Introduction To Computer Security
Introduction To Computer Security
What is “Security?”
Pillars of Security:
Confidentiality, Integrity, Availability (CIA)
Vulnerabilities, Threats, and Controls
Attackers
How to React to an Exploit?
Methods of Defense
Principles of Computer Security
2
Information hiding
Security
Applications Negotiation
Privacy
Integrity Access control Threats
Data provenance
Biometrics
Semantic web security Fraud
Policy making
Trust
Computer epidemic Encryption
Data mining Anonymity
Formal models
System monitoring
Vulnerabilities Network security
3
Critical Infrastructure Areas
Include:
Telecommunications
Electrical power systems
Water supply systems
Gas and oil pipelines
Transportation
Government services
Emergency services
Banking and finance
…
4
2. What is a “Secure” Computer System?
To decide whether a computer system is “secure”, you must
first decide what “secure” means to you, then identify the
threats you care about.
Threats - examples
Viruses, trojan horses, etc.
Denial of Service
Stolen Customer Data
Modified Databases
Identity Theft and other threats to personal privacy
Equipment Theft
Espionage in cyberspace
Hack-tivism
Cyberterrorism
…
5
3. Basic Components of Security:
Confidentiality, Integrity, Availability (CIA)
CIA
Confidentiality: Who is authorized to use data? C I
Integrity: Is data „good?” S
Availability: Can access data whenever need it?
A
S = Secure
CIA or CIAAAN…
(other security components added to CIA)
Authentication
Authorization
Non-repudiation
…
6
Need to Balance
CIA
Example 1: C vs. I+A
Disconnect computer from Internet to increase confidentiality
Availability suffers, integrity suffers due to lost updates
7
Vulnerabilities, Threats, & Controls
8
Vulnerabilities, Threats, and Controls
Understanding Vulnerabilities, Threats, and Controls
Vulnerability = a weakness in a security system
Threat = circumstances that have a potential to cause harm
Controls = means and ways to block a threat, which tries to
exploit one or more vulnerabilities
Most of the class discusses various controls and their effectiveness
[Pfleeger & Pfleeger]
9
Attack (materialization of a vulnerability/threat combination)
= exploitation of one or more vulnerabilities by a threat; tries to defeat
controls
Attack may be:
Unsuccessful
10
Threat Spectrum
Local threats
Recreational hackers
Institutional hackers
Shared threats
Organized crime
Industrial espionage
Terrorism
National security threats
National intelligence
Info warriors
11
Kinds of Threats
Kinds of threats:
Interception
an unauthorized party (human or not) gains access to
an asset
Interruption
an asset becomes lost, unavailable, or unusable
Modification
an unauthorized party changes the state of an asset
Fabrication
an unauthorized party counterfeits an asset
Examples?
12
Levels of Vulnerabilities / Threats
13
A) Hardware Level of Vulnerabilities /
Threats
Add / remove a h/w device
Ex: Snooping, wiretapping
Snoop = to look around a place secretly in order to discover things
about it or the people connected with it.
Ex: Modification, alteration of a system
...
Physical attacks on h/w => need physical security: locks and
guards
Accidental (dropped PC box) or voluntary (bombing a
computer room)
Theft / destruction
Damage the machine (spilled coffe, mice, real bugs)
...
14
Example of Snooping:
Wardriving / Warwalking, Warchalking,
Wardriving/warwalking -- driving/walking
around with a wireless-enabled notebook looking
for unsecured wireless LANs
15
B) Software Level of Vulnerabilities /
Threats
Software Deletion
Easy to delete needed software by mistake
To prevent this: use configuration management
software
Software Modification
Trojan Horses, , Viruses, Logic Bombs,
Trapdoors, Information Leaks ...
Software Theft
Unauthorized copying
via P2P, etc.
16
Types of Malicious Code
Bacterium - A specialized form of virus which does not attach to a specific file. Usage obscure.
Logic bomb - Malicious [program] logic that activates when specified conditions are met.
Usually intended to cause denial of service or otherwise damage system resources.
Trapdoor - A hidden computer flaw known to an intruder, or a hidden computer mechanism
(usually software) installed by an intruder, who can activate the trap door to gain access to the
computer without being blocked by security services or mechanisms.
Trojan horse - A computer program that appears to have a useful function, but also has a
hidden and potentially malicious function that evades security mechanisms, sometimes by
exploiting legitimate authorizations of a system entity that invokes the program.
Virus - A hidden, self-replicating section of computer software, usually malicious logic, that
propagates by infecting (i.e., inserting a copy of itself into and becoming part of) another
program. A virus cannot run by itself; it requires that its host program be run to make the virus
active.
Worm - A computer program that can run independently, can propagate a complete working
version of itself onto other hosts on a network, and may consume computer resources
destructively.
More types of malicious code exist…
17
C) Data Level of Vulnerabilities / Threats
Adequate protection
Cryptography
Good if intractable for a long time
18
Identity Theft
Cases in 2003:
Credit card skimmers plus drivers license, Florida
Faked social security and INS cards $150-$250
Used 24 aliases – used false id to secure credit cards,
open mail boxes and bank accounts, cash fraudulently
obtained federal income tax refund checks, and launder
the proceeds
Bank employee indicted for stealing depositors'
information to apply over the Internet for loans
$7M loss, Florida: Stole 12,000 cards from restaurants
via computer networks and social engineering
19
Types of Attacks on Data CIA
Disclosure
Attack on data confidentiality
Unauthorized modification / deception
E.g., providing wrong data (attack on data integrity)
Disruption
(attack on data availability)
Usurpation
Unauthorized use of services (attack on data confidentiality, integrity
or availability)
20
Ways of Attacking Data CIA
Examples of Attacks on Data Confidentiality
Tapping / snooping
Examples of Attacks on Data Integrity
Modification: salami attack -> little bits add up
E.g/ „shave off” the fractions of cents after interest calculations
Fabrication: replay data -> send the same thing again
E.g., a computer criminal replays a salary deposit to his account
Examples of Attacks on Data Availability
Delay vs. „full” DoS
Examples of Repudiation Attacks on Data:
Data origin repudiation: „I never sent it”
mistakes
„bringing close” physically distant attackers
23
Types of Attackers
Types of Attackers - Classification 1
Amateurs
Opportunistic attackers (use a password they found)
Script kiddies
Hackers - nonmalicious
In broad use beyond security community: also malicious
Crackers – malicious
Career criminals
State-supported spies and information warriors
24
6. Reacting to an Exploit
Etc.
25
7. Methods of Defense
Five basic approaches to defense of
computing systems
Prevent attack
Block attack / Close vulnerability
Deter attack
Make attack harder (can’t make it impossible )
Deflect attack
Make another target more attractive than this
target
Detect attack
During or after
Crenellations
Strong gate
Tower
Guards / passwords
27
Medieval castles
location (steep hill, island, etc.)
moat / drawbridge / walls / gate / guards /passwords
another wall / gate / guards /passwords
yet another wall / gate / guards /passwords
tower / ladders up
Protects CIA:
confidentiality – by „masking” data
integrity – by preventing data updates
e.g., checksums included
availability – by using encryption-based protocols
e.g., protocols ensure availablity of resources for
different users
29
A.2) Controls: Software Controls
Secondary controls – second only to encryption
Software/program controls include:
OS and network controls
E.g. OS: virtual machine
system)
internal program controls (part of a program)
E.g. read/write controls in DBMSs
development controls
E.g. quality standards followed by developers
incl. testing
30
Considerations for Software Controls:
Impact on user’s interface and workflow
E.g. Asking for a password too often?
31
A.3) Controls: Hardware Controls
32
A.4) Controls: Policies and Procedures
33
Policy - must consider:
Alignment with users’ legal and ethical standards
Probability of use (e.g. due to inconvenience)
Inconvenient: 200 character password,
change password every week
(Can be) good: biometrics replacing passwords
Periodic reviews
As people and systems, as well as their goals, change
34
A.5) Controls: Physical Controls
Walls, locks
Guards, security cameras
Backup copies and archives
Cables an locks (e.g., for notebooks)
Natural and man-made disaster protection
Fire, flood, and earthquake protection
Accident and terrorism protection
...
35
B) Effectiveness of Controls
Awareness of problem
People convined of the need for these controls
Likelihood of use
Too complex/intrusive security tools are often disabled
Overlapping controls
>1 control for a given vulnerability
To provide layered defense – the next layer compensates for a
Periodic reviews
A given control usually becomess less effective with time
Need to replace ineffective/inefficient controls with better ones
36
8. Principles of Computer Security
37
Principle of Effectiveness
Controls must be used—and used properly—to be
effective.
They must be efficient, easy to use, and appropriate.
Piyush Patel
Shashi Vishwakarma
39