Unit 1 - CS
Unit 1 - CS
Programme: BTech CS
About the Course:
Lecture Hours/Week: 2
Practical Hours/Week: 2
Credits: 3
Course Objective:This course is an introduction to
the field of Cyber Security. This course presents a balance of
the managerial and technical aspects of the discipline. It will
prepare students with the technical knowledge and skills
needed to protect and defend computer systems and network
08/07/23 Slide #1-1
Textbooks and Reference
• M. Bishop, S.S. Venkatramanayya, Introduction to
Computer Security, 1st edition, Pearson Education, 2014.
• M. Whitman, H. Mattford, Principles of Information
Security, 6th edition, Cengage Learning, 2017
• C. Pfleeger, S. Pfleeger, Security in Computing, 5th
edition, Pearson Education, 2015.
• Vulnerabilities
– Weaknesses in a system that may be able to be
exploited in order to cause loss or harm e.g., a
08/07/23
file server that doesn't authenticate its usersSlide #1-13
Some terminology
• Threats
– A loss or harm that might befall a system
– e.g., users' personal files may be revealed to the public
– There are four major categories of threats:
• Interception
• Interruption
• Modification
• Fabrication
– When we design a system, we need to state a threat model
• This is the set of threats we are undertaking to defend against
• Whom do we want to stop from doing what?
08/07/23 Slide #1-14
Some terminology
• Attack
– An action which exploits a vulnerability
– e.g., telling the file server you are a different user in an
attempt to read or modify their files
• Control
– Removing or reducing a vulnerability
– You control a vulnerability to prevent an attack and block
a threat.
– How would you control the file server vulnerability?
– Our goal: control vulnerabilities
08/07/23 Slide #1-15
A) Hardware Level of Vulnerabilities /
Threats
• Add / remove a h/w device
Snoop = to look around a place secretly in order to discover things about it or
the people connected with it. [Cambridge Dictionary of American English]
– Ex: Modification, alteration of a system
– ...
• Physical attacks on h/w => need physical security: locks and guards
– Accidental (dropped PC box) or voluntary (bombing a computer
room)
– Theft / destruction
• Damage the machine (spilled coffe, mice, real bugs)
• Steal the machine
• „Machinicide:” Axe / hammer the machine
08/07/23 Slide #1-16
B) Software Level of Vulnerabilities /
Threats
• Software Deletion
– Easy to delete needed software by mistake
– To prevent this: use configuration management software
• Software Modification
– Trojan Horses, , Viruses, Logic Bombs, Trapdoors,
Information Leaks (via covert channels), ...
• Software Theft
– Unauthorized copying
• via P2P, etc.
08/07/23 Slide #1-17
C) Data Level of Vulnerabilities / Threats
• Adequate protection
– Cryptography
Slide #1-45
Defence of computer systems
• Remember we may want to protect any of our assets
– Hardware, software, data
• Many ways to do this; for example:
• Cryptography
– Protecting data by making it unreadable to an attacker
– Authenticating users with digital signatures
– Authenticating transactions with cryptographic protocols
– Ensuring the integrity of stored data
– Aid customers' privacy by having their personal
information automatically become unreadable after a
certain length of time
Defence of computer systems
• Software controls
– Passwords and other forms of access control
– Operating systems separate users' actions from
each other
– Virus scanners watch for some kinds of malware
– Development controls enforce quality measures on
the original source code
– Personal firewalls that run on your desktop
Defence of computer systems
• Hardware controls
– (Not usually protection of the hardware itself, but
rather using separate hardware to protect the
system as a whole.)
– Fingerprint readers
– Smart tokens
– Firewalls
– Intrusion detection systems
Defence of computer systems
• Physical controls
– Protection of the hardware itself, as well as
physical access to the console, storage media, etc.
– Locks
– Guards
– Off-site backups
– Don't put your data centre on a fault line in
California
Defence of computer systems
• Policies and procedures
– Non-technical means can be used to protect against
some classes of attack
– If an employee connects his own Wi-fi access
point to the internal company network, that can
accidentally open the network to outside attack.
• So don't allow the employee to do that!
– Rules about changing passwords
– Training in best security practices
Defence of computer systems
• Hardware controls
– (Not usually protection of the hardware itself, but
rather using separate hardware to protect the
system as a whole.)
– Fingerprint readers
– Smart tokens
– Firewalls
– Intrusion detection systems
Defence of computer systems
• Physical controls
– Protection of the hardware itself, as well as
physical access to the console, storage media, etc.
– Locks
– Guards
– Off-site backups
– Don't put your data centre on a fault line in
California
Defence of computer systems
• Policies and procedures
– Non-technical means can be used to protect against
some classes of attack
– If an employee connects his own Wi-fi access
point to the internal company network, that can
accidentally open the network to outside attack.
• So don't allow the employee to do that!
– Rules about changing passwords
– Training in best security practices
Design Principles
• Design Principles underlie the design and implementation of
mechanisms for supporting security policies
• Applications of simplicity and restrictions in computing.
1. Principles of Least Privilege
– Restricts how privileges are granted
– Definition: The principle of least privilege states that a
subject should be given only those privileges that it needs
in order to complete its task
– Function of the subject (as opposed to its identity) should
control the assignment of rights
Slide #1-54
Design Principles
Principles of Least Privilege( Continued….)
•If a specific action requires that a subjects‘ access
rights be augmented, those extra rights should be
relinquished immediately on completion of action
Slide #1-55
Design Principles
2. Principle of Fail-Safe Defaults
– This principle restricts how privileges are
initialized when a subject or object is created.
– Definition: The principle of fail-safe default
states that unless a subject is given explicit
access to an object , it should be denied access
to that object
Slide #1-62
Reference: Chapter 7 Introduction to
Computer Security Matt Bishop
Design Principles
8. Principle of Psychological Acceptability
• This principle recognizes the human element in computer security
• Definition: The principle of psychological acceptability states
that security mechanism should not make the resources more
difficult to access than if the security mechanisms were not
present.
− Interpreted to mean that the security mechanism may add some
extra burden, but that burden must be both minimal and
reasonable.
− Example: User supplying wrong password should get error
message as “login failed”
–
Slide #1-63
Discussion
Slide #1-68
Reference: Introduction to Computer Security Matt
Bishop Chapter 2
Security Policies
Security Policies: Definitions
Secret
Confidential
Unclassified
Slide #1-72
The Bell-LaPadula Model
• The Bell-LaPadula security model combines mandatory and
discretionary access controls.
• Let L(S) = ls be the security clearance of subject S and let
L(O) = lo be the security classification of object O
• Simple Security Condition: S can read O if and only if lo
<= ls and S has discretionary read access to O
• * Property ( Star Property) : S can write O if and only if
ls <= lo and S has discretionary write access to O
( Read down and Write Up)
Slide #1-73
Integrity Model
Biba Model
Biba policy uses three defining properties to protect objects
from being illegitimately modified:
1.Simple Integrity: s can read o iff i(s) <= i(o)
The property whereby a subject at one integrity level is not
permitted to read an object at a lower level of integrity. No
read down.
2. Star(*) Integrity : S can write to O iff i(o) <= i(s)
The property whereby an object at one integrity level is not
allowed to write to an object at a higher level of integrity . No
write up Slide #1-74
Integrity Model
Biba Model
Biba policy uses three defining properties to protect objects
from being illegitimately modified:
3.Invocation/ Execution : s1 can execute s2 iff
i(s2) <= i(s1)
The property whereby a subject at one integrity level is
prohibited from invoking or calling up a subject at a higher
level of integrity.
Slide #1-75
Clark Wilson Integrity Model
• Built upon principles of change control rather than
integrity levels
• Designed for commercial environment
• Its change control principles
– No changes by unauthorized subjects
– No unauthorized changes by authorized persons
– The maintenance of internal and external consistency
• A well formed transaction is a series of operations that
transition the system from one consistent state to another
consistent state.
Slide #1-76
Clark Wilson Integrity Model
The model
•The Clark-Wilson model defines data subject to its integrity
controls as constrained data items or CDIs.
•Data not subjected to integrity are called Unconstrained data
items.
•For example: The balances of accounts.
•The model also defines two set of procedures:
– Integrity Verification procedures( IVP) and
– Transformation Procedures (TP).
Slide #1-77
Clark Wilson Integrity Model
Integrity Verification Procedures or IVPs test that the CDIs
confirm to the integrity constraints at the time IVPs are run.
Transformation Procedures or TPs, change the state of the
data in the system from one valid state to another. TPs, change
the state of the data in the system from one valid state to another.
Clark Wilson Model captures these requirements in two
certification rules:
Certification Rule 1: When any IVP is run, it must ensure that
all CDIs are in a valid state.
Certification Rule 2: For some associates set of CDIs, a TP
must transform those CDIs in a valid state into another valid
state. Slide #1-78
Classification of Hackers
• Hackers can be classified into several categories based on their
activities, motivations, and skills. Here are some common
classifications:
1. White Hat Hackers: Also known as ethical hackers, these individuals
use their skills to identify vulnerabilities in computer systems and
networks and report them to the system owners. They work to improve
the security of computer systems and protect against cyber threats.
2. Black Hat Hackers: These are malicious hackers who use their skills to
break into computer systems and networks for personal gain or to
cause damage. They may steal sensitive information, disrupt
operations, or launch cyber attacks.
6. Hacktivists: These hackers use their skills to advance a political or social cause. They
may target government agencies, corporations, or other organizations to expose
corruption or promote a particular agenda.