CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.

Slides:



Advertisements
Similar presentations
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Overview CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 8, 2004.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Chapter Nine Maintaining a Computer Part III: Malware.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
PART THREE E-commerce in Action Norton University E-commerce in Action.
G53SEC Computer Security Introduction to G53SEC 1.
CIT 380: Securing Computer Systems Security Solutions.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
C8- Securing Information Systems
SECURITY ENGINEERING 2 April 2013 William W. McMillan.
Security in Computer System 491 CS-G(172) By Manesh T
CSC 682: Advanced Computer SecuritySlide #1 CSC 682: Advanced Computer Security Introduction.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
CIT 380: Securing Computer Systems Security Solutions Part 2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Sarvajanik college of engineering and technology. Created by:- Keshvi Khambhati (co-m) Ria Bhatia (co-m) Meghavi Gandhi (co-m) Jarul Mehta(co-m) Topic.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Basic Security Concepts University of Sunderland CIT304 Harry R Erwin, PhD.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
CIT 480: Securing Computer Systems
CS457 Introduction to Information Security Systems
CSC 482/582: Computer Security
Securing Network Servers
Chapter 1: Introduction
Securing Information Systems
CSC 482/582: Computer Security
Chapter 1: Introduction
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction

CIT 380: Securing Computer SystemsSlide #2 About Me James Walden –Assistant Professor of Computer Science –Interests: Software Security Programming Languages Software Engineering Network Security

CIT 380: Securing Computer SystemsSlide #3 Course Administration Web Site –Notes, readings, and assignments on web site. – Assignment submission –Use submit command on kosh. Contact Information – –Phone: (859)

CIT 380: Securing Computer SystemsSlide #4 CIT 380 within the Curriculum CIT 140CIT 370 CIT 380 Security CIT 484 Network Security CIT 430 Forensics

CIT 380: Securing Computer SystemsSlide #5 Syllabus

CIT 380: Securing Computer SystemsSlide #6 Course Goals 1. What is computer security? 2. How do computer systems fail? 3. How can the risks to a system be evaluated? 4. How well does a particular security solution mitigate the risks to a system? 5. How can the costs and trade-offs of a security solution be balanced? 6. What are the essential problems and solutions of network security? 7. How do viruses and worms propagate and how can they be stopped? 8. How can intrusions be detected and investigated to determine the nature of the attackand the attacker? 9. What are the ethical impacts of security technologies?

CIT 380: Securing Computer SystemsSlide #7 Grading Grades are based on –Midterm Exam (30%) –Final Exam (40%) –Assignments (30%) A B80-89 C70-79 D60-69 F0-60

CIT 380: Securing Computer SystemsSlide #8 Topics A first look at four important questions: –What is security? –How do we evaluate risks of various threats? –How does security mitigate these risks? –How do we balance the costs and trade-offs of our security solutions?

CIT 380: Securing Computer SystemsSlide #9 9/11 Most devastating terrorist attack in history. –Low-tech. –Innovative. Completely different than earlier hijackings. We thought we had solved airplane bombings by ensuring passengers were on same flight as baggage. –What were the security responses? How effective were the responses? What were the costs?

CIT 380: Securing Computer SystemsSlide #10 What is Security? Security is the prevention of certain types of intentional actions from occuring in a system. –These potential actions are threats. –Threats that are carried out are attacks. –Intentional attacks are carried out by an attacker. –Objects of attacks are assets.

CIT 380: Securing Computer SystemsSlide #11 Safety vs Security Adversary: An intelligent attacker who intentionally causes the system to fail. Security Home: door lock. Car: alarm. Computer: Login password. Safety Home: fire alarm. Car: crumple zones. Computer: UPS. Safety and security can interact: Who is watching your computer room after the fire alarm was pulled?

CIT 380: Securing Computer SystemsSlide #12 Goals of Security Prevention –Prevent attackers from violating security policy Detection –Detect attackers’ violation of security policy Recovery –Stop attack, assess and repair damage Survivability –Continue to function correctly even if attack succeeds

CIT 380: Securing Computer SystemsSlide #13 NSTISSC Security Model

CIT 380: Securing Computer SystemsSlide #14 Components of Security Confidentiality –Keeping data and resources hidden. Privacy. Integrity –Preventing unauthorized changes to data or resources. Availability –Enabling access to data and resources

CIT 380: Securing Computer SystemsSlide #15 Confidentiality Authentication Passwords, mother’s maiden name Corporations Trade secrets, e.g., the formula for Coca Cola. Databases SSN, Driver’s license Governments National security Embarrassing information:

CIT 380: Securing Computer SystemsSlide #16 Integrity Data Integrity –content of the information. –ex: 2005 Walmart $1.5 million bar code scam. Origin Integrity (authentication) –source of the information. –ex: 1997 Kurt Vonnegut MIT commencement address . Vonnegut was not the 1997 speaker and the content wasn’t his. Prevention vs Detection

CIT 380: Securing Computer SystemsSlide #17 Availability Prevent loss of system access. Denial of service attacks common. –Easy to launch, difficult to track down. –Can be just part of another attack

CIT 380: Securing Computer SystemsSlide #18 States of Information 1.Storage Information not currently being accessed. 2.Processing Information currently being used by processor. 3.Transmission Information in transit btw one node and another.

CIT 380: Securing Computer SystemsSlide #19 Security Measures Technology. –Hardware/software used to ensure confidentiality, integrity, or availability. Policy and practice. –Security requirements and activities. Education, training, and awareness. –Understanding of threats and vulnerabilities and how to protect against them.

CIT 380: Securing Computer SystemsSlide #20 How to evaluate security solutions? 1.What assets are you trying to protect? 2.What are the risks to those assets? 3.How well does the security solution mitigate those risks? 4.What other risks does the security solution cause? 5.What costs and trade-offs does the security solution impose?

CIT 380: Securing Computer SystemsSlide #21 Aspects of Risks To evaluate a risk, we need to evaluate both: –Probability of risk occurring. –Cost incurred by risk if it occurs. Minimize product of probability and cost. Risks are impacted by environment. –Building a house in a flood plain incurs additional risks beyond that of house itself. –Similarly, installion and configuration options impact risk of software systems.

CIT 380: Securing Computer SystemsSlide #22 Security is a matter of Trade-offs Security is only one of many system goals: Functionality Ease of Use Efficiency Time to market Cost Security

CIT 380: Securing Computer SystemsSlide #23 Cost-Benefit Analysis Is it cheaper to prevent violation or recover? –Cost of good network security: Money, time, reduced functionality, annoyed users. Large and ongoing. –Risks of bad network security: Angry customers, bad press, network downtime. Small and temporary.

CIT 380: Securing Computer SystemsSlide #24 Airport Security Let’s consider the issue of airport security again from the standpoint of what we’ve learned. Develop a solution, keeping the 5 questions in mind: 1.What assets are you trying to protect? 2.What are the risks to those assets? 3.How well does the security solution mitigate those risks? 4.What other risks does the security solution cause? 5.What costs and trade-offs does the security solution impose?

CIT 380: Securing Computer SystemsSlide #25 Human Issues: People Problems Social engineering –Kevin Mitnick testified before Congress “I was so successful in that line of attack that I rarely had to resort to a technical attack.” Circumvention –Users write down passwords, leave screens unlocked. Insider attacks

CIT 380: Securing Computer SystemsSlide #26 Human Issues: Organizations Low priority –Security costs, but doesn’t produce income. –Lack of liability reduces costs of bad security. Variable impact –Cost of security violation highly variable. –Insurance converts variable risk to fixed cost, but risk too variable for much involvement so far. Power and responsibility –Personnel responsible for security often don’t have power to enforce security.

CIT 380: Securing Computer SystemsSlide #27 Security: Laws and Customs Are desired security measures illegal? –cryptography export before 2000 –is it legal to monitor security breakins? –international commerce Will users circumvent them? –writing down passwords –removing file ACLs

CIT 380: Securing Computer SystemsSlide #28 Security Liability Product liability: –Tires: Continental recalled Ford SUV tires in 2002 due to wire and vibration problems. –Software: Manufacturer not liable for security flaws. Since Microsoft isn’t liable for Windows security failures, why would they want to sacrifice money, time, functionality, and ease of use for security?

CIT 380: Securing Computer SystemsSlide #29 Assumptions Security rests on assumptions specific to type of security required and environment. Example: –TCP/IP designed for pre-commercial Internet. Assumed only legitimate admins had root access. Trusted IP addresses, since only root can set IP addr. What happens to network when Windows 95 systems added to network, where desktop user has all privileges?

CIT 380: Securing Computer SystemsSlide #30 Assurance How much can you trust a system? Example: –Purchasing aspirin from a drugstore. –Bases for trust: Certification of drug by FDA. Reputation of manufacturer. Safety seal on bottle.

CIT 380: Securing Computer SystemsSlide #31 How much do you trust? Ken Thompson’s compiler hack from “Reflections on Trusting Trust.” –Modified C compiler does two things: If compiling a compiler, inserts the self-replicating code into the executable of the new compiler. If compiling login, inserts code to allow a backdoor password. –After recompiling and installing old C compiler: Source code for Trojan horse does not appear anywhere in login or C compiler. Only method of finding Trojan is analyzing binary.

CIT 380: Securing Computer SystemsSlide #32 Key Points Components of security –Confidentiality –Integrity –Availability States of information –Storage, Processing, Transmission Evaluating risk and security solutions. –Security is a matter of trade-offs. Security is a human problem.

CIT 380: Securing Computer SystemsSlide #33 References 1.Ross Anderson, Security Engineering, Wiley, Matt Bishop, Introduction to Computer Security, Addison-Wesley, Peter Neumann, (moderator), Risks Digest, 4.Bruce Schneier, Beyond Fear, Copernicus Books, Ken Thompson, “Reflections on Trusting Trust”, Communication of the ACM, Vol. 27, No. 8, August 1984, pp (