Chapter-1
Chapter-1
Network Security
12/23/2024 1
Outline
What is Security?
Why Security?
Security Policy and Mechanism
Security trend
Sources and consequences of risks
Types of Vulnerabilities
Security criteria
Security attack types
Security services, mechanisms and model
12/23/2024 2
Chapter Objectives
Security criteria
12/23/2024 3
What is Security?
12/23/2024 4
What is Security?...
Security:
12/23/2024 5
What is Security?...
12/23/2024 7
Why Security?...
• Good Security Standards follow the “90 / 10” Rule:
12/23/2024 8
Why Security?...
• Example: The lock on the door is the 10%. You
12/23/2024 9
Why Security?...
What Does This Mean for Me?
12/23/2024 10
Computer security
Basic components
• Confidentiality
• Integrity
ity
Av
Security
e gr
• Availability
aila
objectives
Int
bil
ity
CIA triad
Confidentiality
11
Confidentiality
• Enciphering an income tax return will prevent anyone from reading it.
• If the owner needs to see the return, it must be deciphered.
• Only the possessor of the cryptographic key can enter it into a deciphering
program.
• However, if someone else can read the key when it is entered into the
program, the confidentiality of the tax return has been compromised.
• All the mechanisms that enforce confidentiality require supporting services
from the system.
• The assumption is that the security services can rely on the kernel, and
other agents, to supply correct data. 13
Integrity
14
Integrity
• Integrity includes data integrity (the content of the information) and origin
integrity (the source of the data, often called authentication).
• The source of the information may bear on its accuracy and credibility and
on the trust that people place in the information.
15
Integrity
• Prevention mechanisms seek to maintain the integrity of the data by blocking any
unauthorized attempts to change the data or any attempts to change the data in
unauthorized ways.
• For example, suppose an accounting system is on a computer.
• Someone breaks into the system and tries to modify the accounting data.
• Then an unauthorized user has tried to violate the integrity of the accounting database.
(example the event 40/60 housing lottery program in Addis Ababa)
• Detection mechanisms do not try to prevent violations of integrity; they simply report
that the data's integrity is no longer trustworthy.
• Detection mechanisms may analyze system events (user or system actions) to detect
problems or (more commonly) may analyze the data itself to see if required or expected
constraints still hold.
• The mechanisms may report the actual cause of the integrity violation (a specific part of a
file was altered), or they may simply report that the file is now corrupt.
16
Availability
17
Availability
• Availability refers to the ability to use the information or resource desired.
• Availability is an important aspect of reliability as well as of system design
because an unavailable system is at least as bad as no system at all.
• The aspect of availability that is relevant to security is that someone may
deliberately arrange to deny access to data or to a service by making it
unavailable.
• System designs usually assume a statistical model to analyze expected
patterns of use, and mechanisms ensure availability when that statistical
model holds.
• Someone may be able to manipulate use (or parameters that control use,
such as network traffic) so that the assumptions of the statistical model are
no longer valid.
• This means that the mechanisms for keeping the resource or data available
18
Threats
• A threat is a potential violation of security.
• The violation need not actually occur for there to be a threat. The fact that the
violation might occur means that those actions that could cause it to occur
must be guarded against (or prepared for).
• Those actions are called attacks. Those who execute such actions, or cause
them to be executed, are called attackers.
• The three security services—confidentiality, integrity, and availability—
counter threats to the security of a system.
• Common attacks can be categorized as:
• Snooping, eavesdropping
• Modification, alteration
• Masquerading, spoofing
• False repudiation/denial of receipt
• Network delay, denial of service
19
Threats …
• Snooping: the unauthorized interception of information, is a form of disclosure.
• It is passive, suggesting simply that some entity is listening to (or reading)
communications or browsing through files or system information.
• Wiretapping, or passive wiretapping, is a form of snooping in which a network is
monitored. Confidentiality services counter this threat.
• Modification or alteration: an unauthorized change of information, covers three
classes of threats.
• The goal may be deception, in which some entity relies on the modified data to
determine which action to take, or in which incorrect information is accepted as
correct and is released.
• If the modified data controls the operation of the system, the threats of disruption
arise.
• Masquerading or spoofing: an impersonation of one entity by another, is a form
of both deception and usurpation (take over).
• It lures a victim into believing that the entity with which it is communicating is a different
entity. 20
Security Policy and Mechanism
• Problems
12/23/2024 when combining security
21 policies of multiple organizations
Goals of security
12/23/2024 24
Security Trends…
12/23/2024 25
Security Trends…
12/23/2024 26
Who are the attackers?
12/23/2024 27
Who are the attackers?...
Basically, there are four main types of attackers:
12/23/2024 28
Who are the attackers?...
1. Cyber Criminals
12/23/2024 29
Who are the attackers?...
2. Hacktivists
12/23/2024 30
Who are the attackers?...
3. State-sponsored Attacker
4. Insider Threats
12/23/2024 32
Who are the attackers?...
4. Insider Threats
12/23/2024 33
Who are the attackers?...
4.1. Malicious
12/23/2024 34
Who are the attackers?...
4.2. Accidental
12/23/2024 35
Who are the attackers?...
4.3. Negligent
12/23/2024 37
What are the vulnerabilities?...
12/23/2024 38
What are the vulnerabilities?...
Unencrypted communication
12/23/2024 39
What are the consequences?
Failure/End of service
Technology leakage
12/23/2024 42
Security Criteria
12/23/2024 43
Security Criteria…
1. Availability
12/23/2024 44
Security Criteria…
2. Integrity
12/23/2024 45
Security Criteria…
3. Confidentiality
4. Authentication
It means that correct identity is known to
communicating parties.
12/23/2024 46
Security Attack Types
Categories of Attacks
Interruption: An attack on Availability
Modification: An attack on Integrity
Interception: An attack on Confidentiality
Fabrication: An attack on Authenticity
12/23/2024 47
Security Attack Types…
Attacks…
Source
Attack
Interruption Interception
Modification Fabrication
12/23/2024 48
Security Attack Types…
12/23/2024 49
Security Attack Types…
12/23/2024 51
Security Attack Types…
By means of encryption
12/23/2024 52
Security Attack Types…
12/23/2024 53
Security Attack Types…
12/23/2024 55
Common security attacks and their
countermeasures
Finding a way into the network
Firewalls
Denial of Service
Access filtering, IDS
TCP hijacking
IPSec
12/23/2024 56
Common security attacks and their
countermeasures…
Packet sniffing
Encryption (SSL, HTTPS)
Social problems
Education
12/23/2024 57
Security Services
X.800:
RFC 2828:
12/23/2024 58
Security Services (X.800)…
12/23/2024 61
Security Model
12/23/2024 62
Security Model
12/23/2024 63
Security Model
12/23/2024 64
Security Model
12/23/2024 66
Dimensions
1. Access Control Security Dimension
12/23/2024 70
Dimensions
5. Communication Security Dimension
12/23/2024 72
Dimensions
7. Availability Security Dimension
12/23/2024 75