Lecture-2 - Overview - of - Cyber Security - (Revised)
Lecture-2 - Overview - of - Cyber Security - (Revised)
Concepts
Lecture-2
3
Cyber Security: Concept
4
Cyber Security: Concept
What is Cyber Security?
7
What is Software Security?
Software security is a kind of computer security that focuses
on the secure design and implementation of software.
• Using the best language, tools, methods
• Focus of study:
The Code
Software : Concepts
Software : Concepts
Software Security: Concepts
Making Secure Software
• Flawed approach: Design and build software, and
ignore security at first
• Add security once the functional requirements are
satisfied
Phases
Security Requirements
• Requirements Abuse Cases
Architectural Risk Analysis
• Design
Security-oriented Design
• Implementation
Code Review (with tools)
• Testing/assurance Risk-based Security Tests
Penetration Testing
Note that different SD processes have
different phases and artifacts, but all
involve the basics above. We’ll keep it
simple and refer to these.
Activities
Network Security: ?
15
What is Network Security?
• Network security:
• Protection of the underlying networking infrastructure from unauthorized
access and misuse.
• The web and the use of DNS services specifically are part of 91% of all malware attacks
• Email and web together are a key part for 99% of successful breaches
Network Security:
Commonly used placeholders in Security
• Alice and Bob: Alice wants to send a message to Bob
Alice Bob
17
Network Security: Issues
• A sends a file to B: E intercepts it and reads it
• How to send a file that looks gibberish to all but the intended receiver?
• A send a file to B: M intercepts it, modifies it, and then forwards it to B
• How to make sure that the document has been received in exactly the form it has been
sent
• M sends a file to B pretending it is from A
• How to make sure your communication partner is really who (s)he claims to be
• A sends a message to B: M is able to delay the message for a while
• How to detect old messages
• A sends a message to B. Later A (or B) denies having sent (received) the message
• How to deal with electronic contracts
• E learns which user accesses which information although the information itself remains
secure
• M prevents communication between A and B: B will reject any message from A because they
look unauthentic
18
Securing
Communication Protocol &
Communication Channel
Understanding Communication Protocols
Understanding Communication Protocols
Network Security: Overview
in Network Protocol layers
22
Securing Communication Protocols
• Transport Layer Security (TLS)
• Establishes secure, negotiated client–server session
• Transport Layer Security (TLS), the successor of the now-
deprecated Secure Sockets Layer (SSL)
• What does TLS do?
• Encryption: hides the data being transferred from third parties.
• Authentication: ensures that the parties exchanging information are
who they claim to be.
• Integrity: verifies that the data has not been forged or tampered
with.
Transport Layer Security (TLS) /SSL
Secure Negotiated Sessions Using SSL/TLS
Securing Channels of Communication
• Firewall
• Hardware or software
• Uses security policy to filter packets
• Two main methods:
• Packet filters
• Application gateways
• Proxy servers (proxies)
• Software servers that handle all
communications from or sent to
the Internet
31
What is Web Security?
• Process, technology or method for protecting
• Web servers, web applications, and web services against different security
threats that exploit vulnerabilities in an application’s code.
• Critical to the business continuity
The web and the use of DNS services specifically are part of 91% of all malware
attacks
Email and web together are a key part for 99% of successful breaches.
• Commonly, prime target by the threat actors
• Ease of execution
Web Attacks: ?
33
SEED Project (seedsecuritylabs.org)
Mobile Security: ?
34
What is Mobile Application Security?
36
System Security: ?
37
What is Operating System Security?
• Interface between hardware and user applications,
• OS security is critical to protecting the overall system and ensuring that applications and
users can interact with it safely.
Protecting Servers and Clients
• Operating system security enhancements
• Upgrades, patches
• Anti-virus software
• Easiest and least expensive way to prevent
threats to system integrity
• Requires daily updates
Operating System Security : ?
40
What is Application Security?
• Application security
• aims to protect Software code, Software and hardware
system, Data against cyber threats.
• introduce a secure software development life cycle to
development teams.
Application Security: Concept
Application Security: Concept
43
What is Information Security?
• Information security
• Protecting information and information systems from unauthorized use, assess,
modification or removal.
• Two sub-categories
• Physical environment by ensuring the premises is secure
• No one can access information electronically
• Concerned with making sure data in any form is kept secure and is a bit more broad
than cybersecurity
What is Hardware Security?
• protection of physical devices and the embedded systems within them from
vulnerabilities, attacks, and unauthorized access.
• various techniques to secure hardware components,
• Microprocessors
• Memory
• Sensors
• Other physical parts of electronic devices
The Role of Laws and Public Policy