Introduction To Computer Security
Introduction To Computer Security
Computer Security
Lecture – 2
• Relationships
theseamong theandconcepts
assets are protected from threats by countermeasures. Figure 2 illustrates
high level concepts relationships.
Defining security
• The security of a system, application, or protocol is always relative to
• A set of desired properties
• An adversary (attacker) with specific capabilities
• Academic study of security not about
• Breaking into a system
• How to launch an attack
• Our focus will be explore
• Why a system is insecure
• How to make them secure
Security goals
Security Goals
Integrity
Properties Brief description
• C.I.A. Keeping information secret from
Confidentiality all but those who are authorised
to see it
Ensuring information has not
Integrity been altered by unauthorized or
unknown means
Data/information is available
Availability
when required
Confidentiality Availability
Confidentiality
Confidentiality: Secrecy & Privacy
• Two dimensions for confidentiality: Secrecy and & Privacy
• protecting unauthorized information access and disclosure (secrecy)
• protecting personal privacy and proprietary information (privacy)
• Secrecy assures that private or confidential information is not made
available or disclosed to unauthorized individuals
• Privacy assures that individuals control or influence what information
related to them may be collected and stored and by whom and to
whom that information may be disclosed
• The need of confidentiality predates computer systems:
• For example, in the first recorded use of cryptography, Julius Caesar
communicated commands to his generals using a simple cipher (will be
studied later)
Tools of Confidentiality
• Encryption: Tools for Confidentiality
• the transformation
• Encryption: theof information
transformation of using a secret,
information using acalled
secret,an encryption key, so
that thecalled
transformed information
an encryption cantransformed
key, so that the only be read using another secret,
information
called the
candecryption key another
only be read using (whichsecret,
may, called
in some cases, be the same as the
the decryption
key (which
encryption key) may, in some cases, be the same as the encryption
key).
Communication
Sender Recipient
channel
encrypt decrypt
ciphertext plaintext
plaintext
p ain
intex
shared shared
secret secret
key key
Attacker
(eavesdropping)
5
Tools of Confidentiality
• Access control:
• Rules and policies that limit access to confidential information to those
people and/or systems with a “need to know”
• This need to know may be determined
• By identity, such as a person’s name or a computer’s serial number
• And / Or by a role that a person has, such as being a manager or a computer
security specialist
Tools of Confidentiality
• Authentication:
• the determination of the identity or role that someone has
• This determination can be done in a number of differentTools for ways, Confidentiality
but it
is usually based on a combination of • Authentication: the determination of the identity or role that
someone has. This determination can be done in a number of
different ways, but it is usually based on a combination of
• Something the person has (like a smart card or a radio keykeys),fob storing secret
– something the person has (like a smart card or a radio key fob storin
secret
keys) – something the person knows (like a password),
– something the person is (like a human with a fingerprint).
active Passive
contents
Internet or
other comms facility
Bob Alice
Bob Alice
Internet or
other comms facility
Bob Alice
Internet or
other comms facility
Bob Alice
(a) Masquerade
Security attacks: active attacks
Alteration: unauthorised modification of information
1.4 / SECURITY SERVICES 19
Internet or
other comms facility
Bob Alice
• Two forms
Internet or
• Modify and then replay, thus forming an active attack
other comms facility
• Observe and analyse and then replay, thus forming a passive attack
Bob Alice
(a) Masquerade
Internet or
other comms facility
Bob Alice
(b) Replay
Security attacks: active attacks Darth Darth modifies
message from Bob
to Alice
Internet or
other comms facility
Bob Server