Computer Security CIS326 Dr Rachel Shipsey.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
0 - 0.
Addition Facts
Cryptography encryption authentication digital signatures
Module 1 Evaluation Overview © Crown Copyright (2000)
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Addition 1’s to 20.
Week 1.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
Chapter 1 – Introduction
Chapter 17 Controls and Security Measures
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Cryptography, Authentication and Digital Signatures
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Information Systems Design and Development Security Precautions Computing Science.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Security Issues in Information Technology
Dibyajit Computer Security Hacking dibyajit
Cryptography: an overview
Cryptography: an overview
Information System and Network Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Information Security.
Chapter 17 Risks, Security and Disaster Recovery
Data & Network Security
Introduction Of Information Security
Information and Network Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Cryptography: an overview
Computer Security CIS326 Dr Rachel Shipsey.
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

Computer Security CIS326 Dr Rachel Shipsey

This course will cover the following topics: passwords access controls symmetric and asymmetric encryption confidentiality authentication and certification security for electronic mail key management

The following books are recommended as additional reading to the CIS326 study guide Computer Security by Dieter Gollman Secrets and Lies by Bruce Schneier Security in Computing by Charles Pfleeger Network Security Essentials by William Stallings Cryptography - A Very Short Introduction by Fred Piper and Sean Murphy Practical Cryptography by Niels Ferguson and Bruce Schneier

There are also many websites dealing with the subjects discussed in this course. For example, the following website provides links to a large number of sites who have security and cryptography course on-line: http://avirubin.com/courses.html

What is Security? Security is the protection of assets. The three main aspects are: prevention detection re-action

Some differences between traditional security and information security Information can be stolen - but you still have it Confidential information may be copied and sold - but the theft might not be detected The criminals may be on the other side of the world

Computer Security deals with the prevention and detection of unauthorised actions by users of a computer system.

There is no single definition of security What features should a computer security system provide?

Confidentiality The prevention of unauthorised disclosure of information. Confidentiality is keeping information secret or private. Confidentiality might be important for military, business or personal reasons.

Integrity Integrity is the unauthorised writing or modification of information. Integrity means that there is an external consistency in the system - everything is as it is expected to be. Data integrity means that the data stored on a computer is the same as the source documents.

Availability Information should be accessible and useable upon appropriate demand by an authorised user. Availability is the prevention of unauthorised withholding of information. Denial of service attacks are a common form of attack.

Non-repudiation Non-repudiation is the prevention of either the sender or the receiver denying a transmitted message. A system must be able to prove that certain messages were sent and received. Non-repudiation is often implemented by using digital signatures.

Authentication Proving that you are who you say you are, where you say you are, at the time you say it is. Authentication may be obtained by the provision of a password or a scan of your retina.

Access Controls The limitation and control of access through identification and authentication. A system needs to be able to indentify and authenticate users for access to data, applications and hardware. In a large system there may be a complex structure determining which users and applications have access to which objects.

Accountability The system managers are accountable to scrutiny from outside. Audit trails must be selectively kept and protected so that actions affecting security can be traced back to the responsible party

Security systems A security system is not just a computer package. It also requires security conscious personnel who respect the procedures and their role in the system. Conversely, a good security system should not rely on personnel having security expertise.

Risk Analysis The disadvantages of a security system are that they are time-consuming, costly, often clumsy, and impede management and smooth running of the organisation. Risk analysis is the study of the cost of a particular system against the benefits of the system.

Designing a Security System There are a number of design considerations: Does the system focus on the data, operations or the users of the system? What level should the security system operate from? Should it be at the level of hardware, operating system or applications package? Should it be simple or sophisticated? In a distributed system, should the security be centralised or spread? How do you secure the levels below the level of the security system?

Security Models A security model is a means for formally expressing the rules of the security policy in an abstract detached way. The model should be: easy to comprehend without ambiguities possible to implement a reflection of the policies of the organisation.

Summary By now you should have some idea about Why we need computer security (prevention, detection and re-action) What a computer security system does (confidentiality, integrity, availability, non-repudiation, authentication, access control, accountability) What computer security exerts do (design, implement and evaluate security systems)