Chapter 1 - Overview-2022
Chapter 1 - Overview-2022
🙠 🙢
Chapter 1:
Overview
Lecturer: Nguyễn Thị Thanh Vân – FIT - HCMUTE
Content
� Introduction
� Security concepts
� OSI security architecture
o Security attacks,
o Security Services
o Security Mechanisms
� Models for network (access) security
� Network security terminologies
� Defense in depth
1/15/2018 2
1
20/08/2022
Introduction
� Changes in information security
1/15/2018 3
Introduction
Security
Application OS Network
Security Security Security
2
20/08/2022
1/15/2018 6
3
20/08/2022
1/15/2018 7
Threat: Apps
� Security: How secure are these apps that are being
developed in-house and the ones that you are paying for
as a service?
� Company-owned versus personal apps: Users will have
their own set of apps on their own devices (BYOD
scenario). How do these apps jeopardize the company's
security posture and can they lead to a potential data
breach?
1/15/2018 8
4
20/08/2022
Threat: Apps
1/15/2018 9
Threat: Data
1/15/2018 10
5
20/08/2022
1/15/2018 11
Security concepts
� Computer Security: The protection an information system
in order to attain the applicable objectives of preserving of
information system resources: (CIA Triad)
o Integrity: Prevents unauthorized modification of S&I
o Availability: Prevents disruption of service and productivity.
o Confidentiality: Prevents unauthorized disclosure
of systems and information
1/15/2018
Availability 12
6
20/08/2022
� Integrity
o Data integrity: are changed only in a specified and authorized manner
o System integrity: System performs its intended function in an
undamaged manner, avoid to unauthorized handling of the system
� Availability
o Assures that systems work promptly and service is not denied to
authorized users
1/15/2018 13
CIA Triad
1/15/2018 14
7
20/08/2022
� Accountability
(nonrepudiation)
o The security goal that
generates the requirement for
actions of an entity to be traced
uniquely to that entity
1/15/2018 15
Security
Security
mechanis
service
m
1/15/2018 16
8
20/08/2022
1/15/2018 17
Security attack
� A means of classifying security
attacks, used both in RFC 4949
o A passive attack attempts to
learn or make use of
information from the system
but does not affect system
resources
o An active attack attempts to
alter system resources or affect
their operation
1/15/2018 18
9
20/08/2022
Passive attacks
� Passive attacks are in the nature of eavesdropping on,
or monitoring of, transmissions.
� The goal of the opponent is to obtain information that is
being transmitted (namespace, IP range, employee, phone numbers…)
� Passive attacks are very difficult to detect, because they
do not involve any alteration of the data
Passive Attack
Release of
Message Contents Traffic Analysis
(Interception)
1/15/2018 19
Passive attacks
an opponent learns
the contents of Hi, I am Bob
information in
transmissions.
1/15/2018
related goals?
20
10
20/08/2022
Passive attacks
determine the location and
identity of communicating
hosts and could observe the
frequency and length of
messages being exchanged
Meet me
Meet me at
at
Cinemax
Cinemax
Phhw ph dw
flqhpda
1/15/2018
related goals? 21
Active attacks
� Involve some modification of the data stream or the
creation of a false stream
� Difficult to prevent because of the wide variety of
potential physical, software, and network vulnerabilities
� Goal is to detect attacks and to recover from any
disruption or delays caused by them
Active
Attack
Denial of
Masquerade
Replay Modification Service
(Fabrication)
(Interuption)
1/15/2018 22
11
20/08/2022
related goals? 23
1/15/2018
Transfer Rs.1000
Transfer Rs.1000 to Darth.
to Darth.
1/15/2018
related goals? 24
12
20/08/2022
Transfer Rs.1,000
to Darth. Transfer Rs.10,000
to Darth
25
1/15/2018
related goals?
1/15/2018
related goals? 26
13
20/08/2022
Handling attacks
• Prevention
Passive • Hard to detect
attacks • Easy to stop
• Detection and
Active Recovery
attacks • Easy to detect
• Hard to stop
1/15/2018 27
1/15/2018
OSI 28
14
20/08/2022
1/15/2018 29
1. Data Confidentiality
� The protection of transmitted data from passive
attacks
o Broadest service protects all user data transmitted
between two users over a period of time
o Narrower forms of service includes the protection of a
single message or even specific fields within a message
1/15/2018 30
15
20/08/2022
Taxonomy of Cryptography
20/08/2022 31
A block cipher:
- processes the plaintext input in fixed-size blocks
- produces a block of ciphertext of equal size for each plaintext block.
16
20/08/2022
DES Structure
The process of encrypting a 64-bit
block with DES:
o Initial permutation - IP
o 16 calculation loops using key
o Permutation end (be the inverse
of IP)
20/08/2022 33
20/08/2022 34
17
20/08/2022
20/08/2022 35
20/08/2022 36
18
20/08/2022
20/08/2022 37
Procedure of RSA
● Encryption, decryption, and key generation in RSA
19
20/08/2022
Key Management
Symmetric-key distribution
Key-distribution center: KDC
Session key
KERBEROS
Servers
Operation
Symmetric-key agreement
Diffie-Hellman key agreement
Public-key distribution
Public announcement
CA
X.509
20/08/2022 40
20
20/08/2022
2. Data integrity
� Can apply to a stream of messages, a single message,
or selected fields within a message
� Connection-oriented integrity service, one that deals with
a stream of messages, assures that messages are
received as sent with no duplication, insertion,
modification, reordering, or replays
� A connectionless integrity service, one that deals
with individual messages - provides protection against
message modification only
1/15/2018 41
3. Authentication
� assuring that a communication is accurate
o A single message: assures the recipient that the message is
from the source that it claims to be from
o An ongoing interaction: assures the 2 entities are accurate and
there is not a 3rd party can masquerade as 1 of the 2 legitimate
parties
� 2 specific authentication services are defined in X.800:
o Peer entity authentication: Provides for the corroboration
(verification) of the identity of a peer entity in a system
o Data origin authentication: Provides for the corroboration of the
source of a data unit
1/15/2018 42
21
20/08/2022
Implementing Authentication
Quiz: An attacker correctly guesses Alice’s password and logins in as her. Is this a case of...
� False positive
� False Negative
1/15/2018 43
Means of Authentication
Something the individual knows Something the individual process
Password Smart card
PIN, Physical key
Answer Token
22
20/08/2022
Authentication
� GOTPass: users employ “images and a one-time
numerical code” in order to secure password.
o using patterns and images instead of letters and numbers
o the generated digits random code
1/15/2018 45
• User education
• Computer-generated passwords
• Reactive password checking
• Complex password policy
� Do not store passwords, but store something that is derived from
them
o Use a one-way hash function and store the result
o The password file is readable only for root/admin
1/15/2018 46
23
20/08/2022
Pass-based Authentication –
Hash Functions
Password Quiz
1. If we do not have a trusted path between a user and the system, what
problem may occur. Check the correct answer(s):
User is not able to log into the system
User may provide the password to a malicious program
24
20/08/2022
2. How many unique four digits PINs are possible? Check the correct
answer:
1,000
100,000
10,000
1,000,000
4. Non-repudiation
� Prevents either sender or receiver from denying a
transmitted message
� Nonrepudiation, Origin
Proof that the message was sent by the specified party.
� Nonrepudiation, Destination
Proof that the message was received by the specified
party
1/15/2018 50
25
20/08/2022
1/15/2018 51
1/15/2018
OSI 52
26
20/08/2022
1/15/2018 53
1/15/2018 54
27
20/08/2022
ACL
MAC
DAC
RBAC
55
1/15/2018 56
28
20/08/2022
Role-Based
Access Control
29
20/08/2022
Capability lists
Security Mechanism
� The mechanisms are divided into those that are implemented
in a specific protocol layer,
o TCP
o Application
1/15/2018 60
30
20/08/2022
31
20/08/2022
1/15/2018 63
1. ENCIPHERMENT ⮚DATA
CONFIDENTIALITY
2. DATA INTEGRITY
3. DIGITAL SIGNATURE
⮚DATA INTEGRITY
4. AUTHENTICATION
EXCHANGE
⮚AUTHENTICATION
5. TRAFFIC PADDING
6. ROUTING CONTROL
⮚NONREPUDIATION
7. NOTARIZATION
8.
1/15/2018 ACCESS CONTROL 64
⮚ACCESS CONTROL
32
20/08/2022
1/15/2018 65
1/15/2018 66
33
20/08/2022
1/15/2018 67
1/15/2018 68
34
20/08/2022
1/15/2018 69
Defense in depth
Lock, Camera
1/15/2018 70
35
20/08/2022
20/08/2022 71
20/08/2022 72
36
20/08/2022
Summary
� Security concepts
• Confidentiality,
• Integrity,
• Availability
o Authentication
o Nonrepudiation (Accountability)
1/15/2018 73
37