0% found this document useful (0 votes)
3 views

chapter 1 Introduction to IAS

The document outlines a course on information security, covering topics such as computer threats, cryptography, network security, and security administration. It aims to equip students with the ability to understand security concepts, identify vulnerabilities, and recognize various types of attackers and attacks. Assessment methods include tests, assignments, quizzes, and a final exam, with a focus on the fundamental objectives of confidentiality, integrity, and availability in security practices.

Uploaded by

kmkkali41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

chapter 1 Introduction to IAS

The document outlines a course on information security, covering topics such as computer threats, cryptography, network security, and security administration. It aims to equip students with the ability to understand security concepts, identify vulnerabilities, and recognize various types of attackers and attacks. Assessment methods include tests, assignments, quizzes, and a final exam, with a focus on the fundamental objectives of confidentiality, integrity, and availability in security practices.

Uploaded by

kmkkali41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Organization of the Course

Chapter 1 Introduction
Chapter 2 Computer Threat
Chapter 3 Cryptography
Chapter 4 Network security
Chapter 5 Administering Security
Learning Objective

By the end of this course, students will be able to:


Pinpoint the basic concepts of information security, including
oSecurity attacks/threats, security vulnerabilities, security criteria, security
models, and security mechanisms

Identify malicious code,


o Type of malicious code, and suggestion to secure computer and
operating system.
3
Cont…

Pinpoint the concepts, principles and practices related to


elementary cryptography, including
oplain-text, cipher-text, different techniques for crypto-analysis,
symmetric cryptography, asymmetric cryptography,

odigital signature, message authentication code, hash functions, and Public


key Infrastructure .

4
Cont…

Describe threats to networks, and explain techniques for ensuring


network security, including
oSecuring network using different protocols, Firewalls, VPN, and
Intrusion Detection and prevention system.

Pinpoint basic concept of administering security such as


oSecurity Planning, Risk Analysis, Organizational Security Polices and
Physical Security
5
Assessment

Assessment type Maximum mark


weight
Test 30%
Assignment 20%
Quiz 10%
Final Exam 40%
Total 100%
6
7
Outline

What is Information Security?


Security attack and its consequence
Vulnerabilities of security
Security criteria
Security attack types
Model for Network Security
History of Information security

8
Objective

At the end of this chapter, the student will be able to:
o Define information security
o Distinguish different types of attacker
o Identify different information security vulnerability
o Describe different consequence of security breaches
o Describe different security requirement with respect to their attack
o Distinguish active and passive attack type
o Identify different attacks on TCP/IP layers
o Distinguish different attack countermeasures
o Describe security model
o Describe history of information security 9
What is Information and security?
Information Security
Is an organized collection of  The quality or state of being secure-
processed data which gives the -to be free from danger”
complete sense.
 To be protected from adversaries
Information is a data that have been
shaped into a form that is meaningful ꬾ Information security is the protection of
and useful to human beings. information and its critical elements, from
modification, disruption, destruction,
It provides answers to who, what and inspection, and access by unauthorized
when questions. part

10
Cont…

A rough classification of protection:


Prevention – taking measures that prevent your assets from being
damaged;

Detection– taking measures that allow you to detect when an asset has
been damaged, how it has been damaged, and who has caused the
damage;

Reaction– taking measures that allow you to recover your assets or to


recover from damage to your assets 11
What is Security?...
Security is about
Threats (bad things that may happen, e.g. your money getting stolen)
Vulnerabilities (weaknesses in your defenses, e.g. your front door
being made of thin wood and glass)

Attacks (ways in which the threats may be actualized,


oe.g. a thief breaking through your weak front door while you and
the neighbors are on holiday)
12
Attackers

Attackers are individuals or groups who attempt to exploit vulnerability for


personal or financial gain.

Attackers are interested in everything, from credit cards to product designs


and anything with value.
oAmateurs/Script Kiddies- attackers with little or no skill, often using
existing tools or instructions found on the Internet to launch attacks.

13
Cont…
 Hackers – This breaks into computers or networks to gain
access for various reasons.
o White hat attackers break into networks or computer
systems to discover weaknesses in order to improve the
security of these systems.
o Gray hat attackers are somewhere between white and
black hat attackers. The gray hat attackers may find a
vulnerability and report it to the owners of the system if
that action coincides with their agenda.
o Black hat attackers are unethical criminals who violate
computer and network security for personal gain, or for
malicious reasons, such as attacking networks.

14
Cont…

15
Cont.…
Organized Hackers-include organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers.
o Cyber criminals are usually groups of professional criminals focused on control,
power, and wealth

o Hacktivists make political statements to create awareness to issues that are important

to them.

o State sponsored attackers steal government secrets, gather intelligence, and sabotage
networks. Their targets are foreign governments, terrorist groups, and corporations.

Insiders-an internal user, such as an employee or contract partner


Cont…

17
What are the vulnerabilities?

Software or Hardware defect


o Errors in the operating system or application code, buffer overflow
attacks, hardware design flaws.
Non-validated input
o data coming into the program could have malicious content
Weaknesses in security practices
o Not educating people
Access-control problems
o Many security vulnerabilities are created by the improper use of
access controls. 18
What are the vulnerabilities?

Physical vulnerabilities
o (E.g. Computer can be stolen, Hard disks can be stolen)

Communication vulnerabilities (Ex. Wires can be tapped)


Human vulnerabilities (Eg. Insiders)
Poorly chosen passwords(eg. 123/ abc)

19
Consequences…
Failure/End of service

Reduction of QoS, down to Denial of Service (DDoS)

Internal problems in the enterprise

Trust decrease from partners (client, providers, share-holders)

Technology leakage

Human consequences (personal data, sensitive data - medical,


insurances, …)
20
Security Criteria(objective)
This will help us to
ounderstand the attacks better and
oThink about the possible solutions to tackle them.
Three fundamental objectives, namely:
oconfidentiality, integrity, and availability (CIA).
Other security requirement are:
o Authentication, Authorization, non- repudiation and etc.
21
Confidentiality
Ensures that computer-related assets are accessed only by authorized parties.
Confidentiality is sometimes called secrecy or privacy.
Confidentiality gets compromised if an unauthorized person is able to access
a message.

Example of this could be a confidential email message sent by A to B, which


is accessed by C without the permission or knowledge of A and B.

This causes loss of message confidentiality.


22
Integrity
It requires that messages should be modified or altered only by authorized
parties.
oModification includes writing, changing, deleting, and creating the message that is
supposed to be transmitted across the network.

Integrity guarantees that no modification, addition, or deletion is done to the


message;

The altering of message can be malicious or accidental.


23
Cont…
For example, suppose you write a check for $100 to pay for the goods
bought from the US. However, when you see your next account
statement, you are startled to see that the check resulted in a payment of
$1000!

This is the case for loss of message integrity.

24
Availability

Assets are accessible to authorized parties at appropriate times.


oIn other words, if some person or system has legitimate access to a
particular set of objects, that access should not be prevented.

For this reason, availability is sometimes known by its opposite, denial


of service.

For example, due to the intentional actions of an unauthorized user C,


an authorized user A may not be able to contact server computer B.

This would defeat the principle of availability. 25


Security criteria...
Authentication
oIt means that correct identity is known to communicating parties.
oThis property ensures that the parties are genuine not impersonator.
 For instance, suppose that user C sends an electronic document over the
Internet to user B. However, the trouble is that user C had posed as user A
when she sent this document to user B. How would user B know that the
message has come from user C, who is posing as user A?

26
Cont…
Authorization
oThis property gives access rights to different types of users.
 For example a network management can be performed by network administrator
only.
Non-repudiation:
oNon-repudiation is a mechanism to guarantee that the sender of a message cannot
later deny having sent the message and that the recipient cannot deny having
received the message.
For instance, user A could send a funds transfer request to bank B over the Internet. After
the bank performs the funds transfer as per A’s instructions, A could claim that she never
sent the funds transfer instruction to the bank! 27
Examples of threats

28
Computer and Network Security
Attacks
Categories of Attacks based security criteria
oInterruption: An attack on availability
oInterception: An attack on confidentiality
oModification: An attack on integrity
oFabrication: An attack on authenticity

29
Computer and Network Security Attacks…
• Categories of Attacks/Threats
Source

Destination
Normal flow of information
Attack

Interruption Interception

Modification Fabrication
30 30
Security attack types
 The following criteria can also classify the attacks.
oPassive or active,
oInternal or external,
oAt different protocol layers.
Passive vs. active attacks
A passive attack attempt to learn or use the information without changing the
message's content and disrupting the communication's operation.

Active attack attempts to interrupt, modify, delete, or fabricate messages or


information, disrupting the network's normal operation. 31
Passive Attacks
Passive attacks do not affect system resources
o The goal of the opponent is to obtain information that is being transmitted
Two types of passive attacks
o Release of message contents
oTraffic analysis
Passive attacks are very difficult to detect
o Message transmission apparently normal
oNo alteration of the data
 Emphasis on prevention rather than detection
• By means of encryption
32
Passive Attacks (1)
Release of Message Contents

33
Passive Attacks (2)
Traffic Analysis

34
Active Attacks
Active attacks try to alter system resources or affect their operation
oModification of data, or creation of false data
Four categories
oMasquerade of one entity as some other
oReplay previous message
oModification of messages
oDenial of service (DoS): preventing normal use
• A specific target or entire network
Difficult to prevent
oThe goal is to detect and recover
35
Active Attacks (1)
Masquerade

36
Active Attacks (2)
Replay

37
Active Attacks (3)
Modification of Messages

38
Active Attacks (4)
Denial of Service

39
Security attack type(Internal vs. External attacks)
External attacks are carried out by hosts that don’t belong to the network
domain, sometimes they are called outsiders.
o E.g. can cause congestion by sending false routing information thereby causing
unavailability of services.
In case of an internal attack, the malicious node from the network domain
gains unauthorized access, acts as a genuine node, and disrupts the normal
operation of nodes.
oThey are also known as insiders.
40
Security attack type(Attacks on different layers of the
TCP/IP model)

The security attacks can also be classified as according to the TCP/IP


layers. Table shows the attack types at each layer.

41
Common security attacks and their
countermeasures
Finding a way into the network
oFirewalls TCP hijacking
Exploiting software bugs, buffer oIPSec
overflows Packet sniffing
oIntrusion Detection Systems oEncryption (SSL, HTTPS)
Denial of Service Social problems
oaccess filtering, IDS
oEducation

42
Model for Network Security

43
Model for Network Security…
 In considering the place of encryption, its useful to use the above model.
 Information being transferred from one party to another over an insecure communications
channel,
o In the presence of possible opponents.
 The two parties, who are the principals in this transaction, must cooperate for the exchange to
take place.
 They can use:
o an appropriate security transform (encryption algorithm),
o with suitable keys (secret information),
o possibly negotiated using the presence of a trusted third party.

44
Model for Network Security…
Using this model requires to:
1. design a suitable algorithm for the security transformation

2. generate the secret information (keys) used by the algorithm

3. develop methods to distribute and share the secret information (key)

4. specify a protocol enabling the principals to use the transformation and secret
information for a security service

45
Model for Network Access Security…

Access control Antivirus/IDS


Firewalls/ proxy servers

46
The History Of Information Security

Computer security began immediately after the first mainframes were


developed

Groups developing code-breaking computations during World War II


created the first modern computers

Physical controls were needed to limit access to authorized personnel to


sensitive military locations

Only rudimentary controls were available to defend against physical


theft, espionage, and sabotage 47
The 1960s

Department of Defense’s Advanced Research Project


Agency (ARPA) began examining the feasibility of a
redundant networked communications

Larry Roberts developed the project from its inception(the


beginning)

48
The 1970s and 80s

ARPANET grew in popularity as did its potential for misuse

Fundamental problems with ARPANET security were


identified
– No safety procedures for dial-up connections to the ARPANET

– User identification and authorization to the system were non-existent

In the late 1970s the microprocessor expanded computing


capabilities and security threats
49
R-609 – The Start of the Study of Computer Security

Information Security began with Rand Report R-609

The scope of computer security grew from physical


security to include:
– Safety of the data

– Limiting unauthorized access to that data

– Involvement of personnel from multiple levels of the


organization
50
The 1990s

Networks of computers became more common, so too did


the need to interconnect the networks

Resulted in the Internet, the first manifestation of a global


network of networks

In early Internet deployments, security was treated as a low


priority
51
The Present

The Internet has brought millions of computer networks


into communication with each other – many of them
unsecured

Ability to secure each now influenced by the security on


every computer to which it is connected

52
Exit Exam Question
1. Eavesdropping and packet sniffing are considered to be attacks of_____.
A. Confidentiality C. Integrity
B. Nonrepudiation D. Authentication
2. _________is threat of a Database, which can occur due to creation, insertion, updating,
changing the status of data, and deletion.
A. Loss of accountability C. Loss of confidentiality
B. Loss of integrity D. loss of availability
Assume: computer lab where students demands the administrator access to a window 11
system to install SQL server; but that right should not be given the student unless he/she is
member of an employee. Which principle of cyber security is considered here?
A. Fail-safe C. Open design
B. Least privilege D. Separation privilege
54

You might also like