Chapter 1 Introduction ToInformationSecurity
Chapter 1 Introduction ToInformationSecurity
Chapter 1: Introduction
IS492 Information Security
Chapter 1 - Introduction
The Cast of Characters
Chapter 1 - Introduction 2
Alice’s Online Bank
Alice opens Alice’s Online Bank (AOB)
concerns?
How are Alice’s and Bob’s concerns similar? How are they
different?
Chapter 1 - Introduction 3
CIA == Confidentiality, Integrity, and Availability
balance
information.
• Cryptography used for confidentiality
Chapter 1 - Introduction 4
Trudy must not be able to change Bob’s account balance
account balance
Chapter 1 - Introduction 5
• AOB’s information must be available whenever it’s
needed.
6
Beyond CIA: Crypto
Chapter 1 - Introduction 7
As before, Bob’s password is verified
arise
Chapter 1 - Introduction 8
Beyond CIA: Access Control
Once Bob is authenticated by AOB, then AOB
must restrict actions of Bob
Bob can’t view Charlie’s account info
authorization
Chapter 1 - Introduction 9
Cryptography, protocols, and access control are
implemented in software
• Software is foundation on which security rests.
Chapter 1 - Introduction 11
The People Problem
To buy from amazon.com…
Chapter 1 - Introduction 12
The People Problem
• What could go wrong?
•/
• Trudy tries man-in-the-middle attack
SSL is secure, so attack doesn’t “work”
Chapter 1 - Introduction 13
Your Course
• The Course consists of four major parts
Cryptography
Access control
Protocols
Software
Chapter 1 - Introduction 14
Cryptography
• “Secret codes”.
Classic cryptography
Symmetric ciphers
Chapter 1 - Introduction 15
Access Control
Authentication
1. Passwords
2. Biometrics
3. Other methods of authentication
Authorization
1. Access Control Lists/Capabilities
2. Firewalls,intrusion detection (IDS)
Chapter 1 - Introduction 16
Protocols
“Simple” authentication protocols
Chapter 1 - Introduction 17
Software
• Security-critical flaws in software
• Buffer overflow
• Race conditions, etc.
• Malware
Future of malware?
Chapter 1 - Introduction 18
Software
• Software reverse engineering (SRE)
• How hackers “dissect” software
Chapter 1 - Introduction 19
Software
• Operating systems
• Basic OS security issues
• “Trusted OS” requirements
• NGSCB: Microsoft’s trusted OS for the PC
Chapter 1 - Introduction 20
Think Like Trudy
• In the past, no respectable sources talked about “hacking”
in detail
• After all, such info might help Trudy
Chapter 1 - Introduction 21
Think Like Trudy
Good guys must think like bad guys!
A police detective…
• …must study and understand criminals
Chapter 1 - Introduction 22
Think Like Trudy
We must try to think like Trudy
stupidity
But, we cannot act like Trudy
• Except in this class…
Chapter 1 - Introduction 23
Think Like Trudy
• Is all of this security information a good idea?
Chapter 1 - Introduction 24
In This Course…
• Think like the bad guy
• Always look for weaknesses
• Find the weak link before Trudy does
Chapter 1 - Introduction 25