Chapter 1: Introduction
Chapter 1: Introduction
Begin at the beginning, the King said, very gravely, and go on till you come to the end: then stop. Lewis Carroll, Alice in Wonderland
Chapter 1 Introduction
Trudy
Trudy
Chapter 1 Introduction
Bob is a customer of AOB, what are his security concerns? are Alices and Bobs concerns similar? How are they different? does Trudy view the situation?
3
How How
Chapter 1 Introduction
CIA
CIA
AOB
Confidentiality:
Chapter 1 Introduction
CIA
Trudy
Bob
Integrity:
Chapter 1 Introduction
CIA
Availability: Data is available in a timely manner when needed Availability is a new security concern
o Denial of service (DoS) attacks
Chapter 1 Introduction
does Bobs computer know that Bob is really Bob and not Trudy?
password must be verified are security concerns of pwds?
o This requires some clever cryptography
Bobs What
Are
Chapter 1 Introduction
When Bob logs into AOB, how does AOB know that Bob is really Bob?
As before, Bobs password is verified Unlike the previous case, network security issues arise What are network security concerns?
o Protocols are critically important o Crypto also important in protocols
Chapter 1 Introduction
Once Bob is authenticated by AOB, then AOB must restrict actions of Bob
o Bob cant view Charlies account info
Enforcing these restrictions: authorization Access control includes both authentication and authorization
9
Chapter 1 Introduction
Chapter 1 Introduction
Your Textbook
The
Chapter 1 Introduction
Chapter 1 Introduction
12
Chapter 1 Introduction
o None of the security mechanisms failed o But user unintentionally broke security
Chapter 1 Introduction 14
Cryptography
Secret
The
codes
book covers
o Classic cryptography
o Symmetric ciphers
o Public key cryptography o Hash functions++ o Advanced cryptanalysis
Chapter 1 Introduction 15
Access Control
Authentication
o Passwords o Biometrics (and other)
Authorization
o Access Control Lists/Capabilities o Multilevel security (MLS), security modeling,
Chapter 1 Introduction
16
Protocols
Simple
authentication protocols
security protocols
Chapter 1 Introduction
17
Software
Security-critical
flaws in software
Software
Software
Digital
and testing
Software
Operating systems
o Basic OS security issues o Trusted OS requirements o NGSCB: Microsofts trusted OS for the PC
Recently,
o Books on network hacking, how to write evil software, how to hack software, etc. o Classes teach writing viruses, SRE, etc.
Chapter 1 Introduction 21
police detective
information security
o We want to understand Trudys methods o Might be good to know Trudys motives o Well often pretend to be Trudy
Chapter 1 Introduction 22
Bruce
Chapter 1 Introduction
23
must try to think like Trudy We must study Trudys methods We can admire Trudys cleverness Often, we cant help but laugh at Alices and/or Bobs stupidity But, we cannot act like Trudy
o Except in this class
Chapter 1 Introduction 24
In This Course
Think
o What rules?
Think