Chapter 1 Introduction
Chapter 1 Introduction
Chapter 1 Introduction
1
OUTLINE
• What is Security?
• Security trend
• Sources and consequences of risks
• Types of Vulnerabilities
• Security criteria
• Security attack types
• Security services and mechanisms
2
computer and network security
What is Security?
Security is about
• Threats (bad things that may happen, e.g. your
money getting stolen)
• Vulnerabilities (weaknesses in your defenses, e.g.
your front door being made of thin wood and glass)
• Attacks (ways in which the threats may be
actualized,
• e.g. a thief breaking through your weak front door
while you and the neighbors are on holiday)
3
computer and network security…
4
computer and network security…
Computer security is about provisions
and policies adopted to protect
information and property from theft,
corruption, or natural disaster
while allowing the information and
property to remain accessible and
productive to its intended users.
security of computers against intruders
(e.g.,hackers) and malicious software
(e.g., viruses).
5
computer and network security…
Network security on the other hand deals with provisions
and policies adopted to prevent and monitor unauthorized
access, misuse, modification, or denial of the computer
network and network-accessible resources.
6
WHO ARE THE ATTACKERS?
Vandals (Hackers, crackers) driven by intellectual challenge.
Cyber attacks
7
WHAT ARE THE VULNERABILITIES?
Physical vulnerabilities (Eg. Computer can be stolen)
Natural vulnerabilities (Eg. Earthquake)
Hardware and Software vulnerabilities (Eg. Failures)
Media vulnerabilities (Eg. Hard disks can be stolen)
Communication vulnerabilities (Ex. Wires can be tapped)
Human vulnerabilities (Eg. Insiders)
Poorly chosen passwords
Software bugs (non reliability of software)
buffer overflow attacks
8
CONSEQUENCES…
Failure/End of service
Reduction of QoS, down to Denial of Service (DDoS)
Internal problems in the enterprise
Trust decrease from partners (client, providers, share-
holders)
Technology leakage
Human consequences (personal data, sensitive data -
medical, insurances, …)
9
SECURITY CRITERIA (IN DETAIL)
•To understand the types of threats to security that exist,
first we need to have a definition of security
requirements.
•In this section, different security requirements are
presented.
Availability
•It requires that computer and network assets are only
available to authorized parties.
• computer and network should provide all the designated
services in the presence of all kinds of security attack.
10
SECURITY CRITERIA...
Integrity
It requires that messages should be modified or altered only
by authorized parties.
Modification includes writing, changing, deleting, and creating the
message that is supposed to be transmitted across the network.
11
SECURITY CRITERIA...
Confidentiality
It requires that the message can only be accessible for reading by
authorized parties.
It also requires that the system should verify the identity of a user.
Authentication
It means that correct identity is known to communicating parties.
This property ensures that the parties are genuine not impersonator.
Authorization
This property gives access rights to different types of users.
For example a network management can be performed by network
administrator only.
12
COMPUTER AND NETWORK
SECURITY
ATTACKS
Categories of Attacks
Interruption: An attack on availability
13
COMPUTER AND NETWORK SECURITY
ATTACKS…
Categories of Attacks/Threats
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
14
EXAMPLES OF THREATS
15
SECURITY ATTACK TYPES
The attacks can also be classified by the following criteria.
Passive or active,
Internal or external,
At different protocol layers.
Passive vs. active attacks
•A passive attack attempt to learn or make use of the information
without changing the content of the message and disrupting the
operation of the communication.
•Examples of passive attacks are:
-- Eavesdropping , traffic analysis, and traffic monitoring.
16
SECURITY ATTACK TYPES…
17
PASSIVE ATTACKS
Passive attacks do not affect system resources
Eavesdropping, monitoring
The goal of the opponent is to obtain information that is being
transmitted
18
PASSIVE ATTACKS (1)
RELEASE OF MESSAGE CONTENTS
19
PASSIVE ATTACKS (2)
TRAFFIC ANALYSIS
20
ACTIVE ATTACKS
Active attacks try to alter system resources or
affect their operation
Modification of data, or creation of false data
Four categories
Masquerade of one entity as some other
Replay previous message
Modification of messages
Denial of service (DoS): preventing normal use
A specific target or entire network
Difficult to prevent
The goal is to detect and recover
21
ACTIVE ATTACKS (1)
MASQUERADE
22
ACTIVE ATTACKS (2)
REPLAY
23
ACTIVE ATTACKS (3)
MODIFICATION OF MESSAGES
24
ACTIVE ATTACKS (4)
DENIAL OF SERVICE
25
SECURITY ATTACK TYPES…
Internal vs. External attacks
External attacks are carried out by hosts that don’t
belong to the network domain, sometimes they are
called outsider.
E.g.it can causes congestion by sending false routing
information thereby causes unavailability of services.
In case of internal attack, the malicious node from the
network gains unauthorized access and acts as a genuine
node and disrupts the normal operation of nodes.
They are also known as insider.
26
COMMON SECURITY ATTACKS AND THEIR
COUNTERMEASURES
Finding a way into the network
Firewalls
Denial of Service
access filtering, IDS
TCP hijacking
IPSec
Packet sniffing
Encryption (SSL, HTTPS)
Social problems
Education
27
SECURITY SERVICES (X.800)
Authentication - assures that communicating entity is the
one claimed
have both peer-entity & data origin authentication
29
10 Q n e
te r O
ha p
o f C
En d
30