Chapter 1 Introduction
Chapter 1 Introduction
Chapter 1 Introduction
1
OUTLINE
• What is Security?
• Security trend
• Sources and consequences of risks
• Types of Vulnerabilities
• Security criteria
• Security attack types
• Security services and mechanisms
• Security model (X.800 and X.805)
2
DEFINITION OF IAS
Assume you visit an e-commerce website such as your online bank
or ATM.
Before you type in high sensitive information, you would like to
have some assurance that your information will be protected.
You want to know, what security-relevant things do you want to
happen, or not happen when you use such a website?
So, Information assurance and security is a profession focused on
the management and protection of knowledge, information, and
data.
Assurance is a measure of confidence that the security features,
practices, procedures, and architecture of a system accurately
mediates and enforces the security policy
3
INFORMATION ASSURANCE
(IA)
IA is the process of getting the right information to the right people
at the right time.
4
IA PROCESS
The information assurance process typically begins with the
enumeration and classification of the information assets to be
protected.
The sum of the products of the threats' impact and the probability of
their occurring is the total risk to the information asset.
5
IA PROCESS
With the risk assessment complete, the IA practitioner then
develops a risk management plan. This plan proposes
countermeasures that involve mitigating, eliminating, accepting, or
transferring the risks, and considers prevention, detection, and
response to threats.
InfoSec
•More tools and tactics
IA focused
•More strategy focus •Stresses technology
•Broader spectrum of and operations
Information and protection •Concerned with security
•Concerned with organizations applications and
over all risk and mitigation infrastructure
•E.g. Anti-virus, firewall,
vulnerability analysis
8
COMPUTER AND NETWORK SECURITY
What is Security?
Security is about
• Threats (bad things that may happen, e.g. your
money getting stolen)
• Vulnerabilities (weaknesses in your defenses, e.g.
your front door being made of thin wood and glass)
• Attacks (ways in which the threats may be
actualized,
• e.g. a thief breaking through your weak front
door while you and the neighbors are on
holiday)
9
COMPUTER AND NETWORK
SECURITY…
“The most secure
computers are those
not connected
to the Internet and
shielded
from any interference”
10
COMPUTER AND NETWORK
SECURITY…
Computer security is about
provisions and policies adopted to
protect information and property
from theft, corruption, or natural
disaster
while allowing the information and
property to remain accessible and
productive to its intended users.
security of computers against
intruders (e.g.,hackers) and
malicious software (e.g., viruses).
11
COMPUTER AND NETWORK
SECURITY…
Network security on the other hand deals with
provisions and policies adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of
the computer network and network-accessible
resources.
12
WHO ARE THE ATTACKERS?
Vandals (Hackers, crackers) driven by intellectual challenge.
14
CONSEQUENCES…
Failure/End of service
Reduction of QoS, down to Denial of Service (DDoS)
Internal problems in the enterprise
Trust decrease from partners (client, providers, share-
holders)
Technology leakage
Human consequences (personal data, sensitive data -
medical, insurances, …)
15
SECURITY CRITERIA (IN DETAIL)
•To understand the types of threats to security that exist,
first we need to have a definition of security
requirements.
•In this section, different security requirements are
presented.
Availability
•It requires that computer and network assets are only
available to authorized parties.
• computer and network should provide all the designated
services in the presence of all kinds of security attack.
16
SECURITY CRITERIA...
Integrity
It requires that messages should be modified or altered only
by authorized parties.
Modification includes writing, changing, deleting, and creating the
message that is supposed to be transmitted across the network.
17
SECURITY CRITERIA...
Confidentiality
It requires that the message can only be accessible for reading by
authorized parties.
It also requires that the system should verify the identity of a user.
Authentication
It means that correct identity is known to communicating parties.
This property ensures that the parties are genuine not impersonator.
Authorization
This property gives access rights to different types of users.
For example a network management can be performed by network
administrator only.
18
COMPUTER AND NETWORK
SECURITY
ATTACKS
Categories of Attacks
Interruption: An attack on availability
19
COMPUTER AND NETWORK SECURITY
ATTACKS…
Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
20
EXAMPLES OF THREATS
21
SECURITY ATTACK TYPES
The attacks can also be classified by the following criteria.
Passive or active,
Internal or external,
At different protocol layers.
Passive vs. active attacks
•A passive attack attempt to learn or make use of the information
without changing the content of the message and disrupting the
operation of the communication.
•Examples of passive attacks are:
-- Eavesdropping , traffic analysis, and traffic monitoring.
22
SECURITY ATTACK TYPES…
23
PASSIVE ATTACKS
Passive attacks do not affect system resources
Eavesdropping, monitoring
The goal of the opponent is to obtain information that is being
transmitted
24
PASSIVE ATTACKS (1)
RELEASE OF MESSAGE CONTENTS
25
PASSIVE ATTACKS (2)
TRAFFIC ANALYSIS
26
ACTIVE ATTACKS
Active attacks try to alter system resources or
affect their operation
Modification of data, or creation of false data
Four categories
Masquerade of one entity as some other
Replay previous message
Modification of messages
Denial of service (DoS): preventing normal use
A specific target or entire network
Difficult to prevent
The goal is to detect and recover
27
ACTIVE ATTACKS (1)
MASQUERADE
28
ACTIVE ATTACKS (2)
REPLAY
29
ACTIVE ATTACKS (3)
MODIFICATION OF MESSAGES
30
ACTIVE ATTACKS (4)
DENIAL OF SERVICE
31
SECURITY ATTACK TYPES…
Internal vs. External attacks
External attacks are carried out by hosts that don’t
belong to the network domain, sometimes they are
called outsider.
E.g.it can causes congestion by sending false routing
information thereby causes unavailability of services.
In case of internal attack, the malicious node from the
network gains unauthorized access and acts as a genuine
node and disrupts the normal operation of nodes.
They are also known as insider.
32
COMMON SECURITY ATTACKS AND THEIR
COUNTERMEASURES
Finding a way into the network
Firewalls
Denial of Service
access filtering, IDS
TCP hijacking
IPSec
Packet sniffing
Encryption (SSL, HTTPS)
Social problems
Education
33
SECURITY SERVICES (X.800)
Authentication - assures that communicating entity is the
one claimed
have both peer-entity & data origin authentication
35
1 0 Q n e
t e r O
h a p
of C
En d
36