John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals
John Carpenter & lecture Lecturer Mr John Carpenter B Eng (Electrical) M Eng Sc (Systems Theory, Pattern Recognition) M Arts (Philosophy – Theory of Mind) Work experience: Embedded Systems Pathology Instrumentation and Databases Project manager Lecturer in Computer Technology, Project Management, and Security
John Carpenter & lecture & Information Security Lecture Introduction Welcome Student Handout: Subject Introduction Assessment Texts Tutorials Lecture 1 Objectives
John Carpenter & lecture & Information Security Principles of Security Securing individual computer systems Models for securing information systems Securing local networks Cryptography as a basis for securing transactions passing across open networks Maybe: Introduction to securing websites Maybe: Securing databases
John Carpenter & lecture Objectives of Lecture 1 Subject Administration Define the objectives of information security Some definitions The four Threats Controls The layers of technology and hence the layers of controls A different point of view Physical security
John Carpenter & lecture References Pfleeger & Pleeger Ch 1, Section 8.4 Gollman Computer Security Ch 1
John Carpenter & lecture There are Problems Theft - of equipment, of proprietary software Theft - Copying of confidential material Fabrication - for gain - Adding false names to company payroll Modification - malicious - Virus infections Access - easy for ‘us’ Access - difficult for ‘them’
John Carpenter & lecture What is Security ? Protection of assets - can take several forms: Prevention Detection Reaction What does this mean for computer assets ?
John Carpenter & lecture What is Information Security ? The objectives of information security are: Confidentiality Integrity Availability to give us: Secure Data
John Carpenter & lecture Confidentiality Only accessible by authorised parties Not revealed More than not reading Confidentiality is distinct from secrecy and privacy ( for you to think about)
John Carpenter & lecture Integrity Associated with loss and corruption Data Integrity: Computerised data to be the same as the external, source data Data not exposed to alteration or destruction No inappropriate modification
John Carpenter & lecture Availability The property of being accessible and useable (without delay) upon demand by an authorised entity We want there to be no denial of service
John Carpenter & lecture Other security issues Accountability Reliability Safety Dependability
John Carpenter & lecture Computer security deals with the prevention and detection of unauthorised actions by users of a computer system security deals with the ready availability of valuable assets by authorised agents, and the denial of that access to all others
John Carpenter & lecture Some Definitions Vulnerability A weakness of some sort Attack When a weakness is exploited Threat A circumstance with a potential for loss Exposure When a vulnerability is visible Control A protective measure NOTE the CLOSED nature of these definitions, the concept of PERIMETER CONTROL.
John Carpenter & lecture Breaches of Security The Four Threats Interruption Interception Modification Fabrication
John Carpenter & lecture Some Principles of Security Principle of Easiest Penetration An intruder will use any means of penetration Principle of Timeliness Items only need to be protected until they lose their value (Only protect valuable items) Principle of Effectiveness Controls must work, and they should be efficient, easy to use, and appropriate
John Carpenter & lecture Costs The costs of additional resources to implement security mechanisms can be quantified (measured) Security mechanisms interfere with users, and can lead to loss of productivity Managing security also costs (Risk Analysis will be covered)
John Carpenter & lecture Controls A control is a protective mechanism A lock with a key An ATM card is a PIN number A login with a password An message that is encrypted What should be the focus of controls ? Should protection mechanisms focus on data, or operations on that data, or should we focus on the users ?
John Carpenter & lecture There are layers of information systems technology Applications Services Operating system Kernel Hardware In which layer (or layers) should security mechanisms be placed ? Should controls be placed in more that one layer ?
John Carpenter & lecture Layers The presence of layers is a feature of technology Separate layers often perform very different functions Similar functions are combined in one layer The boundary between two layers is usually easily defined Layers can often be independently implemented
John Carpenter & lecture One Architecture of Controls Administrative Policies Physical Computer and Network Hardware Software Encryption (concealing)
John Carpenter & lecture Controls: The Onion Model Simple mechanisms, or lots of features ? Should defining and enforcing security be a centralised function ? How to prevent access to the layer below the security mechanism ?
John Carpenter & lecture Attack on the layer below An important concept Needs an understanding of the layers that are used to gain access to an asset When an intruder finds they are blocked at one layer, this intruder may attempt to attack the next layer closer to the asset Circumventing the protection Smashing a door Posing as an employee Posing as a programmer An pretending to be from your bank
John Carpenter & lecture A Different View: Security as a Person problem Roles of individuals in an organisation Directors Managers Professionals Clerks IT staff Personality types Adventurous Anti-social Gregarious
John Carpenter & lecture Physical Security Control ACCESS Control PORTABILITY Detect EXIT VIOLATIONS
John Carpenter & lecture Site Security The concern is with physical things Fire Flood Electric Power Access
John Carpenter & lecture Securing ‘Closed’ Computer systems Media Equipment Site Cold Site Warm Site Hot Site
John Carpenter & lecture Next week Identity and Authentication References: Pfleeger and Pfleeger section 4.5 Gollman Chapter 2 (Anderson Security Engineering )