Esu Sec Week 1 and 2
Esu Sec Week 1 and 2
Esu Sec Week 1 and 2
• Authentication
– The process of positively identifying a subject is called authentication
– The authentication process usually occurs when a subject self-identifies and
then responds to a systematic challenge of the identity.
– This challenge is based on what you know, what you have or who you are.
Recommended access control management systems: multi factor
authentication
• Authorization : is the process of giving someone permission to do or have
something or is the process of giving someone the ability to access a resource
CNSS Security Model
• The model, created by John McCumber in 1991, provides a model
called McCumber Cube.
• The McCumber Cube in Figure 1-2, shows three dimensions. The
three dimensions of each axis become a 3 x 3 x 3 cube with 27 cells
representing areas.
• To secure today’s systems, each of the 27 areas must be properly
addressed during the security process.
• For example, the intersection between technology, integrity, and
storage requires a control or safeguard that addresses the need to use
technology to protect the integrity of information while in storage.
• One such control might be a system for detecting host intrusion that
protects the integrity of information by alerting the security
administrators to the potential modification of a critical file.
Cont…
These attacks are relatively easier to detect. These attacks are harder to detect.
•Vulnerability:
•Threat:
•Attack:
•risk
•Countermeasures
•The likelihood of a virus showing up in the environment and causing
damage is the risk.
SECURITY LIFE-CYCLE
History of computer and Information Security
• Until 1960s computer security was limited to physical
protection of computers
• In the 1960s
– Evolutions
• Computers became interactive
• Multiuser/Multiprogramming was invented
• More and more data started to be stored in computer
databases
– Organizations and individuals started to worry about
• What the other persons using computers are doing to their data
• What is happening to their private data stored in large
databases
History cont’d
• In the 1980s and 1990s
– Evolutions
• Personal computers were popularized
• LANs and Internet invaded the world
• Applications such as E-commerce, E-government and E-
health started to develop
• Viruses become major threats
– Organizations/individuals started to worry about
• Who has access to their computers and data
• Whether they can trust a mail, a website, etc.
• Whether their privacy is protected in the connected world
History cont’d
• Famous security problems
– Morris worm – Internet Worm
• November 2, 1988 a worm attacked more than 60,000 computers
around the USA
• The worm attacks computers, and when it has installed itself, it
multiplies itself, freezing the computer
• It exploited UNIX security holes in Send mail and Finger Programs
• A nation wide effort enabled to solve the problem within 12 hours
– Robert Morris (the father of Computer viruses) became the first person
to be charged for the Computer Fraud and Abuse Act of 1986
• He was sentenced to three years of probation, 400 hours of
community service and a fine of some $10,000
– He is currently an associate professor at the Massachusetts Institute of
Technology (MIT)
History cont’d…
• Famous security problems…
– NASA shutdown
• In1990, an Australian computer science student was
charged for shutting down NASA’s computer system for 24
hours
– Airline computers
• In 1998, a major travel agency discovered that some one
penetrated its ticketing system and has printed airline
tickets illegally
– Bank theft
• In 1984, a bank manager was able to steal $25million
through un-audited computer transactions
History cont’d…
• Famous security problems…
– In Ethiopia
• Employees of a company managed to change their salaries by
fraudulently modifying the company’s database
• In 1990s Internet password theft
– Hundreds of dial-up passwords were stolen and sold to other users
– Many of the owners lost tens of thousands of Birr each
• A major company suspended the use of a remote login software
by technicians who were looking at the computer of the General
Manager
– In Africa: Cote d’Ivoire
• An employee who has been fired by his company deleted all the
data in his company’s computer
Recent Security breaches…..
• User Account Credential of world wide UN officials was hacked
by a hacking group (though UN denounces the accounts are no
longer active)
• The Sony Play Station Network outage:
– The outage occurred in 2011 on Sony's Play Station Network in which
personal details from approximately 77 million accounts were stolen
and prevented users of “Play Station3” and “Play Station Portable
consoles” from playing online through the service. The outage lasted for
approximately 23 days
• Stuxnet Hits Iran
– News broke out (in 2011) that five Iranians suspected in enriching
weapons grade uranium were hit by the Stuxnet worm over a 10- month
period—one reported incident caused damage to a main centrifuge.
Security /Privacy :legal Issues
• Early Efforts
– 1960s:Markedasthebeginningoftruecomputersecuritysyste
mdevelopment
– 1970s:Tiger teams
• Government and industry sponsored crackers who attempted
to break down defenses of computer systems in order to
uncover vulnerabilities so that patches can be developed
– 1970s: Research and modeling
• Identifying security requirements
• Formulating security policy models
• Defining recommended guidelines and controls
• Development of secure systems
Legal Issues Cont’d…
• In the US, legislation was enacted with regards to
computer security and privacy starting from late 1960s
• European Council adopted a convention on Cyber-crime
in 2001
• The World Summit for Information Society considered
computer security and privacy as a subject of discussion
in 2003 and 2005
• The Ethiopian Penal Code of 2005 has articles on data
and computer related crimes ( what does it say? ---
please read!)
Security/Privacy Vulnerabilities
• Physical vulnerabilities (Eg. Buildings)
• Natural vulnerabilities (Eg. Earthquake)
• Hardware and Software vulnerabilities (Eg.
Failures, overflows)
• Media vulnerabilities (Eg. Disks can be stolen)
• Communication vulnerabilities (Eg. Wires can
be tapped)
• Human vulnerabilities (Eg. Insiders)