CH01 CompSec2e
CH01 CompSec2e
CH01 CompSec2e
Overview
Computer Security
Overview
The NIST Computer Security
Handbook defines the term Computer
Security as:
The protection afforded to an
automated information system in
order to attain the applicable
objectives of preserving the integrity,
availability and confidentiality of
information system resources
(includes hardware, software,
firmware, information/data, and
confidentiality
privacy
Integrity
- data integrity
- system integrity
Availabilit
y
Table 1.1
Computer
Security
Terminolo
gy
RFC 2828,
Internet
Security
Glossary, May
2000
Figure 1.2
Security Concepts and Relationships
Vulnerabilities, Threats
and Attacks
categories of vulnerabilities
corrupted (loss of integrity)
leaky (loss of confidentiality)
unavailable or very slow (loss of availability)
threats
capable of exploiting vulnerabilities
represent potential security harm to an asset
operation
insider initiated by an entity inside the security
parameter
outsider initiated from outside the perimeter
Countermeasures
Table 1.2
Threat
Consequen
ces
Figure 1.3
Scope of Computer Security
Table 1.3
Computer and Network Assets
Examples of Threats
Table 1.3
traffic analysis
Table
1.4
(FIPS PUB
200)
Secu
rity
Requ
irem
ents
Security Functional
Requirements
Security Services
X.800
defines a security
service as a service
that is provided by
a protocol layer of
communicating
open systems and
ensures adequate
security of the
systems or of data
transfers
defines a security
RFC 2828
service as a
processing or
communication
service that is
provided by a
system to give a
specific kind of
protection to
system resources;
security services
implement security
policies and are
implemented by
security
mechanisms
Table 1.5
Security
Services
Authentication
Service
that a communication is
from the source that it
claims to be from
must assure that the
connection is not
interfered with by a third
party masquerading as
one of the two legitimate
parties
corroboration of the
source of a data unit
does not provide
protection against the
duplication or
modification of data units
this type of service
supports applications like
Peer
email
where
there are no
Entity
Authentication
provides
for the corroboration
prior
interactions
of the identity
between
the of a peer entity
in an association
communicating
entities
provided for use at the
establishment of, or at times
during the data transfer phase
of, a connection
attempts to provide confidence
that an entity is not performing
either a masquerade or an
unauthorized replay of a
previous connection
Access
Control
Service
Nonrepudiation
Service
prevents either
sender or receiver
from denying a
transmitted message
receiver can prove
Data
Confidentiality
Service
analysis
this requires that an attacker
connectionless
confidentiality
the protection of transmitted
a connection-oriented
Data
Integrity
Service
messages, a single
message, or selected
fields within a message
a connectionless integrity
Availability
Service
of a system or a system
resource being accessible
and usable upon demand
by an authorized system
entity, according to
performance
specifications of the
system
are amenable to
authentication and
encryption
some attacks require a
physical action to
prevent or recover from
loss of availability
a property to be
associated with various
security services
addresses the security
Table
1.6
X.800
Security
Mechanisms
Figur
e 1.4
Securi
ty
Trend
s
Figure 1.5
Security Technologies
Used
Computer Security
Strategy
Security Policy
formal statement of rules and practices
system
potential threats and
the likelihood of
attacks
security
cost of security versus
cost of failure and
recovery
Security Implementation
involves four
complementary
courses of
action:
Assurance and
Evaluation
assurance
the degree of confidence one has that the security
Summary
security concepts
CIA triad
confidentiality preserving
the disclosure of information
integrity guarding against
modification or destruction
of information
availability ensuring timely
and reliable access to
information
terminology table 1.1
security architecture
security services enhances the
threats exploits
vulnerabilities
attack a threat carried out
countermeasure means to
deal with a security attack
assets hardware, software,
data, communication lines,
networks
security trends
figure 1.4
security strategy
policy, implementation,