Download presentation
Presentation is loading. Please wait.
Published byAntony Byrd Modified over 9 years ago
1
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University
2
Assignment A description of yourself, which includes: –Your name, email, affiliation –Your area specialty (be specific) –The reason you are taking this class –A statement saying your level of knowledge on computer networks and discrete mathematics.
3
Topics will include: 1. Introduction –a. Security, Threats, and Vulnerabilities –b. Security Models –c. Cryptography and Cryptanalysis 2. Security Basics and Theory –a. Authentication –b. Protocols 3. Network Security –a. IPsec –b. Firewalls 4. Special Topics –a. Web security
4
Course textbook Textbook: Kaufman, C., Perlman, R. and Speciner, M., Network Security (Private Communication in a Public World), 2 nd edition, Prentice Hall 2002. References: William Stalling, Cryptography and Network Security, 2 nd edition, Prentice Hall 1999. Class notes: Computer Security, Pennsylvania State University http://www.cse.psu.edu/~cg543/
5
Class website http://www.radford.edu/~hlee3/classe s/itec693/itec693_SecurityBasic/ITE C693_schedule.htmhttp://www.radford.edu/~hlee3/classe s/itec693/itec693_SecurityBasic/ITE C693_schedule.htm Group Presentation –See details in the class website
6
You need a basic understanding of Networks Discrete Mathematics
7
What is Computer/Information Security? Garfinkel and Spafford (1991) – “A computer is secure if you can depend on it and its software to behave as expected.” – Not really satisfactory – does not truly capture that security speaks to the behavior of others Expected by whom? Under what circumstances? McDaniel (2003) – “… information security (research) is the study of technologies that guarantee the privacy, access, and quality of electronic resources.”
8
Risk At-risk valued resources that can be misused – Monetary – Data (loss or integrity) – Time – Confidence – Trust What does being misused mean? – Privacy (personal) – Confidentiality (communication) – Integrity (personal or communication) – Availability (existential or quality) Q: What is at stake in your life?
9
Threat A threat is a specific means by which a risk can be realized – Context specific (a fact of the environment) – An attack vector is a specific threat (e.g., key logger) A threat model is a collection of threats that deemed important for a particular environment – E.g., should be addressed – A set of “ security requirements” for a system
10
Vulnerability A vulnerability is a systematic artifact that exposes the user, data, or system to a threat – E.g., buffer-overflow, WEP key leakage What is the source of a vulnerability? – Bad software (or hardware) – Bad design, requirements – Bad policy/configuration – System Misuse unintended purpose or environment E.g., student IDs for liquor store
11
Adversary An adversary is any entity trying to circumvent the security infrastructure – The curious and otherwise generally clueless (e.g., scriptkiddies) – Casual attackers seeking to understand systems – Venal people with an ax to grind – Malicious groups of largely sophisticated users (e.g, chaos clubs) – Competitors (industrial espionage) – Governments (seeking to monitor activities)
12
Are Users Adversaries? Have you ever tried to circumvent the security of a system you were authorized to access? Have you ever violated a security policy (knowingly or through carelessness)?
13
Attacks An attack occurs when someone attempts to exploit a vulnerability Kinds of attacks – Passive (e.g., eavesdropping) – Active (e.g., password guessing) A compromise occurs when an attack is successful –Typically associated with taking over/altering resources
14
Participants Participants are expected system entities – Computers, agents, people, enterprises, … – Depending on context referred to as: servers, clients, users, entities, hosts, routers, … – Security is defined with respect to these entitles Implication: every party may have unique view A trusted third party – Trusted by all parties for some set of actions – Often used as introducer or arbiter
15
Trust Trust refers to the degree to which an entity is expected to behave – What the entity not expected to do? E.g., not expose password – What the entity is expected to do (obligations)? E.g., obtain permission, refresh A trust model describes, for a particular environment, who is trusted to do what? Note: you make trust decisions every day – Q: What are they? – Q: Whom do you trust?
16
Security Model A security model is the combination of a trust and threat models that address the set of perceived risks – The “security requirements” used to develop some cogent and comprehensive design – Every design must have security model LAN network or global information system Java applet or operating system – The single biggest mistake seen in use of security is the lack of a coherent security model – It is very hard to retrofit security (design time) This class is going to talk a lot about security models – What are the security concerns (risks)? – What are the threats? – Who are our adversaries? – Who do we trust and to do what? Systems must be explicit about these things to be secure.
17
Example: Security Models Assume we have a University website that hosts courses through the web –Syllabus, other course information – Assignments submissions – Online Grading In class: elements of the security model – Participants – Adversaries – Risks – Threats
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.