CH 01
CH 01
First Edition
by William Stallings and Lawrie Brown
https://www.youtube.com/watch?v=n8
mbzU0X2nQ
Scope of Computer Security
Network Security Attacks
⮚ A useful means of classifying network security attacks is in terms of:
⮚ Passive attacks are eavesdropping on, or monitoring of, transmissions to
obtain information that is being transmitted. Two types of passive attacks
are:
• release of message contents - opponent learns contents of sensitive
transmissions
• traffic analysis - can occur even when contents of messages are masked,
e.g using encryption, but an opponent can still observe the pattern of
messages and determine location and identity of communicating hosts,
frequency and length of messages being exchanged, and hence guess
nature of communications.
⮚ Passive attacks are very difficult to detect because they do not involve any
alteration of the data. However, it is feasible to prevent the success of these
attacks, usually by means of encryption. Thus, emphasis is on prevention
rather than detection.
⮚ Active attacks involve modification of data stream or creation
of false data:
• masquerade - when one entity pretends to be another.
• replay passive capture of data and subsequent retransmission.
• modification of messages a legitimate message is altered,
delayed or reordered.
• denial of service prevents or inhibits the normal use or
management of communications facilities, or the disruption of
an entire network
⮚ Active attacks present the opposite characteristics of passive
attacks. It is quite difficult to prevent active attacks absolutely.
Instead, the goal is to detect them and to recover from any
disruption or delays caused by them.
Security Functional
Requirements
Here we view countermeasures in terms of functional
requirements, and we follow the classification defined in FIPS
PUB 200 (Minimum Security Requirements for Federal
Information and Information Systems). This standard enumerates
seventeen security-related areas, and are defined in Table 1.4 in
the text.
The requirements listed in FIP PUB(Federal Information
Processing Standard Publication) encompass a wide range of
countermeasures to security vulnerabilities and threats. Each of
the functional areas may involve both computer security
technical measures and management measures.
Functional areas that are primarily require computer security
technical measures include access control; identification and
authentication; system and communication protection; and system
and information integrity. Functional areas that primarily involve
management controls and procedures include awareness and
training; audit and accountability; certification, accreditation, and
security assessments; contingency planning; maintenance; physical
and environmental protection; planning; personnel security; risk
assessment; and systems and services acquisition. Functional areas
that overlap computer security technical measures and management
controls include configuration management; incident response; and
media protection.
Security Taxonomy
X.800 Security Architecture
defines a systematic way of defining the
requirements for security and characterizing the
approaches to satisfying those requirements. The
OSI security architecture is useful to managers
as a way of organizing the task of providing
security. The OSI security architecture focuses
on security attacks, mechanisms, and services.
These can be defined briefly as:
⮚ • Security attack: Any action that compromises the security
of information owned by an organization. cf. network security
attacks slide earlier
⮚ • Security mechanism: A mechanism that is designed to
detect, prevent, or recover from a security attack. cf.
functional requirements from previous slide or Table 1.6 in
text.
⮚ • Security service: A service that enhances the security of the
data processing systems and the information transfers of an
organization. The services are intended to counter security
attacks, and they make use of one or more security
mechanisms to provide the service. cf CIA security concepts
earlier, or Table 1.5 in text.
Security Trends
Computer Security Losses
Security Technologies Used
Computer Security Strategy
⮚ specification/policy
● what is the security scheme supposed to do?
● codify in policy and procedures
⮚ implementation/mechanisms
● how does it do it?
● prevention, detection, response, recovery
⮚ correctness/assurance
● does it really work?
● assurance, evaluation
Summary
⮚ security concepts
⮚ terminology
⮚ functional requirements
⮚ security architecture
⮚ security trends
⮚ security strategy