Lecture 1 - Intro to Security
Lecture 1 - Intro to Security
Chapters
• Introduction On Security
• Cryptography
• Traditional Symmetric Cryptosystem
• Modern Symmetric Cryptosystem
• Asymmetric Cryptography
• Message Authentication
• Network and Internet Security
Reference
• Behrouz A. Fourouzan‖, Cryptography and Network Security‖, Tata
McGraw- Hill, 2008
• William Stallings, "Cryptography and Network Security: Principles and
Practice", 5th Edition, Prentice Hall, 2011
4
Prevention
take measures that prevent your assets from being
damaged (or stolen)
Detection
take measures so that you can detect when, how, and
by whom an asset has been damaged
Reaction
take measures so that you can recover your assets
Real world example 6
Prevention
locksat doors, window bars, secure the
walls around the property, hire a guard
Detection
missing items, burglar alarms, closed circuit
TV
Reaction
attackon burglar (not recommended ), call
the police, replace stolen items, make an in-
surance claim
Information security in past & 7
present
Terminology
Computer Security
2 main focuses: Information and Computer itself
tools and mechanisms to protect data in a computer
(actually an automated information system), even if
the computers/system are connected to a network
tools and mechanisms to protect the information
system itself (hardware, software, firmware,…)
Against?
against hackers (intrusion)
against viruses
against denial of service attacks
etc. (all types of malicious behavior)
9
Terminology
Security Glossary,
May 2000
The global average cost of cyber 11
crime/attacks
2017 Cost
of Cyber
Crime
Study by
Accen-
ture*
Steeper
increasing
trend in
the recent
years
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
Security Objectives: CIA Triad and Beyond
Computer Security Objectives
Additional concepts:
Services, Mechanisms, Attacks 15
Attacks
Attacks on computer systems
break-in to destroy information
break-in to steal information
blocking to operate properly
malicious software
wide spectrum of problems
Source of attacks
Insiders
Outsiders
Attacks 17
Network Security
Active attacks
Passive attacks
Passive attacks
interception of the messages
What can the attacker do?
use information internally
hard to understand
release the content
can be understood
traffic analysis
hard to avoid
Hard to detect, try to prevent
Attacks 18
Active attacks
Attacker actively manipulates
the communication
Masquerade
pretend as someone else
possibly to get more privileges
Replay
passively
capture data
and send later
Denial-of-service
prevent the normal use of
servers, end users, or network
itself
Attacks 19
Non-Repudiation
protection against denial by one of the parties in a
communication
Origin non-repudiation
proof that the message was sent by the specified
party
Destination non-repudiation
proof that the message was received by the speci-
fied party
Relationships 24
Non-repudiation
Authentication
Integrity
25
Security Mechanisms
Cryptographic Techniques
will see next
Software and hardware for access limitations
Firewalls
Intrusion Detection and Prevention Systems
Traffic Padding
against traffic analysis
Hardware for authentication
Smartcards, security tokens
Security Policies / Access Control
define who has access to which resources.
Physical security
Keep it in a safe place with limited and authorized physical access
26
Cryptography
Encryption (a.k.a. Encipherment)
use of mathematical algorithms to transform data into a
form that is not readily intelligible
keys are involved
Steganography
an alternative to encryption
hides existence of message
using only a subset of letters/words in a longer message
marked in some way
using invisible ink
hiding in LSB in graphic image or sound file
has drawbacks
high overhead to hide relatively few info bits
advantage is can obscure encryption use
27
Message Digest
similarto encryption, but one-way (recovery
not possible)
generally no keys are used
Authentication Exchange
ensure the identity of an entity by exchanging some information
Notarization
use of a trusted third party to assure certain properties of a data ex-
change
Timestamping
inclusion of correct date and time within messages
Confidentiality
Prevent unauthorised disclosure of information
Synonyms: Privacy and Secrecy
Integrity
two types: data integrity and system integrity
In general, “make sure that everything is as it is supposed to
be”
More specifically, “no unauthorized modification, deletion” on
data (data integrity)
System performs as intended without any unauthorized ma-
nipulations (system integrity)
Aspects of Computer Security 37
Availability Accountability
services should be accessible audit information must be selectively
when needed and without kept and protected so that actions af-
extra delay fecting security can be traced to the
Dependability responsible party
How can we do that?
Can we trust the system as a Users have to be identified and au-
whole? thenticated to have a basis for access
control decisions and to find out respon-
sible party in case of a violation.
The security system keeps an audit log
(audit trail) of security relevant events
to detect and investigate intrusions.
Attack Surfaces
An attack surface consists of the reachable and
exploitable vulnerabilities in a system
Examples:
Open ports on outward facing Web and other servers,
and code listening on those ports
Services available in a firewall
Code that processes incoming data, email, XML,
office documents, etc.
Interfaces and Web forms
An employee with access to sensitive information
vulnerable to a social engineering attack
Attack Surface Categories