Lecture 08
Lecture 08
Lecture 8
What’s about Security
Computing System
Collection of
Hardware
Software
Storage
Data
People
5 Background
More to concern
Access : a single bit or the whole collection?
Disclose to other parties prohibit?
Security Goal: Integrity
Several meanings
Precise
Accurate
Unmodified
Modified in acceptable way
Consistent
Several properties
Present in a usable form
Enough capacity to meet the service’s needs
Bounded waiting time
Completed services in an acceptable period of time
15
Categories of Security Attacks
Interruption
Attack on availability
Interception
Attack on confidentiality
Modification
Attack on integrity
Fabrication
Attack on authenticity
16
Normal Flow
Normal Flow is the flow of information from an
information source, such as a file, or a region of
main memory, to a destination, such as another file
or user.
Information Information
Source Destination
17
Interruption
An asset of the system is destroyed or becomes
unavailable or unusable.
This is an attack on availability.
Examples: The destruction of hardware, the cutting
of a communication line, or the disabling of the file
management system.
Information Information
Source Destination
18
Interception
An unauthorized party gains access to an asset.
This is an attack on confidentiality.
The unauthorized party could be a person, a
program, or a computer.
Examples: Wiretapping to capture data in a
network and the unauthorized copying of files or
programs.
Information Information
Source Destination
Unauthorized
Party
19
Modification
An authorized party not only gains access to but
tampers with an asset.
This is an attack on integrity.
Examples: Changing values in a data file, altering a
program so that it performs differently, or modifying
the content of messages being transmitted in a
network.
Information Information
Source Destination
Unauthorized
Party
20
Fabrication
An authorized party inserts counterfeit objects into
the system.
This is an attack on authenticity.
Examples: The insertion of spurious (fake) messages
in a network or the addition of records to a file.
Information Information
Source Destination
Unauthorized
Party
21
Passive Attacks
Passive attacks eavesdrop or monitor the
transmission.
Goal: To obtain transmitted information
Two types of passive attacks:
1. Release of contents: A telephone conversation, an
electronic mail message, or confidential information.
2. Traffic analysis: Using the location and identities of hosts
and the frequency and length of messages to determine
the type of communication taking place.
Passive attacks are difficult to detect since they do
not involve any alteration of data.
The emphasis is on prevention rather than
detection.
22
Active Attacks
Active attacks may modify of the data stream or
create a false stream.
Four Types of active attacks:
1. Masquerade: takes place when one entity pretends to
be a different entity. This form usually includes one of the
other forms of active attack.
2. Replay: involves the passive capture of a data unit and
its subsequent retransmission to produce an unauthorized
effect.
3. Modification: occurs when an unauthorized party gains
access to and tampers with an asset. This is an attack on
integrity.
4. Denial of service: prevents or inhibits the normal use or
management of communications facilities.
23
Vulnerabilities of Computing System
Some of software modifications
Logic Bomb
Trojan
Virus
Trapdoor
Information Leaks
Security of Data
Computer Criminal
Armatures
Crackers
Career Criminals
Terrorists
Method of Defense
Prevent
Blocking the attack
Closing the vulnerability
Deter
Making the attack harder
Deflect
Making another target more attractive
Detect
Discover real-time or off-line
Recover
From its effects
Multiple Controls