Introduction To Information Security: Week 1 (8 Sept 2014)
Introduction To Information Security: Week 1 (8 Sept 2014)
Security
Lecture 1
Week 1 (8 Sept 2014)
Topics
• What is security?
• Security Architecture
• Security Principles
• Security Policy
• Security Attacks / Threats
• Methods of Defense
• Security Services
• Security Mechanisms
What is Security?
• Definition:
• Security is the quality or state of being secure that is
to be free from danger and
• to be protected from adversaries – from those who
would do harm, intentionally or otherwise
• Information Security:
• Information Security is the protection of information
and the systems and hardware that use, store, and
transmit that information
By NSTISSC
Security Trends
Security Trends
Why Spam?
Why Malware?
Cyber Attack Trend
Active
attacks: Involve some modification of
the data stream or the creation
Active
of a false stream Attacks
Goal: to obtain authorization
Categories: masquerade, replay,
modification of messages &
denial of service
Passive Attacks:
Release of Message Contents
Internet or other
communications
facility
Passive Attacks: Traffic Analysis
Internet or other
communications
facility
Active Attacks: Masquerade
Internet or other
communications
facility
Active Attacks: Replay
Internet or other
communications
facility
Active Attacks: Modification of Messages
Internet or other
communications
facility
Active Attacks: Denial of Service
Internet or other
communications
facility
Passive Attack vs.Active
ActiveAttack
Attack
• Passive Attack
◦ Quite difficult to prevent
• Very difficult to detect. active attacks. Why?
Why?
◦ Instead, the goal is to detect
active attacks and to recover
• Feasible to prevent the from any disruption or delays
success of these attacks. caused by them.
How?
◦ If the detection has a
deterrent effect, it may also
• Emphasis in dealing contribute to prevention
with passive attacks is
on prevention rather
than detection. Why?
• Physical Controls
Methods of Defense:
Encryption Controls
• Likelihood of use
• Overlapping controls
• Periodic review
Security Services
• Defined by X.800:
• A security service as a service provided by a protocol layer
of communicating open systems which ensure adequate
security of the systems or of data transfers.
1. Connection Integrity
with Recovery
2. Connection Integrity 1. Prevention of
without Recovery unauthorized
3. Selective-field use of a
Connection Integrity 1. Connection Confidentiality
2. Connectionless resource
4. Connectionless
Integrity Confidentiality
5. Selective-field 3. Selective-field
Connectionless
Integrity
Confidentiality
4. Traffic Flow Confidentiality
1. Connection
Confidentiality
2. Connectionless
Confidentiality
3. Selective-field
Confidentiality
4. Traffic Flow
Confidentiality
Security Services: Authentication
Used in association with a logical connection to
provide confidence in the identity of the entities
connected
1. Peer Entity
Authentication
2. Data Origin
Authentication
Security Services: Non-repudiation
1. Non-repudiation, Origin
2. Non-repudiation,
Destination
Security Mechanisms
• Security mechanism is any process (or a device
incorporating such a process) that is designed to detect,
prevent or recover from a security attack.
Data Integrity
Digital Signature
Access Control
Routing Control
SECURITY MECHANISMS
Event Detection
Relationship between Security Services and
Mechanisms
Mechanism
Encipherment Digital Access Data Authentication Traffic Routing Notarization
Service Signature Control Integrity Exchange Padding Control
Peer Entity
Authentication
Y Y Y
Data Origin
Authentication
Y Y
Access Control
Y
Confidentiality
Y Y
Traffic Flow
Confidentiality
Y Y Y
Data Integrity
Y Y Y
Non-
repudiation
Y Y Y
Lecture Summary
• Due to the technology era and sophisticated cyber
threats/attacks/crime today, information security is made
more importance implemented in most of organization.