+ All Categories
Home > Documents > Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security...

Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security...

Date post: 11-Jul-2020
Category:
Upload: others
View: 24 times
Download: 6 times
Share this document with a friend
26
CSS322 Introduction Concepts Architecture Attacks Services Mechanisms Model Introduction to Security CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L01, Steve/Courses/2011/S2/CSS322/Lectures/introduction.tex, r2069
Transcript
Page 1: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Introduction to Security

CSS322: Security and Cryptography

Sirindhorn International Institute of TechnologyThammasat University

Prepared by Steven Gordon on 29 December 2011CSS322Y11S2L01, Steve/Courses/2011/S2/CSS322/Lectures/introduction.tex, r2069

Page 2: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Contents

Computer Security Concepts

The OSI Security Architecture

Security Attacks

Security Services

Security Mechanisms

A Model of Network Security

Page 3: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

What Is Security?

Computer Security

The protection afforded to an automatedinformation system in order to attain the applicableobjectives of preserving the integrity, availability,and confidentiality of information system resources.

NIST Computer Security Handbook

Network and Internet Security

Measures to deter, prevent, detect, and correctsecurity violations that involve transmission ofinformation.

Stallings, Cryptography and Network Security

Page 4: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Key Security Concepts

Others: Authenticity, Accountability

Page 5: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Impact of Security Breaches

How do security breaches impact organisations?

I Effectiveness of primary operations are reduced

I Financial loss

I Damage to assets

I Harm to individuals

Different levels of impact. E.g. FIPS Publication 199defines: Low/Minor, Moderate/Significant, High/Severe

Page 6: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Contents

Computer Security Concepts

The OSI Security Architecture

Security Attacks

Security Services

Security Mechanisms

A Model of Network Security

Page 7: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

ITU-T X.800 Security Architecture for OSI

I Systematic approach to define requirements for securityand approaches to satisfying those requirements

I ITU-T Recommendation X.800, Security Architecturefor OSI

I Provides abstract view of main issues of security

I Security aspects: Attacks, mechanisms and servicesI Terminology:

I Threat: potential violation of securityI Attack: assault on system security derived from

intelligent threat

Page 8: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Aspects of Security

Security Attack

Any action that attempts to compromise the security ofinformation or facilities

I Threat: potential for violation of security of informationor facilities

Security Mechanism

A method for preventing, detecting or recovering from anattack

Security Service

Uses security mechanisms to enhance the security ofinformation or facilities in order to stop attacks

Page 9: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Contents

Computer Security Concepts

The OSI Security Architecture

Security Attacks

Security Services

Security Mechanisms

A Model of Network Security

Page 10: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Types of Attacks

Passive Attack

I Make use of information, but not affect systemresources, e.g.

1. Release message contents2. Traffic analysis

I Relatively hard to detect, but easier to prevent

Active Attack

I Alter system resources or operation, e.g.

1. Masquerade2. Replay3. Modification4. Denial of service

I Relatively hard to prevent, but easier to detect

Page 11: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Release Message Contents

Page 12: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Traffic Analysis

Page 13: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Masquerade Attack

Page 14: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

“On the Internet, nobody knows you’re a dog”

Page 15: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Replay Attack

Page 16: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Modification Attack

Page 17: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Denial of Service Attack

Page 18: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Contents

Computer Security Concepts

The OSI Security Architecture

Security Attacks

Security Services

Security Mechanisms

A Model of Network Security

Page 19: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Defining a Security Service

I ITU-T X.800: service that is provided by a protocollayer of communicating systems and that ensuresadequate security of the systems or of data transfers

I IETF RFC 2828: a processing or communication servicethat is provided by a system to give a specific kind ofprotection to system resources

I Security services implement security policies and areimplemented by security mechanisms

Page 20: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Security Services

1. Authentication Assure that the communicating entity isthe one that it claims to be. (Peer entity and dataorigin authentication)

2. Access Control Prevent unauthorised use of a resource

3. Data Confidentiality Protect data from unauthoriseddisclosure

4. Data Integrity Assure data received are exactly as sentby authorised entity

5. Nonrepudiation Protect against denial of one entityinvolved in communications of having participated incommunications

6. Availability System is accessible and usable on demandby authorised users according to intended goal

Page 21: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Contents

Computer Security Concepts

The OSI Security Architecture

Security Attacks

Security Services

Security Mechanisms

A Model of Network Security

Page 22: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Security Mechanisms

I Techniques designed to prevent, detect or recover fromattacks

I No single mechanism can provide all services

I Common in most mechanisms: cryptographic techniques

I Specific security mechanisms from ITU-T X.800:Encipherment, digital signature, access control, dataintegrity, authentication exchange, traffic padding,routing control, notarization

I Pervasive security mechanisms from ITU-T X.800:Trusted functionality, security label, event detection,security audit trail, security recovery

Page 23: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Security Services and Mechanisms

Page 24: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Contents

Computer Security Concepts

The OSI Security Architecture

Security Attacks

Security Services

Security Mechanisms

A Model of Network Security

Page 25: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Network Security Model

Model of a system that captures many aspects of security

Page 26: Introduction to Securityict.siit.tu.ac.th/~steven/css322y11s2/...Security.pdf · The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model of Network

CSS322

Introduction

Concepts

Architecture

Attacks

Services

Mechanisms

Model

Network Access Security Model

Another model that captures some different aspects ofsecurity


Recommended