0% found this document useful (0 votes)
42 views64 pages

Handout 1 - Introduction

This document discusses key concepts in computer security including an introduction course, security terminology, the CIA triad of confidentiality, integrity and availability, and security principles.

Uploaded by

hordes-decker0g
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views64 pages

Handout 1 - Introduction

This document discusses key concepts in computer security including an introduction course, security terminology, the CIA triad of confidentiality, integrity and availability, and security principles.

Uploaded by

hordes-decker0g
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

CSC 435 – Computer Security

Introduction
Course Topics
 Introduction to Computer Security
 Malicious Software (Attacks and Threats)
 Software Security / Vulnerabilities
 Identification and Authentication
 Access Control
 Cryptography
What is Information Security?
Introduction: Roadmap

 Security terminology
 Computer security: challenges and possible attacks
 Cybercrimes and Security Strategies
Security Terminology: Information Asset
 “Information is an asset which, like other important
business assets, has value to an organization and
consequently needs to be suitably protected” ISO/IEC
27002:2005
 “Whatever form the information takes, or means by which it
is shared or stored, it should always be appropriately
protected” ISO/IEC 27002:2005
 Valued resources that can be misused:
 Data (loss or integrity)
 Time
 Trust
 Monetary
Information Security Elements

People

Process

Technology
Information Security Elements: People
 The biggest threat arise from people
 Social engineers
 Unethical competitors
 Hackers
 Fraudsters
 Careless workers
 Yet the biggest asset is the people (ex. security-aware
employees)
Information Security Elements:
Processes
 Processes are work practices or workflows, the steps or
activities needed to accomplish business objectives
 Processes are described in procedures
 Virtually all business processes involve and/or depend on
information making information a critical business asset.
 Information security policies and procedures define how we
secure information appropriately and repeatedly.
Information Security Elements:
Technology
 Information technologies:
 Cabling, data/voice networks and equipment
 Telecommunications services (PABX,VoIP, ISDN, videoconferencing)
 Phones, cellphones, PDAs
 Computer servers, desktops and associated data storage devices
(disks, tapes)
 Operating system and application software
 Paperwork, files
 Pens, ink
 Security technologies
 Locks, barriers, card-access systems, CCTV
Key Terms
 Information security is what keeps valuable information ‘free
of danger’ (protected, safe from harm)
 It is not something you BUY; it is something you DO
 It is a process not a product
 It is achieved using a combination of suitable strategies and
approaches:
 Determining the RISKS to information and TREATING them
accordingly (proactive risk management)
 Protecting CIA
 Avoiding, preventing, detecting and recovering from Incidents
 Securing people, processes and technology
Principles of Information Security - CIA
 Confidentiality (communication): Making information
accessible only to those authorized to use it
 Integrity (personal or communication): safeguarding the
accuracy and completeness of information and processing
methods
 Availability: Ensuring that information is available when
required
Security Terminology: Threats
 A threat is a specific means by which an attacker can put a
system at risk
 An ability/goal of an attacker (e.g., eavesdrop, fraud, access
denial)

 A threat model is a collection of threats that deemed


important for a particular environment
 A collection of attackers abilities
 E.g., a powerful attacker can read and modify all
communications and generate messages on a communication
channel
Security Terminology: Vulnerabilities
 A vulnerability is a systematic artifact that exposes the user,
data, or system to a threat
 E.g., buffer overflow, key leakage
 What is the source of a vulnerability?
 Bad software (or hardware)
 Bad design, requirements
 Bad policy/configuration
 System misuse
Security Terminology: Adversary
 An adversary is any entity trying to circumvent the security
infrastructure
 The curious and otherwise generally clueless (e.g., script-
kiddies)
 Casual attackers seeking to understand systems
 Malicious groups of largely sophisticated users (e.g., chaos
clubs)
 Competitors (industrial espionage)
 Governments/agencies (monitor activities)
Are Users Adversaries?
 Have you ever tried to circumvent the security of a system you
were authorized to access?
 Have you ever violated a security policy (knowingly or through
carelessness)?

 This is known as the insider adversary (versus outsider


adversary)
Security Terminology: Attacks
 An attack occurs when someone attempts to exploit a
vulnerability
 Kinds of attacks:
 Passive (e.g., eavesdropping)
 Active (e.g., password guessing)
 Denial of Service (DOS)
 Distributed DOS (DDOS)
 Example attacks (network attacks):
 IP spoofing, port scanning, “ping of death”, ARP poisoning,
routing manipulation, DNS spoofing, etc.
 Spyware, adware, worms, viruses, spam, etc.
Security Terminology: Trust
 Trust refers to the degree to which an entity is expected to
behave
 What the entity not expected to do?
 E.g., not expose password
 What the entity is expected to do (obligations)?
 E.g., obtain permission, refresh
 A trust model describes, for a particular environment, who is
trusted to do what?
 Note: you make trust decisions every day
 Q: What are they?
 Q: Whom do you trust?
Security Terminology: Security Model
 A security model is the combination of trust and threat models
that address the set of perceived risks:
 The “security requirements” used to develop some comprehensive design
 Every design must have a security model
 LAN network or global information system
 Java applet or operating system
 Security models:
 What are the security concerns (risks)?
 What are the threats?
 Who are our adversaries?
 How to deal with the threats?
More Definitions
 A computing system is a collection of hardware, software,
storage media, data, and people that an organization uses to
perform computing tasks.
 Computing Security: “Measures and controls that ensure
confidentiality, integrity, and availability of information
system assets including hardware, software, firmware, and
information being processed, stored, and communicated.”*
 It is the protection of any computing system from threats.

*The NIST Internal/Interagency Report NISTIR 7298 (Glossary of Key Information


Security Terms , May 2013)
Computer Security Terminology, from RFC 2828, Internet Security Glossary, May 2000

Error: A human mistake in performing some software activity

Adversary (threat agent)


Individual, group, organization, or government that conducts or has the intent to
conduct detrimental activities. Also called the attacker/hacker/cracker

Attack
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or
destroy information system resources or the information itself.

Countermeasure
A device or techniques that has as its objective the impairment of the operational
effectiveness of undesirable or adversarial activity, or the prevention of espionage,
sabotage, theft, or unauthorized access to or use of sensitive information or
information systems.

Risk
A measure of the extent to which an entity is threatened by a potential
circumstance or event, and typically a function of 1) the adverse impacts that would
arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Security Policy
A set of criteria for the provision of security services. It defines and constrains the
activities of a data processing facility in order to maintain a condition of security for
systems and data.

System Resource (Asset)


A major application, general support system, high impact program, physical plant,
mission critical system, personnel, equipment, or a logically related group of systems.

Threat
Any circumstance or event with the potential to adversely impact organizational
operations (including mission, functions, image, or reputation), organizational assets,
individuals, other organizations, or the Nation through an information system via
unauthorized access, destruction, disclosure, modification of information, and/or denial
of service.

Vulnerability
Weakness in an information system, system security procedures, internal controls, or
implementation that could be exploited or triggered by a threat source.

Exploit
A piece of software or technique that takes advantage of a security vulnerability to
violate an explicit or implicit security policy. (Virus, worms)
Key Security Concepts
The CIA Triad
 Confidentiality:
Preserving authorized restrictions on information access and
disclosure, including means for protecting personal privacy and
proprietary information
 Message Integrity:
Guarding against improper information modification or
destruction, including ensuring information nonrepudiation and
authenticity
 Availability:
Ensuring timely and reliable access to and use of information
Key Security Concepts
Confidentiality
This term covers two related concepts:
 Data Confidentiality: Assures that private or confidential
information is not made available or disclosed to unauthorized
individuals.
 Privacy: Assures that individuals control or influence what
information related to them may be collected and stored and by
whom and to whom that information may be disclosed.
 Taken now more seriously by companies that want to be ‘trusted’ by
their customers.
 Also: the right to be left alone, e.g. not to be bothered by spam.
Key Security Concepts
Integrity
This term covers two related concepts:
 Data Integrity: Assures that information and programs are
changed only in a specified and authorized manner. So data is the
same as that in the source document and has not been exposed
to accidental or malicious alteration or destruction.
 System Integrity: Assures that a system performs its intended
function in an unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of the system.
Key Security Concepts
Availability
 The property of being accessible and usable upon
demand by an authorised entity.
 Denial of Service (DoS): The prevention of authorized
access of resources or the delaying of time-critical
operations.
 Maybe the most important aspect of computer security.
 Distributed denial of service (DDoS) receives a lot of
attention; systems are now designed to be more resilient
against these attacks.
Additional Security Concepts
Authenticity
 “know to whom you are talking”
 The property of being genuine and being able to be verified
and trusted; confidence in the validity of a transmission, a
message, or message originator.
 This means verifying that users are who they say they are
and that each input arriving at the system came from a
trusted source.
Additional Security Concepts
Accountability
 The security goal that generates the requirement for
actions of an entity to be traced uniquely to that entity.
This supports nonrepudiation, deterrence, fault
isolation, intrusion detection and prevention, and after-
action recovery and legal action.
 Truly secure systems aren’t yet achievable, thus we
must be able to trace a security breach to a
responsible party.
Additional Security Concepts
Accountability
 At the operating system level, audit logs record
security relevant events and the user identities
associated with these events.
 If an actual link between a user and a “user identity”
can be established, the user can be held accountable.
 In distributed systems, cryptographic non-repudiation
mechanisms can be used to achieve the same goal.
Additional Security Concepts
Non-repudiation
 Non-repudiation services provide unforgeable
evidence that a specific action occurred.
 Non-repudiation of origin: protects against a sender of
data denying that data was sent.
 Non-repudiation of delivery: protects against a
receiver of data denying that data was received.
 Typical application: signing emails; signatures in secure
e-mail system.
Introduction: Roadmap

 Security terminology
 Computer Security: challenges and possible attacks
 Cybercrimes and Security Strategies
1. Computer security is not as simple as it might first appear to the novice

2. In developing a particular security mechanism or algorithm, one must


always consider potential attacks on those security features

3. Procedures used to provide particular services are often


counterintuitive

4. Physical and logical placement needs to be determined

5. Security mechanisms typically involve more than a particular algorithm


or protocol and also require that participants be in possession of some
secret information which raises questions about the creation, distribution,
and protection of that secret information
6. Attackers only need to find a single weakness, while the designer must
find and eliminate all weaknesses to achieve perfect security

7. Security is still too often an afterthought to be incorporated into a


system after the design is complete, rather than being an integral part of
the design process

8. Security requires regular and constant monitoring

9. There is a natural tendency on the part of users and system managers to


perceive little benefit from security investment until a security failure
occurs

10. Many users and even security administrators view strong security as
an impediment to efficient and user-friendly operation of an information
system or use of information
Owners Threat agents
value
wish to abuse
wish to impose and/or
minimize may damage
give
rise to
countermeasures assets

to
reduce

to to
risk threats
that
increase

Figure 1.2 Security Concepts and Relationships


Table 1.3
Computer and Network Assets, with Examples of Threats
Availability Confidentiality Integrity
Equipment is stolen or
An unencrypted CD-
Hardware disabled, thus denying
ROM or DVD is stolen.
service.
A working program is
modified, either to
Programs are deleted, An unauthorized copy cause it to fail during
Software
denying access to users. of software is made. execution or to cause it
to do some unintended
task.
An unauthorized read
of data is performed. Existing files are
Files are deleted,
Data An analysis of modified or new files
denying access to users.
statistical data reveals are fabricated.
underlying data.
Messages are destroyed Messages are modified,
Communication or deleted. Messages are read. The delayed, reordered, or
Lines and Communication lines traffic pattern of duplicated. False
Networks or networks are messages is observed. messages are
rendered unavailable. fabricated.
Vulnerabilities, Threats, and Attacks
 Categories of vulnerabilities
 Corrupted (loss of integrity)
 Leaky (loss of confidentiality)
 Unavailable or very slow (loss of availability)
 Threats
 Capable of exploiting vulnerabilities
 Represent potential security harm to an asset
 Attacks (threats carried out)
 Passive – attempt to learn or make use of information from the system that
does not affect system resources
 Active – attempt to alter system resources or affect their operation
 Insider – initiated by an entity inside the security parameter
 Outsider – initiated from outside the perimeter
Passive and Active Attacks

Passive Attacks Active Attacks


• Attempts to learn or make use • Attempts to alter system
of information from the resources or affect their
system but does not affect operation
system resources • Involve some modification of the
• Eavesdropping or monitoring data stream or the creation of a
of transmissions false stream
• Goal of attacker is to obtain • Four categories:
information that is being • Replay
transmitted • Masquerade
• Two types: • Modification of messages
• Release of message contents • Denial of service
• Traffic analysis
Friends and enemies: Alice, Bob, Trudy
 well-known in network security world
 Bob, Alice (lovers!) want to communicate “securely”
 Trudy (intruder) may intercept, delete, add messages

Alice channel data, control Bob


messages

secure secure
data data
sender receiver

Trudy

Security: 8- 38
Possible Attacks
 Alice wants to communicate with Bob over a network:
 No one should be able to disable her machine (denial of
service) or misuse her machine
 Or sniff information she exchanges
 Or spoof her address and act in her name
 Or plant malicious code on her machine
 Or attack anything on route to Bob
Alice Bob
secure secure
sender receiver
Who Might Bob, Alice be?
 … Well, real-life Bobs and Alices!
 Web browser/server for electronic transactions (e.g., on-line
purchases)
 On-line banking client/server
 DNS servers
 Routers exchanging routing table updates
 Other examples?
There are Bad Guys (and Girls) out there!
Q:What can a “bad guy” do?
A: a lot!
 eavesdrop: intercept messages
 actively insert messages into connection
 impersonation: can fake (spoof) source address in packet (or any
field in packet)
 hijacking: “take over” ongoing connection by removing sender or
receiver, inserting himself in place
 denial of service: prevent service from being used by others (e.g.,
by overloading resources)
 more...
Security Challenges
 Your security depends on others (unknowns)
 Fighting a living enemy
 New advances lead to improved attacks
 Good security solution must:
 Handle the problem to a great extent (no perfect/complete
solution)
 Handle future variations of the problem, too
 Be inexpensive
 Require few deployment points
 Security professionals: play double game
What They Violate?
 Eavesdropping
 Alteration
 Denial of service
 Masquerading
What They Violate?
 Eavesdropping: Confidentiality
 Alteration: Data integrity
 Denial of service: Availability
 Masquerading: Origin integrity
Introduction: Roadmap

 Security terminology
 Computer security: challenges and possible attacks
 Cybercrimes and Security Strategies
What is cybercrime?
 Cybercrime is criminal activity that either targets or uses a computer, a
computer network or a networked device.

 Most, but not all, cybercrime is committed by cybercriminals or hackers who


want to make money. Cybercrime is carried out by individuals or organizations.

 Some cybercriminals are organized, use advanced techniques and are highly
technically skilled. Others are novice hackers.

 Rarely, cybercrime aims to damage computers for reasons other than profit.
These could be political or personal.

© Kaspersky.com
46
Types of cybercrime
 Email and internet fraud.

 Identity fraud (where personal information is stolen and used).

 Theft of financial or card payment data.

 Theft and sale of corporate data.

 Cyberextortion (demanding money to prevent a threatened attack).

 Ransomware attacks (a type of cyberextortion).

 Cryptojacking (where hackers mine cryptocurrency using resources they do not


own).

 Cyberespionage (where hackers access government or company data).

© Kaspersky.com
47
Types of Cybercrime
 Illegally intercepting or stealing data.

 Interfering with systems in a way that compromises a network.

 Infringing copyright.

 Illegal gambling.

 Selling illegal items online.

 Soliciting, producing or possessing child pornography.

© Kaspersky.com
48
Malware Attacks
 a computer system or network infected with a computer virus or other type
of malware.

 Purposes include:
 stealing confidential data

 using the computer to carry out other criminal acts

 or causing damage to data

 WannaCry ransomware attack, a global cybercrime committed in May 2017.


 230,000 computers in 150 countries.

 Users were locked out of their files and sent a message demanding that they pay a BitCoin
ransom to regain access.

 Financial Losses: $4 billion Worldwid.


© Kaspersky.com
49
Phishing
 spam emails, or other forms of communication, sent en masse, with intention
of tricking recipients into doing something that undermines their security or
their organization’s security.

 In 2018, the World Cup Phishing Scam.


 phishing scam emails [containing links] sent to football fans

 tried to entice fans with fake free trips to Moscow [World Cup host]

 Opening and clicking the links cause personal data to be stolen

 Spear-phishing
 targeted phishing campaigns [specific individuals]

 jeopardizes the security of the organization

© Kaspersky.com
50
DDoS
 Distributed DoS attacks (DDoS) brings down a system
or network.

 Sometimes connected IoT (internet of things) devices


are used to launch DDoS attacks.

 UK National Lottery website DDoS Attack in 2017


 brought the lottery’s website and mobile app offline

 preventing UK citizens from playing

© Kaspersky.com
51
Potection against cybercrime
 Keep software and operating system updated

 Use anti-virus software and keep it updated

 Use strong passwords

 Never open attachments in spam emails

 Do not click on links in spam emails or untrusted websites

 Do not give out personal information unless secure

 Contact companies directly about suspicious requests

 Be mindful of which website URLs you visit

 Keep an eye on your bank statements

© Kaspersky.com
52
Attack Steps (1)
Very often individual attacks will follow the same seven step
pattern:
1. Reconnaissance (Surveying, examination):
The is the preparation phase where the attacker seeks to learn all they
can about the target organization.
2. Scanning:
a) Scanning describes the pre-attack phase where the attacker scans
the target network for specific information, typically vulnerabilities
based on the results of the reconnaissance.
b) Tools at an attacker’s disposal include port scanners, network
mapping tools, vulnerability scanners.
Attack Steps (2)
3. Gain access and escalation:
a. This step is the actual penetration of the target system. The attacker
exploits a vulnerability to gain access.
b. escalate privilege and move undetected through the network
4. Exfiltration: extract any information that is needed (not taken in
every cyber attack)
5. Maintain access (Sustainment):
a) This is the phase where the attacker delivers the desired payload.
They have gained unauthorized access and now wish to exploit it.
This can mean anything from obtaining files/data, planting spyware,
cause damage directly, setup zombie machines, install backdoor, etc.
b) attackers can come and go as they please
Attack Steps (3)
6. Assault or Attack: not taken in every cyber attack
7. Obfuscation (Cover tracks): This is how an attacker hides the
evidence of his/her actions. Log files need to be modified.
Countermeasures
Means used to
deal with
security attacks
• Prevent
• Detect
• Respond
• Recover

Residual
vulnerabilities
may remain

Goal is to
May itself minimize
introduce new residual level of
vulnerabilities risk to the
assets
Security Strategy
A security Strategy usually involves four steps:
1. Security policy
2. Security Implementation
3. Assurance
4. Evaluation
Security Policy (1)
 A security policy is
 an informal description of desired system behavior
 a formal statement of rules and practices that specify or regulate how
a system or organization provides security services to protect
sensitive and critical system resources. “RFC 4949”
 In developing a security policy, a security manager needs to
consider the following factors:
 The value of the assets being protected
 The vulnerabilities of the system
 Potential threats and the likelihood of attacks
Security Policy (2)
The manager must consider the following trade-offs:
 Ease of use versus security: Virtually all security measures
involve some penalty in the area of ease of use. Ex: Access
control mechanisms, Firewalls, Antiviruses…
 Cost of security versus cost of failure and recovery: In addition
to ease of use and performance costs, there are direct
monetary costs in implementing and maintaining security
measures. The cost of security failure and recovery must take
into account:
 the value of the assets being protected
 the damages resulting from a security violation
 the risk or the probability that a particular threat will exploit some
vulnerability with a particular harmful result
Security Implementation (1)
Security implementation involves four complementary courses of
action:
1. Prevention: An ideal security scheme where no attack is
successful. Although not practical in all cases, there is a wide
range of threats in which prevention is a reasonable goal. Ex.
transmission of encrypted data.
2. Detection: In a number of cases, absolute protection is not
feasible, but it is practical to detect security attacks. Ex.
intrusion detection systems designed to detect unauthorized
individuals logged onto a system, detection of a denial of
service attack.
Security Implementation (2)
3. Response: If security mechanisms detect an ongoing attack,
such as a denial of service attack, the system may be able to
respond in such a way as to halt the attack and prevent
further damage.
4. Recovery: An example of recovery is the use of backup
systems, so that if data integrity is compromised, a previously
saved correct copy of the data can be reloaded.

The more you invest into prevention, the more you have to invest
into detection to make sure prevention is working.
Assurance
 Encompassing both system design and system implementation,
assurance is an attribute of an information system that provides
grounds for having confidence that the system operates such
that the system’s security policy is enforced.
 “Does the security system design meet its requirements?”
 “Does the security system implementation meet its specifications?”
 Assurance is expressed as a degree of confidence, not in terms
of a formal proof that a design or implementation is correct.
Evaluation
 Process of examining a computer product or system with
respect to certain criteria
 Involves testing and may also involve formal analytic or
mathematical techniques
Thank You

You might also like