chapter 1 Introduction to IAS
chapter 1 Introduction to IAS
Chapter 1 Introduction
Chapter 2 Computer Threat
Chapter 3 Cryptography
Chapter 4 Network security
Chapter 5 Administering Security
Learning Objective
4
Cont…
8
Objective
At the end of this chapter, the student will be able to:
o Define information security
o Distinguish different types of attacker
o Identify different information security vulnerability
o Describe different consequence of security breaches
o Describe different security requirement with respect to their attack
o Distinguish active and passive attack type
o Identify different attacks on TCP/IP layers
o Distinguish different attack countermeasures
o Describe security model
o Describe history of information security 9
What is Information and security?
Information Security
Is an organized collection of The quality or state of being secure-
processed data which gives the -to be free from danger”
complete sense.
To be protected from adversaries
Information is a data that have been
shaped into a form that is meaningful ꬾ Information security is the protection of
and useful to human beings. information and its critical elements, from
modification, disruption, destruction,
It provides answers to who, what and inspection, and access by unauthorized
when questions. part
10
Cont…
Detection– taking measures that allow you to detect when an asset has
been damaged, how it has been damaged, and who has caused the
damage;
13
Cont…
Hackers – This breaks into computers or networks to gain
access for various reasons.
o White hat attackers break into networks or computer
systems to discover weaknesses in order to improve the
security of these systems.
o Gray hat attackers are somewhere between white and
black hat attackers. The gray hat attackers may find a
vulnerability and report it to the owners of the system if
that action coincides with their agenda.
o Black hat attackers are unethical criminals who violate
computer and network security for personal gain, or for
malicious reasons, such as attacking networks.
14
Cont…
15
Cont.…
Organized Hackers-include organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers.
o Cyber criminals are usually groups of professional criminals focused on control,
power, and wealth
o Hacktivists make political statements to create awareness to issues that are important
to them.
o State sponsored attackers steal government secrets, gather intelligence, and sabotage
networks. Their targets are foreign governments, terrorist groups, and corporations.
17
What are the vulnerabilities?
Physical vulnerabilities
o (E.g. Computer can be stolen, Hard disks can be stolen)
19
Consequences…
Failure/End of service
Technology leakage
24
Availability
26
Cont…
Authorization
oThis property gives access rights to different types of users.
For example a network management can be performed by network administrator
only.
Non-repudiation:
oNon-repudiation is a mechanism to guarantee that the sender of a message cannot
later deny having sent the message and that the recipient cannot deny having
received the message.
For instance, user A could send a funds transfer request to bank B over the Internet. After
the bank performs the funds transfer as per A’s instructions, A could claim that she never
sent the funds transfer instruction to the bank! 27
Examples of threats
28
Computer and Network Security
Attacks
Categories of Attacks based security criteria
oInterruption: An attack on availability
oInterception: An attack on confidentiality
oModification: An attack on integrity
oFabrication: An attack on authenticity
29
Computer and Network Security Attacks…
• Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
30 30
Security attack types
The following criteria can also classify the attacks.
oPassive or active,
oInternal or external,
oAt different protocol layers.
Passive vs. active attacks
A passive attack attempt to learn or use the information without changing the
message's content and disrupting the communication's operation.
33
Passive Attacks (2)
Traffic Analysis
34
Active Attacks
Active attacks try to alter system resources or affect their operation
oModification of data, or creation of false data
Four categories
oMasquerade of one entity as some other
oReplay previous message
oModification of messages
oDenial of service (DoS): preventing normal use
• A specific target or entire network
Difficult to prevent
oThe goal is to detect and recover
35
Active Attacks (1)
Masquerade
36
Active Attacks (2)
Replay
37
Active Attacks (3)
Modification of Messages
38
Active Attacks (4)
Denial of Service
39
Security attack type(Internal vs. External attacks)
External attacks are carried out by hosts that don’t belong to the network
domain, sometimes they are called outsiders.
o E.g. can cause congestion by sending false routing information thereby causing
unavailability of services.
In case of an internal attack, the malicious node from the network domain
gains unauthorized access, acts as a genuine node, and disrupts the normal
operation of nodes.
oThey are also known as insiders.
40
Security attack type(Attacks on different layers of the
TCP/IP model)
41
Common security attacks and their
countermeasures
Finding a way into the network
oFirewalls TCP hijacking
Exploiting software bugs, buffer oIPSec
overflows Packet sniffing
oIntrusion Detection Systems oEncryption (SSL, HTTPS)
Denial of Service Social problems
oaccess filtering, IDS
oEducation
42
Model for Network Security
43
Model for Network Security…
In considering the place of encryption, its useful to use the above model.
Information being transferred from one party to another over an insecure communications
channel,
o In the presence of possible opponents.
The two parties, who are the principals in this transaction, must cooperate for the exchange to
take place.
They can use:
o an appropriate security transform (encryption algorithm),
o with suitable keys (secret information),
o possibly negotiated using the presence of a trusted third party.
44
Model for Network Security…
Using this model requires to:
1. design a suitable algorithm for the security transformation
4. specify a protocol enabling the principals to use the transformation and secret
information for a security service
45
Model for Network Access Security…
46
The History Of Information Security
48
The 1970s and 80s
52
Exit Exam Question
1. Eavesdropping and packet sniffing are considered to be attacks of_____.
A. Confidentiality C. Integrity
B. Nonrepudiation D. Authentication
2. _________is threat of a Database, which can occur due to creation, insertion, updating,
changing the status of data, and deletion.
A. Loss of accountability C. Loss of confidentiality
B. Loss of integrity D. loss of availability
Assume: computer lab where students demands the administrator access to a window 11
system to install SQL server; but that right should not be given the student unless he/she is
member of an employee. Which principle of cyber security is considered here?
A. Fail-safe C. Open design
B. Least privilege D. Separation privilege
54