Lecture 1 Introduction
Lecture 1 Introduction
INFORMATION SECURITY
Gatekeeper
Firewall, application gateway, packet filter etc.
Internal control
Logs, Monitoring, IDS, audits, virus scans, etc.
Terminology -I
5
Requirements
& Policies
Security Architecture
Security Information
Features
or
Services
Security Attacks
Security
Mechanisms
Terminology - II
6
Asset
Network or system resource that has value
Examples - bandwidth, web server, CPU cycles, database with credit
card numbers, e-mail with confidential data
Vulnerability
Weakness in the asset that can be exploited
Example - Access to network bandwidth for anyone without
authentication or controls
Threat
Someone capable of and wanting to exploit a vulnerability in an
asset
Sometimes it is expressed as an abstract event that could occur
rather than specifically identifying someone who is a threat
Vulnerabilities
7
Threats
10
Types of Attacks
12
ตรว จ
Zombies
Take over several vulnerable machines and use them as
Zombies to launch DoS attacks or send SPAM e-mail
Steal information
Break into systems and databases and steal credit card
and identity information
Extortion
Threaten companies that their cyberinfrastructure will be
attacked if they do not pay up
Most attacks are on hosts running vulnerable software.
But not all of them are such attacks
Security Services - 2
16
Confidentiality
Protects against interception and traffic analysis
Message Authentication
Combination of authentication and integrity
Protects against fabrication and modification
Non-repudiation
Protects against repudiation
Authentication
Identity of the source of information is not false
During initiation of connection
During ongoing interaction
Attacks are active – fabrication, masquerade, replay, session
hijacking etc.
Integrity
Information has not been modified by unauthorized entities
Not reordered, inserted, delayed, or changed in any other way
Attack is active: modification, alteration
Authentication and Integrity (II)
19
Availability
20
Security is a process
22
เค อง อมาใ ป
Prevention
เอา
Detection
ตรว จหา
Assessment
What is the status?
Are there the right policies and procedures, are right technical pieces in place, are we
legal…
Prevention
Measures taken to reduce the chance of security breaches
Includes architectural placements, deployment of components like firewalls, use of
secure protocols… both host-based and perimeter-based
Detection
Process of identifying security breaches and violations of policies
Automatic methods like IDS and IPS, manual - monitoring and logs, procedures like
audits
Response
Making sure that detection of a security breach is actually a security breach
Process to ensure similar breaches do not occur again (patch, clean-up, restore)
Process to take legal and other steps (report to DoJ, sue, etc.)
: แสวงหา ประโยช
Exploitation จากระ
:เ ่ม ค. นแ รง การใ
Reinforcement
Consolidation เ ้าย
ป ัน อ
Pillage
ข้
ข้
พิ
ลั
ข้
รุ
ขั้
Reconnaissance
25
Reconnaissance - II
26
Defense
Possible to detect some of the message exchanges by IDS
Reinforcement
28