0% found this document useful (0 votes)
117 views

2 (V.v.imp) Security Goals or Key Principles of Security

The document discusses the key principles of information security - confidentiality, integrity, and availability (CIA triad). It defines each principle and provides examples. Confidentiality refers to protecting information from unauthorized access. Integrity means maintaining and assuring the accuracy and completeness of information. Availability ensures timely access to information resources. The document also discusses additional security goals like authenticity, access control, and non-repudiation. It outlines common security attacks like interruption, interception, modification, and fabrication that can impact the CIA triad goals.

Uploaded by

ckoparkar123
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views

2 (V.v.imp) Security Goals or Key Principles of Security

The document discusses the key principles of information security - confidentiality, integrity, and availability (CIA triad). It defines each principle and provides examples. Confidentiality refers to protecting information from unauthorized access. Integrity means maintaining and assuring the accuracy and completeness of information. Availability ensures timely access to information resources. The document also discusses additional security goals like authenticity, access control, and non-repudiation. It outlines common security attacks like interruption, interception, modification, and fabrication that can impact the CIA triad goals.

Uploaded by

ckoparkar123
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 18

Security Goals/ Key Principles of Security

V.V.IMP (Compulsory Question can be expected for 5-10 M) BY ::


Prof Yogesh Doulatramani VIT College

CIA Triad

Key Objectives
Confidentiality
Data Confidentiality-information not disclosed to unauthorized individuals Privacy individuals control how their information is collected, stored, shared

Integrity
Data Integrity System Integrity

Availability service not denied to authorized users


3

Security Goals
Confidentiality

Integrity

Avalaibility

Security Goals
Confidentiality
Concealment of information or resources

Integrity
Trustworthiness of data or resources

Availability
Ability to use information or resources

Confidentiality
Need for keeping information secret arises from use of computers in sensitive fields such as government and industry Access mechanisms, such as cryptography, support confidentiality Example: encrypting income tax return Lost through unauthorized disclosure of information
6

Integrity
Often requires preventing unauthorized changes Includes data integrity (content) and origin integrity (source of data also called authentication) Include prevention mechanisms and detection mechanisms

Includes both correctness and trustworthiness Lost through unauthorized modification or 7 destruction of information

Example: Newspaper prints info leaked from White House and gives wrong source

Availability
Is an aspect of reliability and system design Attempts to block availability, called denial of service attacks (DoS) are difficult to detect
Example: bank with two servers one is blocked, the other provides false information

Ensures timely and reliable access to and use of information Lost through disruption of access to information or information system
8

3 Additional Goals
Authenticity- being genuine and able to be verified or trust; verifying that users are who they say they are (use Digital Certificates,Passwords,Biometrics)
Access Control : only users with rights(r,w,x) will be allowed(use Access Control Matrix) Non-Repudiation : user cant deny later (use Digital Signatures

Security Attacks on Goals

10

Security Attacks

Information source

Information destination

Normal Flow

11

Security Attacks

Information source

Information destination

Interruption Attack on availability


(ability to use desired information or resources) 12

Security Attacks

Information source

Information destination

Interception Attack on confidentiality


(concealment of information) 13

Security Attacks

Information source

Information destination

Fabrication Attack on authenticity


(identification and assurance of origin of information) 14

Security Attacks

Information source

Information destination

Modification Attack on integrity


(prevention of unauthorized changes) Network Security 15

Security Threats/Attacks

16

Security Attacks
Interruption: This is an attack on availability
Disrupting traffic Physically breaking communication line

Interception: This is an attack on confidentiality


Overhearing, eavesdropping over a communication line

17

Security Attacks (continued)


Modification: This is an attack on integrity
Fabrication: This is an attack on authenticity
Corrupting transmitted data or tampering with it before it reaches its destination

Faking data as if it were created by a legitimate and authentic party


18

You might also like