02 - Overview of Computer Security
02 - Overview of Computer Security
CSC662
COMPUTER SECURITY
AN OVERVIEW
These slides are prepared from Matt Bishop‘s slide, Ahmad Al-
Mulhem‘s and Dr Adnan Gutub‘s lecture slide Version 2.0
1
COMPUTER SECURITY…
What is computer security?
Protection of computer systems and their services
from unauthorized modification, destruction, or
disclosure
Why is it important?
Computer systems are important in our life (mission-
critical, business, banks, . . . etc).
Information is power and money.
Why is it difficult?
Computer systems are growing in complexity and
usage.
People make mistakes
2
HUMAN ERROR - EMAIL
3
HUMAN ERROR – ADOBE READER II
HUMAN ERROR –
LESSONS LEARNED
Users make errors
elaborate social engineering design
time pressure
Significant monetary motivation
Business efficiency via Internet
4
ADOBE READER… AGAIN - I
5
ADOBE READER… AGAIN - IV
JBIG2 exploit: potential threats
Start a keylogger
Start a botnet (zombie) client
Download further code from a remote site
COMPUTER SECURITY
INSTRUMENTS
Prevention
stop attackers from violating security policy
Detection
discover attackers’ violation of security policy
Recovery/Reaction
Prevent or end attack, assess and repair
damage
continue to function correctly even if attack
succeeds
6
POLICIES & MECHANISMS
Security policy – a statement of what is, and
what is not, allowed
Policy says: formal or informal - legal or illegal
This defines “security” for the site/system/etc.
Security mechanism - a method, tool, or
procedure for enforcing a security policy.
Mechanisms enforce policies – can be non
technical (ID proof)
Composition of policies
If policies conflict, discrepancies may create
security vulnerabilities
7
ASSUMPTIONS & TRUSTS
Underlie all aspects of security
Opening a door lock requires a key?
Policies
Unambiguously & clearly partition system states
into “secure & non-secure” states
Correctly capture security requirements not
allowing the system to enter in “non-secure”
state
Mechanisms
Assumed to enforce policy
Support mechanisms work correctly
TYPE OF MECHANISMS
8
ASSURANCE
Assurance - A basis of “how much” one
can trust a system
Specification
Requirements analysis
Statement of desired functionality
Design
How system will meet specification
Implementation
Programs/systems that carry out design
Medication for example….
TYING UP TOGETHER
9
TYING UP TOGETHER - OTHERS
KEY POINTS
Policy defines security
Mechanisms enforce security
Confidentiality
Integrity
Availability
Trust and knowing assumptions
Importance of assurance
The human factor
10
Thank You
11