Download presentation
Presentation is loading. Please wait.
Published byPaul Shelton Modified over 9 years ago
1
Chapter 1 Overview
2
The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. — The Art of War, Sun Tzu
3
Background n Information Security requirements have changed in recent times n traditionally provided by physical and administrative mechanisms n computer use requires automated tools to protect files and other stored information n use of networks and communications links requires measures to protect data during transmission
4
Definitions n Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers n Network Security - measures to protect data during their transmission n Internet Security - measures to protect data during their transmission over a collection of interconnected networks
5
A secure(dependable) system is a robust system that exhibits: n secrecy(privacy or confidentiality) n integrity n reliability n availability n non repudiation
6
Security Loopholes: n Trojan Horse: the programs that appear to be benign or even useful to users. n Virus: the programs that multiply themselves throughout the network. n Worm: the programs that copy and compile themselves on remote systems, not modify other programs - denial of service.
7
Common security threats: Natural disaster: 15% Human disaster: 85% n interruption(loss of data, denial of service) - availability n interception - secrecy n modification - integrity n fabrication - integrity
9
Security threat sources: n unintentional system or user faults - fault- tolerant mechanisms n external intruders - authentication verification n internal intruders - authorization validation
10
系統安全的威脅
11
系統品質與安全 兩者需求互相衝突 兩者需求互相衝突 系統品質 系統品質 – 容易使用性 – 即時性 – 傳輸量 – 簡單性
12
系統品質與安全
13
系統安全的等級標準
14
Services, Mechanisms, Attacks n need systematic way to define requirements n consider three aspects of information security: security attacksecurity attack security mechanismsecurity mechanism security servicesecurity service
15
Security Service is something that enhances the security of the data processing systems and the information transfers of an organizationis something that enhances the security of the data processing systems and the information transfers of an organization intended to counter security attacksintended to counter security attacks make use of one or more security mechanisms to provide the servicemake use of one or more security mechanisms to provide the service
16
Security Mechanism n a mechanism that is designed to detect, prevent, or recover from a security attack n no single mechanism that will support all functions required n however one particular element underlies many of the security mechanisms in use: cryptographic techniques
17
Security Attack n any action that compromises the security of information owned by an organization n information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems n have a wide range of attacks n can focus of generic types of attacks n note: often threat & attack mean same
18
OSI ITU-T X.800 Security Services n X.800 defines it as: a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers n RFC 2828 defines it as: a processing or communication service provided by a system to give a specific kind of protection to system resources n X.800 defines it in 5 major categories
19
OSI ITU-T X.800 Security Services n Authentication - assurance that the communicating entity is the one claimed n Access Control - prevention of the unauthorized use of a resource n Data Confidentiality –protection of data from unauthorized disclosure n Data Integrity - assurance that data received is as sent by an authorized entity n Non-Repudiation - protection against denial by one of the parties in a communication
21
Security Mechanisms (X.800) n specific security mechanisms: encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarizationencipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization n pervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recoverytrusted functionality, security labels, event detection, security audit trails, security recovery
22
X.800 Classify Security Attacks as n passive attacks - eavesdropping on, or monitoring of, transmissions to: obtain message contents, orobtain message contents, or monitor traffic flowsmonitor traffic flows active attacks – modification of data stream to: active attacks – modification of data stream to: masquerade of one entity as some othermasquerade of one entity as some other replay previous messagesreplay previous messages modify messages in transitmodify messages in transit denial of servicedenial of service
23
Model for Network Security
24
n using this model requires us to: design a suitable algorithm for the security transformationdesign a suitable algorithm for the security transformation generate the secret information (keys) used by the algorithmgenerate the secret information (keys) used by the algorithm develop methods to distribute and share the secret informationdevelop methods to distribute and share the secret information specify a protocol enabling the principals to use the transformation and secret information for a security servicespecify a protocol enabling the principals to use the transformation and secret information for a security service
25
Model for Network Access Security
26
n using this model requires us to: select appropriate gatekeeper functions to identify usersselect appropriate gatekeeper functions to identify users implement security controls to ensure only authorised users access designated information or resourcesimplement security controls to ensure only authorised users access designated information or resources
27
Approaches to protect a system from intrusion: n n Encryption of data n n Authentication n n Authorization n n Auditing n n Training Firewall & Intrusion Detection System Virus detection & Anti-virus Virus detection & Anti-virus
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.