10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Computer Security CIS326 Dr Rachel Shipsey.
CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Dieter Gollmann Microsoft Research
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
Cryptography and Network Security Chapter 1
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Threats and Attacks Principles of Information Security, 2nd Edition
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CPSC 6126 Computer Security Information Assurance.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
What does “secure” mean? Protecting Valuables
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Security in Computer System 491 CS-G(172) By Manesh T
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Ingredients of Security
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Computer Security By Duncan Hall.
CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Is There a Security Problem in Computing?
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Computer Security Introduction
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Issues and Protections
Chapter 1: Introduction
Security
Foundation Of Computer Security
Computer Security Introduction
Computer Security CIS326 Dr Rachel Shipsey.
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

10/17/20151 Computer Security Introduction

10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized actions by users of the system.

10/17/20153 Introduction How do we achieve Computer Security: 1.Security principles/concepts: explore general principles/concepts that can be used as a guide to design secure information processing systems. 2.Security mechanisms: explore some of the security mechanisms that can be used to secure information processing systems. 3.Physical/Organizational security: consider physical & organizational security measures (policies)

10/17/20154 Security Security is about protecting assets. This involves: Prevention Detection Reaction (recover/restore assets)

10/17/20155 Computer Security 1.Confidentiality: prevent unauthorized disclosure of information. 2.Integrity: prevent unauthorized modification of information. 3.Availability: prevent unauthorized withholding of information. Additionally: Authenticity, accountability, reliability, safety, dependability, survivability...

10/17/20156 Computer Security Even at this general level there is disagreement on the precise definitions of some of the required security aspects. References: TCSEC or Orange book – US Dept of Defense, Trusted Computer System Evaluation Criteria. ITSEC – European Trusted Computer System Product Criteria. CTCPEC – Canadian Trusted Computer System Product Criteria

10/17/20157 Confidentiality Historically, security is closely linked to secrecy. Security involved a few organizations dealing mainly with classified data. However, nowadays security extends far beyond confidentiality. Confidentiality involves: privacy: protection of private data, secrecy: protection of organizational data.

10/17/20158 Integrity “Making sure that everything is as it is supposed to be.” For Computer Security this means: Preventing unauthorized writing or modifications.

10/17/20159 Availability For Computer Systems this means that: Services are accessible and useable (without undue Delay) whenever needed by an authorized entity. For this we need fault-tolerance. Faults may be accidental or malicious ( Byzantine ). Denial of Service attacks are an example of malicious attacks.

10/17/ Relationship between Confidentiality Integrity and Availability Integrity Confidentiality Secure Availability

10/17/ Accountability Actions affecting security must be traceable to the responsible party. For this, Audit information must be kept and protected, Access control is needed.

10/17/ Other security requirements Reliability – deals with accidental damage, Safety – deals with the impact of the environment on system failure Dependability – reliance can be justifiably placed on the system Survivability – deals with the recovery of the system after massive failure.

10/17/ Computer Security If I must give a definition…. (again) Computer Security deals with the prevention and detection of unauthorized actions by users of the System.

10/17/ Fundamental dilemma of Computer Security Functionality or Assurance: which one? Security mechanisms need additional computational resources. Security policies interfere with working patterns, and can be very inconvenient. Managing security requires additional effort and costs. Ideally there should be a tradeoff.

10/17/ Principles of Computer Security-- fundamental design parameters Application Software | User | Resource (subject) | (object) | Hardware The dimensions of Computer Security

10/17/ Principles of Computer Security Integrity = compliance with a given set of rules. Rules: Internal consistency of data items Authorized operations on data items Access control

10/17/ st Design decision Should protection focus on data, operations or users?

10/17/ Layers of an IT system Application – users run application programs tailored to meet specific requirements Services – application programs make use of services provided by a software packages like a Database Management System (DBMS) or an Object Reference Broker (ORB). OS – The software packages run on top of the OS which controls access to resources OS kernel – the OS may have a kernel that mediates every access to the processor or memory Hardware – (processor & memory) physically stores and manipulates data.

10/17/ nd Design decision In which layer should security be placed?

10/17/ The onion model of protection mechanisms Hardware OS Kernel OS Services Application

10/17/ Complexity vs Assurance 3rd Design decision Should security focus on simplicity or security?

10/17/ Centralized vs Decentralized 4 th Design decision Should security control tasks be given to a central entity of left to individual components?

10/17/ The layer below Physical and organizational security mechanisms define a security perimeter or boundary. Attackers may try to bypass this boundary. Computer Security Physical and organizational security measures protection boundary

10/17/ The layer below Access to the layer below is controlled through physical and organizational security measures. Parts of the system that can malfunction without compromising the protection mechanisms lie beyond the perimeter. Parts that can be used to disable the protection mechanisms lie within the perimeter.

10/17/ th Design decision How to prevent the attacker from accessing the layer below the protection boundary?

10/17/ Vulnerabilities Hardware: Interruption (DOS), Modification, Interception (Theft), Fabrication (Substitution) Software: Interruption (Deletion), Modification, Interception, Fabrication Data: Interruption (Loss), Modification, Interception, Fabrication

10/17/ Hardware Hardware is more visible, so it is more easy to add/remove/change devices, intercept traffic, flood with traffic and generally control their functionality. Attacks: physical damage

10/17/ Software Interruption (Deletion): surprisingly easy! Modification: –Logic bombs –failure when certain conditions are met) –Trojan horses –a program that overtly does one thing while covertly does another –Viruses –a specific Trojan horse that can be used to spread its “infection”. –Trapdoors –a program that has a specific entry point –Information leaks in programs –code that makes information accessible to unauthorized users Interception (Theft): unauthorized copying

10/17/ Data Hardware security is usually the concern of a relatively small number of staff. Software extends to programmers and analysts who create an modify programs. However data can be readily interpreted by the general public. Because of its visibility data attacks are much more widespread.

10/17/ Data Data Confidentiality: wiretapping, planting bugs, sifting though trash receptacles, monitoring electromagnetic radiation, bribing, inferring, requesting … Data Integrity: a higher level of sophistication is needed. –Salami attacks –shave off a little from many accounts to form a valuable result –Replay attacks

10/17/ Computer Criminals Amateurs –Normal people who observe a weakness in a security system –Disgruntled over some negative work situation –Have committed most of computer crimes to date Crackers –Often high school or university students: cracking is seen as the ultimate victimless crime –Attack for curiosity, self-satisfaction and personal gain –No common profile or motivation

10/17/ Computer Criminals Career criminals –Understand the targets of computer crime –Usually begin as computer professionals who later engage in computer crime finding the prospects and payoff good. –Electronic spies and information brokers who recognize –That trading in companies secrets can be lucrative.