01 Intro 1
01 Intro 1
Spring 2022
www.faisalak.info
[email protected]
Grading:
Quizzes (2 x 7.5%) 15%
HW 10%
Midterm 25%
Final 50%
3
Course Syllabus
Course Outline:
Information security foundations
Security design principles; security mechanisms,
Symmetric and asymmetric cryptography,
Hash functions, digital signatures, key management,
authentication and access control
Software security, vulnerabilities and protections,
Security policies, Policy formation and enforcement,
Risk assessment, cybercrime, law and ethics in
information security
4
Attacks, Services, and Mechanisms
* Security Attack: Any action that compromises the security
of information (e.g., stealing information).
5
Security Objectives
(PI and 3 A's)
* Privacy (Confidentiality)
* Integrity (has not been altered or deleted)
* Availability (accessibility - permanence, non-erasure)
- Denial of Service Attacks
- Virus that deletes files
8
Security Functional Requirements
9
Security Functional Requirements contd..
10
Security Functional Requirements contd..
11
Fundamental Security Design Principles
12
Fundamental Security Design
Principles contd..
• Least common mechanism: Minimize the functions shared by diff users
• Psychological acceptability: Security mechanism should not interfere unduly
13
Security Implementation
14
Information Security Summary
15
Security Standards
Internet - Internet Engineering Task Force (IETF)
De Facto (PGP email security system, Kerberos-MIT)
ITU (X.509 Certificates)
National Institute of Standards and Technology (SHA)
IEEE
Department of Defense, Nat. Computer Security Center
Export Controls ( U.S. Dept. of Commerce)
- High Performance Computers
- Systems with “Hard” Encryption
16