confidentiality l Targets  Hardware  Software  Data l Controls  Physical security  Limited interface  Identification and authorization  Encryption l Analysis of costs and benefits

Progress and Risk l Risk = (Probability of failure) * (Size of loss) l Safety-critical considerations  Dutch port authority  RER train  Software in automobiles  Intelligent highways

Progress and Risk, cont. l Security-critical considerations  Credit card purchases on the web  Voting on the web  Banking on the web  Mobile agents and active networks l Safety and security considerations  Military systems, eg. Star Wars  Actuators on public networks

Security Requirements l Banking l Government l Public Telecommunications Carriers l Corporate / Private Networks l Electronic Commerce Ref: Computer Communications Security, W. Ford, 94.

Banking l Electronic Funds Transfer (EFT)  Prosecution of fraud problematic  Financial system overall at risk l Automated Teller Machine (ATM)

Automatic Teller Machines l Goals  Availability: Provide automated teller operations 24x7 in convenient locations  Integrity: Authorized users only, transactional guarantees  Confidentiality: Private communication with branches or center l Vulnerabilities and controls l Risk analysis and liabilities

Government l National security of course, but also l “Unclassified but sensitive information” must not be disclosed  Example: social security web page l Electronic signatures approved for government contractors

Public Telecom Carriers l Operations, Administration, Maintenance, and Provisioning (OAM&P) l Availability is a key concern l Significant insider risks

Corporate Private Networks l Completely private networks are becoming a thing of the past because of telecommuting. l Protection of proprietary information of course, but also concerns like privacy in the health care industry. l Foreign government threat?

Electronic Commerce l Electronic Data Interchange (EDI) l Electronic contracts need to be binding l ABA Resolution: “recognize that information in electronic form, where appropriate, may be considered to satisfy legal requirements regarding a writing or signature to the same extent as information on paper or in other conventional forms, when appropriate security techniques, practices, and procedures have been adopted.”

Goals of Security DATA Integrity DATA Availability DATA Confidentiality Ref: Pfleeger.

Safety and Security l Many things in common and some major differences. l Some similarities aid understanding of both. l System vs. Environment. l Accident, breach. l Hazard, vulnerability.

System vs. Environment (Safety) Environment System

System vs. Environment (Security) System Environment

Accident and Security Breach l Accident  Loss of life  Injury  Damage to property l Security Breach  Secret is revealed  Service is disabled  Data is altered  Messages are fabricated

Accident Definition l An accident is an undesired and unplanned (but not necessarily unexpected) event that results in (at least) a specified level of harm. l Define breach similarly. l A security threat is a possible form of breach

Hazards and Vulnerabilities l Hazard  No fire alarms  No fire extinguishers  Rags close to furnace l Vulnerability  Password too short  Secret sent in plaintext over public network  Files not write protected

Hazard Definition l A hazard is a state or set of conditions of a system that, together with other conditions in the environment of the system, will lead inevitably to an accident. l Define security vulnerability similarly.

Other Terms l Asset: object of value. l Exposure: threat to an asset. l Attack: effort by an agent to exploit a vulnerability and create a breach.

Major Threats l Interruption l Interception l Modification l Fabrication

Major Assets l Hardware l Software l Data

Threats to Hardware l Interruption: crash, performance degradation l Interception: theft l Modification: tapping l Fabrication: spoofed devices

Threats to Software Code l Interruption: deletion l Interception: theft l Modification  Trojan horse  Logic bomb  Virus  Back door  Information leak l Fabrication: spoofing software distribution on the web

Threats to Software Processes l Interruption: bad inputs l Interception: attacks on agents l Modification: of exploited data l Fabrication: service spoofing (man-in- the-middle)

Threats to Data l Interruption: deletion, perceived integrity violation l Interception: eavesdropping, snooping memory l Modification: alteration of important information l Fabrication: spoofing web pages

Principles of Security l Easiest Penetration: An intruder must be expected to use any available means of penetration. l Adequate Protection: Computer items must be protected only until they lose their value. They must be protected to a degree consistent with their value. l Effectiveness: Controls must be used to be effective. They must be efficient, easy to use, and appropriate.

Controls l Physical security l Limited interface l Identification and authorization l Encryption

Breakdown of S/W Controls l Program controls  as exercised by the programmer  as dictated by the programming language or programming environment l Operating system controls l Development process controls

Security Models l Multi-layer security l Graham-Denning model Ref: Pfleeger.

Military Security l Familiar hierarchy of sensitivities, partitioned in to compartments.

Compartments l Each piece of information is coded with its security level and one or more compartments

Classification and Clearance l l Each piece of information, or object, o is classified by its rank and compartments. C(o) = classification of o l Each actor, or subject, s is given a clearance by rank and compartments. C(s) = clearance of s l Dominance  iff r  r’ and c is a subset of c’. l C(o)  C(s) if the classification of o is dominated by the clearance of s.

Guarantees l A subject s is only able to access an object o if  the rank of s is higher than that of o, and  s is cleared for all of the compartments of o. l The first is called a hierarchical requirement, the second a non- hierarchical requirement.

Top Secret Secret Confidential Restricted Unclassified A B C D x y z w v

Graham-Denning Model Subject executing command is x. Transferable rights are denoted r*. Non-transferable rights are denoted r. A[x,s]