Download presentation
Presentation is loading. Please wait.
Published byBrandon Stephens Modified over 9 years ago
1
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 28 (last) November 30, 2004
2
Computer Science and Engineering Contents A7 in Tommy’s presentation Presentation evaluation in Put-it-all-together Final Q/A Evaluation
3
Computer Science and Engineering Class Inputs ResearchersInstructorStudentsNon-academic CSE 5339/7339
4
Computer Science and Engineering OS Database Networks System Background MathAlgorithms Security Issues EncryptionDecryption
5
Computer Science and Engineering Security
6
Security Goals Availability Availability Confidentiality Integrity Assets are accessed only by authorized people Assets can be modified only by authorized people Assets are accessible to authorized people
7
Computer Science and Engineering senderreceiverMedium Intruder Block it Intercept it Modify it Fabricate an authentic looking message
8
Computer Science and Engineering Important Background
9
Computer Science and Engineering Analysis of Algorithms nSequential Algorithms n Time Complexity n Space Complexity nAn algorithm whose time complexity is bounded by a polynomial is called a polynomial-time algorithm. An algorithm is considered to be efficient if it runs in polynomial time.
10
Computer Science and Engineering Time Complexity O(n) O(log n) O(nlogn) O(n 2 ) … O(n k )Polynomial O(2 n )Exponential O(k n ) O(n n )
11
Computer Science and Engineering Applications OS -- Review OS – a program that acts as an intermediary between a user of a computer and the computer hardware. OS Hardware Users
12
Computer Science and Engineering OS -- Review OS Services Program Execution I/O Operation File System manipulation Communications Error detection Resource Allocation Accounting Protection
13
Computer Science and Engineering Levels of Abstraction in a DBMS Physical Database View 1 View 2 View n Conceptual Database
14
Computer Science and Engineering Important Concepts in Database Data independence -- storage media; application Schema -- record definition Relation – table Indexing – B trees Entity/ Relationship model – entity, entity set, attributes, key, relationship Relational Database – information for an enterprise entities and relationships relational database SQL – Query language, programming language, embedded vs. interactive
15
Computer Science and Engineering Computer Network Basics Wide Area Networks (WAN) Metropolitan Area Network (MAN) Local Area Network (LAN) System or Storage Area Network (SAN)
16
Computer Science and Engineering ISO OSI Network Model Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical LAN Internet
17
Computer Science and Engineering Mail ftp Telnet Transmission Control Protocol (TCP) Internet Protocol (IP) Ethernet Token ring TCP/IP
18
Computer Science and Engineering IP Protocol Unreliable packet delivery service Datagram (IPv4) Service TypeVERSHLENTOTAL LENGTH IDENTIFICATIONFLAGSFRAGMENT OFFSET TIME TO LIVEPROTOCOLHEADER CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS PADDINGOPTIONS (IF ANY) DATA
19
Computer Science and Engineering Encryption
20
Encryption/Decryption EncryptionDecryption plaintext Original plaintext ciphertext
21
Computer Science and Engineering Ciphers Substitution Ciphers Substitute a character or a symbol for each character of the original message Transposition Ciphers The order of letters is rearranged
22
Computer Science and Engineering Symmetric Encryption EncryptionDecryption plaintext Original plaintext ciphertext key
23
Computer Science and Engineering Asymmetric Encryption EncryptionDecryption plaintext Original plaintext ciphertext KEKE KDKD
24
Computer Science and Engineering Hash Functions H M H(M) = h
25
Computer Science and Engineering Cryptographic Hash Functions Message Digest Functions Protect integrity Users create a message digest or fingerprint of a digital document Message Authentication Codes (MACs) Protect both integrity and authenticity MACs produce fingerprints based on both a given document and a secret key
26
Computer Science and Engineering Getting a Message Digest from a document Hash Message Digest
27
Computer Science and Engineering Generating Signature Message Digest Signature Encrypt using private key
28
Computer Science and Engineering Appending Signature to document Append Signature
29
Computer Science and Engineering Verifying Signature Hash Decrypt using public key Message Digest Message Digest
30
Computer Science and Engineering Security in OS
31
Computer Science and Engineering OS User interface Resource allocation Services users DataCPUMemoryI/O devices TablesLibraries Synchronization Concurrency control Deadlock management Communication Accounting OS Functions
32
Computer Science and Engineering In general O S OO SS Gate OOO SSS
33
Computer Science and Engineering User Authentication Knowledge-based techniques (passwords) Token-based techniques (smart cards) Biometric techniques (fingerprint) Two-factor (Card + PIN)
34
Computer Science and Engineering Security Policy A security policy is a statement of the security we expect the system to enforce. A system can be trusted only in relation to its security policy, that is, to the security needs the system is expected to satisfy.
35
Computer Science and Engineering Military Security policy Unclassified Restricted Confidential Secret Top Secret
36
Computer Science and Engineering Models of Security Security models are used to Test a particular policy for completeness and consistency Document a policy Help conceptualize and design an implementation Check whether an implementation meets the requirements
37
Computer Science and Engineering Kernel – OS part that performs lowest level functions User tasks OS OS Kernel Hardware
38
Computer Science and Engineering Combined Security Kernel / OS System User tasks OS OS Kernel Hardware Security activity OS Kernel: - HW interactions - Access control OS: - Resource allocation - Sharing - Access control - Authentication functions
39
Computer Science and Engineering Modules operating in Different Layers Least trusted code Most trusted code User interface User ID lookup Data comparison Data update User Authentication module
40
Computer Science and Engineering Security in DB
41
Computer Science and Engineering Sensitive Data Data that should not be made public Nothing sensitive and everything sensitive – can be handled by access control to the database itself Some but not all are sensitive -- not only data elements but context and meaning Factors that make data sensitive Inherently sensitive From a sensitive source Declared sensitive Part of a sensitive attribute or a sensitive record Sensitive in relation to previously disclosed information
42
Computer Science and Engineering Types of Disclosures Exact data -- most serious disclosure Bounds – sensitive data is between L and H Negative result -- a value that is not a zero Existence Probable value -- probability that a certain element has a certain value A successful security strategy must protect against both direct and indirect disclosures
43
Computer Science and Engineering Multilevel Database Sensitivity is determined not only by attribute NameDepartmentSalaryPhonePerformance element security several grades of security aggregate vs. individual elements
44
Computer Science and Engineering Proposal for Multilevel security Partitioning (Separation) The database is divided into several databases, each at its own level of security Encryption (Separation) Sensitive data are encrypted Each level of sensitive data can be stored in a table encrypted under a key unique to the level of sensitivity
45
Computer Science and Engineering Network Security
46
Computer Science and Engineering An Example of an Attack Attacker send echo request message to broadcast address Attacker also spoofs source address in the request Intermediary Attacker Victim
47
Computer Science and Engineering attacker master daemon Large number of UDP packets to random ports
48
Computer Science and Engineering Encryption Link Encryption End-to-End Encryption BNTSME
49
Computer Science and Engineering Link Encryption Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical BNTSME
50
Computer Science and Engineering End-to-End Encryption Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical BNTSME
51
Computer Science and Engineering IPSec Security Parameter Index (SPI) – data element, a pointer into a table of security associations Authentication Header (AH) – immediately follows IP header (authentication for IP traffic) Encapsulated Security Payload (ESP) – replaces (includes) the conventional TCP header and data portion of packet (encryption for IP data)
52
Computer Science and Engineering TCP/IP Conventional Packets Physical Header IP Header TCP Header Data Physical Trailer
53
Computer Science and Engineering TCP/IP Conventional Packets IP Header AH
54
Computer Science and Engineering Authentication Header Next Header SEQUENCE NUMBER Payload Length Security Parameters Index (SPI) Authentication Data Reserved
55
Computer Science and Engineering IPSec Packets ESP (includes TCP header and Data)
56
Computer Science and Engineering Encapsulated Security Packet Next Header SEQUENCE NUMBER Payload DATA Padding Length Padding Security Parameters Index (SPI) Authentication Data authenticated encrypted
57
Computer Science and Engineering Good Luck!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.