Download presentation
Presentation is loading. Please wait.
Published byMarshall Ferguson Modified over 9 years ago
1
1 Security in Computing Module 1 Introduction
2
What Is Security? “The quality or state of being secure—to be free from danger” 2
3
Security - Years back Physical security –Information was primarily on paper –Lock and key –Safe transmission Administrative security –Control access to materials –Personnel screening –Auditing 3
4
Why Do We Need Security? Increased reliance on Information technology with or with out the use of networks The use of IT has changed our lives drastically. We depend on E-mail, Internet banking, and several other governmental activities that use IT 4
5
Why Do We Need Security? Increased use of E-Commerce and the World wide web on the Internet as a vast repository of various kinds of information (immigration databases, flight tickets, stock markets etc.) 5
6
Why Do We Need Security? Protect sensitive resources –Prevent loss –Prevent damage In the context of information systems –Prevent unauthorized users from reading information (loss) Guarantee confidentiality 6
7
–Prevent unauthorized users from tampering with information (damage) Guarantee integrity Computing Systems: –Hardware, software, storage media, data & people 7
8
What is Computer Security? Wikipedia: Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) cannot perform actions that they are not allowed to perform, but can perform the actions that they are allowed to. A computer is secure if you can depend on it and its software to behave as you expect. 8
9
“Measures and tools to protect data and thwart hackers is called Computer Security”. Network security or internet security- security measures needed to protect data during their transmission 9
10
Some differences between traditional security and information security Information can be stolen - but you still have it Confidential information may be copied and sold - but the theft might not be detected The criminals may be on the other side of the world 10
11
What features should a computer security system provide? Confidentiality –Concealment of information or resources –the protection of information from unauthorized or accidental disclosure Integrity –Trustworthiness of data or resources –assures information is as entered and intended; that the information has not been incorrectly modified, corrupted or destroyed. 11
12
What features should a computer security system provide? Availability –Ability to use information or resources. –assures that assets are available when needed to support the organizational enterprise on a timely and reliable basis. 12
13
Security Goals Integrity Confidentiality Availability Secure 13
14
Attacks, Services and Mechanisms Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms 14
15
Security Attacks Vulnerability Threats Attacks 15
16
Security Attacks 16
17
Security Attacks Interruption: This is an attack on availability –Destruction of hardware device –Malfunction of OS file manager –Physically breaking communication line –Disrupting traffic 17
18
Interruption 18
19
Security Attacks (continued) Interception: This is an attack on confidentiality –Overhearing, eavesdropping over a communication line 19
20
Security Attacks (continued) Interception 20
21
Security Attacks (continued) Modification: This is an attack on integrity –Corrupting transmitted data or tampering with it before it reaches its destination 21
22
Security Attacks (continued) Modification 22
23
Security Attacks (continued) Fabrication: This is an attack on authenticity –Faking data as if it were created by a legitimate and authentic party 23
24
Security Attacks (continued) Fabrication 24
25
Passive and active attacks Passive attacks –No modification of content or fabrication –Eavesdropping to learn contents or other information (transfer patterns, traffic flows etc.) Active attacks –Modification of content and/or participation in communication to Impersonate legitimate parties Modify the content in transit Launch denial of service attacks 25
26
26
27
Passive and active attacks Passive attacks:eavesdropping on, or monitoring of, transmissions to: –obtain message contents, or –monitor traffic flows Active attacks:modification of data stream to: –masquerade of one entity as some other –replay previous messages –modify messages in transit –denial of service 27
28
28 Passive Attacks and Active Attacks
29
Passive Attacks 29
30
Passive Attacks 30
31
31 Active Attacks Active attacks involve some sort of modification of the data stream or the creation of a false stream. Four sub-categories: –Masquerade –Replay –Modification of Messages –Denial of service
32
32 Masquerade An entity pretends to be another. For the purpose of doing some other form of attack. Spoofing,impersonation.
33
33 Replay First passive capture of data and then its retransmission to produce an unauthorized effect.
34
34 Modification of Messages Some portion of a legitimate message is altered or messages are delayed or reordered to produce an unauthorized effect.
35
35 Denial of Service - DOS Prevents the normal use or management of communication facilities. Such attacks have become very common on the Internet especially against web servers. On the Internet remotely located hackers can crash the TCP/IP software by exploiting known vulnerabilities in various implementations. One has to constantly look out for software updates and security patches to protect against these attacks.
36
Active Attacks 36
37
Active Attacks 37
38
Problems Passive attacks –Difficult to detect –Protection approach - prevention Active attacks –Easy to detect but difficult to prevent –Recovery 38
39
Network Security Computer networks are widely used to connect computers at distant locations. Raises additional security problems: o Data in transmission must be protected. o Network connectivity exposes each computer to more vulnerabilities. 39
40
Model for Network Security Two components: –Security related transformation Encryption Additional codes –Secret information Encryption key May need a trusted third part to assist 40
41
41
42
Model for Network Security Basic tasks in designing security service: –Design an algorithm that opponent cannot defeat –Generate the secret information to be used with the algorithm –Develop methods for distributing secret information –Specify a protocol to be used 42
43
Computer Criminals Amateurs: regular users, who exploit the vulnerabilities of the computer system –Motivation: easy access to vulnerable resources Crackers: attempt to access computing facilities for which they do not have the authorization –Motivation: enjoy challenge, curiosity Career criminals: professionals who understand the computer system and its vulnerabilities –Motivation: personal gain (e.g., financial) 43
44
44 Hackers Crackers
45
Malicious Software 45
46
46 Virus Virus lifecycle: 1.Dormant phase: the virus is idle. (not all viruses have this stage) 2.Propagation phase: the virus places an identical copy of itself into other programs of into certain system areas. 3.Triggering phase: the virus is activated to perform the function for which it was created. 4.Execution phase: the function is performed. The function may be harmless or damaging.
47
Functional structure of Virus 47 VIRUS Anti-detection routine SearchCopy
48
48 How Viruses Append Original program Virus code Original program Virus code Virus appended to program +=
49
49 How Viruses Append Original program Virus code Original program Virus code Part a Virus surrounding a program += Virus code Part b
50
50 How Viruses Append Original program Virus code Original program Virus-1 Virus integrated into program += Virus-2 Virus-3 Virus-4
51
Home for Viruses High risk virus properties : –Hard to detect –Hard to destroy –Spread infection widely –Can re-infect –Easy to create –Machine & OS independent Earlier – repeated execution of code so that virus could multiply 51
52
Home for Viruses One-Time execution –E-mail attachment Boot Sector viruses Memory –Resident viruses Application programs –Macro Libraries 52
53
Types of viruses Parasitic virus: Most common form. Attaches itself to a file and replicates when the infected program is executed.(File virus-executable files) Memory resident virus: Lodged in main memory as part of a resident system program. Virus may infect every program that executes. 53
54
Types of viruses Boot Sector Viruses: –Infects the boot record and spreads when system is booted. –Gains control of machine before the virus detection tools. –Very hard to notice –Carrier files: AUTOEXEC.BAT, CONFIG.SYS,IO.SYS Multipartite Viruses: infects both(files & boot sector) 54
55
Types of viruses Stealth virus: a form of virus explicitly designed to hide from detection by antivirus software. Polymorphic virus: a virus that mutates with every infection, making detection by the “signature” of the virus difficult. 55
56
Example Code red worm signature 56
57
Types of viruses Macro viruses: infect macro-enabled documents, especially the Microsoft Office suite of applications -Word and Excel. When opened, an infected document executes a macro automatically or the user does so accidentally. Then infects other documents on the disk. Email virus 57
58
Other Malicious Programs Virus - A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting (i.e., inserting a copy of itself into and becoming part of) another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. Worm - A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively. Trojan horse - A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. 58
59
Other Malicious Programs Logic bomb - Malicious [program] logic that activates when specified conditions are met. Usually intended to cause denial of service or otherwise damage system resources. Time bomb – is a logic bomb whose trigger is a time or date. Trapdoor or backdoor - A hidden computer flaw known to an intruder, or a hidden computer mechanism (usually software) installed by an intruder, who can activate the trap door to gain access to the computer without being blocked by security services or mechanisms. Zombie – A program that secretly takes over another Internet attached computer and then uses that computer to launch attacks. Difficult to trace zombie’s creator. Used for DoS attacks Rabbit 59
60
Services and Mechanisms A security policy is a statement of what is and what is not allowed. A security service is a measure to address a threat –E.g. authenticate individuals to prevent unauthorized access A security mechanism is a means to provide a service –E.g. encryption, cryptographic protocols 60
61
Security Services A security service is a service provided by the protocol layer of a communicating system (X.800) 5 Categories –Authentication –Access Control –Data Confidentiality –Data Integrity –Nonrepudiation –(Availability) 61
62
Security Services Security services (X.800) falls under five categories: Authentication:The assurance that the communicating entity is the one that it claims to be –Peer Entity Authentication –Data-Origin Authentication 62
63
Security Services Access Control : The prevention of unauthorized use of a resource - Who can access, Under what conditions, What they are allowed to do Data Confidentiality :The protection of data from unauthorized disclosure –Connection Confidentiality –Connectionless Confidentiality –Selective-Field Confidentiality –Traffic-flow Confidentiality 63
64
Security Services Data Integrity: The assurance that data received are exactly as sent by an authorized entity (i.e. contain no modification, insertion, deletion, or replay) –Connection Integrity with Recovery –Connection Integrity without Recovery –Selective-Field Connection Integrity –Connectionless Integrity –Selective-Field Connectionless Integrity 64
65
Security Services NonRepudiation: Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication –NonRepudiation, origin –NonRepudiation, destination 65
66
Security Services Examples Authentication –Ensuring the proper identification of entities and origins of data before communication Access control –Preventing unauthorized access to system resources Data confidentiality –Preventing disclosure to unauthorized parties Data integrity –Preventing corruption of data Non-repudiation –Collecting proof to prevent denial of participation in transaction or communication Availability –Protection against denial-of-service 66
67
Security Mechanisms Security Mechanisms : A mechanism that is designed to detect, prevent or recover from a security attack. Two types –Specific mechanisms existing to provide certain security services E.g. encryption used for authentication –Pervasive mechanisms which are general mechanisms incorporated into the system and not specific to a service E.g. security audit trail 67
68
Specific Security Mechanisms 1. Specific Security Mechanisms May be incorporated into the appropriate protocol layer in order to provide some of the OSI security services –Encipherment –Digital Signature –Access Control –Data Integrity –Authentication Exchange –Traffic Padding –Routing Control –Notarization 68
69
Pervasive Security Mechanisms Mechanisms those are not specific to any particular OSI security service or protocol layer. Trusted Functionality –That which is perceived to be true by some criteria Security Label –The marking of (bound to) a resource that names or designates the security attributes of the resource 69
70
Pervasive Security Mechanisms Event Detection –Intrusion detection –Detection of specific hacks (detector hardware) –Too many log in attempts Security Audit Trail –Logging of all system events Security Recovery –Recovery based on requests from security mechanisms and/or event handling. 70
71
Methods of Defense Encryption Software Controls –(access limitations in a data base, in operating system protect each user from other users) Hardware Controls –(smartcard) Policies –(frequent changes of passwords) Physical Controls 71
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.