Chapter 1 - Computer Security Concepts
Chapter 1 - Computer Security Concepts
05/09/2017 2
1
05/09/2017
05/09/2017 3
05/09/2017 4
2
05/09/2017
3
05/09/2017
05/09/2017 7
Vulnerabilities
o It can be corrupted, so that it does the w rong thing or gives w rong answ ers.
o It can become leaky.
o It can become unavailable or very slow.
Attacks
o Active attack: An attempt to alter system resources or affect their operation.
o Passive attack: An attempt to learn or make use of information from the system
that does not affect system resources.
o Inside attack: Initiated by an entity inside the security perimeter, it is authorized
to access system resources but uses them in a w ay not
approved by those w ho granted the authorization.
o Outside attack: Initiated from outside the perimeter, by an unauthorized or
illegitimate user of the system
Countermeasure
o Detect
o Prevent
o Recover
05/09/2017 8
4
05/09/2017
Attacks
Release of Denial of
Traffic Masquerade
Message Contents Replay Modification Serv ice
Analysis (Fabrication)
(Interception) (Interuption)
05/09/2017 9
05/09/2017
related goals?
10
5
05/09/2017
Phhw ph dw
flqhpda
05/09/2017
related goals? 11
related goals? 12
05/09/2017
6
05/09/2017
Transfer Rs.1000
Transfer Rs.1000 to Darth.
to Darth.
Transfer Rs.1,000
to Darth. Transfer Rs.10,000
to Darth
14
05/09/2017
related goals?
7
05/09/2017
05/09/2017
related goals? 15
05/09/2017 16
8
05/09/2017
05/09/2017 18
9
05/09/2017
Prevention
Detection
Response
Recovery and remediation
Policy (what) vs. mechanism (how)
05/09/2017 19
the countermeasures are used to reduce vulnerabilities and deal w ith threats to system assets:
Access Control: (authorized users)
Aw areness and Training: all people in organization
Audit and Accountability: all information system
Certification, Accreditation, and Security Assessments: (the controls)
Configuration Management: (hardware, software, firmware, and documentation)
Contingency Planning: ensure the availability of critical information resources.
Identification and Authentication: (users, processes, or devices)
Incident Response
Maintenance
Media, Physical, Environmental, System and Communications Protection
Planning
Personnel Security
Risk Assessment
Systems and Services Acquisition
05/09/2017 20
10
05/09/2017
05/09/2017 21
05/09/2017 22
11
05/09/2017
05/09/2017 23
05/09/2017 24
12