Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Introduction to network security
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 Steve Chenoweth Tuesday, 10/18/11 Week 7, Day 2 Right – One view of the layers of ingredients to an enterprise security program. From
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Cryptography and Network Security Chapter 1
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Web Services Quality Model V2.0 Business Value Quality Group Business Value Quality Cost Suitability Effect Service Measurement Quality Group Service Level.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Clay Brockman ITK 478 Fall Why intrusion detection? Comparing two types: Monitoring Database Application Behavior Using Time Signatures.
CSC8320. Outline Content from the book Recent Work Future Work.
Cryptography, Authentication and Digital Signatures
Dimensions of E – Commerce Security
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Operating system Security By Murtaza K. Madraswala.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Csci5233 computer security & integrity 1 Cryptography: an overview.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Ch 13 Trustworthiness Myungchul Kim
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
Threat Modeling for Cloud Computing
Securing Network Servers
Chapter 9: Security © Len Bass, Paul Clements, Rick Kazman, distributed under Creative Commons Attribution License.
Lecture 06 Security, Testability, Usability
Cryptographic Hash Function
SECURITY in IT ~Shikhar Agarwal.
Operating system Security
Information and Network Security
Computer Security Security Concepts September 20, 2018
Lecture 1: Foundation of Network Security
Cryptography: an overview
Lecture 6 – Quality Attributes
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Lecture 6 – Quality Attributes
Security in SDR & cognitive radio
Introduction to Cryptography
Presentation transcript:

Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people and system that are authorized. Security characteristics: Confidentiality: data or services are protected from unauthorized access. Integrity: data or services are not subject to unauthorized manipulation. Availability: the system will be available for legitimate use. Authentication: verifies the identities of the parties to transactions and checks if they are truly who they claim to be. Nonrepudiation: guarantees that the sender of a message cannot later deny having sent the message, and the recipient cannot deny having received the message. Authorization: grants a user the privileges to perform a task.

Security

Security Tactics

Detect Attacks Detect intrusion: by comparison of network traffic or service request patterns within a system to a set of signatures or known patterns of malicious behavior stored in a database. Detect service denial: by comparison of the pattern or signature of network traffic coming into a system to historical profiles of known denial-of-service attacks. Verify message integrity: by employing techniques such as checksums or hash values to verify of messages, resource files, deployment files, and configuration files. Detect message delay: detect potential man-in-middle attacks, where a malicious party is intercepting (and possibly modifying) messages, by checking the time that it takes to deliver a message.

Security Tactics Resist Attacks Identity actors: identify the source of an external input to the system Authenticate actors: ensure that an actor (user or computer) is actually who or what it purports to be. Authorize actors: ensure that an authenticated actor has the rights to access ad modify either data or services. Limit access: limiting access to computing/hardware resources. Limit exposure: minimize the attack surface of a system by having the least possible number of access points for resources, data, or services and reducing the number of connectors that may provide unanticipated exposure. Encrypt data: to provide extra protection to persistently maintained data beyond that available from authorization. Separate entities: separate sensitive and non-sensitive data by physical separation on different computers, to reduce the attack possibility from non-sensitive data users. Change default settings: to prevent attackers from gaining access to the system through settings that are generally publicly available.

Security Tactics React to Attacks Revoke access: when an attack is underway, access can be severely limited to sensitive resources, even for normally legitimate users and uses. Lock computer: limit access from a particular computer if there are repeated failed attempts to access an account from that computer. Inform actors: the relevant actors must be notified when the system has detected an attack.

Security Tactics Recover from Attacks Maintain audit trail Restore (same as availability tactics)