Is There a Security Problem in Computing?

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
The University of Adelaide, School of Computer Science
Introduction to Security in Computing Computer and Network Security Semester 1, 2011 Lecture #01.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Introducing Computer and Network Security
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 1 Page 1 CS 236, Spring 2008 What Are Our Security Goals? Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CPSC 6126 Computer Security Information Assurance.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Computer Crime and Information Technology Security
Week 1 - Wednesday.  What did we talk about last time?  Course overview  Terminology  Threats  Vulnerabilities  Attacks  Controls  CIA.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
C8- Securing Information Systems
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.
Network security Network security. Look at the surroundings before you leap.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Lecture 1 Page 1 CS 236 Online What Are Our Security Goals? CIA Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Introduction to Computer Security
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
Security
CS 450/650 Fundamentals of Integrated Computer Security
Security in Networking
Faculty of Science IT Department By Raz Dara MA.
Keselamatan Komputer (Computer Security)
Security in Computing, Fifth Edition
What Are Our Security Goals?
Mohammad Alauthman Computer Security Mohammad Alauthman
Basic Security Concepts
Presentation transcript:

Is There a Security Problem in Computing? Chapter 1 Is There a Security Problem in Computing? Information security / Mahmoud Obeidat

In This Chapter The risks involved in computing The goal of secure computing: confidentiality, integrity, availability The threats to security in computing: interception, interruption, modifications, fabrication Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, laws and ethics Information security / Mahmoud Obeidat

What Does “Secure” Mean? Are you Secure? What makes you feel secure? Example: Banks Yesterday – learning from the past Today Protecting Valuables Protecting Money Vs. Protecting Information Size and Portability (large vs. small) Ability to Avoid Physical Contact (lots vs. little) Value of Asset (very high vs. variable) Information security / Mahmoud Obeidat

Developing an Understanding Examine the risk of security in computing Consider available countermeasures or controls Stimulate thought about uncovered vulnerabilities Identify areas where more work is needed Information security / Mahmoud Obeidat

Characteristics of Computer Intrusion Any computer system can be a target: Hardware, Software, Storage, Data, People/User Any system is most vulnerable at its weakest point. Principle of Easiest Penetration - An intruder must be expected to use any available means of penetration. Penetration may not necessarily be by the most obvious means, nor via the one we have the most defense against. Consider all the means of penetration Checked repeated times Don’t underestimate the attacker/think like an attacker Strengthening one thin might weaken another Information security / Mahmoud Obeidat

Attacks The components to attack: Hardware Software Data Vulnerability – a weakness in the security system that could be exploited to cause harm or loss. For instance, a particular system may be vulnerable to unauthorized data manipulation because the system does not verify a user's identity before allowing data access. Threat – a set of circumstances that has the potential to cause loss or harm. Wall holding back water Threat to get wet Vulnerability is a crack in the wall Information security / Mahmoud Obeidat

in Figure 1-1. Here, a wall is holding water back in Figure 1-1. Here, a wall is holding water back. The water to the left of the wall is a threat to the man on the right of the wall: The water could rise, overflowing onto the man, or it could stay beneath the height of the wall, causing the wall to collapse. So the threat of harm is the potential for the man to get wet, get hurt, or be drowned. For now, the wall is intact, so the threat to the man is unrealized. However, we can see a small crack in the walla vulnerability that threatens the man's security. If the water rises to or beyond the level of the crack, it will exploit the vulnerability and harm the man. Information security / Mahmoud Obeidat

Attack – human who exploits a vulnerability Control – a protective measure against an attack a control is an action, device, procedure, or technique that removes or reduces a vulnerability A threat is blocked by control of vulnerability Type of System Security Threats in computing Interception Interruption Modification Fabrication Information security / Mahmoud Obeidat

interception : some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. Interruption : an asset of the system becomes lost, unavailable, or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file. Modification: unauthorized party tampers with an asset. For example, someone might change the values in a database, alter a program so that it performs an additional computation, or modify data being transmitted electronically. fabrication : The intruder may insert spurious transactions to a network communication system or add records to an existing database. Information security / Mahmoud Obeidat

Figure 1-2. System Security Threats. Information security / Mahmoud Obeidat

Method, Opportunity & Motive Attacker must have three things: Method – the skill, knowledge and tool Opportunity – the time and access Motive – a reason to want to perform an attack Information security / Mahmoud Obeidat

Security Goals Secure is: Confidentiality (Secrecy or Privacy)- assets accessed only by authorized parties Not only reading but viewing, printing or knowing about the asset Integrity – assets modified only by authorized parties Includes writing, changing, changing the status, deleting or creating Availability – assets are accessible to authorized parties at appropriate times. Denial of Service Information security / Mahmoud Obeidat

Figure 1-3. Relationship Between Confidentiality, Integrity, and Availability. Information security / Mahmoud Obeidat

Availability Availability applies both to data and to services A data item, service, or system is available if There is a timely response to our request. Resources are allocated fairly so that some requesters are not favored over others. The service or system involved follows a philosophy of fault tolerance. The service or system can be used easily and in the way it was intended to be used. Concurrency is controlled. Information security / Mahmoud Obeidat

Vulnerabilities Hardware It is very visible Easy to attack adding devices, changing them, removing them, intercepting the traffic to them Water, burned, frozen, gassed and electrocuted, dust, time, environment Voluntary Machine Slaughter or Machinicide Machines have been shot with guns, stabbed with knives, and smashed with all kinds of things. Bombs, fires, and collisions have destroyed computer rooms Safeware Insurance reported 600,000 laptops stolen in 2003. Credent Technologies reported that 29 percent were stolen from the office, 25 percent from a car, and 14 percent in an airport. Stolen laptops are almost never recovered: The FBI reports 97 percent were not returned Information security / Mahmoud Obeidat

Software Software Deletion Software Modification (cause it to fail or cause it to perform an unintended task) Software Theft Software replaced Software destroyed the attacks are obvious, as when the software no longer runs. More subtle are attacks in which the software has been altered but seems to run normally. Information security / Mahmoud Obeidat

Figure 1-4. Vulnerabilities of Computing Systems. Information security / Mahmoud Obeidat

Malicious Modification of Software Logic Bomb:  a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Trojan Horse: a program that overtly does one thing while covertly doing another Virus Trapdoor : a program that has a secret entry point Information leaks : code that makes information accessible to unauthorized people or programs Information security / Mahmoud Obeidat

Data Vulnerabilities Effects everyone Data is more than just an electronic file Principle of Adequate Protection – Computer items must be protected only until they lose their value. Data Confidentiality Data can be gathered by many means, such as tapping wires, planting bugs in output devices, sifting through trash receptacles, monitoring electromagnetic radiation, bribing key employees, inferring one data point from other values, or simply requesting the data. Data Integrity Printed data, however, can be readily interpreted by the general public. Because of its visible nature, a data attack is a more widespread and serious problem than either a hardware or software attack. Thus, data items have greater public value than hardware and software because more people know how to use or interpret data. Information security / Mahmoud Obeidat

Other Exposed Assets Networks very exposed storage medium or access from distant and potentially untrustworthy computing systems. Access steal computer time to do general-purpose computing, destroys software or data and deny service to a legitimate user Key People People can be crucial weak points in security. If only one person knows how to use or maintain a particular program, trouble can arise if that person is ill, suffers an accident, or leaves the organization . In particular, a disgruntled employee can cause serious damage by using inside knowledge of the system and the data that are manipulated. Information security / Mahmoud Obeidat

Figure 1-5. Security of Data. Information security / Mahmoud Obeidat Figure 1-5. Security of Data.

Computer Criminals Amateurs Crackers or Hackers Career Criminal Terrorists Information security / Mahmoud Obeidat

The security community distinguishes between a "hacker," someone who programs, manages, or uses computing systems, and a "cracker," someone who attempts to access computing systems for malicious purposes. Crackers are the "evildoers." Now, hacker has come to be used outside security to mean both benign and malicious users. Information security / Mahmoud Obeidat

Terrorists terrorists using computers in three ways: targets of attack: denial-of-service attacks and web site defacements are popular for any political organization because they attract attention to the cause and bring undesired negative attention to the target of the attack. propaganda vehicles: web sites, web logs, and e-mail lists are effective, fast, and inexpensive ways to get a message to many people. methods of attack: to launch offensive attacks requires use of computers Information security / Mahmoud Obeidat

Methods of Defense Harm occurs when a threat is realized against a vulnerability Risk – the possibility of harm Dealing with Harm prevent it, by blocking the attack or closing the vulnerability deter it, by making the attack harder but not impossible deflect it, by making another target more attractive (or this one less so) detect it, either as it happens or some time after the fact recover from its effects Information security / Mahmoud Obeidat

Controls Control – attempt to prevent the exploitation of a vulnerability Computer Security has lots of controls Simple or Difficulty Inexpensive or Expensive Type of Control Encryption – formal name for the scrambling process deals with confidentially and integrity Does not solve computer security problems. Cleartext Ciphertext Protocols Information security / Mahmoud Obeidat

Software Controls Hardware Controls Programs must be secure to prevent attacks Program Controls: Internal Program Controls Operating System and Network System Controls Independent Control Programs (virus checker) Development Controls (quality standards in construction) Software controls effect the user Hardware Controls Smart cards, locks, devices to ID users, firewalls, intrusion detection systems, circuitry control Policies and Procedures Policies – an agreement of way things are done Must be written and training provided Physical Controls – locks/security officer/backups Information security / Mahmoud Obeidat

Effectiveness of Controls Controls must be properly used! Awareness of Problem Likelihood of Use Principles of Effectiveness - Control must be used-and used properly- to be effective. They must be efficient, easy to use, and appropriate. Overlapping Controls (good) Periodic Review – controls are not permanent Principle of Weakest Link – Security can be no stronger than its weakest link. Information security / Mahmoud Obeidat

Conclusion The risks involved in computing The goal of secure computing: confidentiality, integrity, availability The threats to security in computing: interception, interruption, modifications, fabrication Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, laws and ethics Information security / Mahmoud Obeidat