Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Introduction To Computer Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

Chapter 1

Introduction to Computer Security


Basics components of security

 Confidentiality
 Integrity
 Availability
Confidentiality

 Confidentiality is the concealment of information or


resources.

 Access control mechanisms support confidentiality

 Cryptography scrambles data to make it


incomprehensible.

 Cryptographic key controls access to the unscrambled


data, but then the cryptographic key itself becomes
another datum to be protected.
Contd..
 EXAMPLE: Enciphering an income tax return will
prevent anyone from reading it. If the owner needs
to see the return, it must be deciphered. Only the
possessor of the cryptographic key can enter it into
a deciphering program. However, if someone else
can read the key when it is entered into the
program, the confidentiality of the tax return has
been compromised.
Integrity

 Integrity refers to the trustworthiness of data or


resources

 is usually phrased in terms of preventing improper


or unauthorized change.

 Integrity includes data integrity (the content of the


information) and origin integrity (the source of the
data, often called authentication).
Contd..
 EXAMPLE: A newspaper may print information
obtained from a leak at the White House but
attribute it to the wrong source. The information is
printed as received (preserving data integrity), but
its source is incorrect (corrupting origin integrity).
Integrity mechanisms

 Prevention Mechanisms
 seek to maintain the integrity of the data by blocking any unauthorized
attempts to change the data or any attempts to change the data in
unauthorized ways.

 Detection Mechanism
 Detection mechanisms do not try to prevent violations of integrity; they
simply report that the data’s integrity is no longer trustworthy.
 analyze system events (user or system actions) to detect problems or
(more commonly) may analyze the data itself to see if required or
expected constraints still hold.
 may report the actual cause of the integrity violation (a specific part of a
file was altered), or they may simply report that the file is now corrupt.
Availability

 Availability refers to the ability to use the information


or resource desired.

 Information only has value if the right people can


access it at the right times.

 De nying access to information has become a very


common attack nowadays.

 The primary aim of DoS attacks is to deny users of the


website access to the resources of the website.
Contd..
 EXAMPLE: Suppose Anne has compromised a bank’s secondary system
server, which supplies bank account balances. When anyone else asks
that server for information, Anne can supply any information she desires.
Merchants validate checks by contacting the bank’s primary balance
server. If a merchant gets no response, the secondary server will be asked
to supply the data. Anne’s colleague prevents merchants from contacting
the primary balance server, so all merchant queries go to the secondary
server. Anne will never have a check turned down, regardless of her
actual account balance. Notice that if the bank had only one server (the
primary one), this scheme would not work. The merchant would be
unable to validate the check.
Threat Vs. Attack
 Threat
 A potential for violation of security, which exists when there is a circumstance,
capability, action, or event that could breach security and cause harm. That is, a
threat is a possible danger that might exploit a vulnerability.
 is a possible danger that might exploit a vulnerability to breach security and this
cause possible harm.

 Attack
 An assault on system security that derives from an intelligent threat; that is, an
intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system.
 Is any attempt to destroy, expose, alter, disable, steal or gain unauthorized
access to resources.
Categories of Threats

 Shirey divides threats into four broad classes:


 disclosure, or unauthorized access to information
 deception, or acceptance of false data
 disruption, or interruption or prevention of correct
operation
 usurpation, or unauthorized control of some part
of a system
Security Attacks

 Passive Attack
 are in the nature of eavesdropping on, or monitoring of,
transmissions.
 The goal of the opponent is to obtain information that is
being transmitted.
 Two types
▪ Release of message contents
▪ Traffic Analysis
▪ The common technique for masking contents is encryption.
▪ If we had encryption protection in place, an opponent might still be able to observe the
pattern of these messages.
▪ The opponent could determine the location and identity of communicating hosts and
could observe the frequency and length of messages being exchanged. This information
might be useful in guessing the nature of the communication that was taking place.
Active Attacks

 involve some modification of the data stream or the creation of a


false stream

 can be subdivided into four categories: masquerade, replay,


modification of messages, and denial of service.
 A masquerade takes place when one entity pretends to be a different entity
 Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
 Modification of messages simply means that some portion of a legitimate
message is altered, or that messages are delayed or reordered, to produce
an unauthorized effect
 The denial of serviceprevents or inhibits the normal use or management of
communications facilities. for example, an entity may suppress all messages
directed to a particular destination (e.g., the security audit service).
Security Threats: Snooping

 Snooping
 the unauthorized interception of information
 is a form of disclosure
 Is passive in nature
 some entity is listening to (or reading) communications or
browsing through files or system information.
 E.g. passive wiretapping in which network is monitored.
Masquerading

 Also termed as spoofing

 An impersonation of one entity by another

 Is a form of both deception and usurpation

 Lures a victim into believing that the entity with which it is


communicating is a different entity

 For example, if a user tries to log into a computer across the


Internet but instead reaches another computer that claims
to be the desired one, the user has been spoofed.
Modification

 Also termed as alteration, an unauthorized change of


information

 Covers three classes of threats


 deception, in which some entity relies on the modified data to determine
which action to take, or in which incorrect information is accepted as
correct and is released.
 If the modified data controls the operation of the system, the threats of
disruption and usurpation arise.

 modification is active; it results from an entity changing


information. Active wiretapping is a form of modification in
which data moving across a network is altered

You might also like