CS421 - Lec1
CS421 - Lec1
CS421 - Lec1
SYSTEM
SECURITY
Chapter 1:
Information and Network
Security Concepts
Course Information
Aims
This module addresses the problem of securing computer systems. Different levels of computer threats
and different authentication methods are studied. Ciphering and cryptographic techniques are studied to
create secure algorithms. In addition, web security is introduced for the student to be aware of the different
Learning outcomes
Knowledge: On completion of this module, the successful student will be able to:
Illustrate the concepts of Hash Function, Message Digest and Message Authentication Code.
Discriminate between different authentication methods used for access control in computer systems.
Propose, apply and evaluate security, privacy and integrity policies for a system.
Although the use of the CIA triad to define security objectives is well
established, some in the security field feel that additional concepts are needed
to present a complete picture. Two of the most commonly mentioned are:
Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator.
Accountability: The security goal that generates the requirement for actions
of an entity to be traced uniquely to that entity.
LEVELS OF IMPACT
Can define 3 levels of impact from a security breach*
Low: The loss could be expected to have a limited adverse
effect on organizational operations, organizational assets, or
individuals.
(i) cause a degradation in mission capability to an extent and
duration that the organization is able to perform its primary functions,
but the effectiveness of the functions is noticeably reduced;
(ii) result in minor damage to organizational assets;
(iii) result in minor financial loss; or
(iv) result in minor harm to individuals.
LEVELS OF IMPACT
Moderate: The loss could be expected to have a serious
adverse effect on organizational operations, organizational
assets, or individuals
(i) cause a significant degradation in mission capability to an extent
and duration that the organization is able to perform its primary
functions, but the effectiveness of the functions is significantly
reduced;
(ii) result in significant damage to organizational assets;
(iii) result in significant financial loss; or
(iv) result in significant harm to individuals that does not involve loss of
life or serious, life-threatening injuries.
LEVELS OF IMPACT
High: The loss could be expected to have a severe or
catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
(i) cause a severe degradation in or loss of mission capability to an
extent and duration that the organization is not able to perform one or
more of its primary functions;
(ii) result in major damage to organizational assets;
(iii) result in major financial loss; or
(iv) result in severe or catastrophic harm to individuals involving loss of
life or serious life threatening injuries.
OUR AIM
our focus is on Internet Security
which consists of measures to deter, prevent, detect, and correct security
violations that involve the transmission & storage of information
COMPUTER SECURITY
CHALLENGES
1. not simple
2. must consider potential attacks
3. involve algorithms and secret info
4. must decide where to deploy mechanisms
5. battle of intelligence between attacker / admin
6. not perceived on benefit until fails
7. requires regular monitoring
8. too often an after-thought
OSI SECURITY
ARCHITECTURE
ITU-T X.800 “Security Architecture for OSI”
defines a systematic way of defining and providing security requirements
for us it provides a useful overview of concepts we will study
ASPECTS OF SECURITY
consider 3 aspects of information security:
security attack
security mechanism
security service
SECURITY ATTACK
any action that compromises the security of information
owned by an organization
information security is about how to prevent attacks, or
failing that, to detect attacks on information-based
systems
often threat & attack used to mean same thing
have a wide range of attacks
can focus of generic types of attacks
passive
active
PASSIVE ATTACKS
PASSIVE ATTACKS
Have “passive attacks” which attempt to learn or
make use of information from the system but does
not affect system resources.
By eavesdropping on, or monitoring of, transmissions
to:
obtain (message contents + monitor traffic flows)
RFC 2828:
“a processing or communication service provided by a system to give a specific kind of
protection to system resources”
SECURITY SERVICES (X.800)
Authentication - assurance that the communicating entity is the
one claimed
Peer entity authentication
Data origin authentication:
X.800 standard
security attacks, services, mechanisms
models for network (access) security