Chapter 1
Chapter 1
Security
05/07/2024 1
Outline
What is Security?
Why Security?
Security Policy and Mechanism
Security trend
Sources and consequences of risks
Types of Vulnerabilities
Security criteria
Security attack types
Security services, mechanisms and model
05/07/2024 2
Chapter Objectives
05/07/2024 3
What is Security?
05/07/2024 4
What is Security?...
Security:
not connected
network-accessible resources.
isolation
05/07/2024 8
Why Security?...
others do not open the door, keeping control of the keys, etc.
is the 90%.
05/07/2024 9
Why Security?...
What Does This Mean for Me?
05/07/2024 10
An Overview of Computer
Security
11
Basic components
• Confidentiality
• Integrity
• Availability
12
Confidentiality
• Confidentiality is the concealment of information or resources.
• The need for keeping information secret arises from the use of computers in
sensitive fields such as government and industry.
• For example, military and civilian institutions in the government often restrict
access to information to those who need that information.
• The first formal work in computer security was motivated by the military's
attempt to implement controls to enforce a "need to know" principle.
• This principle also applies to industrial firms, which keep their proprietary designs
secure lest their competitors try to steal the designs.
• As a further example, all types of institutions keep personnel records secret.
13
Confidentiality - Example
• Ex: Enciphering an income tax return will prevent anyone from reading it.
• If the owner needs to see the return, it must be deciphered.
• Only the possessor of the cryptographic key can enter it into a deciphering program.
• However, if someone else can read the key when it is entered into the program, the
confidentiality of the tax return has been compromised.
• All the mechanisms that enforce confidentiality require supporting services from the system.
• The assumption is that the security services can rely on the kernel, and other agents, to supply
correct data.
• Thus, assumptions and trust underlie confidentiality mechanisms.
14
Integrity
• Trustworthiness of data or resources
• Prevention vs. detection
• Blocking unauthorized attempts to change data, or attempts to
change data in unauthorized ways
• The second is much harder…
• Correctness vs. trustworthiness of data
15
Integrity
• Integrity refers to the trustworthiness of data or resources, and it is usually phrased in terms of
preventing improper or unauthorized change.
• Integrity includes data integrity (the content of the information) and origin integrity (the source of
the data, often called authentication).
• The source of the information may bear on its accuracy and credibility and on the trust that
people place in the information.
16
• Prevention mechanisms seek to maintain the integrity of the data by blocking any unauthorized attempts to change
the data or any attempts to change the data in unauthorized ways.
• For example, suppose an accounting system is on a computer.
• Someone breaks into the system and tries to modify the accounting data.
• Then an unauthorized user has tried to violate the integrity of the accounting database. (example the event 40/60
housing lottery program in Addis Ababa)
• Detection mechanisms do not try to prevent violations of integrity; they simply report that the data's integrity is no
longer trustworthy.
• Detection mechanisms may analyze system events (user or system actions) to detect problems or (more commonly)
may analyze the data itself to see if required or expected constraints still hold.
• The mechanisms may report the actual cause of the integrity violation (a specific part of a file was altered), or they
may simply report that the file is now corrupt.
17
Availability
• Denial of service attacks
• Denying access can lead to more serious attacks
• I.e., if credit card verification is down
18
Availability
• Availability refers to the ability to use the information or resource desired.
• Availability is an important aspect of reliability as well as of system design because an unavailable
system is at least as bad as no system at all.
• The aspect of availability that is relevant to security is that someone may deliberately arrange to
deny access to data or to a service by making it unavailable.
• System designs usually assume a statistical model to analyze expected patterns of use, and
mechanisms ensure availability when that statistical model holds.
• Someone may be able to manipulate use (or parameters that control use, such as network traffic)
so that the assumptions of the statistical model are no longer valid.
• This means that the mechanisms for keeping the resource or data available are working in an
environment for which they were not designed. As a result, they will often fail.
19
Threats
• A threat is a potential violation of security.
• The violation need not actually occur for there to be a threat. The fact that the
violation might occur means that those actions that could cause it to occur must
be guarded against (or prepared for).
• Those actions are called attacks. Those who execute such actions, or cause them
to be executed, are called attackers.
• The three security services—confidentiality, integrity, and availability—counter
threats to the security of a system.
• Common attacks can be categorized as:
• Snooping, eavesdropping
• Modification, alteration
• Masquerading, spoofing
• False repudiation/denial of receipt
• Network delay, denial of service
20
Threats …
• Snooping: the unauthorized interception of information, is a form of disclosure.
• It is passive, suggesting simply that some entity is listening to (or reading) communications or
browsing through files or system information.
• Wiretapping, or passive wiretapping, is a form of snooping in which a network is monitored.
Confidentiality services counter this threat.
• Modification or alteration: an unauthorized change of information, covers three classes of threats.
• The goal may be deception, in which some entity relies on the modified data to determine which
action to take, or in which incorrect information is accepted as correct and is released.
• If the modified data controls the operation of the system, the threats of disruption arise.
• Masquerading or spoofing: an impersonation of one entity by another, is a form of both deception and
usurpation.
• It lures a victim into believing that the entity with which it is communicating is a different entity.
• For example, if a user tries to log into a computer across the Internet but instead reaches another
computer that claims to be the desired one, the user has been spoofed.
21
Security Policy and Mechanism
allowed.
a security policy.
organizations
05/07/2024 22
Security Trends
Comments/RFC 1636).
The report stated the general consensus that the Internet needs
security mechanisms.
05/07/2024 23
Security Trends…
and
05/07/2024 24
Security Trends…
Internet-related vulnerabilities over a 10-year period.
These include:
• Security weaknesses in the OS of
attached computers (e.g., Windows,
Linux) as well as
• Vulnerabilities in Internet routers
and
other network devices.
05/07/2024 25
Who are the attackers?
Attackers use every tools and techniques they would try and
05/07/2024 26
Who are the attackers?...
05/07/2024 27
Who are the attackers?...
1. Cyber Criminals
generating profits.
In today's, they are the most prominent and most active type
of attacker.
05/07/2024 28
Who are the attackers?...
2. Hacktivists
3. State-sponsored Attacker
of origin.
4. Insider Threats
customers.
05/07/2024 31
Who are the attackers?...
4. Insider Threats
05/07/2024 32
Who are the attackers?...
4.1. Malicious
infrastructure.
was doing something wrong with them in some way, and they
05/07/2024 33
Who are the attackers?...
4.2. Accidental
insider employees.
requirements.
05/07/2024 34
Who are the attackers?...
4.3. Negligent
05/07/2024 36
What are the vulnerabilities?
05/07/2024 37
What are the vulnerabilities?...
Poorly chosen passwords
Open ports
Incorrect configuration
File permissions
Administrative privileges
05/07/2024 38
What are the vulnerabilities?...
Untrained users/system administrators
Unencrypted communication
05/07/2024 39
What are the consequences?
Failure/End of service
Technology leakage
05/07/2024 40
Security Criteria
05/07/2024 41
Security Criteria
Availability
Integrity
Confidentiality
Authentication
1. Availability
to authorized parties.
05/07/2024 43
Security Criteria…
2. Integrity
by authorized parties.
the network.
3. Confidentiality
by authorized parties.
user.
05/07/2024 45
Security Criteria…
4. Authentication
parties.
impersonator.
05/07/2024 46
Security Attack Types
Categories of Attacks
05/07/2024 47
Security Attack Types…
Attacks…
Source
Attack
Interruption Interception
Modification Fabrication
05/07/2024 48
Security Attack Types…
Passive or active,
Internal or external,
05/07/2024 49
Security Attack Types…
1. Passive vs. Active attacks
05/07/2024 51
Security Attack Types…
By means of encryption
05/07/2024 52
Security Attack Types…
of the network.
05/07/2024 55
Common security attacks and their
countermeasures
Finding a way into the network
Firewalls
Denial of Service
Access filtering, IDS
TCP hijacking
IPSec
05/07/2024 56
Common security attacks and their countermeasures…
Packet sniffing
Encryption (SSL, HTTPS)
Social problems
Education
05/07/2024 57
Security Services
X.800:
RFC 2828:
05/07/2024 58
Security Services (X.800)…
Authentication - assures that communicating entity is the one
claimed.
05/07/2024 59
Security Mechanism
course
05/07/2024 60
Security Mechanism (X.800)
Specific security mechanisms:
05/07/2024 61
Security Model
discussed below:
05/07/2024 62
Security Model
05/07/2024 64
Security Model
3. There must be a trusted third party which will distribute the
secret information to both sender and receiver.
05/07/2024 65
Security Model
Model for Network Security
05/07/2024 66
Security Model…Eight Security Dimensions
1. Access Control Security Dimension
05/07/2024 69
Security Model…Eight Security Dimensions
4. Data Confidentiality Security Dimension
05/07/2024 70
Security Model…Eight Security Dimensions
5. Communication Security Dimension
05/07/2024 72
Security Model…Eight Security Dimensions
7. Availability Security Dimension
05/07/2024
failure. 73
Security Model…Eight Security Dimensions
8. Privacy Security Dimension
05/07/2024 76