Basic Principles in Data Security
Basic Principles in Data Security
Basic Principles in Data Security
College of Engineering
Department of Software Engineering
Data Security
Academic year 2018-2019
4th Year Material
Chapter One
2
Class Rules1
Students are not allowed to attend class after 15 minutes
from it’s starting time.
3
Class Rules2
Students are allowed to come to my office during office
hours, which are specified in the time table.
4
About the Course
Syllabus consist of teen chapters, one quiz and four lab
works.
7
Availability
•Availability: Requires that computer systems assets be
available to authorized parties when needed.
8
Confidentiality
•Confidentiality: Ensures that the information in a computer
system and transmitted information are accessible only for
reading by authorized parties. This type of access includes
printing, displaying.
9
Integrity
•Integrity: Ensures that only authorized parties are able to
modify computer systems assets and transmitted information.
Modification includes writing, changing, changing status,
deleting, creating and delaying or replaying of transmitted
messages.
10
Basic Principles of Information Security2
11
Key Points1
The OSI (open systems interconnection) security architecture
provides a systematic framework for defining security
attacks, mechanisms, and services.
12
Key Points2
•Security mechanism: is any process (or a device
incorporating such a process) that is designed to detect,
prevent, or recover from a security attack. Examples of
mechanisms are encryption algorithms, digital signatures, and
authentication protocols.
13
Passive attacks1
•Passive attacks are in the nature of eavesdropping on, or
monitoring of, transmissions. The goal of the opponent is to
obtain information that is being transmitted. Two types of
passive attacks are release of message contents and traffic
analysis.
14
Passive attacks2
•Second type of passive attack, traffic analysis. Suppose that
we had a way of masking the contents of messages or other
information traffic so that opponents, even if they captured
the message, could not extract the information from the
message. The common technique for masking contents is
encryption.
15
16
Active attacks1
•Active attacks involve some modification of the data stream
or the creation of a false stream and can be subdivided into
four categories: masquerade, replay, modification of
messages, and denial of service.
17
18
Active attacks2
•Modification of messages simply means that some portion
of a legitimate message is altered, or that messages are
delayed or reordered, to produce an unauthorized effect . For
example, a message meaning " let's meet today" is modified
to mean " let's meet tomorrow”.
19
20
Security Mechanisms
•Are implemented to protect data against security attacks.
These mechanisms will be covered in the appropriate places
in the next lectures and so we do not elaborate now.
21
Security Services1
•A service provided by a protocol layer of communicating
open systems, which ensures adequate security of the systems
or of data transfers.
22
Security Services2
•Access control: is the ability to limit and control the access
to host systems and application via communication links.
23
Other terms in Information Security1
•Authorization: is the act of determining whether a particular
user (or computer system) has the right to carry out a certain
activity, such as reading a file or running a program.
24
Other terms in Information Security2
Plaintext: The input to an encryption function or the output
of a decryption function.
25
Other terms in Information Security3
•Asymmetric encryption: A form of cryptosystem in which
encryption and decryption are performed using two different
keys, one of which is referred to as the public key and one of
which is referred to as the private key. Also known as public
key encryption.
26
Other terms in Information Security4
•Public key: One of the two keys used in an asymmetric
encryption system. The public key is made public, to be used
in conjunction with a corresponding private key.
27
Homework
•Q1: What are basic types of cryptanalysis attack?
28