Chapter 1-Introduction
Chapter 1-Introduction
Physical Security
3
Computer Security: when there is connection to networks
(Network security) it deals with provisions and policies adopted to
prevent and monitor unauthorized access, misuse, modification, or
denial of the computer network and network-accessible resources
Physical Security
4
“The most secure computers are those not connected to the
Internet and shielded from any interference”
5
Threats, vulnerabilities, Controls
Vulnerability is a point where a system is susceptible to
attack.
Threat is a possible danger to the system.
It might be a person (cracker or a spy),
a thing (a faulty piece of equipment),
an event (a fire or a flood) that might exploit a vulnerability of
the system.
Countermeasures are techniques for protecting your
system.
6
Vulnerabilities
Physical vulnerabilities
break into your server room, device theft, steal backup
media and printouts,
Locks, guards, Surveillance cams, Burglar alarms
Natural vulnerabilities
vulnerable to natural disasters and to environmental
threats, power loss
Natural disasters:
disasters fire, flood, earthquakes, lightning
environmental threats:
threats Dust, humidity, and uneven
temperature conditions
air conditioning and heating systems……UPS,…..back ups
7
Vulnerabilities…
Hardware and Software vulnerabilities
protection features failure lead to open security
holes
open some "locked" systems by introducing extra
hardware
Software failures: antivirus ,firewall failures
Media vulnerabilities
can be stolen, damaged by dust or electromagnetic
fields.
keep backup tapes and removable disks clean and
dry
8
Vulnerabilities…
Communication vulnerabilities
Wires can be tapped, physicaly damaged, EMI
Fiber optics
Human vulnerabilities
the greatest vulnerability of all
Employees, contractors
Choose employees carefully
9
The Human Factor
The human factor is an important component of computer security
Some organizations view technical solutions as “their solutions”
for computer security. However:
Technology is fallible
Eg. UNIX holes that opened the door for Morris worm
The technology may not be appropriate
Eg. It is difficult to define all the security requirements and
find a solution that satisfies those requirements
Technical solutions are usually (very) expensive
Eg. Antivirus purchased by ETC to protect its Internet
services
Threats
Threats fall into three main categories based on
the source: natural, unintentional, and
intentional.
Natural: fires, floods, power failures, and other
disasters
fire alarms, temperature gauges, and surge protectors
backing up critical data off-site.
Unintentional threats: delete a file, change of
security passwords
Training , security procedures and policies
11
Threats…
• Intentional threats: outsiders and insiders
• Outsiders may penetrate systems in a variety of ways:
• simple break-ins of buildings and computer rooms;
• disguised entry as maintenance personnel;
• anonymous, electronic entry through modems and
network connections;
• and bribery or coercion of inside personnel.
• Although most security mechanisms protect best
against outside intruders, surveys indicates that most
attacks are by insiders.
12
Threats…
• Estimates are that as many as 80 percent of
system penetrations are by fully authorized users
who abuse their access privileges to perform
unauthorized functions.
• "The enemy is already in, we hired them.”
• Insiders are sometimes referred as living Trojan
horses
• There are a number of different types of insiders.
• fired or disgruntled employee might be trying to steal
revenge ; employee might have been blackmailed or
bribed by foreign or corporate enemy agents.
13
Threats…
• greedy employee might use her inside knowledge to
divert corporate or customer funds for personal
benefit.
• insider might be an operator, a systems
programmer, or even a casual user who is willing to
share a password.
• Don't forget, one of the most dangerous insiders
may simply be lazy or untrained.
• He doesn't bother changing passwords,
• doesn't learn how to encrypt email messages and
other files,
• leaves sensitive printouts in piles on desks and
floors, and ignores the paper shredder when
disposing of documents.
14
Security Attacks
• Any action that compromises the security of
information owned by an organization.
• Classification security attacks
• passive attacks and active attacks.
• A passive attack attempts to learn or make use of
information from the system but does not affect
system resources.
• An active attack attempts to alter system resources or
affect their operation.
operation
15
Security attacks
Interception
Interruption
Modification Fabrication
16
Countermeasures
Authentication
Physical security
Password,cards,biometrics
Laws
Encryption
Backups
Auditing
Standards
Administrative procedures
17
Basic Security Objectives (Pillars) - CIA
20
1.1.3 Goals of Security
Given a security policy’s specification of “secure” and “nonsecure”
actions, security mechanisms can prevent (defend) the attack,
detect the attack, or recover from the attack
Prevention/Defence: take measures to prevent the damage; it
means that an attack will fail; e.g., passwords to prevent
unauthorised users or Intrusion Prevention Systems (IPSs)
Detection: if an attack cannot be prevented; when, how and
who of the attack have to be identified; e.g., when a user
enters a password three times; Intrusion Detection Systems
(IDSs)
Recovery/Reaction: take measures to recover from the
damage; e.g., restore deleted files from backup; sometimes
retaliation (attacking the attacker’s system or taking legal
actions to hold the attacker accountable)
The three strategies are usually used together
A fourth approach is deterrence; involves active steps to beat off
21
attacks; discourage them even to try attacking
Example 1: Protecting valuable items at home from a burglar
Prevention: locks on the door, guards, hidden places, etc.
Detection: burglar alarm, guards, Closed Circuit Television
(CCTV), etc.
Recovery: calling the police, replace the stolen item, etc.
Example 2: Protecting a fraudster from using our credit card in
Internet purchase
Prevention: Encrypt when placing order, perform some check
before placing order, or don’t use credit card on the Internet
Detection: A transaction that you had not authorized appears
on your credit card statement
Recovery: Ask for new card, recover cost of the transaction
from insurance, the card issuer or the merchant
22
Software security assurance
• Software security is the idea of software engineering so that it
continues to function correctly under malicious attack.
• Software security is an idea implemented to protect software against
malicious attack and other hacker risks so that the software
continues to function correctly under such potential risks
• Any compromise to integrity, authentication and availability
makes a software unsecure.
• Software systems can be attacked to steal information, monitor
content, introduce vulnerabilities and damage the behaviour of
software.
• Malware can cause DoS (denial of service) or crash the system
itself.
23
Software Security Threats
Software defects with security ramifications including
• implementation bugs such as buffer overflows and
• design flaws such as inconsistent error handling.
Buffer overflow, stack overflow, command injection
and SQL injections are the most common attacks on
the software.
Buffer and stack overflow attacks overwrite the
contents of the heap or stack respectively by writing
extra bytes.
24
Software Security Threats
• Command injection can be achieved on the software code
when system commands are used predominantly.
• New system commands are appended to existing commands
by the malicious attack.
• Sometimes system command may stop services and cause
DoS.
• SQL injections use malicious SQL code to retrieve or modify
important information from database servers.
• SQL injections can be used to bypass login credentials.
• Sometimes SQL injections fetch important information from a
25
Software security assurance
• Malicious intruders can hack into systems by exploiting software
defects
• Software security includes:
• software design principles including the principles of
• least privilege,
• fail-safe stance, and
• defence-in-depth (These also included in Computer Security)
• Internet-enabled software applications present the most common
security risk encountered today, with software’s ever-expanding
complexity and extensibility adding further fuel to the fire.
26