Lec 1
Lec 1
Network Security
Spring 2024
Lecture 1
Mobin Javed
1
Introductions…
2
Instructor: Mobin Javed
• 15 years back: An UG student taking a security clas
• Collaborations:
**TAs**
Mughees
4 ur Rehman Saad Sher Alam
Plan for Today
• Course Staff Introductions [~5 mins]
5
How many of you feel you
are NOT secure on the
Internet?
6
Today’s Security
Landscape…
7
What are we trying to
Secure?
8
Data, Communications,
& Infrastructure
9
Online Transactions
10
Money
11
Content: Text, Audio,
Video
12
13
14
15
Democracy
16
Today’s Security
Landscape…
26
Course Objectives
• Goal 1: Develop a concrete understanding of the
fundamentals of computer security
27
fi
Course Overview
28
y
Grading
Labs: 12%
HWs: 20%
Quizzes: 25%
Midterm: 15%
Final: 25%
Class Participation: 03%
Labs: In-lecture labs led by the TAs
• Announcements
• Online discussion
30
Note on TAs / Email
Communication
We have assigned each student a Primary TA
31
Ethics
• We will be covering attacks in the class, some of
them quite nasty
33
Foundations of Secure
Systems
34
1. Con dentiality
35
fi
Con dentiality
■ Goal: To Keep the contents of communication or data
on storage secret
■ Example: Alice and Bob want their communications to
be secret from Eve
■ Eve is able to see the bits
■ On an ethernet network that uses a hub, each computer is capable of
seeing all the network traffic generated by any other computer
■ Ethereal, tcpdump, dsniff
■ Promiscuous mode
■ Key – a secret shared between Alice & Bob
■ Sometimes accomplished with
■ Cryptography, Steganography
36
fi
2.Data Integrity
37
Data Integrity
■ Data Integrity = No Corruption
■ Man in the middle attack:
■ Has Mallory tampered with the message that Alice sends to
Bob?
■ Integrity Check: Add redundancy to data/messages
■ Techniques:
■ Hashing (MD5, SHA-1, …), Checksums (CRC…)
■ Codes that are functions of the message being sent are appended
■ Message Authentication Codes (MACs)
38
Expired Crypto
39
3. Authentication
40
Authentication
• The act of Identity Veri cation
41
fi
Authentication
(a) Something you KNOW
■ Bob asks for a secret that only Alice knows.
■ Example: Passwords
■ Pros:
■ Simple to implement
■ Simple for users to understand
■ Cons:
■ Easy to crack (unless users choose strong ones)
■ Passwords are reused many times
■ Numerous opportunities for the attacker to listen in
■ One-time Passwords (OTP): different password used each time,
but it is difficult for user to remember all of them
■ A device could be used that could keep track of all the
passwords that a user would need to use.
42
Authentication
(b) Something you HAVE
■ OTP Cards : generates new password each time user logs in
■ SecureID offered by RSA security
■ The OTP card is a One Time Password generator. When the code
button is pushed a new dynamic password is displayed on the card.
■ Smart Card:
■ tamper-resistant
■ stores secret information
■ entered into a card-reader
■ reader must be trusted
■ attacks have been carried out using rogue card readers
■ Token / Key
■ ATM Card
■ Not tamper resistant
■ Magnetic tape reader can copy contents which can be moved to an empty card
■ Strength of authentication in this case depends on difficulty of forging
43
Authentication
(c) Something you ARE
■ Biometrics
44
4. Availability
45
Availability
■ If a system is made unavailable through an attack, a
company may lose its ability to earn revenue.
■ One example of such an attack is denial of service.
■ Goal of DoS (Denial of Service) attacks are to reduce
availability
■ Malware used to send excessive traffic to victim site
■ Overwhelmed servers can’t process legitimate traffic
■ Distributed denial of service attacks.
■ Solutions:
■ Add redundancy to remove single point of failure
■ Impose “limits” that legitimate users can use
46
5. Authorization
47
Authorization
■ It is the act of checking whether a user has
permission to conduct some action
■ ATM example
■ Alice wants to draw more than the daily limit
■ Is a “subject” (Alice) allowed to access an “object”
(open a file, delete a file etc)?
■ Access Control List: mechanism used by many
operating systems to determine whether users are
authorized to conduct different actions
48
6. Accountability
49
Accountability
■ Key security goal
■ Able to determine the attacker or principal in case
something goes wrong.
■ Logging & Audit Trails
■ Requirements:
■ Secure Timestamping
■ Data integrity in logs & audit trails, must not be able to change trails, or be
able to detect changes to logs
■ Otherwise attacker can cover their tracks
50
7. Non-Repudiation
51
Non-Repudiation
■ Undeniability of a transaction by any of the parties
involved
■ Alice wants to prove to Trent that she did
communicate with Bob
■ Generate evidence / receipts (digitally signed
statements)
52
Key Security Concepts
• Con dentiality
• Data Integrity
• Authentication
• Availability
• Authorization
• Accountability
• Non-Repudiation
These will come up again and again, so internalise them
53
fi
Questions?
54
Next Lecture: Web
Security
55