Presented by: Dr. Munam Ali Shah

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Protection.
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Network Security Lecture 3 Presented by: Dr. Munam Ali Shah.
Chapter 14 Protection Bernard Chen Spring Goal of Protection Protection was originally conceived as an adjunct to multiprogramming operation.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Network security Network security. Look at the surroundings before you leap.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
Cosc 4740 Chapter 13: Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique.
Protection Nadeem Majeed Choudhary
Modul ke: Fakultas Program Studi Proteksi SISTEM OPERASI Misbahul Fajri, ST., MTI. 14 FASILKOM Teknik Informatika.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Goals of Protection Operating system consists of a collection.
Network Security Introduction
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
CSE Operating System Principles Protection.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Cryptography and Network Security
Information and Network Security
Lecture 1: Foundation of Network Security
Cryptography and Network Security
Chapter 14: Protection.
Chapter 14: Protection.
Cryptography and Network Security
Presentation transcript:

Presented by: Dr. Munam Ali Shah Network Security Lecture 4 Presented by: Dr. Munam Ali Shah

Summary of the previous lecture Prevention, Detection and Reaction How much security Security trade-offs (productivity, functionality) Penetration testing tool No free lunch

Outlines Security through obscurity Aspects of Security OSI Security architecture Active and Passive attacks Protection and access rights

Objectives To describe the difference between security and protection. To understand access privileges and create access right metrix. To understand how different security tools be used.

There is never a free lunch Means don’t go for free software, free wallpapers etc. No one is going to give you anything free

Security through obscurity … ? Security through obscurity – hiding design or implementation details to gain security: keeping secret not the key, but the encryption algorithm, hiding a DB server under a name different from “db”, etc. The idea doesn’t work it’s difficult to keep secrets (e.g. source code gets stolen) if security of a system depends on one secret, then, once it’s no longer a secret, the whole system is compromised secret algorithms, protocols etc. will not get reviewed  flaws won’t be spotted and fixed  less security Systems should be secure by design, not by obfuscation Security AND obscurity

Aspects of Security Security attack Any action that compromises the security of information owned by an organization. Security mechanism A process that is designed to detect, prevent or recover from a security attack. Security service Services that enhances the security of the data processing systems and the information transfers of an organization. These services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. The OSI security architecture focuses on security attacks,mechanisms,and services.

OSI Security Architecture  International Telecommunication Union (ITU-T) recommends X.800, the security architecture for OSI Defines a systematic way of defining and providing security requirements International telecommunication union (ITU) telecommunication standardization sector (ITU-T)

Security Attacks Classification Any action that compromises the security of information owned by an organization Information security is about how to prevent attacks, or failing that, to detect attacks Classification according to X.800 Passive attack Active attack A threat is a possible potential danger that might exploit a vulnerability. Is a sequence of commands that take advantage of a vulnerability in order to cause vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system.

Passive attack Obtaining message content Traffic analysis Passive attacks attempt to learn or make use of information from the system but does not affect system resources. By eavesdropping on, or monitoring of, transmissions to: + obtain message contents or + monitor traffic flows ( … opponent could determine the frequency and length of messages being exchange this kind of information maybe helpful in determining the nature of communication that was taking place) Are difficult to detect because they do not involve any alteration of the data.

Active attack Masquerade Replay previous messages Modify messages in transit Denial of service Active attacks attempt to alter system resources or affect their operation. By modification of data stream to: + masquerade of one entity as some other + replay previous messages (as shown above in Stallings Figure 1.4b) + modify messages in transit + denial of service Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical,software,and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.

Security Attacks Security Attacks Security Attacks Security Attacks Snooping Snooping Snooping Snooping Modification Modification Modification Modification Denial of Service Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Traffic Analysis Masquerading Masquerading Masquerading Threat to Availability Replaying Replaying Threat to Confidentiality Repudiation Threat to Integrity

Passive Versus Active Attacks Bob Alice Alice and Bob want to communicate in presence of adversaries Adversaries: Passive – just looking Active – may change msgs

Categorization of passive and active attacks Passive/Active Threatening Snooping Traffic Analysis Passive Confidentiality Modification Masquerading Replaying Repudiation Active Integrity Denial of Service Availability

Security Service Enhance security of data processing systems and information transfers of an organization Intended to counter security attacks Using one or more security mechanisms X.800 defines a security service as “a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”

Protection In one protection model, computer consists of a collection of objects, hardware or software Each object has a unique name and can be accessed through a well-defined set of operations Protection problem - ensure that each object is accessed correctly and only by those processes that are allowed to do so

Principles of Protection Guiding principle – principle of least privilege Programs, users and systems should be given just enough privileges to perform their tasks Limits damage if entity has a bug, gets abused Can be static (during life of system, during life of process) Or dynamic (changed by process as needed) – domain switching, privilege escalation “Need to know” a similar concept regarding access to data Must consider “grain” aspect Rough-grained privilege management easier, simpler, but least privilege now done in large chunks Fine-grained management more complex, more overhead, but more protective File ACL lists, RBAC Domain can be user, process, procedure

Domain Structure Access-right = <object-name, rights-set> where rights-set is a subset of all valid operations that can be performed on the object Domain = set of access-rights

Access control prevention of the unauthorized use of a resource, that is this service controls - who can have access to a resource - under what condition access can occur - what those accessing are allowed to do

Access Matrix View protection as a matrix (access matrix) Rows represent domains Columns represent objects Access(i, j) is the set of operations that a process executing in Domaini can invoke on Objectj

Access Matrix

Role-based Access Control in Solaris 10

Summary of today’s lecture In today’s lecture, we talked about security through obscurity We also learnt about different types of attacks such as Active and Passive attacks. We have developed an understanding about access rights and how to use access metrix

Next lecture topics We will discuss different types of security attacks such as virus, worms, Trojan horse etc. DoS attacks, DDoS attacks and its different types

The End