Lecture -01- Introduction to Computer Security
Lecture -01- Introduction to Computer Security
Bilal Ahmed
1
Impact
• Global
• Diplomacy
• Economy
• Safety
• Technology
• Individual
• Financial
• Privacy
• Data
• Relationships
Stuxnet (2010)
• The first discovered malware that spies on and subverts
industrial systems
https://en.wikipedia.org/wiki/Stuxnet
USA NSA Leaks (2013)
• Operational details about the US
National Security Agency (NSA) and
its international partners
https://en.wikipedia.org/wiki/Edward_Snowden
WannaCry (May 2017)
• Ransomware
cryptoworm
• Targeted computers
running the
Microsoft Windows
operating system
• Encrypts data and
demands ransom
payments
https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
AshleyMadison.com (2015)
• July 15, 2015, hackers from “The Impact Team” stole all of its
customer data—including emails, names, home addresses, and
credit card information
• Motives:
• Shut down the website
• Extortion
https://en.wikipedia.org/wiki/Ashley_Madison
US Elections Impacted
Security
Level
Security
Level
• Insiders
– Computer crimes committed by insiders usually
do not involve a violation of internal security
controls
• Absence of Fine-grained Controls
– People routinely gain access to more information
than they need, either because
• the system is not tuned to provide adequate protection
or
• because implementing such protection is inconvenient
or costly.
Common Goals of Attackers
• Trophy grabbing
• Information theft
• Service theft
• Identity theft
• Tampering
• Configuration error
• Public information
• Weak design
• Carelessness.
The Basic Concepts of Computer Security
Operational Issues
Human Issues
Coming Up …
• Goals of Security?
• Components of computer system that need
to be secured? (CIA-AA)
Goals of Security
• Prevention
– Prevent attackers from violating security policy
Goals of Security
• Detection
– Detect attackers’ violation of security policy
– When, how, and by whom
Goals of Security
• Recovery
– Stop attack, assess and repair damage
– Continue to function correctly even if attack
succeeds
Example 1 – Private Property
• Prevention
– locks at doors, window bars, walls around the
property.
• Detection
– stolen items are missing, burglar alarms, closed
circuit TV.
• Recovery
– call the police, replace stolen items, make an
insurance claim …
Example 2 – E-Commerce
• Prevention
– encrypt your orders, rely on the merchant to
perform checks
• Detection
– an unauthorized transaction appears on your
credit card statement.
• Recovery
– complain, ask for a new card number, etc.
Components/Services of Computer Security
• Confidentiality
– Protect information from unauthorized disclosure (need to know)
• Use of Access control mechanism e.g., Crypto
– Keeping data and resources hidden (existence)
• Integrity
– Protecting information from unauthorized modification or
destruction
– Data integrity (includes correctness & trustworthiness of data)
– Origin integrity.
Components/Services of Computer Security
• Availability
– Enabling access to data and resources
– Denial of service
Threats
Policy
Specification
Assurance
Design
Implementation
Policy
Specification
Assurance
Design
Implementation
Gain user
access
Gain Engage in
privileged Other
access unauthorized
activity
Threats
Policy
Specification
Assurance
Design
Implementation
Policy
Specification
Assurance
Design
Implementation
76
Example: Secure Information System for an Organization
• Threat: Intruders
• Policy: Detect intruders and actively hunt for
new intrusion threats
• Specification
– Install Network and Host based IDS
– Install Honeypots
• Design
– Where to install NIDS and Honeypots?
• Implementation
– Which vendor to choose?
Assurance
• Assurance techniques do not guarantee
correctness or security
• They do provide a firm basis for assessing
what one must trust in order to believe that a
system is secure
• They eliminate possible sources of error and
force designers to define precisely what the
system is to do
Policy
Specification
Assurance
Design
Implementation
81
Operational Issues
• Risk Analysis
82
Operational Issues
• Risk Analysis
– Exposure Factor: The exposure factor (EF) represents
the percentage of asset value that will be lost in any
incident
– For example, if a data warehouse has the asset value
of $150,000, if a fire were to occur, 25 percent of the
warehouse would be damaged
83
Operational Issues
• Risk Analysis
– Single Loss Expectancy: SLE is an amount that
represents the company’s potential loss amount if a
specific threat was to take place
– Asset Value × Exposure Factor (EF) = SLE
84
Operational Issues
• Risk Analysis
– The annualized rate of occurrence (ARO) is the value
that represents the estimated frequency of a specific
threat taking place
– if the probability of a fire taking place and damaging a
data warehouse is once every ten years, the ARO value
is 0.1
85
Operational Issues
• Risk Analysis
– Annual Loss Expectancy
– ALE is an annual expected financial loss to an
organization's asset because of a particular threat
occurring within that same calendar year
– SLE × Annualized Rate of Occurrence (ARO) = ALE
86
Operational Issues
• Risk Analysis
– if a data warehouse has the asset value of $150,000, it
can be estimated that if a fire were to occur, 25 percent
of the warehouse would be damaged, if the probability
of a fire taking place and damaging our data
warehouse is once every ten years, what is ALE ?
87
Human Issues
• Organizational Problems
– Power and responsibility
– No direct financial benefits of security
• People problems
– Outsiders and insiders
– Social engineering.
Tying It All Together
Threats
Policy
Specification
Assurance
Design
Implementation
92
Overview
• Security objectives / services
– Confidentiality – Integrity – Availability –
Accountability – Authenticity – Privacy –
Reliability – Safety
• Fundamental Dilemma of Computer
Security
• Fundamental Design Principles of
Computer Security
• The layer below.
Confidentiality
• Prevent unauthorised disclosure of information (prevent
unauthorised reading)
• Secrecy: protection of data belonging to an organisation
• Historically, security and secrecy were closely related;
security and confidentiality are sometimes used as
synonyms.
Integrity
• Prevent unauthorised modification of
information (prevent unauthorised writing)
• Data Integrity (from the Orange book) - The state
that exists when computerized data is the same
as that in the source document and has not been
exposed to accidental or malicious alteration or
destruction
• Detection (and correction) of intentional and
accidental modifications of transmitted data.
Integrity ...
• No user of the system, even if authorized, may be
permitted to modify data items in such a way that
assets or accounting records of the company are lost
or corrupted
• In the most general sense: make sure that everything
is as it is supposed to be
• Integrity is a prerequisite for many other security
services; operating systems security has a lot to do
with integrity.
Availability
• The property of being accessible and usable upon
demand by an authorised entity
• Denial of Service or DoS : prevention or the delaying
of authorised access of resources of time-critical
operations
• Distributed denial of service (DDoS) receives a lot of
attention; systems are now designed to be more
resilient against these attacks.
Denial of Service Attack - Example
attacker
A