0% found this document useful (0 votes)
70 views

Chapter 1-Introduction

This document provides an introduction to computer security. It defines key concepts like security, threats, vulnerabilities, and attacks. The three main goals or pillars of security are then discussed: confidentiality, integrity, and availability. Various security attacks and countermeasures are also outlined. The importance of security policies and mechanisms to enforce those policies is noted. Overall, the document lays out foundational concepts around what computer security entails and aims to achieve.

Uploaded by

shifara Tesfaye
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Chapter 1-Introduction

This document provides an introduction to computer security. It defines key concepts like security, threats, vulnerabilities, and attacks. The three main goals or pillars of security are then discussed: confidentiality, integrity, and availability. Various security attacks and countermeasures are also outlined. The importance of security policies and mechanisms to enforce those policies is noted. Overall, the document lays out foundational concepts around what computer security entails and aims to achieve.

Uploaded by

shifara Tesfaye
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 26

Chapter One

Introduction to Computer Security


What is Security?
 Security : “the quality or state of being free from danger” Or
“ measures taken to guard against espionage, sabotage, crime,
attack, or escape.”
Security is about
• Threat: is any potential occurrence, malicious or
otherwise, that could harm an asset. In other words, a
threat is any bad thing that can happen to your assets.
• Vulnerability: is a weakness that makes a threat
possible. This may be because of poor design,
configuration mistakes, or inappropriate and insecure
coding techniques
• Attacks: is an action that exploits a vulnerability or
enacts a threat. Examples of attacks include sending
malicious input to an application or flooding a network
2
in an attempt to deny service.
Computer Security
 Computer security is about provisions and policies adopted to
protect information and property from unauthorized access,
use, alteration, degradation, destruction, theft, corruption,
natural disaster, etc. while allowing the information and
property to remain accessible and productive to its intended use
 Privacy: The right of the individual to be protected against
intrusion into his personal life or affairs, or those of his family

Physical Security

3
 Computer Security: when there is connection to networks
(Network security) it deals with provisions and policies adopted to
prevent and monitor unauthorized access, misuse, modification, or
denial of the computer network and network-accessible resources

Physical Security

4
 “The most secure computers are those not connected to the
Internet and shielded from any interference”

5
Threats, vulnerabilities, Controls
 Vulnerability is a point where a system is susceptible to
attack.
 Threat is a possible danger to the system.
It might be a person (cracker or a spy),
a thing (a faulty piece of equipment),
an event (a fire or a flood) that might exploit a vulnerability of
the system.
Countermeasures are techniques for protecting your
system.

6
Vulnerabilities
 Physical vulnerabilities
 break into your server room, device theft, steal backup
media and printouts,
 Locks, guards, Surveillance cams, Burglar alarms
 Natural vulnerabilities
 vulnerable to natural disasters and to environmental
threats, power loss
 Natural disasters:
disasters fire, flood, earthquakes, lightning
 environmental threats:
threats Dust, humidity, and uneven
temperature conditions
 air conditioning and heating systems……UPS,…..back ups

7
Vulnerabilities…
Hardware and Software vulnerabilities
 protection features failure lead to open security
holes
 open some "locked" systems by introducing extra
hardware
 Software failures: antivirus ,firewall failures

Media vulnerabilities
 can be stolen, damaged by dust or electromagnetic
fields.
 keep backup tapes and removable disks clean and
dry

8
Vulnerabilities…
Communication vulnerabilities
 Wires can be tapped, physicaly damaged, EMI
 Fiber optics

Human vulnerabilities
 the greatest vulnerability of all
 Employees, contractors
 Choose employees carefully

9
The Human Factor
 The human factor is an important component of computer security
 Some organizations view technical solutions as “their solutions”
for computer security. However:
 Technology is fallible
 Eg. UNIX holes that opened the door for Morris worm
 The technology may not be appropriate
 Eg. It is difficult to define all the security requirements and
find a solution that satisfies those requirements
 Technical solutions are usually (very) expensive
 Eg. Antivirus purchased by ETC to protect its Internet
services
Threats
Threats fall into three main categories based on
the source: natural, unintentional, and
intentional.
Natural: fires, floods, power failures, and other
disasters
fire alarms, temperature gauges, and surge protectors
backing up critical data off-site.
Unintentional threats: delete a file, change of
security passwords
Training , security procedures and policies

11
Threats…
• Intentional threats: outsiders and insiders
• Outsiders may penetrate systems in a variety of ways:
• simple break-ins of buildings and computer rooms;
• disguised entry as maintenance personnel;
• anonymous, electronic entry through modems and
network connections;
• and bribery or coercion of inside personnel.
• Although most security mechanisms protect best
against outside intruders, surveys indicates that most
attacks are by insiders.

12
Threats…
• Estimates are that as many as 80 percent of
system penetrations are by fully authorized users
who abuse their access privileges to perform
unauthorized functions.
• "The enemy is already in, we hired them.”
• Insiders are sometimes referred as living Trojan
horses
• There are a number of different types of insiders.
• fired or disgruntled employee might be trying to steal
revenge ; employee might have been blackmailed or
bribed by foreign or corporate enemy agents.

13
Threats…
• greedy employee might use her inside knowledge to
divert corporate or customer funds for personal
benefit.
• insider might be an operator, a systems
programmer, or even a casual user who is willing to
share a password.
• Don't forget, one of the most dangerous insiders
may simply be lazy or untrained.
• He doesn't bother changing passwords,
• doesn't learn how to encrypt email messages and
other files,
• leaves sensitive printouts in piles on desks and
floors, and ignores the paper shredder when
disposing of documents.
14
Security Attacks
• Any action that compromises the security of
information owned by an organization.
• Classification security attacks
• passive attacks and active attacks.
• A passive attack attempts to learn or make use of
information from the system but does not affect
system resources.
• An active attack attempts to alter system resources or
affect their operation.
operation

15
Security attacks

Normal flow of information

Interception
Interruption

Modification Fabrication

16
Countermeasures
Authentication
 Physical security
 Password,cards,biometrics
 Laws
 Encryption
 Backups
 Auditing
 Standards
 Administrative procedures

17
Basic Security Objectives (Pillars) - CIA

 Confidentiality: This term covers two Confidentiality


related concepts:
 Data confidentiality: Assures that
private or confidential information
or resources (resource and
configuration hiding) are not made Integrity Availability
available or disclosed to
unauthorized individuals
 Is compromised by reading and copying
 In network communication, it means only sender and
intended receiver should “understand” message contents
 Privacy: Assures that individuals control or influence what
information related to them may be collected and stored and
by whom and to whom that information may be disclosed
18
 Integrity: This term covers two related concepts
 Data integrity: Assures that information and programs are
changed only in a specified and authorized manner
 In network communication, sender and receiver want to
ensure that the message is not altered (in transit or
afterwards) without detection
 System integrity: Assures that a system performs its intended
function in an unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of the system
 Is compromised by deleting, corrupting, and tampering with
 Availability: Assures that systems work promptly and service is
not denied to authorized users
 Authenticity: Some say it is a missing component of objectives in
CIA. It is the property of being genuine and being able to be
verified and trusted; confidence in the validity of a transmission, a
message, or message originator; or sender and receiver want to
confirm the identity of each other 19
1.1.2 Policy and Mechanism

 A security policy is a statement of what is, and what is not,


allowed by users of a system
 A security mechanism is a method, tool, or procedure for
enforcing a security policy
 More on this in Chapter 5 - Security Mechanisms and
Techniques

20
1.1.3 Goals of Security
 Given a security policy’s specification of “secure” and “nonsecure”
actions, security mechanisms can prevent (defend) the attack,
detect the attack, or recover from the attack
 Prevention/Defence: take measures to prevent the damage; it
means that an attack will fail; e.g., passwords to prevent
unauthorised users or Intrusion Prevention Systems (IPSs)
 Detection: if an attack cannot be prevented; when, how and
who of the attack have to be identified; e.g., when a user
enters a password three times; Intrusion Detection Systems
(IDSs)
 Recovery/Reaction: take measures to recover from the
damage; e.g., restore deleted files from backup; sometimes
retaliation (attacking the attacker’s system or taking legal
actions to hold the attacker accountable)
 The three strategies are usually used together
 A fourth approach is deterrence; involves active steps to beat off
21
attacks; discourage them even to try attacking
 Example 1: Protecting valuable items at home from a burglar
 Prevention: locks on the door, guards, hidden places, etc.
 Detection: burglar alarm, guards, Closed Circuit Television
(CCTV), etc.
 Recovery: calling the police, replace the stolen item, etc.
 Example 2: Protecting a fraudster from using our credit card in
Internet purchase
 Prevention: Encrypt when placing order, perform some check
before placing order, or don’t use credit card on the Internet
 Detection: A transaction that you had not authorized appears
on your credit card statement
 Recovery: Ask for new card, recover cost of the transaction
from insurance, the card issuer or the merchant

22
Software security assurance
• Software security is the idea of software engineering so that it
continues to function correctly under malicious attack.
• Software security is an idea implemented to protect software against
malicious attack and other hacker risks so that the software
continues to function correctly under such potential risks
• Any compromise to integrity, authentication and availability
makes a software unsecure.
• Software systems can be attacked to steal information, monitor
content, introduce vulnerabilities and damage the behaviour of
software.
• Malware can cause DoS (denial of service) or crash the system
itself.
23
Software Security Threats
 Software defects with security ramifications including
• implementation bugs such as buffer overflows and
• design flaws such as inconsistent error handling.
 Buffer overflow, stack overflow, command injection
and SQL injections are the most common attacks on
the software.
 Buffer and stack overflow attacks overwrite the
contents of the heap or stack respectively by writing
extra bytes.
24
Software Security Threats
• Command injection can be achieved on the software code
when system commands are used predominantly.
• New system commands are appended to existing commands
by the malicious attack.
• Sometimes system command may stop services and cause
DoS.
• SQL injections use malicious SQL code to retrieve or modify
important information from database servers.
• SQL injections can be used to bypass login credentials.
• Sometimes SQL injections fetch important information from a
25
Software security assurance
• Malicious intruders can hack into systems by exploiting software
defects
• Software security includes:
• software design principles including the principles of
• least privilege,
• fail-safe stance, and
• defence-in-depth (These also included in Computer Security)
• Internet-enabled software applications present the most common
security risk encountered today, with software’s ever-expanding
complexity and extensibility adding further fuel to the fire.

26

You might also like