Csci5233 computer security & integrity 1 An Overview of Computer Security.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
1 cs691 chow C. Edward Chow Overview of Computer Security CS691 – Chapter 1 of Matt Bishop.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
Chapter 1 – Introduction
Security+ Guide to Network Security Fundamentals
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Introducing Computer and Network Security
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1 Introduction to Security Dr.Talal Alkharobi. 2 Why is security important? Computers and networks are the nerves of the basic services and critical infrastructures.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CPSC 6126 Computer Security Information Assurance.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Introduction to Network Defense
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chap1: Is there a Security Problem in Computing?.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Security Introduction
CS457 Introduction to Information Security Systems
CS 395: Topics in Computer Security
Overview CSE 465 – Information Assurance Fall 2017 Adam Doupé
Issues and Protections
Chapter 1: Introduction
Cyber Crimes Chunlian QU 9/18/2018.
Chapter 1: Introduction
Chapter 1: Introduction
An Overview of Computer Security
Advanced System Security
Overview CSE 365 – Information Assurance Fall 2018 Adam Doupé
Information Security: Terminology
Computer Security Introduction
Security.
Mohammad Alauthman Computer Security Mohammad Alauthman
Overview CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

csci5233 computer security & integrity 1 An Overview of Computer Security

csci5233 computer security & integrity 2 Outline Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues

csci5233 computer security & integrity 3 Status of security in computing In terms of security, computing is very close to the wild west days. Some computing professionals & managers do not even recognize the value of the resources they use or control. In the event of a computing crime, some companies do not investigate or prosecute.

csci5233 computer security & integrity 4 Characteristics of Computer Intrusion A computing system: a collection of hardware, software, data, and people that an organization uses to do computing tasks Any piece of the computing system can become the target of a computing crime. The weakest point is the most serious vulnerability. The principles of easiest penetration

csci5233 computer security & integrity 5 Security Breaches - Terminology Exposure –a form of possible loss or harm Vulnerability –a weakness in the system Attack Threats –Human attacks, natural disasters, errors Control – a protective measure Assets – h/w, s/w, data

csci5233 computer security & integrity 6 Types of Security Breaches Disclosure: unauthorized access to info –Snooping Deception: acceptance of false data –Modification, spoofing, repudiation of origin, denial of receipt Disruption: prevention of correct operation –Modification, man-in-the-middle attack Usurpation: unauthorized control of some part of the system ( usurp: take by force or without right ) –Modification, spoofing, delay, denial of service

csci5233 computer security & integrity 7 Security Components Confidentiality: The assets are accessible only by authorized parties. –Keeping data and resources hidden Integrity: The assets are modified only by authorized parties, and only in authorized ways. –Data integrity (integrity) –Origin integrity (authentication) Availability: Assets are accessible to authorized parties. –Enabling access to data and resources

csci5233 computer security & integrity 8 Computing System Vulnerabilities Hardware vulnerabilities Software vulnerabilities Data vulnerabilities Human vulnerabilities ?

csci5233 computer security & integrity 9 Software Vulnerabilities Destroyed (deleted) software Stolen (pirated) software Altered (but still run) software –Logic bomb –Trojan horse –Virus –Trapdoor –Information leaks

csci5233 computer security & integrity 10 Data Security The principle of adequate protection Storage of encryption keys Software versus hardware methods

csci5233 computer security & integrity 11 Other Exposed Assets Storage media Networks Access Key people

csci5233 computer security & integrity 12 People Involved in Computer Crimes Amateurs Crackers Career Criminals

csci5233 computer security & integrity 13 Methods of Defense Encryption Software controls Hardware controls Policies Physical controls

csci5233 computer security & integrity 14 Encryption at the heart of all security methods Confidentiality of data Some protocols rely on encryption to ensure availability of resources. Encryption does not solve all computer security problems.

csci5233 computer security & integrity 15 Software controls Internal program controls OS controls Development controls Software controls are usually the 1 st aspects of computer security that come to mind.

csci5233 computer security & integrity 16 Policies and Mechanisms Policy says what is, and is not, allowed –This defines “security” for the site/system/etc. Mechanisms enforce policies Mechanisms can be simple but effective –Example: frequent changes of passwords Composition of policies –If policies conflict, discrepancies may create security vulnerabilities Legal and ethical controls –Gradually evolving and maturing

csci5233 computer security & integrity 17 Principle of Effectiveness Controls must be used to be effective. –Efficient Time, memory space, human activity, … –Easy to use –appropriate

csci5233 computer security & integrity 18 Overlapping Controls Several different controls may apply to one potential exposure. H/w control + S/w control + Data control

csci5233 computer security & integrity 19 Goals of Security Prevention –Prevent attackers from violating security policy Detection –Detect attackers’ violation of security policy Recovery –Stop attack, assess and repair damage –Continue to function correctly even if attack succeeds

csci5233 computer security & integrity 20 Trust and Assumptions Underlie all aspects of security Policies –Unambiguously partition system states –Correctly capture security requirements Mechanisms –Assumed to enforce policy –Support mechanisms work correctly

csci5233 computer security & integrity 21 Types of Mechanisms secure precise broad set of reachable statesset of secure states

csci5233 computer security & integrity 22 Assurance Specification –Requirements analysis –Statement of desired functionality Design –How system will meet specification Implementation –Programs/systems that carry out design

csci5233 computer security & integrity 23 Operational Issues Cost-Benefit Analysis –Is it cheaper to prevent or to recover? Risk Analysis –Should we protect something? –How much should we protect this thing? Laws and Customs –Are desired security measures illegal? –Will people do them?

csci5233 computer security & integrity 24 Human Issues Organizational Problems –Power and responsibility –Financial benefits People problems –Outsiders and insiders –Social engineering

csci5233 computer security & integrity 25 Tying Together Threats Policy Specification Design Implementation Operation

csci5233 computer security & integrity 26 Key Points Policy defines security, and mechanisms enforce security –Confidentiality –Integrity –Availability Trust and knowing assumptions Importance of assurance The human factor