0% found this document useful (0 votes)
20 views76 pages

Chapter 1

Uploaded by

Tibebe Solomon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views76 pages

Chapter 1

Uploaded by

Tibebe Solomon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 76

Chapter-1:

Introduction to Computer and Network

Security

05/07/2024 1
Outline

 What is Security?
 Why Security?
 Security Policy and Mechanism
 Security trend
 Sources and consequences of risks
 Types of Vulnerabilities
 Security criteria
 Security attack types
 Security services, mechanisms and model
05/07/2024 2
Chapter Objectives

 At the end of this chapter, students will be able to understand:


 The definition of security and why we have to study this field
as computer engineering student
 Types of risk in computer and network day to day activity
 Different Security attacks and how to defend you self and the
organization you are responsible for.
 Security criteria
 Security services and mechanisms

05/07/2024 3
What is Security?

 Most of computer science technology is concerned with


achieving desired behavior.
 In some sense, security is concerned with preventing undesired
behavior
 Different way of thinking!
 An enemy/opponent/hacker/adversary may be actively and
maliciously trying to circumvent any protective measures you
put in place

05/07/2024 4
What is Security?...
 Security:

“The most secure

computers are those

not connected

to the Internet and

shielded from any interference”


05/07/2024 5
What is Security?...
 Computer security is about provisions
and policies adopted to protect
information and property from theft,
corruption, or natural disaster while
allowing the information and property to
remain accessible and productive to its
intended users.

 Security of computers against intruders


(e.g.,hackers) and malicious software
05/07/2024 (e.g., viruses). 6
What is Security?...

 Network security on the other hand deals with provisions and

policies adopted to prevent and monitor unauthorized access,

misuse, modification, or denial of the computer network and

network-accessible resources.

 Computer security: focuses on security aspects of systems in

isolation

 Network security: focuses on security of data as it is


05/07/2024 7
Why Security?...

• Good Security Standards follow the “90 / 10” Rule:

• 10% of security safeguards are technical and

• 90% of security safeguards rely on the computer user

(“YOU”) to adhere to good computing practices .

05/07/2024 8
Why Security?...

• Example: The lock on the door is the 10%. You remembering

to lock the lock, checking to see if the door is closed, ensuring

others do not open the door, keeping control of the keys, etc.

is the 90%.

• You need both parts for effective security.

05/07/2024 9
Why Security?...
 What Does This Mean for Me?

 This means that everyone who uses a computer or mobile


device needs to understand how to keep their computer,
devices and data secure.

 Information Security is everyone’s responsibility and that is


why we study computer and network security.

05/07/2024 10
An Overview of Computer
Security

11
Basic components
• Confidentiality
• Integrity
• Availability

12
Confidentiality
• Confidentiality is the concealment of information or resources.
• The need for keeping information secret arises from the use of computers in
sensitive fields such as government and industry.
• For example, military and civilian institutions in the government often restrict
access to information to those who need that information.
• The first formal work in computer security was motivated by the military's
attempt to implement controls to enforce a "need to know" principle.
• This principle also applies to industrial firms, which keep their proprietary designs
secure lest their competitors try to steal the designs.
• As a further example, all types of institutions keep personnel records secret.

13
Confidentiality - Example
• Ex: Enciphering an income tax return will prevent anyone from reading it.
• If the owner needs to see the return, it must be deciphered.
• Only the possessor of the cryptographic key can enter it into a deciphering program.
• However, if someone else can read the key when it is entered into the program, the
confidentiality of the tax return has been compromised.

• All the mechanisms that enforce confidentiality require supporting services from the system.
• The assumption is that the security services can rely on the kernel, and other agents, to supply
correct data.
• Thus, assumptions and trust underlie confidentiality mechanisms.

14
Integrity
• Trustworthiness of data or resources
• Prevention vs. detection
• Blocking unauthorized attempts to change data, or attempts to
change data in unauthorized ways
• The second is much harder…
• Correctness vs. trustworthiness of data

15
Integrity
• Integrity refers to the trustworthiness of data or resources, and it is usually phrased in terms of
preventing improper or unauthorized change.
• Integrity includes data integrity (the content of the information) and origin integrity (the source of
the data, often called authentication).
• The source of the information may bear on its accuracy and credibility and on the trust that
people place in the information.

16
• Prevention mechanisms seek to maintain the integrity of the data by blocking any unauthorized attempts to change
the data or any attempts to change the data in unauthorized ways.
• For example, suppose an accounting system is on a computer.
• Someone breaks into the system and tries to modify the accounting data.
• Then an unauthorized user has tried to violate the integrity of the accounting database. (example the event 40/60
housing lottery program in Addis Ababa)
• Detection mechanisms do not try to prevent violations of integrity; they simply report that the data's integrity is no
longer trustworthy.
• Detection mechanisms may analyze system events (user or system actions) to detect problems or (more commonly)
may analyze the data itself to see if required or expected constraints still hold.
• The mechanisms may report the actual cause of the integrity violation (a specific part of a file was altered), or they
may simply report that the file is now corrupt.

17
Availability
• Denial of service attacks
• Denying access can lead to more serious attacks
• I.e., if credit card verification is down

18
Availability
• Availability refers to the ability to use the information or resource desired.
• Availability is an important aspect of reliability as well as of system design because an unavailable
system is at least as bad as no system at all.
• The aspect of availability that is relevant to security is that someone may deliberately arrange to
deny access to data or to a service by making it unavailable.
• System designs usually assume a statistical model to analyze expected patterns of use, and
mechanisms ensure availability when that statistical model holds.
• Someone may be able to manipulate use (or parameters that control use, such as network traffic)
so that the assumptions of the statistical model are no longer valid.
• This means that the mechanisms for keeping the resource or data available are working in an
environment for which they were not designed. As a result, they will often fail.

19
Threats
• A threat is a potential violation of security.
• The violation need not actually occur for there to be a threat. The fact that the
violation might occur means that those actions that could cause it to occur must
be guarded against (or prepared for).
• Those actions are called attacks. Those who execute such actions, or cause them
to be executed, are called attackers.
• The three security services—confidentiality, integrity, and availability—counter
threats to the security of a system.
• Common attacks can be categorized as:
• Snooping, eavesdropping
• Modification, alteration
• Masquerading, spoofing
• False repudiation/denial of receipt
• Network delay, denial of service
20
Threats …
• Snooping: the unauthorized interception of information, is a form of disclosure.
• It is passive, suggesting simply that some entity is listening to (or reading) communications or
browsing through files or system information.
• Wiretapping, or passive wiretapping, is a form of snooping in which a network is monitored.
Confidentiality services counter this threat.
• Modification or alteration: an unauthorized change of information, covers three classes of threats.
• The goal may be deception, in which some entity relies on the modified data to determine which
action to take, or in which incorrect information is accepted as correct and is released.
• If the modified data controls the operation of the system, the threats of disruption arise.
• Masquerading or spoofing: an impersonation of one entity by another, is a form of both deception and
usurpation.
• It lures a victim into believing that the entity with which it is communicating is a different entity.
• For example, if a user tries to log into a computer across the Internet but instead reaches another
computer that claims to be the desired one, the user has been spoofed.

21
Security Policy and Mechanism

• A security policy is a statement of what is, and what is not,

allowed.

• A security mechanism is a method, tool, or procedure for enforcing

a security policy.

• One is meaningless without the other…

• Problems when combining security policies of multiple

organizations
05/07/2024 22
Security Trends

 In 1994, the Internet Architecture Board (IAB) issued a report

entitled "Security in the Internet Architecture" (Request for

Comments/RFC 1636).

 The report stated the general consensus that the Internet needs

more and better security, and it identified key areas for

security mechanisms.

05/07/2024 23
Security Trends…

 Among these were:

 the need to secure the network infrastructure from

unauthorized monitoring and control of network traffic

and

 the need to secure end-user-to-end-user traffic using

authentication and encryption mechanisms.

05/07/2024 24
Security Trends…
 Internet-related vulnerabilities over a 10-year period.

These include:
• Security weaknesses in the OS of
attached computers (e.g., Windows,
Linux) as well as
• Vulnerabilities in Internet routers
and
other network devices.

05/07/2024 25
Who are the attackers?

 In computer and computer networks, an attacker is the

individual or organization who performs the malicious

activities to destroy, expose, alter, disable, steal or gain

unauthorized access to or make unauthorized use of an asset.

 Attackers use every tools and techniques they would try and

attack us to get unauthorized access.

05/07/2024 26
Who are the attackers?...

 Basically, there are four main types of attackers:

05/07/2024 27
Who are the attackers?...

1. Cyber Criminals

 Cybercriminals are individual or group of people who use

technology to commit cybercrime with the intention of

stealing sensitive company information or personal data and

generating profits.

 In today's, they are the most prominent and most active type

of attacker.
05/07/2024 28
Who are the attackers?...

2. Hacktivists

 Hacktivists are individuals or groups of hackers who carry out

malicious activity to promote a political agenda, religious

belief, or social ideology.

 They are not like cybercriminals who hack computer

networks to steal data for the cash.

 They see themselves as fighting injustice.


05/07/2024 29
Who are the attackers?...

3. State-sponsored Attacker

 These attackers have particular objectives aligned with either

the political, commercial or military interests of their country

of origin.

 The government organizations have highly skilled hackers

and specialize in detecting vulnerabilities and exploiting these

before the holes are patched. It is very difficult to defeat these


05/07/2024 30
Who are the attackers?...

4. Insider Threats

 The insider threat is a threat to an organization's security or

data that comes from within.

 These type of threats are usually occurred from employees or

former employees, but may also arise from third parties,

including contractors, temporary workers, employees or

customers.
05/07/2024 31
Who are the attackers?...

4. Insider Threats

 Insider threats can be categorized in to three:

05/07/2024 32
Who are the attackers?...

4.1. Malicious

 Malicious threats are attempts by an insider to access and

potentially harm an organization's data, systems or IT

infrastructure.

 These insider threats are often attributed to dissatisfied

employees or ex-employees who believe that the organization

was doing something wrong with them in some way, and they
05/07/2024 33
Who are the attackers?...

4.2. Accidental

 Accidental threats are threats which are accidently done by

insider employees.

 In this type of threats, an employee might accidentally delete

an important file or inadvertently share confidential data with

a business partner going beyond company’s policy or legal

requirements.
05/07/2024 34
Who are the attackers?...

4.3. Negligent

 These are the threats in which employees try to avoid the

policies of an organization put in place to protect endpoints

and valuable data.

 For example, if the organization have strict policies for

external file sharing, employees might try to share work on

public cloud applications so that they can work at home.


05/07/2024 35
Who are the attackers?...

 Note: In addition to the above mentioned attackers, it should

be noted that Natural disasters: flooding, fire, storms,

earthquake… can be an attacker.

05/07/2024 36
What are the vulnerabilities?

 Physical vulnerabilities (Eg. Computer can be stolen)

 Natural vulnerabilities (Eg. Earthquake)

 Hardware and Software vulnerabilities (Eg. Failures)

 Media vulnerabilities (Eg. Hard disks can be stolen)

 Communication vulnerabilities (Ex. Wires can be tapped)

 Human vulnerabilities (Eg. Insiders)

05/07/2024 37
What are the vulnerabilities?...
 Poorly chosen passwords

 Software bugs (non reliability of software)

 Automatically running active content: active-x, scripts, Java


programs (applet)

 Open ports

 Incorrect configuration

 File permissions

 Administrative privileges
05/07/2024 38
What are the vulnerabilities?...
 Untrained users/system administrators

 Trap doors (intentional security holes)

 Unencrypted communication

 Limited Resources (i.e. TCP connections)

05/07/2024 39
What are the consequences?
 Failure/End of service

 Reduction of Quality of Service (QoS), down to Denial of


Service (DoS).

 Internal problems in the enterprise

 Trust decrease from partners (client, providers, share-holders)

 Technology leakage

 Human consequences (personal data, sensitive data - medical,


insurances, …)

05/07/2024 40
Security Criteria

 Security Evaluation Criteria are usually presented as a set of

parameter thresholds that must be met for a system to be

evaluated and deemed acceptable.

 These criteria are established based on a Threat Assessment to

establish the extent of the data sensitivity, the security policy,

and the system characteristics.

05/07/2024 41
Security Criteria

 Security is expressed in terms of:

 Availability

 Integrity

 Confidentiality

 Authentication

 Note: Authentication is a foundations of security. In its


absence, all security properties can be violated
05/07/2024 42
Security Criteria…

1. Availability

 It requires that computer and network assets are only available

to authorized parties.

 Computer and network should provide all the designated

services in the presence of all kinds of security attack.

05/07/2024 43
Security Criteria…

2. Integrity

 It requires that messages should be modified or altered only

by authorized parties.

 Modification includes writing, changing, deleting, and

creating the message that is supposed to be transmitted across

the network.

 Integrity guarantees that no modification, addition, or deletion


05/07/2024 44
Security Criteria…

3. Confidentiality

 It requires that the message can only be accessible for reading

by authorized parties.

 It also requires that the system should verify the identity of a

user.

05/07/2024 45
Security Criteria…

4. Authentication

 It means that correct identity is known to communicating

parties.

 This property ensures that the parties are genuine not

impersonator.

05/07/2024 46
Security Attack Types

 Categories of Attacks

 Interruption: An attack on Availability

 Modification: An attack on Integrity

 Interception: An attack on Confidentiality

 Fabrication: An attack on Authenticity

05/07/2024 47
Security Attack Types…

 Attacks…
Source

Normal flow of information Destination

Attack

Interruption Interception

Modification Fabrication

05/07/2024 48
Security Attack Types…

 The attacks can also be classified by the following criteria.

 Passive or active,

 Internal or external,

 At different TCP/IP protocol Layers

05/07/2024 49
Security Attack Types…
1. Passive vs. Active attacks

 A passive attack is a network attack in which a system is


monitored and sometimes scanned for open ports and
vulnerabilities.

 The purpose of a passive attack is to gain information about


the system being targeted; it does not involve any direct action
on the target.

 These kind of attacks attempt to learn or make use of the


information without changing the content of the message and
05/07/2024 50
Security Attack Types…
1. Passive vs. Active attacks

 Passive attacks include active reconnaissance and passive


reconnaissance.

 In a computer security context, reconnaissance is the act of


exploring a system or network in order to gather information
before conducting a full attack.

 Example: traffic analysis and monitoring, Eavesdropping

05/07/2024 51
Security Attack Types…

1. Passive vs. active attacks…

 Passive attacks do not affect system resources and they are

very difficult to detect because:

 Message transmission apparently normal

 No alteration of the data

 Emphasis on prevention rather than detection

 By means of encryption
05/07/2024 52
Security Attack Types…

1. Passive vs. active attacks…

 Active attack attempts to interrupt, modify, delete, or fabricate

messages or information thereby disrupting normal operation

of the network.

 Some examples of active attacks include: Jamming,

impersonating, modification, denial of service (DoS).

 Difficult to prevent. The goal53 is to detect and recover


05/07/2024
Security Attack Types…
2. Internal vs. External attacks

 External attacks are carried out by hosts that don’t belong to


the network domain, sometimes they are called outsider.

 E.g. It can causes congestion by sending false routing


information thereby causes unavailability of services.

 In case of internal attack, the malicious node from the


network gains unauthorized access and acts as a genuine node
and disrupts the normal operation of nodes. They are also
known as insider.
05/07/2024 54
Security Attack Types…
3. At different TCP/IP protocol Layers

05/07/2024 55
Common security attacks and their
countermeasures
 Finding a way into the network
 Firewalls

 Exploiting software bugs, buffer overflows


 Intrusion Detection Systems

 Denial of Service
 Access filtering, IDS

 TCP hijacking
 IPSec

05/07/2024 56
Common security attacks and their countermeasures…

 Packet sniffing
 Encryption (SSL, HTTPS)

 Social problems
 Education

05/07/2024 57
Security Services
 X.800:

 “a service provided by a protocol layer of communicating


open systems, which ensures adequate security of the systems
or of data transfers”

 RFC 2828:

 “a processing or communication service provided by a system


to give a specific kind of protection to system resources”

05/07/2024 58
Security Services (X.800)…
 Authentication - assures that communicating entity is the one
claimed.

 Access Control - prevention of the unauthorized use of a resource.

 Data Confidentiality –protection of data from unauthorized


disclosure.

 Data Integrity - assurance that data received is as sent by an


authorized entity.

 Non-Repudiation - protection against denial by one of the parties in


a communication.


05/07/2024 59
Security Mechanism

 Security mechanisms are features designed to detect, prevent,

or recover from a security attack.

 No single mechanism that will support all services required.

 However one particular element underlies many of the

security mechanisms in use.

 Hence Cryptographic techniques will be our focus on this

course
05/07/2024 60
Security Mechanism (X.800)
 Specific security mechanisms:

 Ciphering/deciphering, digital signatures, data integrity,


authentication exchange, routing control, …

 Firewall, proxy server

 Access control, Intrusion detection system

05/07/2024 61
Security Model

 A Network Security Model exhibits how the security service

has been designed over the network to prevent the opponent

from causing a threat to the confidentiality or authenticity of

the information that is being transmitted through the network.

 Any security service would have the three components

discussed below:

05/07/2024 62
Security Model

 1. Transformation of the information which has to be sent to

the receiver. So, that any opponent present at the information

channel is unable to read the message.

 This indicates the encryption of the message.

 It also includes the addition of code during the transformation

of the information which will be used in verifying the identity

of the authentic receiver.


05/07/2024 63
Security Model

 2. Sharing of the secret information between sender and

receiver of which the opponent must not any clue.

 Yes, we are talking of the encryption key which is used during

the encryption of the message at the sender’s end and also

during the decryption of message at receiver’s end.

05/07/2024 64
Security Model
 3. There must be a trusted third party which will distribute the
secret information to both sender and receiver.

 While designing the network security model, designer must


also concentrate on developing the methods to distribute the
key to the sender and receiver.

 An appropriate methodology must be used to deliver the


secret information to the communicating parties without the
interference of the opponent.

05/07/2024 65
Security Model
 Model for Network Security

05/07/2024 66
Security Model…Eight Security Dimensions
1. Access Control Security Dimension

 The Access Control Security Dimension ensures that only


authorized personnel or devices are allowed access to network
elements, stored information, information flows, services and
applications.

 In addition, Role-BasedAccess Control (RBAC) provides different


access levels to guarantee that individuals and devices can only gain
access to and perform operations on network elements, stored
information, and information flows that they are authorized for.

 Examples: password, firewall


05/07/2024 67
Security Model…Eight Security Dimensions
2. Authentication Security Dimension

 The Authentication Security Dimension serves to confirm the


identities of communicating entities.

 Authentication ensures the validity of the claimed identities of the


entities participating in communication (e.g. person, device, service
or application) and provides assurance that an entity is not
attempting a masquerade or unauthorized replay of a previous
communication.

 Examples: shared secret key, digital signature, digital certificate


 Digital signatures create a virtual fingerprint that is unique to a person or
05/07/2024 68
Security Model…Eight Security Dimensions
3. Non-repudiation Security Dimension

 The Non-repudiation Security Dimension provides Assurance that


the sender of information is provided with proof of delivery and the
recipient is provided with proof of the sender's identity, so neither
can later deny having processed the information.

 It ensures the availability of evidence that can be presented to a


third party and used to prove that some kind of event or action has
taken place.

 Example: Digital Signature

05/07/2024 69
Security Model…Eight Security Dimensions
4. Data Confidentiality Security Dimension

 The Data Confidentiality Security Dimension protects data from


unauthorized disclosure.

 Data Confidentiality ensures that the data content cannot be


understood by unauthorized entities.

 Example: Encryption, access control lists, and file permissions are


methods often used to provide data confidentiality.

05/07/2024 70
Security Model…Eight Security Dimensions
5. Communication Security Dimension

 The Communication Security Dimension ensures that information


flows only between the authorized end points (the information is not
diverted or intercepted as it flows between these end points).

 It ensures that information flows from source to destination.

 Ex: Virtual Private Network(VPN), Multiprotocol Label


Switching(MPLS)
 VPN describes the opportunity to establish a protected network
connection when using public networks.
 MPLS, is a networking technology that routes traffic using the shortest
05/07/2024 71
Security Model…Eight Security Dimensions
6. Data Integrity Security Dimension

 The Data Integrity Security Dimension ensures the correctness or


accuracy of data.

 The data is protected against unauthorized modification, deletion,


creation, and replication and provides an indication of these
unauthorized activities.

 Examples: MD5, digital signature, anti-virus software


 MD5(Message Digest Algorithm) is a cryptographic protocol used for
authenticating messages as well as content verification

05/07/2024 72
Security Model…Eight Security Dimensions
7. Availability Security Dimension

 The Availability Security Dimension ensures that there is no denial


of authorized access to network elements, stored information,
information flows, services and applications due to events
impacting the network.

 Disaster recovery solutions are included in this category.

 Examples IDS/IPS, network redundancy.

 Network redundancy is process of providing multiple paths for


traffic, so that data can keep flowing even in the event of a

05/07/2024
failure. 73
Security Model…Eight Security Dimensions
8. Privacy Security Dimension

 The Privacy Security Dimension provides for the protection of


information that might be derived from the observation of network
activities.

 It Ensures that identification and network use is kept private

 Examples of this information include web-sites that a user has


visited, a user's geographic location, and the IP addresses and DNS
names of devices in a Service Provider network.

 Examples: Network Address Translator (NAT), encryption


 NAT It's a way to map multiple local private addresses to a public one before
05/07/2024 transferring the information so that
74 the private addresses will not be made
Security Model…Eight Security Dimensions
 Quiz: A hacked computer can be used to… (select all that
apply)
a) Record keystrokes and steal passwords.
b) Send spam and phishing emails.
c) Harvest and sell email addresses and passwords.
d) Access restricted or personal information on your
computer or other systems that you have access to.
e) Infect other systems.
f) Hide programs that launch attacks on other computers.
05/07/2024 75
Thank You

05/07/2024 76

You might also like