Lecture 1 - Basic Concepts in Information Security
Lecture 1 - Basic Concepts in Information Security
Systems 2020
PhD Furkan Gözükara, Toros University
https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020
Lecture 1
Basic concepts in Information Security
Composed from Prof. Audun Jøsang, University of Oslo,
Information Security 2018 Lectures
Source: https://www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/
Why study information security ?
• Being an IT expert requires knowledge about IT security
– Analogy: Building architects must have knowledge about fire safety
• Developing IT systems without considering security will
lead to vulnerable IT systems
• IT experts without security skills are part of the problem
• Learn about IT security to become part of the solution !
• Security by Design is a prerequisite for privacy by design
which is a legal requirement for processing personal data
• Information security is a political issue
– Often seen as a cost, but saves costs in the long term
– Often given low priority in IT industry and IT education
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 2
Certifications for IS Professionals
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 3
ISACA Certifications
(Information Systems Audit and Control Association)
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 4
CISM: Certified Information Security Manager
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 5
CISM Exam
• Exams normally twice per year worldwide
• 2018 exam information to give you an idea
• Next exam in Oslo (and worldwide): June
2018
– Deadline for registering: April 2018
– Register for exam at www.isaca.org
– Exam fee approx. US $500
– Multiple choice exam
– Requires 5 years professional experience
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 6
(ISC)2 Certifications
International Information Systems Security Certification Consortium
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 7
CISSP Exam:
Certified Information System Security Professional
• Many different books to prepare for CISSP exam
• e.g. text book used for INF3510 course
CISSP All-in-One Exam Guide
7th Edition, 2016
Author: Shon Harris and Fernando Maymí
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 8
CISSP CBK (Common Body of Knowledge)
8 domains
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 9
Security Surveys
Useful for knowing the trend and current state of information
security threats and attacks
• Verizon Data Breach Report:
http://www.verizonenterprise.com/DBIR/
• PWC security survey:
http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html
• Mnemonic Security Report
https://www.mnemonic.no/security-report/
• Mørketallsundersøkelsen;
http://www.nsr-org.no/moerketall/
– New report in December every 2 years (even years).
+ many others
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 10
Security Advisories
• Useful for managing threats and vulnerabilities
– NorCERT: For government sector: https://www.nsm.stat.no/
– NorSIS: For private sector: http://www.norsis.no/
– FinansCERT: http://www.finanscert.no/
– KraftCERT: https://www.kraftcert.no/
–HelseCERT:
https://www.nhn.no/tema/sikkerhet/HelseCERT/Sider/default.aspx
– UNINETT-CERT: https://www.uninett.no/cert
– UiO-CERT: http://www.uio.no/english/services/it/security/cert/
– US CERT: http://www.cert.org/
– Australia AusCERT: http://www.auscert.org.au/
+ many others
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 11
Academic Forum on Security
• Monthly seminar on information security
• https://wiki.uio.no/mn/ifi/AFSecurity/
• Guest expert speakers
• Organised by SecurityLab
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 12
Information Security
Basic Concepts
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 13
What is security in general
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 14
What is Information Security
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 16
The Need for Information Security
• Why not simply solve all security problems once for all?
• Reasons why that’s impossible:
– Rapid innovation constantly generates new technology with new
vulnerabilities
– More activities go online
– Crime follows the money
– Information security is a second thought when developing IT
– New and changing threats
– More effective and efficient attack technique and tools are being
developed
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 18
Malware Trend
Information Security
• Preventive controls:
– prevent attempts to exploit vulnerabilities
• Example: encryption of files
• Detective controls:
– warn of attempts to exploit vulnerabilities
• Example: Intrusion detection systems (IDS)
• Corrective controls:
– correct errors or irregularities that have been detected.
• Example: Restoring all applications from the last known
good image to bring a corrupted system back online
– During transmission
• Physical or electronic
– Confidentiality:
– Integrity
– Availability: Information
Security
Availability
• CIA are the three main security properties/services
• Data privacy is an additional property which assumes CIA
Data Privacy
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 23
Security services and controls
• Security services (aka. goals or properties)
– implementation independent
– supported by specific controls
• Security controls (aka. mechanisms)
– Practical mechanisms, actions, tools or procedures that are used
to provide security services
Security services:
e.g. Confidentiality – Integrity – Availability
support
Security controls:
e.g. Encryption – Firewalls – Awareness
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 24
Confidentiality
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 25
Integrity
• Data Integrity: The property that data has not been altered or
destroyed in an unauthorized manner.
(X.800: Security Architecture for OSI)
• System Integrity: The property of accuracy and completeness
(ISO 27000).
Can include the accountability of actions.
• Threats: Data and system corruption, loss of accountability
• Controls:
– Hashing, cryptographic integrity check and encryption
– Authentication, access control and logging
– Software digital signing
– Configuration management and change control (system integrity)
As general controls, also include:
Secure System Development, Incident Response
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 26
Availability
• The property of being accessible and usable
upon demand by an authorized entity.
(ISO 27000)
• Main threat: Denial of Service (DoS)
– The prevention of authorized access to resources
or the delaying of time critical operations
• Controls:
– Redundancy of resources,
– Load balancing,
– Software and data backups
As general controls, also include:
Secure System Development and
Incident Response
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 27
Data Privacy
To protect specific aspects of information that may be related
to natural persons (personal information).
• Prevent unauthorized collection and storage of personal
information
• Prevent unauthorized use of collected personal information
• Make sure your personal information is correct
• Ensure transparency and access for data subjects
• Provide adequate information security (CIA) around
personal information
• Define clear responsibilities around personal information
• GDPR becomes EU law on 25 May 2018
10101
(General Data Protection Regulation) 01101101
10110
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 28
Authenticity (Security Service)
The CIA properties are quite general security services.
Other security services are often mentioned.
Authentication is very important, with various types:
• User authentication:
– The process of verifying a claimed identity of a (legal) user
when accessing a system or an application.
• Organisation authentication:
– The process of verifying a claimed identity of a (legal)
organisation in an online interaction/session
• System authentication (peer entity authentication):
– The corroboration (verification) that a peer entity (system) in an
association (connection, session) is the one claimed (X.800).
• Data origin authentication (message authentication):
– The corroboration (verification) that the source of data received
is as claimed (X.800).
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 29
Taxonomy of Authentication
Authentication
Entity Data
Authentication Authentication
MAC,
DigSig&PKI
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 31
Organisation/System Authentication
• Goal
– Establish the correct identity of organisations/remote hosts
• Main threat:
– Network intrusion Host A Host B
– Masquerading attacks,
– Replay attacks
– (D)DOS attacks
• Controls:
– Cryptographic authentication protocols based on hashing and
encryption algorithms
– Examples: TLS, VPN, IPSEC
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 32
Data Origin Authentication
(Message authentication)
• Goal: Recipient of a message (i.e. data) can verify the
correctness of claimed sender identity
– But 3rd party may not be able to verify it
• Main threats:
– False transactions
– False messages and data
• Controls:
– Encryption with shared secret key
– MAC (Message Authentication Code)
– Security protocols
– Digital signature with private key
– Electronic signature,
• i.e. any digital evidence
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 33
Non-Repudiation
(Strong form of Data Authentication)
• Goal: Making sending and receiving messages undeniable
through unforgible evidence.
– Non-repudiation of origin: proof that data was sent.
– Non-repudiation of delivery: proof that data was received.
– NB: imprecise interpretation: Has a message been received and read
just because it has been delivered to your mailbox?
• Main threats:
– Sender falsely denying having sent message
– Recipient falsely denying having received message
• Control: digital signature
– Cryptographic evidence that can be confirmed by a third party
• Data origin authentication and non-repudiation are similar
– Data origin authentication only provides proof to recipient party
– Non-repudiation also provides proof to third parties
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 34
Accountability
(Can be considered as a part of System integrity)
• Goal: Trace action to a specific user and hold them
responsible
– Audit information must be selectively kept and protected so that
actions affecting security can be traced to the responsible party
(TCSEC/Orange Book)
• Main threats:
– Inability to identify source of incident
– Inability to make attacker responsible
• Controls:
– Identify and authenticate users
– Log all system events (audit)
– Electronic signature
– Non-repudiation based on digital signature
– Forensics
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 35
Authorization
• Authorization is to specify access and usage permissions for
entities, roles or processes
– Authorization policy normally defined by humans
– Issued by an authority within the domain/organisation
• Authorities authorize, systems don’t
• Authority can be delegated
– Management → Sys.Admin
– Implemented in IT systems as configuration/policy
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 36
Identity and Access Management (IAM)
Phases
Configuration Operation phase Termination
phase phase
Registration Self-
of identity Claim identity De-registration
Identification
Enforce access
Authorization Revoke
Access control authorization
of access authorization
policy
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 37
Confusion about Authorization
• The term “authorization” is often wrongly used in the sense
of “access control”
– e.g. misleading figure on p.725 in Harris 7th ed.
– Common in text books and technical specifications (RFC 2196 …)
– Cisco AAA Server (Authentication, Authorization and Accounting)
• Wrong usage of “authorization” leads to absurd scenario:
1. You get somebody’s password, and uses it to access account.
2. Login screen gives warning: “Only authorized users may access
this system”.
3. You get caught and taken to the police
4. You argue: “Text books in security state that a system authorizes
the user when typing the right password, hence I was authorized
because I typed the right password”.
5. Case dismissed, you go free.
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 38
Identity and Access Management Concepts
System Owner Domain
User
registration 1
2 provisioning
Source: www.uio.no/studier/emner/matnat/ifi/INF3510/v18/lectures/ 39
End of lecture
40