CH 1
CH 1
INTRODUCTION
By: Mr. Joseph Wanambwa
Tel: +256703600655
Email: [email protected]
Slide 3
Definition of Terms cont…
1. Information security: protecting information and
information systems from unauthorized access,
use, disclosure, disruption, modification,
perusal, inspection, recording or destruction.
Slide 5
The 1960s
During the 1960s, the Department of Defense’s
Advanced Research Procurement Agency (ARPA)
began examining the feasibility of a redundant
networked communications system designed to
support the military’s need to exchange information.
Slide 6
The 1970s and 80s
ARPANET grew in popularity as did its potential
for misuse
Read more about;
- ARPANET,
- R-600,
- Evolution of the Internet, and
- Network computing
Slide 7
III. LAYERS OF SECURITY
What is Security? “The quality or state of being
secure--to be free from danger”
To be protected from adversaries
A successful organization should have multiple
layers of security in place:
– Physical security - to protect the physical items,
objects, or areas of an organization from unauthorized
access and misuse.
– Personal security – to protect the individual or group of
individuals who are authorized to access the
organization and its operations.
Slide 8
Layers of Security cont…
- Operations security – to protect the details of a
particular operation or series of activities.
Slide 10
IV. Critical Characteristics Of Information
The C.I.A. triangle has expanded into a list of
critical characteristics of information;
1. Confidentiality
2. Integrity
3. Availability
4. Authenticity
5. Non-repudiation
Slide 12
Critical Characteristics cont …
Availability: For any information system to serve its
purpose, the information must be available when it is
needed. This means that the computing systems
used to store and process the information, the
security controls used to protect it, and the
communication channels used to access it must be
functioning correctly.
High availability systems aim to remain available at
all times, preventing service disruptions due to power
outages, hardware failures, and system upgrades.
Ensuring availability also involves preventing denial-
of-service attacks.
Slide 13
Critical Characteristics cont …
Authenticity: It is necessary to ensure that the data,
transactions, communications or documents
(electronic or physical) are genuine. It is also
important for authenticity to validate that both parties
involved are who they claim they are.
Non-repudiation: This implies one's intention to
fulfill their obligations to a contract. It also implies
that one party of a transaction cannot deny having
received a transaction nor can the other party deny
having sent a transaction.
Slide 14
V. Components of an Information System
To fully understand the importance of information
security, you need to know the elements of an
information system
Slide 15
Securing the Components
The computer can be either or both the subject of
an attack and/or the object of an attack
When a computer is
– the subject of an attack, it is used as an active
tool to conduct the attack
– the object of an attack, it is the entity being
attacked
Slide 16
Figure 1-1 – Subject and Object of Attack
Slide 17
Balancing Security and Access
It is impossible to obtain perfect security - it is not
an absolute; it is a process
Security should be considered a balance
between protection and availability
Slide 18
Figure 1-2 – Balancing Security &Access
Slide 19
Bottom Up Approach
Security from a grass-roots effort - systems
administrators attempt to improve the security of
their systems
Slide 20
Approaches to Security Implementation
Slide 21
Top-down Approach
Initiated by upper management:
– issue policy, procedures, and processes
– dictate the goals and expected outcomes of
the project
– determine who is accountable for each of the
required actions
This approach has strong upper management
support, a dedicated champion, dedicated
funding, clear planning, and the chance to
influence organizational culture
May also involve a formal development strategy
referred to as a systems development life cycle
– Most successful top-down approach
Slide 22
VI. NEED FOR SECURITY
Information security performs four important functions for
an organization:
1. Protects the organization’s ability to function
“information security is a management issue in
addition to a technical issue, it is a people issue in
addition to the technical issue.”
To assist management in addressing the needs for
information security, communities of interest must
communicate in terms of business impact and the
cost of business interruption and avoid arguments
expressed only in technical terms.
Slide 23
Need for Security Cont …
2. ENABLE THE SAFE OPERATION OF
APPLICATIONS
Today’s organizations are under immense pressure to
create and operate integrated, efficient, and capable
applications.
Slide 24
Need for Security cont …
3. PROTECTING DATA
Many organizations realize that one of their most
valuable assets is their data, because without data, an
organization loses its record of transactions and/or its
ability to deliver value to its customers.
Slide 26
VII. ACCESS CONTROL
The term Access Control is something of an
ambiguous term. To some it could be interpreted as
controlling the access to a system from an external
source.. Eg: through Logging into the system
Slide 28
Access control cont…
If the user's credentials match the MAC
security label properties of the object access
is allowed.
Mandatory Access Control is by far the most
secure access control environment but does
not come without a price. Firstly, MAC
requires a considerable amount of planning
before it can be effectively implemented.
Eg; Intra -departmental access, Internet café
access controllers/Timers
Slide 29
Access control cont…
Discretionary Access Control (DAC) allows each
user to control access to their own data. DAC is
typically the default access control mechanism for
most desktop operating systems.
Each resource object on a DAC based system has
an Access Control List (ACL) associated with it. An
ACL contains a list of users and groups to which the
user has permitted access together with the level of
access for each user or group.
Eg: Read, Write or Full control access.
A user can only set access permissions for
resources which they already own.
Slide 30
Access control cont…
Role Based Access Control (RBAC), also known
as Non discretionary Access Control, takes more of a
real world approach to structuring access control.
Access under RBAC is based on a user's job
function within the organization to which the
computer system belongs.
Essentially, RBAC assigns permissions to particular
roles in an organization. Users are then assigned to
that particular role. For example, an accountant in a
company will be assigned to the Accountant role,
gaining access to all the resources permitted for all
accountants on the system.
Slide 31
VIII. AUTHENTICATION
Authentication involves the prevention of
unauthorized access to computer systems.
Authentication takes a variety of forms, ranging from
verifying account credentials (using, amongst other
things, a login name and password) to physical
identity verification (using biometrics such as finger
print scanning technology) to identifying that the
client system from which a user is attempting to
connect to a server is really the authorized client
system.
Slide 32
Types of Authentication
1. User Name and password: These are unique
identifiers for a logon process. which if entered
correctly will permit access to the system.
Identification is confirmed through a logon process.
Read more about rules of creating a secure and
safe user name and password.
Slide 34
Types of Authentication Cont…
2. Challenge Handshake Authentication Protocol (CHAP) is
used at the startup of a link and periodically verifies the
identity of the remote node using a three-way handshake.
After the PPP link establishment phase is complete, the local
router sends a "challenge" message to the remote node.
The remote node responds with a value calculated using a
one-way hash function, Message Digest 5 (MD5). This
response is based on the password and challenge message.
The local router checks the response against its own
calculation of the expected hash value. If the values match,
the authentication is acknowledged, otherwise the connection
is immediately terminated.
Slide 35
CHAP Cont…
Logon Request
1
3 2
Challenge
Encrypts
Encrypts Value
Value 5
Response
4
6
Server
Client
7 Compare
Authorize or Fail encrypted
Results
Slide 36
CHAP Cont…
Slide 37
Types of Authentication cont…
3. Certificates: Are another common form of
authentication. A server or certificate authority
can issue a certificate that will be accepted by the
challenging system. Certificates can either be
physical access devices such as smart cards or
electronic certificates that are used as part of the
logon process. A simple way to think of them is
hall passes at school. If you have a hall pass, you
can enter the hall way of the school. If your pass
is invalid, the hallway monitor can send you to the
principal’s office.
Slide 38
Certificate illustration
Client
3 Valid Certificate
Application Server
1
Authentication 2 Certificate
Security Server
Slide 39
Types of Authentication Cont…
4. Kerberos Authentication: Provides an
authentication process that does not require the
transmission of username and password though the
use of a symmetric-key authentication protocol. The
term symmetric key in this context is used to refer to
the fact that the same key is used for both the
encryption and decryption processes.
The Kerberos Authentication process relies on a third
entity called the Key Distribution Center.
Slide 40
Kerberos Cont…
The following provides a step by step breakdown
of the Kerberos authentication process:
1. User requests access to service running on a
different server.
2. KDC authenticates user and sends a ticket to be
used between the user and the service on the
server
3. User’s workstation sends a ticket to service to
authenticate and use the requested service.
Slide 41
Kerberos Picture
2 KDC
User Workstation 3
Server Providing
services to user
Slide 42
Types of Authentication cont…
5. Biometrics
Bio – life, metrics - measure
Biometrics verifies (authenticates) an individuals
identity by analyzing unique personal attribute
(something they ARE)
Require enrollment before being used,
EXPENSIVE and COMPLEX
Can be based on
– behavior (signature dynamics) – might change over
time
– Physical attribute (fingerprints, iris, retina scans)
– We will talk about the different types of biometrics later
Slide 43
Biometric cont…
Fingerprint
Palm Scan
Hand Geometry
Retina Scan
Iris Scan
Keyboard Dynamics
Voice Print
Facial Scan
Hand Topography
Slide 44
Types of Authentication cont…
6. Smart Cards: Is a type of badge or card that can
allow access to multiple resources including
buildings, parking lots, and computers. Each area or
computer has a reader in which the card can be
inserted or scanned.
The card contains information about the user’s
identity, and access privileges.
The reader is connected to the workstation and
validates against the security system.
Increased security of the authentication process
since one must be in physical possession of the
card.
Slide 45