Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
2 views

CSIT561 Module 1 Introduction

The document provides an introduction to computer security, emphasizing the importance of protecting computer systems and networks from various threats and vulnerabilities. It outlines the C-I-A triad (Confidentiality, Integrity, Availability) as fundamental components of security and discusses the need for effective controls to mitigate risks. Additionally, it highlights the evolution of computer security and the financial implications of security breaches on organizations.

Uploaded by

shwetasah2002
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CSIT561 Module 1 Introduction

The document provides an introduction to computer security, emphasizing the importance of protecting computer systems and networks from various threats and vulnerabilities. It outlines the C-I-A triad (Confidentiality, Integrity, Availability) as fundamental components of security and discusses the need for effective controls to mitigate risks. Additionally, it highlights the evolution of computer security and the financial implications of security breaches on organizations.

Uploaded by

shwetasah2002
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

CSIT 561 - Computer Security

Module 1
Introduction

Bharath K. Samanthula
Department of Computer Science
Montclair State University
Outline

Motivation & Definition

C-I-A Triad

Access Control Terminology

Threats, Vulnerabilities, Attacks

Controls
Need for Computer Security

We are living in a interconnected digitalized world

Computer Systems and Networks are vulnerable to


different kinds of attacks

Many companies spend a lot of resources to counter


security attacks (according to Gartner1 , Worldwide
spending on security is estimated to be $188.3 billion in
2023)

Interesting Questions:
How do users communicate online securely?
What countermeasures need to be taken to secure
applications or networks?

1
https://www.gartner.com/en/newsroom/press-releases/
2022-10-13-gartner-identifies-three-factors-influencing-growth-i
Evolution of Computer Security

Dates back to 1988 - Worm, a software program that


affected approximately 5,000 computers
At that time, the Worm didn’t affect the daily lives of
humans

After 9/11 (2001) terrorist attack, security of many aspects


of society drew renewed scrutiny

Security of computers and their interconnecting networks


is one of the top aspects
Attack Scenario 1: Example

In Feb 2013, residents of Great Falls, Montana received a


strange broadcast message on their TVs “Civil authorities
in your area have reported that the bodies of the dead are
rising from the grave and attacking the living” that sounded
authentic.

What would you have done?


Attack Scenario 2: Example

In 2023, two former Tesla (TSLA) employees were behind


a data breach that compromised personal information of
more than 75,000 people including staff, the electric
carmaker said in a legal disclosure.

Shared the confidential data with German newspaper


Handelsblatt.

What would you expect the media outlet to do?


Cyber Threat Map

https://threatmap.checkpoint.com/

https://cybermap.kaspersky.com/

https://threatmap.checkpoint.com/
Recent Cyber Attacks
Growing cyber attacks

Snowden leaks information about various NSA data


collection programs (phone call records, etc.)

Target - theft of 40 million credit card accounts (spent $240


million to replace customers’ cards)

Anthem - around 80 million customer records have been


compromised

Facebook CEO’s page hacked by Palestinian Khalil


Shreateh to demonstrate bugs in Facebook

Equifax and WannaCry ransomware attacks

... Capital One breach (compromised 100 million


customer’s data)
Hollywood’s Take on Computer Security

Source: Cryptography and Network Security, Behrouz Forouzan


What does computer security mean?

Computer security deals with (textbook):


Protection of the items you value, called the assets of
a computer or computer system
Assets can be hardware, software, data, people,
processes or combinations of these
Identify the assets to protect and determine their
value
NIST Definition
Vulnerability-Threat-Control Paradigm

Vulnerability: A weakness in the system


Example: a system that doesn’t verify user’s identity
before log on is vulnerable to unauthorized or illegal
data access

Threat: A set of circumstances that has the potential to


cause loss or harm

Control: a countermeasure that prevents threats from


exercising vulnerabilites
Why should you provide Computer Security?

We need to have proper security mechanisms in place to avoid

Financial losses

Physical attacks

Loss of credibility

Legal issues - Most governments regulations (e.g., HIPAA


and US Patriot Act) require you to protect customer’s data
Basic Security Components - CIA Triad
Confidentiality

Objectives
Keeping data and resources hidden

Data, whether at rest or being transmitted, need to remain


confidential

Often related to privacy

How this is achieved


Data confidentiality is typically achieved by encrypting the
data (more on this later)

Example: user passwords and bio-metric data need to be


protected from other users/attackers
Confidentialty: Example

An unauthorized person learns the existence of a piece of data


(e.g., knowing that talks are underway about the merger of two
companies)

Is this a failure of data confidentiality?


Integrity
Objectives
Maintain the accuracy and trustworthiness of data
Includes data integrity and origin integrity (authentication)
Data integrity: Data at rest or in transit should not be
changed by unauthorized people (e.g., in the case of
hacking)

How this is achieved


Use cryptographic techniques (such as digital signatures)
Example: when accessing your bank account details, how
can the user ensure that his/her account information is
accurate and trustworthy?
Key question: Can the user authenticate him/herself to the
server without revealing his/her identity?
Availability

Availability - the ability to use the information or resource


desired

A system that is unavailable is at least as bad as no


system at all

Denial of Service (DoS) Attacks: an attempt to make a


machine/data/resource unavailable to intended users
Additional Concepts

ISO 7498-2 adds two more properties that are desirable to


communication networks:

Authenticity: The ability of a system to confirm the identity


of a sender

Accountability or Nonrepudiation: The ability of a system


to confirm that a sender cannot convincingly deny having
sent the message

U.S. Department of Defense adds Auditability to extend security

Auditability: The ability of a system to trace all actions


related to a given asset
C-I-A Together

Computer Security seeks to prevent unauthorized viewing


(confidentiality) or modification (integrity) of data while
preserving access (availability)
Access Control

©2015 Pearson Education, Inc. All rights reserved.


Security Issues

Vulnerability: weakness in the security system (at


hardware, software, data levels)

Threat: a set of circumstances that lead to violation of


system security

Key Question: What is more important for cybersecurity


professionals to focus on, threats or vulnerabilities?"
Threats

Caused both by human and other sources, such as natural


disasters, loss of electrical power, failure of processor chip,
etc.

Either benign or malicious

Targeted or random
Four Common Threats

Interruption

Interception

Modification

Fabrication
Interruption

©2017 Pearson Education, Inc., Hoboken, NJ.


Interception

©2017 Pearson Education, Inc., Hoboken, NJ.


Modification

©2017 Pearson Education, Inc., Hoboken, NJ.


Fabrication

©2017 Pearson Education, Inc., Hoboken, NJ.


Types of Threats

©2017 Pearson Education, Inc., Hoboken, NJ.


Advanced Persistent Threat (APT)

Organized

Directed

Well-financed

Patient

Silent

Example: A series of attacks in 2012 and 2013, organized


and supported by the Chinese government, obtained
product designs from aerospace companies in US.
https://www.crowdstrike.com/cybersecurity-101/advanced-persistent-threat-apt/
Types of Attackers

©2017 Pearson Education, Inc., Hoboken, NJ.


Computer Security vs. Terrorism
Terrorists use computers in four ways:
Computer as target of attack: DoS attacks and website
defacements. Example - A massive DoS attack launched
against the country of Estonia in 2007
Computer as method of attack: malicious code used to
attack systems
Computer as enabler of attack: Website, web logs, emails
provide inexpensive way for coordination among terrorists.
Example - Terrorists in Mumbai attack (2008) used GPS,
Blackberries and Google Earth to execute their plan
Computer as enhancer of attack: Using Internet for
terrorists to spread propoganda and recruit agents.
Example - FBI arrested Colleen LaRose, known as
JihadJane, in Oct 2009 after she spent months on using
electronic tools to recruit radicals in Europe and South
Asia.
Method-Opportunity-Motive
A Malicious attacker must have three things to ensure success:
method, opportunity, and motive

©2017 Pearson Education, Inc., Hoboken, NJ.


Controls/Countermeasures

Physical Controls: stop or block an attack by using


something tangible, such as locks, human guards, fire
extinguishers, etc.

Procedural/Administrative Controls: laws, regulations,


copyrights, contracts, agreements, etc.

Technical Controls: Counter threats with technology, such


as passwords, network protocols, access control, etc.
Controls/Countermeasures

©2017 Pearson Education, Inc., Hoboken, NJ.


Different Types of Controls

©2017 Pearson Education, Inc., Hoboken, NJ.


Summary

Vulnerabilities are weaknesses in a system; threats exploit


those weaknesses; controls protect those weaknesses
from exploitation

Confidentiality, integrity, and availability are the three basic


security primitives

Different attackers pose different kinds of threats based on


their capabilities and motivations

Different controls address different threats; controls come


in many flavors and can exist at various points in the
system
Useful References

https://www.mcafee.com/blogs/enterprise/
5-most-common-types-of-threats-you-need-to-know

Chapter 1, Security in Computing by Charles P. Pfleeger et


al., 5th Edition, Pearson, 2015.

https://www.techwalla.com/articles/
the-difference-between-passive-active-attacks-on

You might also like