TU3263 Security Elements in Computer Systems: Lecture Notes by William Stallings and Lawrie Brown
TU3263 Security Elements in Computer Systems: Lecture Notes by William Stallings and Lawrie Brown
TU3263 Security Elements in Computer Systems: Lecture Notes by William Stallings and Lawrie Brown
What is computer security? the protection given to information systems in order to preserve the confidentiality, integrity, and availability (CIA) of information system resources
Resources includes: hardware, software, firmware, information/data, and telecommunications
Provide security of computers against intruders (e.g., hackers) and malicious software (e.g., viruses)
Cryptography: is a technique for ensuring the secrecy and/or authenticity of information What kind of information needs to be protected? Where can you find cryptography application?
What other systems that needs high security protection? Cryptography will be covered in Part 2 and Part 5
Confidentiality
preserve authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.
Integrity:
Guard against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Non-repudiation: someone cannot deny something
E.g.: Alice cannot denied that she has sent Bob a message
Authenticity: genuine or valid, not being a fake or forgery A loss of integrity is the unauthorized modification or destruction of information.
Availability:
Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system.
Three levels of impact on organizations/individuals should there be a breach of security (a state where CIA is lost):
Low Moderate High
10
Low: The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.
Example: a sheet of paper containing names of patients is lost
NAME Ahmad Park Jae-sang Rajoo Mei Chu WARD NO 23 4 34 21
11
Moderate: The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals
Example: a message between a nurse and a doctor is intercepted Containing a patients personal information (such as name, address, age, gender, contact no, medication), and current medical condition
Ahmad b. Ali Government servent No 21, Lorong Haji Talib, KL Age: 34 Contact no: 013-12345678 Medication condition: bypass heart, need medication every two hours.
12
Abu b. Ali Government Servent High: The loss could be expected to have a severe or No 21, Lorong Haji Talib, KL catastrophic adverse effect on organizational operations, Age: 40 Contact no: 013-12345678 organizational assets, or individuals Diagnose as: HIV carrier Medical history: frequent outdoor patients for flu, high fever Example: a message between doctors is intercepted Treatment: monthly visit to check blood condition,.. Prescription:. Containing a patients detailed medical information, such as
hand?
13
14
1.
not simple
Not easy to achieve security requirements. The security processes are complex
2.
When designing the security process, must consider the potential attack Success attacks always focus on the weakness of the security process
3.
Often, security processes are complex, It is hard enough to understand the system requirements statements from user, and therefore elaborate security processes are deemed not needed. until various aspect of threats are considered, that elaborate security mechanisms make sense
15
4.
5.
6.
must decide where to deploy mechanisms battle of wits between attacker / admin
Attacker needs only to find a weakness and exploit them Admin needs to eliminate all weakness
7.
16
8. 9.
requires regular monitoring too often an after-thought incorporated after the design is complete
Should design security process during the system development
10.
17
security attack:
Any action that compromises the security of information owned by an organization.
security mechanism:
A process (or a device) that is designed to detect, prevent, or recover from a security attack.
security service:
A process or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
18
threat a potential for violation of security, a possible danger that might exploit a vulnerability
Vulnerability: a weakness in the security system, e.g. in procedures, design, or implementation, that might be exploited to cause loss or harm. E.g.: No authorization mechanism (such as login and pwd) to enter a system is vulnerable to attacks
attack an assault on system security, a deliberate attempt to evade security services Two types of attacks: passive and active
19
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are:
release of message contents traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged
These attacks are difficult to detect because they do not involve any alteration of the data
20
21
22
Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories:
Masquerade of one entity as some other Replay previous messages Modify/alter (part of) messages in transit to produce an unauthorized effect Denial of service - prevents or inhibits the normal use or management of communications facilities
1. 2. 3. 4.
23
24
Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
25
feature designed to detect, prevent, or recover from a security attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use:
cryptographic techniques
26
27
enhance security of data processing systems and information transfers of an organization intended to counter security attacks using one or more security mechanisms often replicates functions, normally associated with physical documents
which, for example, have signatures, dates; need protection from disclosure, tampering or destruction; be notarized or witnessed; be recorded or licensed
28
Authentication - assurance that communicating entity is the one claimed Access Control - prevention of the unauthorized use of a resource Data Confidentiality protection of data from unauthorized disclosure Data Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication Availability resource accessible/usable
29
30