CS 5950/6030 Network Security Class 2 (F, 9/2/05)
CS 5950/6030 Network Security Class 2 (F, 9/2/05)
Description: Survey of topics in the area of computer and network security with
a thorough basis in the fundamentals of computer/network security.
3
...
4
1.2. Survey of Students’ Background and Experience (1)
Background Survey
CS 5950/6030 Network Security - Fall 2005
Please print all your answers.
First name: __________________________ Last name: _____________________________
Email _____________________________________________________________________
Undergrad./Year ________ OR:Grad./Year or Status (e.g., Ph.D. student) ________________
Major _____________________________________________________________________
6
1.3. Introduction to Security (1)
1.3.1. Examples – Security in Practice
...
9
1.3.3. Pillars of Security:
Confidentiality, Integrity, Availability (CIA)
Confidentiality: Who is authorized?
Integrity: Is the data „good?”
Availability: Can access data whenever need it?
Confidentiality Integrity
S
Availability
S = Secure
[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 10
Balancing
CIA
Biographical Payroll Health
Data Data Data
Confidentiality Integrity
Sensitive
Data
Availability
12
Confidentiality
“Need to know” basis for data access
– How do we know who needs what data?
Approach: access control specifies who can access what
– How do we know a user is the person she claims to be?
Need her identity and need a gatekeeper to verify this identity
Approach: identification and authentication
13
Integrity
Integrity vs. Confidentiality
– Concerned with unauthorized modification of assets (= resources)
Confidentiality - concered with access to assets
– Integrity is more difficult to measure than confidentiality
Not binary – degrees of integrity
Context-dependent - means different things in different contexts
Could mean any subset of these asset properties:
{ precision / accuracy / currency / consistency /
meaningfulness / usefulness / ...}
Complex
Context-dependent
Could mean any subset of these asset (data or service)
properties :
{ usefulness / sufficient capacity /
progressing at a proper pace /
completed in an acceptable period of time / ...}
[Pfleeger & Pfleeger]
15
Availability (2)
16
1.3.4. Vulnerabilities, Threats, and Controls
Understanding Vulnerabilities, Threats, and Controls
– Vulnerability = a weakness in a security system
– Threat = circumstances that have a potential to cause
harm
– Controls = means and ways to block a threat, which tries
to exploit one or more vulnerabilities
• Most of the class discusses various controls and their
effectiveness
17
Attack
– = exploitation of one or more vulnerabilities by a threat;
tries to defeat controls
• Attack may be:
– Successful
• resulting in a breach of security, a system penetration, etc.
– Unsuccessful
• when controls block a threat trying to exploit a
vulnerability
[Pfleeger & Pfleeger]
Examples
– Fig. 1-1 (p.6)
– New Orleans disaster (Hurricane Katrina):
What were city vulnerabilities, threats, and controls
18
Kinds of Threats
Kinds of threats:
– Interception
• an unauthorized party (human or not) gains access to an
asset
– Interruption
• an asset becomes lost, unavailable, or unusable
– Modification
• an unauthorized party changes the state of an asset
– Fabrication
• an unauthorized party counterfeits an asset
[Pfleeger & Pfleeger]
Examples?
19
Levels of Vulnerabilities / Threats
D) for other assets (resources)
• including. people using data, s/w, h/w
C) for data
• „on top” of s/w, since used by s/w
B) for software
• „on top” of h/w, since run on h/w
A) for hardware
20
A) Hardware Level of Vulnerabilities / Threats
Add / remove a h/w device
– Ex: Snooping, wiretapping
Snoop = to look around a place secretly in order to discover things about it or
the people connected with it. [Cambridge Dictionary of American English]
– Ex: Modification, alteration of a system
– ...
Physical attacks on h/w => need physical security: locks and guards
– Accidental (dropped PC box) or voluntary (bombing a computer
room)
– Theft / destruction
• Damage the machine (spilled coffe, mice, real bugs)
• Steal the machine
• „Machinicide:” Axe / hammer the machine
• ...
21
Example of Snooping:
Wardriving / Warwalking, Warchalking,
Wardriving/warwalking -- driving/walking
around with a wireless-enabled notebook
looking for unsecured wireless LANs
26
Viruses
Virus
A hidden, self-replicating section of computer software, usually malicious
logic, that propagates by infecting (i.e., inserting a copy of itself into and
becoming part of) another program. A virus cannot run by itself; it requires that
its host program be run to make the virus active
Bacteria
Worms
Logic Bombs Viruses
30