Lecture 1
Lecture 1
SECURITY (5 UNITS)
2
Course Description…
Cryptography: Basics of cryptography such
as key management and digital signatures,
etc. and network security such as PKI,
IPSec, intrusion detection and prevention.
Risk management, security assurance, and
secure design principles. Issues such as
organizational security policy, legal and
ethical issues in security, standards and
methodologies for security evaluation and
certification.
3
Course Description…
Information protection: Techniques for the
protection and survivability of information
systems and networks. Critical infrastructure
definition, risk management, vulnerability and
risk analysis, fault and attack trees,
availability analysis, traffic restoration
schemes and survivable network design and
management techniques; critical
infrastructure simulation, CIP policy and legal
issues, SCADA systems; information security
standards including ISO 17799 or 27001/2.
4
Course Description…
Network Security: Principles of network
security and management. Threats on the
network, Review of network vulnerabilities,
security at the link, network and transport
layers; dial-up security (PAP, CHAP, Radius,
Diameter), IPSEC, SSL, and VPNS. Email
security (PGP, S/MIME); Kerberos; X.509
certificates; AAA and mobile IP; SNMP
security; firewalls; filters and gateways;
policies and implementation of firewall
policies; stateful firewalls; firewall
appliances.
5
Course Objectives
Objectives:
•To enable the students to get more
experience in computer network and
troubleshooting security issues by managing
networks.
1.Introduce the students to threats on IT
infrastructure including threats to computer
networks databases and applications
2.Give the students knowledge and skills of
designing security countermeasures for the
IT infrastructure
6
Learning Outcomes
At the end of the course students are
expected:
1.Understand the concept of information
systems security and protection
2.Know and be able to apply the latest
techniques for protection and survivability of
information systems;
3.Be competent managers of networks
including developing network security policies.
7
Course Contents…
Mode of Delivery:
• 50 Contact hours (30 lecture hours plus 20 hours of
practical) and 70 hours self-directed learning, assessment,
assignments and seminars.
8
References
1. Pfleeger, C. P., and S. L. Pfleeger, Security in Computing, 4th
Edition, Prentice-Hall International, 2006.
2. Stallings, W., Cryptography and Network Security, 5th
Edition, Prentice-Hall, 2011
9
Introduction
Overview
Security Goals
– The need for security
– OSI Security Architecture
Attacks, services and mechanisms
– Security attacks
– Security services
Methods of Defense
– A model for Internetwork Security
– Internet standards and RFCs
11
Computer/Information/Network
Security
13
Key Objectives
• Confidentiality
– Data Confidentiality-information not disclosed to
unauthorized individuals
– Privacy– individuals control how their information is
collected, stored, shared
• Integrity
– Data Integrity
– System Integrity
• Availability– service not denied to authorized users
14
Security Goals
• Confidentiality
– Concealment of information or resources
• Integrity
– Trustworthiness of data or resources
• Availability
– Ability to use information or resources
15
Security Goals
Confidentiality
Integrity Availability
16
Confidentiality
• Need for keeping information secret arises
from use of computers in sensitive fields such
as government and industry
• Access control mechanisms, such as
cryptography, support confidentiality
– Example: encrypting income tax return
• Lost through unauthorized disclosure of
information
17
Integrity
• Often requires preventing unauthorized
changes
• Includes data integrity (content) and origin
integrity (source of data also called
authentication)
• Include prevention mechanisms and detection
mechanisms
– Example: Newspaper prints info leaked from White
House and gives wrong source
• Includes both correctness and trustworthiness
• Lost through unauthorized modification or
destruction of information 18
Availability
• Is an aspect of reliability and system design
• Attempts to block availability, called denial of
service attacks (DoS) are difficult to detect
– Example: bank with two servers –one is blocked, the
other provides false information
• Ensures timely and reliable access to and use
of information
• Lost through disruption of access to
information or information system
19
Authenticity and
Accountability
Two additional objectives:
•Authenticity- being genuine and able to be
verified or trust; verifying that users are who
they say they are
•Accountability-actions of an entity can be
traced uniquely to that entity; supports
nonrepudiation, deterrence, fault isolation,
intrusion-detection and prevention.
20
Insecurity and Levels of
Impact
• We can define 3 levels of impact from
a security breach:
– Low
– Moderate
– High
21
Security Breach
Low Impact
• Loss has limited adverse effect
• For example:
– Effectiveness of the functions of an
organization are noticeably reduced
– Results in minor damage to organizational
assets
– Results in minor financial loss
– Results in minor harm to individuals
22
Security Breach
Moderate Impact
• Loss may have serious adverse effect on
organizational operations, assets or individuals.
• For example:
– Effectiveness of the functions of an
organization are significantly reduced
– Results in significant damage to organizational
assets
– Results in significant financial loss
– Results in significant harm to individuals
23
Security Breach
High Impact
• Loss is expected to have severe or catastrophic adverse
effect on organizational operations, assets or individuals.
• For example:
– Effectiveness of the functions of an organization are
reduced so that the organization cannot perform its
primary function(s).
– Results in major damage to organizational assets
– Results in major financial loss
– Results in severe or catastrophic harm to individuals,
involving loss of life or serious life-threatening
injuries
24
Examples of Security
Requirements
• Confidentiality – student grades
– High confidentiality - grades
• Only available to students, parents and employees
(who need it to do their job)
– Moderate confidentiality –enrollment
– Low confidentiality – Directory information
• Lists of departments, faculty, students
• Available to the public
• Often published on Web site
25
Examples of Security
Requirements
• Integrity- patient information
– High requirement for integrity
• –Medical database, if falslified or inaccurate, could
cause harm ( allergies, etc.)
– Medium requirement for integrity
• Web site that offers a forum for discussion of
medical topics, not for research
– Low requirement for integrity
• Anonymous poll (such as a patient satisfaction)
26
Examples of Security
Requirements
Availability - The more critical a component or
service is, the higher the level of availability
required:
•High availability- authentication service
– Interruption of service results in being unable to
access computing resources
•Moderate availability- College web site
– Provides information but is not critical
•Low availability- online phone directory
– Other sources of information are available 27
The Need for Security
• Motivation: Why do we need security?
29
Security Concerns
• Damage to any IT-based system or activity can result
in severe disruption of services and losses
• Systems connected by networks are more prone to
attacks and also suffer more as a result of the
attacks than stand-alone systems (Reasons?)
32
https://
33
However, in reality
• Security is often over looked (not one of the top criteria)
• Availability, efficiency and performance tend to be the
ones
• Buggy implementations
• Systems too complex in nature and rich in features can be
filled with security holes
• Incorporation of security into networks, not growing with
the rapidly growing number and size of networks
• Attacking is becoming so common and easy – there are
books clearly explaining how to launch them
• Security and attacks are a perpetual cat-and-mouse play.
The only way to avoid attacks is to keep up-to-date with
latest trends and stay ahead of malicious netizens
34
The Good News...
36
Computer Security
Challenges
6. battle of wits between attacker/administrator
7. not perceived to be a benefit until it fails
8. requires regular monitoring
9. too often an after-thought
10. regarded as impediment to efficient and user
friendly use of system
These difficulties will be explored
throughout the course.
37
OSI Security Architecture
38
OSI Model
• 7 Layer Model
• Describes the protocols and details of
transmitting data at each layer
• “Please do not throw sausage pizza away.”
39
7 Layer OSI Model
Layer Functions
7 Application How application uses network
45
Security Attacks
46
Security Attacks (continued)
47
Threats
48
Examples of Threats
49
Passive and Active Attacks
50
Passive and active attacks…
52
Passive Attacks
53
Active Attacks
54
Active Attacks
55
Summary of Passive and Active Threats
56
Safeguards and
Vulnerabilities
• A Safeguard is a countermeasure to protect
against a threat
57
Services and Mechanisms
• A security policy is a statement of what is
and what is not allowed.
• A security service is a measure to address a
threat
– E.g. authenticate individuals to prevent
unauthorized access
• A security mechanism is a means to provide
a service
– E.g. encryption, cryptographic protocols
58
Security Services
– enhance security of data processing systems
and information transfers of an organization
– are intended to counter security attacks
– use one or more security mechanisms
– often replicate functions normally associated
with physical documents
• which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; are notarized or witnessed; are
recorded or licensed
59
Security Services
• (X.800) defines a security service as a service
provided by the protocol layer of a
communicating system, that ensures adequate
security of the systems or data transfers
• 6 Categories
– Authentication
– Availability
– Access Control
– Data confidentiality
– Data Integrity and
60
– Nonrepudiation
Security services
61
Security Services
• Authentication (who created or sent the data)
• Access control (prevent misuse of resources)
• Confidentiality (privacy)
• Integrity (has not been altered)
• Non-repudiation (the order is final)
• Availability (permanence, non-erasure)
– Denial of Service Attacks
– Virus that deletes files
62
Security Services
Examples
• Authentication
– Ensuring the proper identification of entities and origins of
data before communication
• have both peer-entity & data origin authentication
• Access control
– Preventing unauthorized access to system resources
• Data confidentiality
– Preventing disclosure to unauthorized parties
• Data integrity
– Preventing corruption of data
• Non-repudiation
– Collecting proof to prevent denial of participation in transaction or
communication
• Availability
– Protection against denial-of-service
63
Security Mechanism
• Basic tasks
– Design an algorithm that opponent cannot
defeat
– Generate the secret information to be used
with the algorithm
– Develop methods for distributing secret
information
– Specify a protocol to be used
• May need a trusted third party to assist
66
Model for Network Security
67
Security Models
68
Two Types of Program
Threats
• Information access threats
– Intercept or modify data on behalf of users who
should not have access to that data.
– E.g. corruption of data by injecting malicious code
• Service threats
– Exploit service flaws in computers to inhibit use by
legitimate users.
• Viruses and worms are examples of software
attacks.
69
General Security
Access Model
70
Model for Network Access
Security
• Security mechanisms for controlling unwanted
access fall into two categories.
• Using this model requires us to:
1. select appropriate gatekeeper functions to identify
users (for example, password-based login procedures)
2. implement security controls to ensure only authorised
users access designated information or resources
(for example, monitor activities and analyze stored
information to detect the presence of intruders.
These two categories when taken togather they make
it possible to achieve a mechanism for—AAA
71
Fundamental threats [McGibney04]
• Information leakage
– Disclosure to unauthorized parties
– Prince Charles mobile phone calls, 1993
• Integrity violation
– Corruption of data or loss of data
– Coca-Cola website defaced with slogans, 1997
• Denial of service
– Unavailability of system/service/network
– Yahoo!, 2000, 1Gbps
• Illegitimate use
– Morris Internet worm spread to 5% of machines on the
Internet, 1988
72
Methods of Defense
• Encryption
• Software Controls
– (access limitations in a data base, in operating
system protect each user from other users)
• Hardware Controls
– (smartcard)
• Policies
– (frequent changes of passwords)
• Physical Controls
73
Internet standards and
RFCs
• National Institute of Standards and
Technology (NIST)
• The Internet Society (ISOC)
– Internet Architecture Board (IAB)
– Internet Engineering Task Force (IETF)
– Internet Engineering Steering Group (IESG)
– These organizations developed standards,
published as Request for Comments (RFC)
74
Internet RFC Publication Process
75
Policies and Mechanisms
• Policy says what is, and is not, allowed
– This defines “security” for the
site/system/etc.
• Mechanisms enforce policies
• Composition of policies
– If policies conflict, discrepancies may
create security vulnerabilities
76
Goals of Security
• Prevention
– Prevent attackers from violating security
policy
• Detection
– Detect attackers’ violation of security policy
• Recovery
– Stop attack, assess and repair damage
– Continue to function correctly even if attack
succeeds
77
Trust and Assumptions
Underlie all aspects of security:
•Policies
– Unambiguously partition system into
states—secure and insecure states
– Correctly capture security requirements
•Mechanisms
– Assumed to enforce policy
– Support mechanisms work correctly
78
Security Assurance
Achieved through:
•Specification
– Requirements analysis
– Statement of desired functionality
•Design
– How system will meet specification
•Implementation
– Programs/systems that carry out design
79
Operational Issues
• Cost-Benefit Analysis
– Is it cheaper to prevent or detect or
recover?
• Risk Analysis
– Should we protect something?
– How much should we protect this thing?
• Laws and Customs
– Are desired security measures illegal?
– Will people do them?
80
Human Issues
• Organizational Problems
– Power and responsibility
– Financial benefits
• People problems
– Outsiders and insiders
– Social engineering
81
Tying Together
Threats
Policy
Specification
Design
Implementation
Operation
82
Outline of Course
• Part One - Introduction
• Part Two–Use of Cryptographic algorithms and
security protocols to provide security over the
Internet. Topics include: key management,
authentication, as well as transport-level,
wireless, email and IP security
• Part Three-Deals with security facilities to
protect against threats, including intruders,
viruses and worms.
83
Summary
• topic roadmap
• security concepts:
– confidentiality, integrity, availability
• X.800 security architecture
• security attacks, services, mechanisms
• models for network (access) security
• Standards organizations
• Security Policies & Mechanisms
84