01C-Network Security Essentials
01C-Network Security Essentials
Lecture 1
Network Security
Essentials
Objectives
Information
Data n Data with context
n Data: 98123
n Information:
n 23/01/98 The date of the final exam
n $98,123 is a salary
n 98123 is a house number
Data vs. Information
Data Information
n 6.34
n 6.45 SIRIUS SATELLITE RADIO INC.
n 6.39 $7.20
$7.00
n 6.62 $6.80
6.57
Stock Price
$6.60
n
$6.40
n 6.64 $6.20
n 6.71 $6.00
$5.80
n 6.82 1 2 3 4 5 6 7 8 9 10
Last 10 Days
n 7.12
n 7.06
Data à Information
Data
Information
Information à Knowledge
Information
Knowledge
Information Systems
Generic Goal:
n Transform Data into Information
n Manipulate/Present Data/Information/Knowledge
q Confidentiality
q Integrity
q Availability
Information Security Goals
Confidentiality
Confidentiality
n Data confidentiality
Integrity
n Data integrity
n High
n The loss could be expected to have a severe or
n Security attack
n Any action that compromises the security of information
owned by an organization
n Security mechanism
n A process (or a device incorporating such a process) that is
Threat
n A potential for violation of security, which exists when there is a
circumstance, capability, action, or event that could breach security
and cause harm. That is, a threat is a possible danger that might
exploit a vulnerability.
Attack
n An assault on system security that derives from an intelligent threat;
that is, an intelligent act that is a deliberate attempt (especially in the
sense of a method or technique) to evade security services and violate
the security policy of a system.
n A means of classifying
security attacks, used both Darth
Bob Alice
resources 1 2
n Internet or
other comms facility
Masquerade
n Takes place when one entity pretends to be a different entity Usually
includes one of the other forms of active attack
Replay
n Involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
Modification of messages
n Some portion of a legitimate message is altered, or messages are
delayed or reordered to produce an unauthorized effect
Denial of service
n Prevents or inhibits the normal use or management of
communications facilities
Authentication
n The assurance that the communicating entity is the
Access Control
n The prevention of unauthorized use of a resource
Connection Confidentiality
n The protection of all user data on a connection.
Connectionless Confidentiality
n The protection of all user data in a single data block
Selective-Field Confidentiality
n The confidentiality of selected fields within the user
Data Integrity
n The assurance that data received are exactly as sent
Nonrepudiation, Origin
n Proof that the message was sent by the specified
party.
Nonrepudiation, Destination
n Proof that the message was received by the
specified art.
n Specific Security
Mechanisms
n Encipherment n Pervasive Security
n Digital signatures Mechanisms
n Access controls n Trusted functionality
n Data integrity n Security labels
n Authentication n Event detection
exchange n Security audit trails
n Traffic padding n Security recovery
n Routing control
n Notarization
Digital Signature
n Data appended to, or a cryptographic transformation of,
resources.
Data Integrity
n A variety of mechanisms used to assure the integrity of a
Authentication Exchange
n A mechanism intended to ensure the identity of an
Notarization
n The use of a trusted third party to assure certain of a data
exchange
Pervasive Security Mechanisms
n Mechanisms that are not specific to any particular OSI security
Event Detection
n Detection of security-relevant events.
Economy of mechanism
n Means that the design of Fail-safe defaults
security measures embodied in n Means that access decisions
both hardware and software should be based on permission
should be as simple and small rather than exclusion
as possible n The default situation is lack of
n Relatively simple, small design access, and the protection
is easier to test and verify scheme identifies conditions
thoroughly under which access is
n With a complex design, there permitted
are many more opportunities n Most file access systems and
for an adversary to discover virtually all protected services
subtle weaknesses to exploit on client/server use fail-safe
that may be difficult to spot defaults
ahead of time
Complete mediation
n Means that every access must
Open design
be checked against the access
n Means that the design of a
control mechanism
security mechanism should be
n Systems should not rely on
open rather than secret
access decisions retrieved from
n Although encryption keys must
a cache
be secret, encryption
n To fully implement this, every
algorithms should be open to
time a user reads a field or public scrutiny
record in a file, or a data item
in a database, the system must n Is the philosophy behind the NI
exercise access control ST program of standardizing
encryption and hash algorithms
n This resource-intensive
approach is rarely used
Least privilege
n Means that every process and
Separation of privilege every user of the system should
operate using the least set of
n Defined as a practice in which
privileges necessary to perform
multiple privilege attributes are
the task
required to achieve access to a
restricted resource n An example of the use of this
principle is role-based access
n Multifactor user authentication
control; the system security
is an example which requires
policy can identify and define
the use of multiple techniques,
the various roles of users or
such as a password and a
processes and each role is
smart card, to authorize a user
assigned only those
permissions needed to perform
its functions
Psychological acceptability
Isolation
Encapsulation
n Applies in three contexts:
n Can be viewed as a specific
n Public access systems
form of isolation based on
should be isolated from
object-oriented functionality
critical resources to prevent
disclosure or tampering n Protection is provided by
encapsulating a collection of
n Processes and files of
procedures and data objects in
individual users should be
a domain of its own so that the
isolated from one another
internal structure of a data
except where it is explicitly
object is accessible only to the
desired
procedures of the protected
n Security mechanisms
subsystem, and the procedures
should be isolated in the may be called only at
sense of preventing access designated domain entry points
to those mechanisms
Layering
n Refers to the use of
Modularity multiple, overlapping
n Refers both to the protection approaches
development of security addressing the people,
functions as separate, technology, and
protected modules and to operational aspects of
the use of a modular information systems
architecture for n The failure or
mechanism design and circumvention of any
implementation individual protection
approach will not leave
the system unprotected
Least astonishment
n Means that a program or user interface should
legitimate users
ITU-T
n The International Telecommunication Union (ITU) is
ISO
n The International Organization for Standardization is