Introduction to Computer Security

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
The University of Adelaide, School of Computer Science
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
CSCE 201 Introduction to Information Security Fall 2010.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
CSA 223 network and web security Chapter one
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 1 Introduction to Security
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering.
CPSC 6126 Computer Security Information Assurance.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Crime and Information Technology Security
Security in Computing (C2021) Week-1. Module Syllabus Summary The main topics of study will include: General Security Problems: attacks; computer criminals;
Week 1 - Wednesday.  What did we talk about last time?  Course overview  Terminology  Threats  Vulnerabilities  Attacks  Controls  CIA.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
C8- Securing Information Systems
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Information Security What is Information Security?
Topic 5: Basic Security.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Chap1: Is there a Security Problem in Computing?.
CSCE 548 Secure Software Development Security Operations.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
Is There a Security Problem in Computing?
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Issues and Protections
Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Secure Software Confidentiality Integrity Data Security Authentication
CS 450/650 Fundamentals of Integrated Computer Security
Information and Network Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter 1: Information Security Fundamentals
Keselamatan Komputer (Computer Security)
Security in Computing, Fifth Edition
Cyber Security For Civil Engineering
Basic Security Concepts
Presentation transcript:

Introduction to Computer Security CHAPTER 1 Introduction to Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM 2004

Objectives Define the computer security concept Explain the difference between computer intrusion, computer threats, vulnerabilities and controls Differentiate threats to security computing:interception, interruption, fabrication and modification Explain the goals of secure computing i.e confidentiality,integrity,availability and non repudiation Discuss controls available to address these security threats

‘’SECURE” mean… Protecting Valuables. Computer-related assets, not gold & money. Protecting Money vs. Protecting Information.

‘’SECURE” mean… (cont) Characteristic Bank Protecting Money People Protecting Information Size and portability Sites storing money are large, not portable. Building need guards, etc. Sites storing info are very small and portable. Physical device fit in briefcase. Ability to avoid physical contact Difficult. Criminal can carry it away from bank’s premises. Simple. Info that handle by electronic. Value of assets Very high. Variable, from very high to very low.

Characteristics of Computer Intrusion Any part of a computing system can be the target of a crime computing system:a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks . Target of crime : hardware, software, storage media, data and people. Do not assume that some parts of computing system are not valuable to an outsider (money or information???). Any system is most vulnerable at its weakest point.

Characteristics of Computer Intrusion (cont) Principle of Easiest Penetration An intruder must be expected to use any available means of penetration. The penetration may not necessarily be by the most obvious means, nor is it necessarily the one against which the most solid defense has been installed.

ATTACKS When we test any computer system, we need to imagine how the system could malfunction. Then we improve the system’s design so that the system can withstand any of the problems that we have identified.

Threats, Vulnerabilities and Control Three valuable components: hardware, software and data. Vulnerability : weakness in the security system, for example in procedures, design or implementation that might be exploited to cause loss or harm. Data manipulation – system does not verify a user 's identity before allowing data access.

Threats, Vulnerabilities and Control (cont) Threat : circumstances that has the potential to cause loss or harm. Human-initiated, computer-initiated and also natural disasters for example flood. Control : an action, device, procedure or technique that removes or reduce the vulnerability.

Threats, Vulnerabilities and Control (cont) “A threat is blocked by control of a vulnerability.”

System security threats

Threats, Vulnerabilities and Control (cont) 4 kinds of threat : Interception : some unauthorized party has gained access to an asset. – illicit copying of program or a computing system. Interruption : an asset of the system becomes lost, unavailable or unusable. – erasure of a data file or malfunction of an operating system. Modification : unauthorized party not only accesses but tampers with an asset. – changes the values in a database. Fabrication : intruder insert spurious transaction to an existing computing system. – forgeries.

Attacker syndrome A malicious attacker must have three things (MOM syndrome): Method : the skills, knowledge, tools and other things with which to be able to pull of the attack. Opportunity : the time and access to accomplish the attack. Motive : a reason to want to perform this attack against this system.

The Meaning of Computer Security The purpose of computer security is to devise ways to prevent the weaknesses from being exploited Security goals: Confidentiality : ensures that computer related assets are accessed only by authorized parties. It is sometime called secrecy or privacy. Integrity : assets can be modified only by authorized parties or only in authorized ways. Availability : assets are accessible to authorized parties at appropriate times. Also known by its opposite, denial of service.

Relationship Between Confidentiality, Integrity, and Availability.

Vulnerabilities of Computing Systems.

Computer Criminals computer crime is any crime involving a computer or aided by the use of one some of these characteristics: Amateurs : committed most of the computer crimes reported to date. Ordinary computer professionals or users. When they become disgruntled, they vow to ‘get even’ with management by wreaking havoc on a computing installation.

Computer Criminals (cont) Crackers or Malicious Hackers : often high school or university students, attempt to access computing facilities for which they have not been authorized. It is seen as the ultimate victimless crime. They enjoy the simple challenge of trying to log in, just to see whether it can be done. There is no common profile or motivation for these attackers.

The security community distinguishes between a "hacker," someone who (nonmaliciously) programs, manages , or uses computing systems, and a "cracker," someone who attempts to access computing systems for malicious purposes. Crackers are the " evildoers ." Now, hacker has come to be used outside security to mean both benign and malicious users.

Computer Criminals (cont) Career criminals : understand the target of computer crime. There is some evidence that organized crime and international groups are engaging in computer crime. Some companies are reticent to prosecute computer criminals.

Terrorists :terrorists using computers in three ways: targets of attack: denial-of-service attacks and web site defacements are popular for any political organization because they attract attention to the cause and bring undesired negative attention to the target of the attack. propaganda vehicles: web sites, web logs, and e-mail lists are effective, fast, and inexpensive ways to get a message to many people. methods of attack: to launch offensive attacks requires use of computers.

Methods of Defense : Concepts We can deal with harm in several ways. Prevent it, by blocking the attack or closing the vulnerability. Deter it, by making the attack harder, but not impossible. Deflect it, by making another target more attractive. Detect it, either as it happens or some time after the fact. Recover from its effects.

Methods of Defense : The Methods Controls : physical security-strong gate or door. Encryption : Scrambling process,so that they are unintelligible to the outside observer Software Controls : program control-OS and development control. Hardware Controls : firewalls, intrusion detecting system. Policies and Procedures : codes of ethics. Physical Control : locks the door, backup.

Effectiveness of Controls several aspects that can enhance the effectiveness of controls. Awareness of Problem- People using controls must be convinced of the need for security. That is, people will willingly cooperate with security requirements Likelihood of Use -no control is effective unless it is used Overlapping Controls -several different controls may apply to address a single vulnerability (layered defense) Periodic Review -judging the effectiveness of a control is an ongoing task.

Exercise Distinguish among vulnerability, threat, and control. Briefly explain four types of threat. What is the principles of computer security? State the ways to deal with harm . List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials.