Lecture1,2 Introduction
Lecture1,2 Introduction
DR. PROGRAM
MOHAMME
Introduction to
D
NASSER Information Security
AL-
KHWLANI
COMMUNICATION BY
TEL/WATSUP
777040098
EMAIL:
[email protected]
COURSE OUTLINE
INTRODUCTION -1,2
3- VULNERABILITIES
4-AUTHENTICATION
5-ACCESSES CONTROLS
6- SECURITY POLICIES
8,9,10 ENCRYPTION
11,12 DATABASE
SECURITY
Assements Methods
Introduction to
Information Security
?What Does "Secure" Mean
How do we protect our most valuable assets?
One option is to place them in a safe place,
―like a bank.
Overview
• Early, the bank robberies
are more;
Kept large amount of cash,
gold & silver, which could not
be traced easily,
Communication &
transportation facilities it
might be;
― hours before the legal
authorities were informed of
a robbery, and
― days before they could
actually arrives at the scene
Overview
Today; many factors work against the
potential criminal;
Very sophisticated
alarm systems
camera systems
silently protect secure places;
Ex.; banks.
The techniques of criminal investigation have
become very effective;
a person can be identified by;
― Fingerprint, voice recognition, composite
sketch, ballistics evidence,
― retinal patterns, and
― genetic material (DNA).
Overview (3)
Much of a bank's business is
conducted with;
checks,
electronic transfers,
credit cards, or
debit cards.
Sites that do stores large amounts of
cash or currency are protected with
many levels security:
Several layers of physical systems,
complex locks,
multiple-party systems requiring the
agreement of several people to allow
access.
Characteristics of Computer
Intrusion()تطفل
Any part of a computing system can be the
target of a crime;
A computing system is a collection of:
HW, SW,
storage media, data, and
person that an organization uses to do
computing tasks.
The obvious target of a bank robbery is each;
A list of names & addresses of depositors,
A list might be:
― On paper, Recorded on a magnetic medium,
― Stored in internal computer memory, or
― transmitted over telephone lines, or satellite
links.
Characteristics of Computer
Intrusion
A competing bank can use this information
to:
steal clients or even to disrupt(ل3 )تعطservice,
Discredit( )تشويه سمعةthe bank,
An unscrupulous(مير3ديم الض3 )عindividual could
move money from one account to another
without the owner's permission,
A group of con artists could contact large
depositors and convince them to invest in
fraudulent( )تضليلschemes.
Characteristics of Computer
Intrusion (3)
•Example:
A robber intent on stealing something from your
house will not attempt to penetrate( )يتسللa
two-inch-thick metal door if a window gives
easier access.
• The weakest point is the most serious
vulnerability;
• A Principle of Easiest Penetration()التطفل:
Confidentiality
2-Interception
3-Modification;
4-Fabrication
Threats Kinds
Threats Kinds
Threats Kinds to computing system
security:
1-Interruption;
―an asset of the system becomes lost or
unavailable or unusable;
malicious destruction of a HW device,
Erasure of a program or data file, or
Malfunction or failure of an OS file
manager.
Effect on availability.
Threats Kinds
2-Interception
―means that some unauthorized party has
gained access to an asset;
The outside party can be a person, a
program, or a computing system,
Ex: illicit(روع3ير مش3 )غcopying of program or
data files; or wiretapping to obtain data in
network,
a silent interceptor may leave no traces by
which the interception can be readily
detected,
Effect on confidentiality
Threats Kinds
3-Modification;
―when an unauthorized party can be access
and tampers with an asset;
modify the values in a data base,
Alter program, or
Modify data being transmitted electrically,
It is possible to modify HW,
Some cases of modification can be
detected with simple measures, but other,
more subtle,
changes may be almost impossible to
detect.
Effect on integrity.
Threats Kinds
4-Fabrication
― when an unauthorized party can be
fabricates counterfeit objects for a computing
system;
The intruder may wish to;
- add spurious(ةWW )زائفtransactions to a
network communication system,
- add records to an existing data base.
Effect on authenticity
Types of Threats Based on
Sources
−Nonhuman threats
− include;
Human threats