+ All Categories
Home > Documents > Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4...

Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4...

Date post: 11-Jan-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
18
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 Chapter 1 Overview Overview
Transcript
Page 1: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

Computer Security: Principles and Practice

First Editionby William Stallings and Lawrie BrownLecture slides by Lawrie Brown

Chapter 1 Chapter 1 –– OverviewOverview

Page 2: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

2

Overview

Computer Security: protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

Page 3: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

3

Key Security Concepts

Page 4: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

4

Computer Security Challenges

1. not simple2. must consider potential attacks3. procedures used counter-intuitive4. involve algorithms and secret info5. must decide where to deploy mechanisms6. battle of wits between attacker / admin7. not perceived on benefit until fails8. requires regular monitoring9. too often an after-thought10. regarded as impediment to using system

Page 5: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

5

Security Terminology

Page 6: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

6

Vulnerabilities and Attacks

• system resource vulnerabilities may– be corrupted (loss of integrity)– become leaky (loss of confidentiality)– become unavailable (loss of availability)

• attacks are threats carried out and may be– passive– active– insider– outsider

Page 7: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

7

Countermeasures

• means used to deal with security attacks– prevent– detect– recover

• may result in new vulnerabilities• will have residual vulnerability• goal is to minimize risk given constraints

Page 8: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

8

Threat Consequences

• unauthorized disclosure– exposure, interception, inference, intrusion

• deception– masquerade, falsification, repudiation

• disruption– incapacitation, corruption, obstruction

• usurpation– misappropriation, misuse

Page 9: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

9

Scope of Computer Security

Page 10: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

10

Network Security Attacks

• classify as passive or active• passive attacks are eavesdropping

– release of message contents– traffic analysis– are hard to detect so aim to prevent

• active attacks modify/fake data– masquerade– replay– modification– denial of service– hard to prevent so aim to detect

Page 11: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

11

Security Functional Requirements

• technical measures:– access control; identification & authentication; system &

communication protection; system & information integrity

• management controls and procedures – awareness & training; audit & accountability; certification,

accreditation, & security assessments; contingency planning; maintenance; physical & environmental protection; planning; personnel security; risk assessment; systems & services acquisition

• overlapping technical and management:– configuration management; incident response; media protection

Page 12: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

12

X.800 Security Architecture

• X.800, Security Architecture for OSI

• systematic way of defining requirements for security and characterizing approaches to satisfying them

• defines:– security attacks - compromise security

– security mechanism - act to detect, prevent, recover from attack

– security service - counter security attacks

Page 13: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

13

Security Taxonomy

Page 14: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

14

Security Trends

Page 15: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

15

Computer Security Losses

Page 16: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

16

Security Technologies Used

Page 17: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

17

Computer Security Strategy

• specification/policy– what is the security scheme supposed to do?– codify in policy and procedures

• implementation/mechanisms– how does it do it?– prevention, detection, response, recovery

• correctness/assurance– does it really work?– assurance, evaluation

Page 18: Computer Security: Principles and Practice, 1/ehossein/Teaching/Fa09/710/Lectures/ch01.pdf · 4 Computer Security Challenges 1. not simple 2. must consider potential attacks 3. procedures

18

Summary

• security concepts• terminology• functional requirements• security architecture• security trends• security strategy


Recommended