Chapter 4 Security New
Chapter 4 Security New
Chapter 1- Introduction
Introduction
• Information is an asset that has a value like any other asset.
• As an asset information needs to be secured from attacks.
• To be secured, information needs to be hidden from unauthorized access (confidentiality),
protected from unauthorized change (integrity), and available to an authorized entity when it
is needed (availability).
• Until a few decades ago, the information collected by an organization was stored on physical
files.
• The confidentiality of the file was achieved by restricting the access to a few authorized and
trusted people in the organization. In the same way, only a few authorized people were
allowed to change the contents of the files.
• Availability was achieved by designating at least one person who would have access to the
files at all times.
• The advent of computers and introduction of distributed systems has brought the major
challenge to security.
• Network/Internet security measures are needed to protect data during their transmission.
• With the advent of computers, information storage became electronic.
• Instead of being stored on physical media, it was stored in computers.
• The three security requirements however, did not change.
• The files stored in computers require confidentiality, integrity and availability.
• The implementation of these requirements, however, is different and more challenging.
• The major change that affected security is the introduction of distributed
systems and the use of networks and communications facilities for carrying
data between terminal user and computer and between computer and
computer.
• Network security measures are needed to protect data during their transmission.
• In fact, the term network security is somewhat misleading, because virtually all
business, government, and academic organizations interconnect their data processing
equipment with a collection of interconnected networks.
• Such a collection is often referred to as an internet, and the term internet security is
used.
Computing systems are the assets to attackers. Today computers are very powerful, work at unimaginable speed and at
very high accuracy. With computers we now have new concerns namely automated attacks, privacy breach, ease of
theft etc.
• Automating attacks
• Suppose that someone manages to create a machine that can produce counterfeit (forged) coins, would that not bother
authorities? It certainly would.
• However, producing so many coins on a mass scale may not be that much economical compared to the return on that investment!
How many such coins would the attacker be able to get into the market so rapidly? This is quite different with computers. They are
quite efficient and happy in doing routine, boring and repetitive tasks.
• Stealing a very low amount say half a dollar from a million bank accounts in a matter of few minutes. This would give the attacker
half a million dollars possibly without any major complaints!
• Privacy concerns
• Collecting information about people and later misusing it is turning out to be a huge problem
• The so called data mining applications gather process and tabulate all sorts of details about individuals. People can then illegally sell
this information.
• For example, companies like Experian (formerly TRW), TransUnion and Equifax maintain credit history of individuals in the USA.
• Similar trends are seen in the rest of the world. These companies have volumes of information about a majority of citizens of that
country. These companies can collect, collate, polish and format all sorts of information to whosoever is ready to pay for that data!
• Examples of information that can come out of this are: which store the person buys more from, which restaurant s/he eats in, where s/he goes for
vacations frequently and so on.
• Every company (Eg. Shop keepers, banks, airlines, insurers) is collecting and processing a mind boggling amount of information
about us, without we realizing when and how it is going to be used.
• Distance does not matter
In 1995, A russian hacker broke into Citibank‟s computers remotely, stealing $12 million. Although the attacker was
traced, it was very difficult to get him extradited for the court case.
Goals of Information Security
Confidential
memo
Cryptographic
Hash algorithm
Receiver algorithm
• Access Control - A variety of mechanisms that enforce access rights to resources.
• Access control regulates who or what can view or use resources, by verifying various login
credentials, which can include usernames and passwords, PINs, biometric scans, and
security tokens.
• Authentication Exchange - A mechanism intended to ensure the identity of an
entity by means of information exchange.
• Traffic Padding - The insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts.
• Routing Control - Enables selection of particular physically secure routes for
certain data and allows routing changes, especially when a breach of security is
suspected.
• Notarization - The use of a trusted third party to assure certain properties of a
data exchange.
• When notarization occurs, a notary public certifies the authenticity of any signature
appended to a document.
• It acts as mediator between sender and receiver so that if any chance of conflict is reduced.
This mediator keeps record of requests made by sender to receiver for later denied.
PERVASIVE SECURITY
MECHANISMS
• Mechanisms that are not specific to any particular OSI security service or protocol layer.
Trusted Functionality
• That which is perceived to be correct with respect to some criteria (e.g., as established by a security
policy).
Security Label
• The marking bound to a resource (which may be a data unit) that names or designates the security
attributes of that resource.
Event Detection
• Detection of security-relevant events.
Security Audit Trail
• Data collected and potentially used to facilitate a security audit, which is an independent review and
examination of system records and activities.
Security Recovery
• Deals with requests from mechanisms, such as event handling and management functions, and takes
recovery actions.
• A processing or communication service that is provided by a system to give a
specific kind of protection to system resources; security services implement
security policies and are implemented by security mechanisms.
1. The advent of computers and introduction of distributed systems has brought
the less challenge to security. (True/False)
2. Measures needed to protect data during their transmission are called ____.
3. The case of stealing a very low amount say half a dollar from a million bank
accounts in a matter of few minutes without any major complaints is enabled
by__________________________
a. Automating attacks b. Privacy concerns c. Distance does not matter d. None
4. The Goal of Information security that assures that private information is not
made available or disclosed to unauthorized individuals is:
a. Confidentiality b. Integrity c. Availability d. Accountability
5. A process (or a device incorporating such a process) that is designed to detect,
prevent, or recover from a security attack is called_____________________.
6. One of the following is an attack threatening confidentiality.
a. Snooping b. Repudiation c. Masquerading d. Replaying
7. One of the following is an passive attack.
b. Snooping b. Repudiation c. Masquerading d. Replaying
8. _________ is data appended to, or a cryptographic transformation of, a data unit
that allows a recipient of the data unit to prove the source and integrity of the data
unit and protect against forgery.
a. Digital Signature b. Encipherment c. Traffic Padding d. Notarization