Introduction To Security
Introduction To Security
Any breach with the Information System will lead to Loss of productivity, loss
of revenue, legal liabilities, loss of reputation and other losses.
Cyber crime is defined as criminal activity involving the IT infrastructure,
including illegal access, illegal interception, data interference, misuse of devices,
ID theft and electronic fraud
Mukesh Chinta, Asst Prof, CSE,VRSEC
In the real world, security involves processes. It involves preventive technologies, but also detection and
reaction processes, and an entire forensics system to hunt down and prosecute the guilty. Security is not
a product; it itself is a process. .
Bruce Schneier
ARPANET, the precursor to the modern internet allowed easy synchronization of information
between data centers but has unsecure points between the data centers and the public. This
vulnerability was addressed by securing physical locations and hardware. A task force formed by
ARPA (Advanced Research Projects Agency) to study internet security in 1967 found this
method to be inadequate, and released the Rand Report R-609 which determined additional
steps must be taken to improve security. This report marked an important stage in the
development of today's information security.
The NIST (National Institute of Standards & Technology} Computer Security Handbook [NIST95]
(Available from: http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf) defines the term
computer security as
The protection afforded to an automated information system in order to attain the
applicable objectives of preserving the integrity, availability, and confidentiality of
information system resources (includes hardware, software, firmware, information/data,
and telecommunications).
The definition introduces three key objectives that are at the heart of the computer security:
Confidentiality
Data Confidentiality
Privacy
Integrity
Data Integrity
System Integrity
Availability
Mukesh Chinta, Asst Prof, CSE,VRSEC
Confidentiality
10
Integrity
Data Integrity - Assures that information and programs are changed only
in a specified and authorized manner
System Integrity - Assures that a system performs its intended function in
an unimpaired manner, free from deliberate or inadvertent unauthorized
Availability: Ensuring timely and reliable access to and use of information. A loss of
availability is the disruption of access to or use of information or an information system.
Authenticity: The property of being genuine and being able to be verified and trusted;
confidence in the validity of a transmission, a message, or message originator.
Accountability: The security goal that generates the requirement for actions of an entity
to be traced uniquely to that entity.
12
MODERATE
HIGH
Limited
Minor
Significant
Severe degradation
degradation degradation
Minor
Significant
Major
Financial Loss
Minor
Significant
Major
Harm to individual
Minor
Significant
Serious
Severe or even
catastrophic
13
14
ITU-T X.800 Security Architecture for OSI defines a systematic way of defining and
providing security requirements. Three important aspects of OSI security architecture are:
: Any action that compromises the security of information owned by an
organization.
Threats
Vulnerabilities
Something that
can potentially cause damage to
the organization, IT Systems or
network
an assault on system
security, a deliberate attempt to
evade security services
: A possibility that a threat
exploits a vulnerability in an asset
and causes damage or loss to the
asset.
Controls *
reduce
Protection
Requirements
Risk
Information
assets
Asset values
16
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent
is to obtain information that is being transmitted. Two types of passive attacks are:
Release of message contents Any transferred message could be intercepted or listened to
Traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could
observe the frequency and length of messages being exchanged.
Traffic Analysis
17
18
An active attack is one in which an unauthorized change of the system is attempted. This
could include, for example, the modification of transmitted or stored data, or the creation of
new data streams
19
Access Control
Connection Confidentiality
Security Services
Data
Confidentiality
Connectionless Confidentiality
Selective-Field Confidentiality
Traffic-Flow Confidentiality
Data Integrity
Non Repudiation
X.800 divides security services into five categories and fourteen specific services. Security Services intend to counter security
attacks and make use of one or more security mechanisms to provide the service
22
23
24
25
Interception
Forgery
Denial of Service
Is Private?
Wish to access!!
Not
SENT !
Modification
Claim
Unauthorized access
26
Security
Mechanism
Description
Encipherment
The use of mathematical algorithms to transform data into a form that is not readily
intelligible. The transformation and subsequent recovery of the data depend on an
algorithm and zero or more encryption keys.
Digital Signature
Data appended to, or a cryptographic transformation of, a data unit that allows a
recipient of the data unit to prove the source and integrity of the data unit and
protect against forgery.
Access Control
Data Integrity
Authentication
Exchange
Traffic Padding
The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Routing Control
Enables selection of particular physically secure routes for certain data and allows
routing changes, especially when a breach of security is suspected.
Notarization
The use of a trusted third party to assure certain properties of a data exchange.
Mukesh Chinta, Asst Prof, CSE,VRSEC
28
Security
Mechanism
Description
Trusted
Functionality
Security Label
The marking bound to a resource (which may be a data unit) that names or
designates the security attributes of that resource.
Event Detection
Security Audit
Trail
Security
Recovery
Deals with requests from mechanisms, such as event handling and management
functions, and takes recovery actions.
29
Data is transmitted over network between two communicating parties, who must cooperate for the
exchange to take place. A logical information channel is established by defining a route through the
internet from source to destination by use of communication protocols by the two parties.
Two components are present in almost all the security providing techniques.
A security-related transformation on the information to be sent making it unreadable by the opponent, and
the addition of a code based on the contents of the message, used to verify the identity of sender.
Some secret information shared by the two principals and, it, unknown to the opponent. A trusted third
party may be needed to distribute the secret information or to arbitrate disputes between the principals.
31
The general model shows that there are four basic tasks in designing a particular security
service:
1. Design an algorithm for performing the security-related transformation. The algorithm should be
such that an opponent cannot defeat its purpose
2. Generate the secret information to be used with the algorithm
3. Develop methods for the distribution and sharing of the secret information
4. Specify a protocol to be used by the two principals that makes use of the security algorithm and
the secret information to achieve a particular security service
Various other threats to information system like unwanted access still exist. The existence of hackers
attempting to penetrate systems accessible over a network remains a concern. Another threat is
placement of some logic in computer system affecting various applications and utility programs.
This inserted code presents two kinds of threats.
Information access threats intercept or modify data on behalf of users who should not have
access to that data
Service threats exploit service flaws in computers to inhibit use by legitimate users
Mukesh Chinta, Asst Prof, CSE,VRSEC
32
Viruses and worms are two examples of software attacks inserted into the system by means of a
disk or also across the network.
Security Controls are categorized based on their functionality and plane of application.
Based on functionality, the types of controls are given as:
- These try to prevent security violations and enforce access control. Like other controls, preventive
controls may be physical, administrative, or technical: doors, security procedures, and authentication requirements
- Detective controls are in place to detect security violations and alert the defenders. They come into
play when preventive controls have failed or have been circumvented and are no less crucial than detective controls.
Detective controls include cryptographic checksums, file integrity checkers, audit trails and logs, and similar mechanisms.
- Corrective controls try to correct the situation after a security violation has occurred. Corrective
controls vary widely, depending on the area being targeted, and they may be technical or administrative in nature.
- Deterrent controls are intended to discourage potential attackers. Examples of deterrent controls include
notices of monitoring and logging as well as the visible practice of sound information security management.
similar to corrective controls applied in more serious situations to recover from security violations and
restore information and information processing resources. These include disaster recovery and business continuity mechanisms,
backup systems and data, emergency key management arrangements, and similar controls.
- are intended to be alternative arrangements for other controls when the original controls have
failed or cannot be used. When a second set of controls addresses the same threats that are addressed by another set of controls,
the second set of controls are compensating controls.
Mukesh Chinta, Asst Prof, CSE,VRSEC
33
Logical access control models are the abstract foundations upon which actual access
control mechanisms and systems are built.
Access control models define how computers enforce access of subjects (such as users,
other computers, applications, and so on) to objects (such as computers, files, directories,
applications, servers, and devices).
Three main access control models exist:
34
A vulnerability can occur anywhere in the IT environment, and can be the result of
many different root causes.
solutions gather comprehensive endpoint and
network intelligence and apply advanced analytics to identify and prioritize the
vulnerabilities that pose the most risk to critical systems.
includes assessment of the environment for known
vulnerabilities, and to assess IT components using the security configuration
policies(by device role) that have been defined for the environment.
is a dictionary of common names
(i.e., CVE Identifiers) for publicly known information security vulnerabilities.
provides an open framework for
communicating the characteristics and impacts of IT vulnerabilities.
provides a common
language of discourse for discussing, finding and dealing with the causes of
software security vulnerabilities as they are found in code, design, or system
architecture.
37