0% found this document useful (0 votes)
55 views

CS 5950/6030 Network Security Class 2 (F, 9/2/05)

The document summarizes key topics from the second class of a network security course. It discusses the three pillars of security - confidentiality, integrity, and availability. For each pillar, it provides definitions and examples. It then discusses vulnerabilities, threats, and controls, defining each term. The document aims to introduce foundational concepts of network security.

Uploaded by

Pradeep Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

CS 5950/6030 Network Security Class 2 (F, 9/2/05)

The document summarizes key topics from the second class of a network security course. It discusses the three pillars of security - confidentiality, integrity, and availability. For each pillar, it provides definitions and examples. It then discusses vulnerabilities, threats, and controls, defining each term. The document aims to introduce foundational concepts of network security.

Uploaded by

Pradeep Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 30

CS 5950/6030 Network Security

Class 2 (F, 9/2/05)


Leszek Lilien
Department of Computer Science
Western Michigan University

[Using some slides prepared by:


Prof. Aaron Striegel, University of Notre Dame
Prof. Barbara Endicott-Popovsky and Prof. Deborah Frincke, University of Washington]
Section 1– Class 2
Class 1:
1.1. Course Overview
– Syllabus - Course Introduction
1.2. Survey of Students’ Background and Experience
1.3. Introduction to Security
1.3.1. Examples – Security in Practice
1.3.2. What is „Security?”
1.3.3. Pillars of Security: Confidentiality, Integrity, Availability (CIA) – PART 1
Class 2:
1.3.3. Pillars of Security: Confidentiality, Integrity, Availability
(CIA) — PART 2
1.3.4. Vulnerabilities, Threats, and Controls – PART 1
Vulnerabilities, Threats, and Controls / Attacks
Kinds of Threats
(interception/interruption/modification/fabrication)
Levels of Vulnerabilities / Threats
A) Hardware level
B) Software level
... To be continued ...
2
1.1. Course Overview (1)
CS 5950/6030: Network Security - Fall 2005
Department of Computer Science
Western Michigan University

Description: Survey of topics in the area of computer and network security with
a thorough basis in the fundamentals of computer/network security.

Class: CEAS C0141, M W F 3:00 PM – 3:50 PM


Instructor: Dr. Leszek (Leshek) Lilien, CEAS B-249, phone: 276-3116
Email: [email protected] – please use for urgent matters only
Notes:
1) Only mail coming from a WMU account (ending with “wmich.edu” will be read).
2) Files submitted as attachments will not be read unless they are scanned with
up-to-date anti-viral software, and the message including them contains the
following statement:
I have scanned the enclosed file(s) with <name of software, its version>, which
was last updated on <date>>.

Office Hours: MW 4:30 PM -5:30 PM F 1:30 PM – 2:30 PM  OK?

Web Pages: http://www.cs.wmich.edu/~llilien/cs5950-6030/index.html

3
...

4
1.2. Survey of Students’ Background and Experience (1)
Background Survey
CS 5950/6030 Network Security - Fall 2005
Please print all your answers.
First name: __________________________ Last name: _____________________________
Email _____________________________________________________________________
Undergrad./Year ________ OR:Grad./Year or Status (e.g., Ph.D. student) ________________
Major _____________________________________________________________________

PART 1. Background and Experience


1-1) Please rate your knowledge in the following areas (0 = None, 5 = Excellent).
UNIX/Linux/Solaris/etc. Experience (use, administration, etc.)
0 1 2 3 4 5
Network Protocols (TCP, UDP, IP, etc.)
0 1 2 3 4 5
Cryptography (basic ciphers, DES, RSA, PGP, etc.)
0 1 2 3 4 5
Computer Security (access control, security fundamentals, etc.)
0 1 2 3 4 5

Any new students


who did not fill out the survey?
5
...

6
1.3. Introduction to Security (1)
1.3.1. Examples – Security in Practice

...

[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 7


1.3.2. What is „Security?”

You Will Never Own a Perfectly Secure


System.

You Will Never Own a Perfectly Secure


System.

You Will Never Own a Perfectly Secure


System.

[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 8


...

9
1.3.3. Pillars of Security:
Confidentiality, Integrity, Availability (CIA)
Confidentiality: Who is authorized?
Integrity: Is the data „good?”
Availability: Can access data whenever need it?

Confidentiality Integrity
S

Availability
S = Secure
[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 10
Balancing
CIA
Biographical Payroll Health
Data Data Data

Confidentiality Integrity

Sensitive
Data

Availability

Need to balance CIA


Packet
Ex: Disconnect computer from Switch
Internet to increase
confidentiality (availability
suffers, integrity suffers due to Bridge
lost updates)
File
Server
Ex: Have extensive data checks
by different people/systems to
increase integrity (confidentiality Gateway
suffers as more people see data,
availability suffers due to locks Other
Networks
on data under verification)

[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 11


Class 1 ended here.
Class 2 starts here.

12
Confidentiality
 “Need to know” basis for data access
– How do we know who needs what data?
Approach: access control specifies who can access what
– How do we know a user is the person she claims to be?
Need her identity and need a gatekeeper to verify this identity
Approach: identification and authentication

 Analogously: “Need to access/use” basis for physical assets


– E.g., access to a computer room, use of a desktop
 Confidentiality is:
– difficult to ensure
– easiest to assess in terms of success (binary in nature: Yes / No)

13
Integrity
 Integrity vs. Confidentiality
– Concerned with unauthorized modification of assets (= resources)
Confidentiality - concered with access to assets
– Integrity is more difficult to measure than confidentiality
Not binary – degrees of integrity
Context-dependent - means different things in different contexts
Could mean any subset of these asset properties:
{ precision / accuracy / currency / consistency /
meaningfulness / usefulness / ...}

 Types of integrity—an example


– Quote from a politician
– Preserve the quote (data integrity) but misattribute (origin
integrity)
14
Availability (1)
 Not understood very well yet
„[F]ull implementation of availability is security’s next challenge”
E.g. Full implemenation of availability for Internet users (with
ensuring security)

 Complex
Context-dependent
Could mean any subset of these asset (data or service)
properties :
{ usefulness / sufficient capacity /
progressing at a proper pace /
completed in an acceptable period of time / ...}
[Pfleeger & Pfleeger]
15
Availability (2)

 We can say that an asset (resource) is available if:


– Timely request response
– Fair allocation of resources (no starvation!)
– Fault tolerant (no total breakdown)
– Easy to use in the intended way
– Provides controlled concurrency (concurrency control,
deadlock control, ...)
[Pfleeger & Pfleeger]

16
1.3.4. Vulnerabilities, Threats, and Controls
 Understanding Vulnerabilities, Threats, and Controls
– Vulnerability = a weakness in a security system
– Threat = circumstances that have a potential to cause
harm
– Controls = means and ways to block a threat, which tries
to exploit one or more vulnerabilities
• Most of the class discusses various controls and their
effectiveness

[Pfleeger & Pfleeger]

17
 Attack
– = exploitation of one or more vulnerabilities by a threat;
tries to defeat controls
• Attack may be:
– Successful
• resulting in a breach of security, a system penetration, etc.
– Unsuccessful
• when controls block a threat trying to exploit a
vulnerability
[Pfleeger & Pfleeger]

 Examples
– Fig. 1-1 (p.6)
– New Orleans disaster (Hurricane Katrina):
What were city vulnerabilities, threats, and controls

18
Kinds of Threats
 Kinds of threats:
– Interception
• an unauthorized party (human or not) gains access to an
asset
– Interruption
• an asset becomes lost, unavailable, or unusable
– Modification
• an unauthorized party changes the state of an asset
– Fabrication
• an unauthorized party counterfeits an asset
[Pfleeger & Pfleeger]
 Examples?

19
Levels of Vulnerabilities / Threats
 D) for other assets (resources)
• including. people using data, s/w, h/w
 C) for data
• „on top” of s/w, since used by s/w
 B) for software
• „on top” of h/w, since run on h/w
 A) for hardware

[Pfleeger & Pfleeger]

20
A) Hardware Level of Vulnerabilities / Threats
 Add / remove a h/w device
– Ex: Snooping, wiretapping
Snoop = to look around a place secretly in order to discover things about it or
the people connected with it. [Cambridge Dictionary of American English]
– Ex: Modification, alteration of a system
– ...
 Physical attacks on h/w => need physical security: locks and guards
– Accidental (dropped PC box) or voluntary (bombing a computer
room)
– Theft / destruction
• Damage the machine (spilled coffe, mice, real bugs)
• Steal the machine
• „Machinicide:” Axe / hammer the machine
• ...
21
Example of Snooping:
Wardriving / Warwalking, Warchalking,
 Wardriving/warwalking -- driving/walking
around with a wireless-enabled notebook
looking for unsecured wireless LANs

 Warchalking -- using chalk markings to show


the presence and vulnerabilities of wireless
networks nearby
– E.g., a circled "W” -- indicates a WLAN protected
by Wired Equivalent Privacy (WEP) encryption

[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 22


Example of Snooping:
Tapping Wireless
http://www.oreillynet.com/cs/weblog/view/wlg/448

[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 23


[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 24
Example of System Alteration:
Skimming from ABC.com

A legitimate transaction, so it seems... Stealing credit card data.

Making counterfeit „blank” credit Magetizing the magnetic strip to


card (with a blank magnetic strip). complete produsing a counterfeit card.
[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 25
B) Software Level of Vulnerabilities / Threats
 Software Deletion
– Easy to delete needed software by mistake
– To prevent this: use configuration management
software
 Software Modification
– Trojan Horses, , Viruses, Logic Bombs, Trapdoors,
Information Leaks (via covert channels), ...
 Software Theft
– Unauthorized copying
• via P2P, etc.

26
Viruses
 Virus
A hidden, self-replicating section of computer software, usually malicious
logic, that propagates by infecting (i.e., inserting a copy of itself into and
becoming part of) another program. A virus cannot run by itself; it requires that
its host program be run to make the virus active

 Many kinds of viruses:


 Mass Mailing Viruses  Cell phone viruses
 Macro Viruses  Home appliance viruses
 “Back Doors” a.k.a. “Remote Access Trojans”

[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 27


Types of Malicious Code
Trapdoors
Trojan Horses
X
Files

Bacteria

Worms
Logic Bombs Viruses

[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington] 28


Bacterium - A specialized form of virus which does not attach to a specific file.
Usage obscure.
Logic bomb - Malicious [program] logic that activates when specified conditions
are met. XUsually intended to cause denial of service or otherwise damage system
resources.
File
s
Trapdoor - A hidden computer flaw known to an intruder, or a hidden computer
mechanism (usually software) installed by an intruder, who can activate the trap
door to gain access to the computer without being blocked by security services or
mechanisms.
Trojan horse - A computer program that appears to have a useful function, but
also has a hidden and potentially malicious function that evades security
mechanisms, sometimes by exploiting legitimate authorizations of a system entity
that invokes the program.
Virus - A hidden, self-replicating section of computer software, usually malicious
logic, that propagates by infecting (i.e., inserting a copy of itself into and
becoming part of) another program. A virus cannot run by itself; it requires that
its host program be run to make the virus active.
Worm - A computer program that can run independently, can propagate a
complete working version of itself onto other hosts on a network, and may
consume computer resources destructively.
[…more types of malicious code exist…] [bacterium: http://sun.soci.niu.edu/~rslade/secgloss.htm, other: http://www.ietf.org/rfc/rfc2828.txt] 29
Continued - Class 3

30

You might also like