Sensorweb Research Laboratory Georgia State University Fundamentals of Computer Security Song Tan Georgia State University.

Slides:



Advertisements
Similar presentations
Trust Management of Services in Cloud Environments:
Advertisements

Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Lecture 1: Overview modified from slides of Lawrie Brown.
8.2 Discretionary Access Control Models Weiling Li.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Introduction to Distributed Systems
Troy Hutchison Service Oriented Architecture (SOA) Security.
Revision Week 13 – Lecture 2. The exam 5 questions Multiple parts Read the question carefully Look at the marks as an indication of how much thought and.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Cloud Usability Framework
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
CHAPTER FIVE Enterprise Architectures. Enterprise Architecture (Introduction) An enterprise-wide plan for managing and implementing corporate data assets.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
CSC8320. Outline Content from the book Recent Work Future Work.
Distributed Systems: Concepts and Design Chapter 1 Pages
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
For Testbeds TM. Secure, multi-tenant cloud orchestration platform –Turnkey platform for delivering IaaS clouds –Hypervisor agnostic –Massively scalable,
Chisinau 2004NATO ANW1 Security Issues for e-Society Oliver B. Popov MSU, SU, SCMU NATO ANW The Third CEENet Workshop on Managerial Issues - MIXREN Chisinau,
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Qusay H. Mahmoud CIS* CIS* Service-Oriented Computing Qusay H. Mahmoud, Ph.D.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Distributed Computing Environment (DCE) Presenter: Zaobo He Instructor: Professor Zhang Advanced Operating System Advanced Operating System.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
CSc 8320 Advanced Operating Systems Chapter 8 Distributed Computer Security 8.1 Fundamentals of Computer Security FALL 2013 Instructor: Prof. Yanqing Zhang.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Clouding with Microsoft Azure
Understanding The Cloud
Grid Computing Security Mechanisms: the state-of-the-art
Information Security.
University of Technology
Network Services, Cloud Computing, and Virtualization
Cloud Testing Shilpi Chugh.
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
3 Cloud Computing.
Done by:Thikra abdullah
Presentation transcript:

Sensorweb Research Laboratory Georgia State University Fundamentals of Computer Security Song Tan Georgia State University

Sensorweb Research Laboratory Georgia State University -2- Outline Concepts about computer security in distributed system. Recent studies about computer security in distributed system. Future vision about the potential research topics.

Sensorweb Research Laboratory Georgia State University -3- Concepts

Sensorweb Research Laboratory Georgia State University -4-Secure? A secure computer and communication system is a robust system that exhibits the characteristics of secrecy, integrity, availability, reliability and safety in the operation of the system. (Randy Chow,1997)

Sensorweb Research Laboratory Georgia State University -5- Secrecy: protection from unauthorized disclosure of system objects. Integrity: only authorized users can modify system objects. Availability: authorized user can have access to the corresponding authorized objects. Reliability and safety: fault-tolerant features.

Sensorweb Research Laboratory Georgia State University -6- Risks and Threats? In a distributed system: Open architecture and interactions across a wide range of autonomous and heterogeneous systems over open communication links. Issue: access control and user authentication. Message passing through a communication network. Issue: protection against spoofing and forging.

Sensorweb Research Laboratory Georgia State University -7- Risks and threats? Transparency: uniform view of a system that has transparent distribution of computation and resources. Interoperability: the ability to have effective information exchange between hosts and between processes. Issues: Interdomain authentication, secure message transfer between domains and interdomain access control.

Sensorweb Research Laboratory Georgia State University -8- Subjects: active entities that access objects. Objects: passive entities whose security attributes must be protected. Access control policy: a security policy that describes how objects are to be accessed by subjects. Flow control policy: a security policy that describes how the information flow is to be regulated.

Sensorweb Research Laboratory Georgia State University -9- Security threats and protection approaches

Sensorweb Research Laboratory Georgia State University -10- Distributed security architecture

Sensorweb Research Laboratory Georgia State University -11- Recent Studies

Sensorweb Research Laboratory Georgia State University -12- Segregate Applications at System Level to Eliminate Security Problems: resource separating and grouping mechanism that physically and logically separates system resources by adaptable scale to eliminate security problems and reduce the overall cost.

Sensorweb Research Laboratory Georgia State University -13- Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control: An approach to design a multi- agent systemmanaging a security management system corporate memory in the form of adistributed semantic Web and describes the resulting architecture.

Sensorweb Research Laboratory Georgia State University -14- Future vision

Sensorweb Research Laboratory Georgia State University -15- Cloud Security Issues Assurance in service level agreements (SLA) about the users’ private data. The security of corporate data in Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS) environment. VM level attacks: VM(Virtual Machine) technology used by cloud vendors are a potential problem in multi-tenant architecture. Enterprises have to merge cloud security policies with their own security metrics and policies.

Sensorweb Research Laboratory Georgia State University -16- References R.Chow, T.Johnson. Distributed Operating system & Algorithm,1997. CJ.Jone, “Segregate Applications at System Level to Eliminate Security Problems”, Cluster Computing and the Grid Workshops, Sixth IEEE International Symposium, Kandukuri, B.R.; Paturi, V.R.; Rakshit, A., Adv. Software Technol.” Cloud Security Issues”, Services Computing, SCC '09. G.A.S. Torrellas ; D.V. Cruz, Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control, Computational Cybernetics, ICCC Farzad Sabahi,” Virtualization-Level Security in Cloud Computing”, Communication Software and Networks (ICCSN), 2011

Sensorweb Research Laboratory Georgia State University -17- Thank You