Lecture 2
Lecture 2
04/29/2024
Eng. Mohamed Jaambiir
Computer Network Security
COS-413
Lecture Two
Eng. Mohamed Jaambiir
2
Aspects of Security
Non-repudiation:
Nonrepudiation provides proof of the origin, authenticity and integrity of data. It provides
assurance to the sender that its message was delivered, as well as proof of the sender's identity to
the recipient. This way, neither party can deny that a message was sent, received and processed.
Access control:
Access control is an essential element of security that determines who is allowed to access certain
data, apps, and resources—and in what circumstances.
Authorization:
Authorization species the rights of actors to access resources. This includes the rights to view or
change information on a shared system or database, as well as rights to know or alter the content
of certain communications.
I. Active attack:
An attempt to alter system resources or affect their operation.
II. Passive attack:
An attempt to learn or make use of information from the system that does not
affect system resources.
I. Inside attack:
Initiated by an entity inside the security perimeter (an “ insider”). The insider is
authorized to access system resources but uses them in a way not approved by those
who granted the authorization.
II. Outside attack:
Initiated from outside the perimeter, by an unauthorized or illegitimate user of the
system (an “outsider”). On the Internet, potential Outside attackers range from
amateur pranksters to organized criminals, international terrorists, and hostile
governments.
This principle defines that the This principle says that if any
security measures implemented in user wants access to any
the software and the hardware must mechanism then whether the
be simple and small. access is permitted or denied
should be based on authorization
rather than elimination.
Least privilege
Separation of privilege
This security principle states that whenever This principle states that each user
a user tries to gain access to a system, the should be able to access the
access should not be granted based on a system with the least privilege.
single attribute or condition. Instead, there
Only those limited privileges
must be multiple situations or conditions or
attribute which should be verified to grant should be assigned to the user
access to the system. which are essential to perform the
desired task.
According to this principle, the cost This principle states that user
of bypass a security mechanism interfaces should be well designed
should be compared with the and intuitive, and all security-
resources of an attacker when related settings should adhere to
designing a security scheme. what an ordinary user might
expect.
Compromise recording
Work factor
This principle states that
This security principle there should sometimes it is more desirable to
be minimum common functions to record the details of an intrusion
share between the different user. than to adopt more sophisticated
measures to prevent it.
The first thing we must admit is that the attacker knows the encryption and decryption
functions. This is known as Kerckhoffs’ Principle.
Lars Knudsen, a Danish researcher, proposed the following division for determining the scale
of attacker's success:
Total break: deducing and obtaining a secret key.
Global deduction: discovering an algorithm, which allows to decrypt many messages,
without knowing the actual secret key.
Local deduction: discovering an original plaintext of the specific given ciphertext.
Information deduction: obtaining some information about the secret key or original message
(for example, a few bits of the key or information about a plaintext format).
Eng. Mohamed Jaambiir 04/29/2024
18
The End
Eng. Mohamed Jaambiir 04/29/2024