0% found this document useful (0 votes)
39 views

Chapter 1 - Computer Security Concepts

The document discusses key topics in computer security including confidentiality, integrity, availability, security threats, attacks, and a comprehensive security strategy. It defines security requirements such as confidentiality, integrity, and availability. It also defines common security terms like threats, vulnerabilities, attacks, risks, and countermeasures. Specific types of attacks are defined such as active attacks, passive attacks, inside attacks, and outside attacks. Examples of different attacks are also provided such as interception, modification, replay, and masquerade attacks.

Uploaded by

Lâm Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Chapter 1 - Computer Security Concepts

The document discusses key topics in computer security including confidentiality, integrity, availability, security threats, attacks, and a comprehensive security strategy. It defines security requirements such as confidentiality, integrity, and availability. It also defines common security terms like threats, vulnerabilities, attacks, risks, and countermeasures. Specific types of attacks are defined such as active attacks, passive attacks, inside attacks, and outside attacks. Examples of different attacks are also provided such as interception, modification, replay, and masquerade attacks.

Uploaded by

Lâm Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

05/09/2017

 

Lecturer: Nguyễn Thị Thanh Vân – FIT - HCMUTE

 Describe the key security requirements of confidentiality,


integrity, and availability.
 Discuss the types of security threats and attacks that must be
dealt with and give examples of the types of threats and
attacks that apply to different categories of computer and
network assets.
 Summarize the functional requirements for computer security.
 Explain the fundamental security design principles.
 Understand the principle aspects of a comprehensive security
strategy.

05/09/2017 2

1
05/09/2017

 The protection afforded to an automated information


system in order to attain the applicable objectives of
preserving the
o integrity,
o availability, and
o confidentiality
 of information system resources, includes:
o hardware,
o software,
o firmware,
o information/data, and
o telecommunications).

05/09/2017 3

05/09/2017 4

2
05/09/2017

 Attack - an act that is an intentional or unintentional attempt to cause damage


or compromise to the information and/or the systems that support it.
 Threats - a category of objects, persons, or other entities that represents a
potential danger to an asset.
 Threat Agent -a specific instance or component of a more general threat
 Vulnerability- weaknesses or faults in a system or protection mechanism that
expose information to attack or damage
 Hacking - Good: to use computers or systems for enjoyment; Bad: to illegally
gain access to a computer or system
 Risk - the probability that threat will exploit a vulnerability with a harmful result.
 Subject - an active entity that interacts with an information system and causes
information to move through the system for a specific end purpose
 Object - a passive entity in the information system that receives or contains
information

 Access - a subject or object’s ability to use, manipulate, modify, or affect


another subject or object
 Asset - the organizational resource that is being protected.
 Control, Safeguard or Countermeasure- security mechanisms, policies or
procedures that can successfully counter attacks, reduce risk, resolve
vulnerabilities, and otherwise improve the security within an organization
 Exploit – to take advantage of weaknesses or vulnerability in a system
 Exposure - a single instance of being open to damage.
 Security Blueprint - the plan for the implementation of new security
measures in the organization
 Security Model - a collection of specific security rules that represents the
implementation of a security policy
 Security Posture or Security Profile- a general label for the combination of
all policy, procedures, technology, and programs that make up the total
security effort currently in place
6

3
05/09/2017

05/09/2017 7

 Vulnerabilities
o It can be corrupted, so that it does the w rong thing or gives w rong answ ers.
o It can become leaky.
o It can become unavailable or very slow.
 Attacks
o Active attack: An attempt to alter system resources or affect their operation.
o Passive attack: An attempt to learn or make use of information from the system
that does not affect system resources.
o Inside attack: Initiated by an entity inside the security perimeter, it is authorized
to access system resources but uses them in a w ay not
approved by those w ho granted the authorization.
o Outside attack: Initiated from outside the perimeter, by an unauthorized or
illegitimate user of the system
 Countermeasure
o Detect
o Prevent
o Recover
05/09/2017 8

4
05/09/2017

Attacks

Passiv e Attack Activ e Attack

Release of Denial of
Traffic Masquerade
Message Contents Replay Modification Serv ice
Analysis (Fabrication)
(Interception) (Interuption)

Prevention Detection and Recovery


Hard to detect Easy to detect
Easy to stop Hard to stop

05/09/2017 9

an opponent learns the Hi, I am Bob


contents of information
in transmissions.

Hi, I am Bob Hi, I am Bob

05/09/2017
related goals?
10

5
05/09/2017

determine the location and


identity of communicating
hosts and could observe the
frequency and length of
messages being exchanged
Meet me at
Meet me at
Cinemax
Cinemax

Phhw ph dw
flqhpda

05/09/2017
related goals? 11

• Takes place when one entity


pretends to be a different entity
• Usually includes one of the other
forms of active attack

related goals? 12
05/09/2017

6
05/09/2017

• Involves the passive capture of a


Transfer
data unit and its subsequent
Rs.1000 to
retransmission to produce an
Darth.
unauthorized effect

Transfer Rs.1000
Transfer Rs.1000 to Darth.
to Darth.

05/09/2017 Sign can’t defense replay.


related goals? A Think: B send next sms 13

• Some portion of a legitimate Transfer


message is altered, or messages Rs.10,000 to
are delayed or reordered to Darth.
produce an unauthorized effect

Transfer Rs.1,000
to Darth. Transfer Rs.10,000
to Darth

14
05/09/2017
related goals?

7
05/09/2017

• Prevents or inhibits the


normal use or management of
communications facilities

05/09/2017
related goals? 15

05/09/2017 16

8
05/09/2017

Exposure Data are directly released to an unauthorized entity

Unauthorized Interception An unauthorized entity directly accesses data


Disclosure Inference: An unauthorized entity indirectly accesses data
Confidentiality Intrusion An unauthorized entity gains access to data
Masquerade Performs a mali. act by posing as an authorized entity
Deception Falsification False data deceive an authorized entity
Integrity Repudiation Deceives by falsely denying responsibility for an act.
Incapacitation interrupts system by disabling a system component
Disruption Corruption alters system operation by modifying system

Availability Obstruction interrupts delivery of system services by hindering SO


Misappropriation assumes unauthorized logical or physical control of a
Usurpation system resource
Misuse Causes a system component to perform a function or
Access control service that is harmful to system security. 17

05/09/2017 18

9
05/09/2017

 Prevention
 Detection
 Response
 Recovery and remediation
Policy (what) vs. mechanism (how)

05/09/2017 19

the countermeasures are used to reduce vulnerabilities and deal w ith threats to system assets:
 Access Control: (authorized users)
 Aw areness and Training: all people in organization
 Audit and Accountability: all information system
 Certification, Accreditation, and Security Assessments: (the controls)
 Configuration Management: (hardware, software, firmware, and documentation)
 Contingency Planning: ensure the availability of critical information resources.
 Identification and Authentication: (users, processes, or devices)
 Incident Response

 Maintenance
 Media, Physical, Environmental, System and Communications Protection
 Planning
 Personnel Security
 Risk Assessment
 Systems and Services Acquisition

 System and Information Integrity

05/09/2017 20

10
05/09/2017

 Reduce vulnerabilities by following basic design principles for


secure systems:
• Economy of mechanism
• Fail-safe defaults
• Complete mediation
• Open design
• Separation of privilege
• Least privilege
• Least common mechanism
• Psychological acceptability
• Isolation
• Encapsulation
• Modularity
• Layering
• Least surprise

05/09/2017 21

 Specification/policy: What is the security scheme supposed


to do?
 Implementation/mechanisms: How does it do it?
o Prevention
o Detection
o Response
o Recovery
 Correctness/assurance: Does it really work?
o Assurance: a degree of confidence
o Evaluation: the process of examining a computer product or
system with respect to certain criteria

05/09/2017 22

11
05/09/2017

 The key security requirements


 Key objectives in Computer security
 The types of Vulnerabilities, threats and attacks
 Functional requirements for computer security
 Fundamental security design principles
 Computer security strategy.

05/09/2017 23

05/09/2017 24

12

You might also like