Objectives For Chapter 1
Objectives For Chapter 1
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Computer Security Concept
What Is Computer Security?
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
3
Assets
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
4
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Computer Security Concept. Cont.
Critical Infrastructure Areas
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Computer Security Concept. Cont.
Internet, Wireless Communication, IoT get all types of information systems
connected, It is urgent to secure them against virus, hacker, eavesdropping,
cheats …
• System Security : computer system, mobile devices, IoT devices…
• Computer Security:
The protection afforded to an automated information system in order to attain the
applicable objectives of preserving the integrity, availability and confidentiality of
information system resources (includes hardware, software, firmware, information/data, and
telecommunications). (NIST95)
• Confidentiality:
• Data confidentiality: Assures that private or confidential information is not made available or disclosed to
unauthorized individuals.
• Privacy: Assures that individuals control or influence what information related to them may be collected and stored
and by whom and to whom that information may be disclosed.
• Integrity:
• Data integrity: Assures that information (both stored and in transmitted packets) and programs are changed only in
a specified and authorized manner.
• System integrity: Assures that a system performs its intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the system.
• Availability:
Assures that systems work promptly and service is not denied to authorized users.
Computer Security Concept. Cont.
Confidentiality: Preserving authorized
restrictions on information access
and disclosure, including means for
protecting personal privacy and proprietary
information. A loss of confidentiality is the
unauthorized disclosure of
information. Figure 1.1 Essential Network and Computer
Security Requirements
■ Integrity: Guarding against improper
information modification or destruction,
including ensuring information Authenticity: The property of being genuine and
nonrepudiation and authenticity. A loss being able to be verified and trusted; confidence
of integrity is the unauthorized modification in the validity of a transmission, a message, or
or destruction of information. message originator. This means verifying that
users are who they say they are and that each
■ Availability: Ensuring timely and reliable
input arriving at the system came from a trusted
access to and use of information. source.
A loss of availability is the disruption of ■ Accountability: The security goal that
access to or use of information or an generates the requirement for actions of an entity
information system. to be traced uniquely to that entity.
Computer Security Concept. Cont.
When is any System Secure?
Confidentiality: Who is authorized?
Integrity: Is data good?
Availability: Can one access data whenever needed?
Confidentiality Integrity
S
Availability
S = secure
S = secure
Availability
Sensitive
Data
under verification
Types of Attackers
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
12
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Attack
• = exploitation of one or more vulnerabilities by a threat; tries to defeat
controls
• Attack may be:
• Successful
• resulting in a breach of security, a system penetration, etc.
• Unsuccessful
• when controls block a threat trying to exploit a vulnerability
[Pfleeger & Pfleeger]
• Examples
• Fig. 1-1 (p.6)
• New Orleans disaster (Hurricane Katrina):
What were city vulnerabilities, threats, and controls
15
Types of Harm
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Kinds of Threats
• Kinds of threats:
• Interception
• an unauthorized party (human or not) gains access to an asset
• Interruption
• an asset becomes lost, unavailable, or unusable
• Modification
• an unauthorized party changes the state of an asset
• Fabrication
• an unauthorized party counterfeits an asset
[Pfleeger & Pfleeger]
1.17
Making counterfeit „blank” credit card (with a Magetizing the magnetic strip to complete producing
blank magnetic strip). a counterfeit card.
[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
Attacks Threatening Availability 1.24
Security Services
1.39
Cryptography
Cryptography, a word with Greek origins, means “secret
writing.” However, we use the term to refer to the science and
art of transforming messages to make them secure and
immune to attacks.
Classical Cryptography & Modern Cryptography
• Cryptography is “the art of writing or solving codes.” -
Concise Oxford English Dictionary
• focusing solely on the codes used for centuries to enable secret
communication.
• By military organizations and governments.
• Modern Cryptography :
• mathematical techniques for securing digital information, systems,
and distributed computations against adversarial attacks.
mathematical discipline.
• Provable security
• In everywhere, central topic of computer security
1.44
Steganography
The word steganography, with origin in Greek, means
“covered writing,” in contrast with cryptography, which
means “secret writing.”
Steganography Examples
Example 1: using dictionary
{Every word is uniquely coded by a bit combination.
Shorter bit patterns are given to frequently used words}
• 1.7 Draw a matrix similar to Table 1.4 that shows the relationship between security
services and attacks.
• 1.8 Consider a financial report publishing system used to produce reports for various
organizations.
• a. Give an example of a type of publication in which confidentiality of the stored
• data is the most important requirement.
• b. Give an example of a type of publication in which data integrity is the most important
• requirement.
• c. Give an example in which system availability is the most important requirement.
Summary
• topic roadmap & standards organizations
• security concepts:
• confidentiality, integrity, availability
• X.800 security architecture
• security attacks, services, mechanisms
• models for network (access) security