Introduction To Computer Security
Introduction To Computer Security
Introduction To Computer Security
Confidentiality
Integrity
Availability
Confidentiality
Prevention Mechanisms
seek to maintain the integrity of the data by blocking any unauthorized
attempts to change the data or any attempts to change the data in
unauthorized ways.
Detection Mechanism
Detection mechanisms do not try to prevent violations of integrity; they
simply report that the data’s integrity is no longer trustworthy.
analyze system events (user or system actions) to detect problems or
(more commonly) may analyze the data itself to see if required or
expected constraints still hold.
may report the actual cause of the integrity violation (a specific part of a
file was altered), or they may simply report that the file is now corrupt.
Availability
Attack
An assault on system security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system.
Is any attempt to destroy, expose, alter, disable, steal or gain unauthorized
access to resources.
Categories of Threats
Passive Attack
are in the nature of eavesdropping on, or monitoring of,
transmissions.
The goal of the opponent is to obtain information that is
being transmitted.
Two types
▪ Release of message contents
▪ Traffic Analysis
▪ The common technique for masking contents is encryption.
▪ If we had encryption protection in place, an opponent might still be able to observe the
pattern of these messages.
▪ The opponent could determine the location and identity of communicating hosts and
could observe the frequency and length of messages being exchanged. This information
might be useful in guessing the nature of the communication that was taking place.
Active Attacks
Snooping
the unauthorized interception of information
is a form of disclosure
Is passive in nature
some entity is listening to (or reading) communications or
browsing through files or system information.
E.g. passive wiretapping in which network is monitored.
Masquerading