Lecture 2 - Introduction To Security
Lecture 2 - Introduction To Security
INTRODUCTION TO
SECURITY
1
2
Topics
What is security?
Security Architecture
Security Principles
Security Policy
Security Attacks / Threats
Methods of Defense
Security Services
Security Mechanisms
3
What is Security?
Definition:
Security is the quality or state of being secure that is to be free from
danger and
to be protected from adversaries – from those who would do harm,
intentionally or otherwise
Information Security:
Information Security is the protection of information and the systems
and hardware that use, store, and transmit that information
By NSTISSC
4
Security Area
Tools: scanner such as virus scanner, internet
Detection scanner and Web server scanner
Recovery
Tools: forensic, backup
techniques,
proper planning
5
Security Architecture
Internet or other
communications
facility
10
Passive Attacks: Traffic Analysis
Internet or other
communications
facility
11
Active Attacks: Masquerade
Internet or other
communications
facility
12
Active Attacks: Replay
Internet or other
communications
facility
13
Active Attacks: Modification of Messages
Internet or other
communications
facility
14
Active Attacks: Denial of Service
Internet or other
communications
facility
15
Passive Attack vs. Active Attack
Passive Attack
Very difficult to detect. Why?
Feasible to prevent the success of these attacks. How?
Emphasis in dealing with passive attacks is on prevention rather than
detection. Why?
Active Attack
Quite difficult to prevent active attacks. Why?
Instead, the goal is to detect active attacks and to recover from any
disruption or delays caused by them.
If the detection has a deterrent effect, it may also contribute to
prevention.
16
Methods of Defense
We can deal with harm that occurs when a threat is realized against
a vulnerability in several ways:
Prevent it, by blocking the attack or closing the vulnerability.
Deter it, by making the attack harder, but not impossible.
Deflect it, by making another target more attractive.
Detect it, either as it happens or some time after the fact.
Recover from its effects.
17
Methods of Defense: Controls
Encryption
Software Controls - access limitations in a data base, in operating
system protect each user from other users
Hardware Controls –smartcard
Policies - frequent changes of passwords
Physical Controls
18
Methods of Defense: Software Controls
Program controls include:
Internal program controls: part of the program that enforce security
restrictions, such as access limitations in a database management
program.
Operating system and network system controls: limitations
enforced by the operating system or network to protect each user from
all other users.
Independent control programs: application programs, such
password checkers, intrusion detection utilities or virus scanners, that
protect against certain types of vulnerabilities.
Development controls: quality standards under which a program is
designed, coded, tested and maintained, to prevent software faults from
becoming exploitable vulnerabilities.
19
Methods of Defense: Hardware Controls
Numerous hardware devices have been created to assist in providing
computer security. These devices include a variety of means, such as:
Hardware or smart card implementations of encryption
Locks or cables limiting access or deterring theft
Devices to verify user’s identities
Firewalls
Intrusion detection systems
Circuit boards that control access
to storage media
20
Methods of Defense: Policies & Procedure Controls
1. Nonrepudiation,
1. Peer Entity
Origin
Authentication
2. Nonrepudiation,
2. Data Origin
Destination
Authentication
25
Security Services: Data Integrity
Provides for the integrity of all user data on a
connection and detects any modification,
insertion, or replay of any data within an
entire data sequence, with recovery
1. Connection Integrity attempted
with Recovery
2. Connection Integrity
without Recovery As Connection Integrity with Recovery but provides detection
3. Selective-field without recovery
Connection Integrity
4. Connectionless
Integrity Provides for the integrity of selected
5. Selective-field fields within the user data of a data
Connectionless block transferred over a connection
Integrity
and takes the form of determination
of whether the selected fields have
been modified, inserted, deleted or
Provides for the integrity
replayed
of selected fields within a
single connectionless
data block; takes the Provides for the integrity of a
form of determination of single connectionless data
whether the selected block and may take the form
fields have been modified of detection of data
modification
26
Security Services: Data Confidentiality
1. Connection
Confidentiality
2. Connectionless
Confidentiality
3. Selective-field
Confidentiality
4. Traffic Flow Confidentiality
27
Security Services: Authentication
Used in association with a logical
connection to provide confidence in the
identity of the entities connected
1. Peer Entity
Authentication
2. Data Origin
Authentication
28
Security Services: Nonrepudiation
1. Non-repudiation,
Origin
2. Non-repudiation,
Destination
29
Security Mechanisms
Security mechanism is any process (or a device incorporating such a
process) that is designed to detect, prevent or recover from a
security attack.
Access Control
Routing Control
Security label
Event Detection