Chapter 1fundamental of Software Security
Chapter 1fundamental of Software Security
Chapter 1fundamental of Software Security
Chapter – 1
fundamental of software security
Outlines
Introduction to security
. Key Objectives of Security
Computer Security Challenges
Security Services and Mechanisms
Security Attacks
Security Techniques
Model for Network Security
Fundamental of Security
Security:- a prevents unauthorized access to organizational assets
Computer security:- is broad contains d/t security measures to protect
destruction
Process of preventing and detecting unauthorized use of the
computer system.
Fundamental of Security
E.g. BIOS
Data only has value if the right people can access at the right time.
Implementing firewalls
Data redundancy
All cyber attacks have the potential to threaten one or more of the
three parts of the CIA triad.
It is securing both the software and hardware technologies e.g.
It prevents from negatively affecting users’ ability to access or use
the network.
Network security has become increasingly challenging as
to public cloud.
Types of Computer Security
5. Internet security:- protecting computer systems and networks from threats
that originate from the internet.
How to make secure??
By implementing web security measures e.g. secure browsing and filtering,
Apply and monitor endpoint security policies throughout the entire network
E.g. Advance malware protection
Types of Computer Security …
7.Cloud security:- securing data and applications hosted in cloud
environments to prevent unauthorized access or modification.
an infected program or file is executed, virus can spread to other files and
systems.
Can infect a large number of systems quickly and can be difficult to detect and
remove.
E.g. Use up hard disk space b/c a worm can replicate in great volume and
speed.
Phishing:- type of attack that uses social engineering techniques to trick users
into disclosing sensitive information.
E.g. passwords and credit card numbers
Computer security threats…
Botnet:- a network of computers or devices that are infected with malware
Can remotely control the bots to carry out sending spam emails, launching
DDoS attacks, stealing sensitive data, and spreading malware.
Activating firewall
Use Internet with cares and ignore pop-ups drive-by downloads while
browsing
Lack of awareness: users are not aware of the risks if do not follow security
best practices.
Security service
Security mechanism
Security attack
Security services
Security services :-are functions that provide protection and security
to computer systems and networks.
Specific mechanism
Security mechanisms …
Encipherment:- to the process of applying mathematical algorithms
for converting data into a form that is not intelligible.
reversible & irreversible
Data Integrity: a used to assure the integrity of a data unit or stream of data
units.
Security Audit Trail: record of all events and actions occurred within
a computer system or network.
Attack on availability
Attacks on confidentiality.
Security Attacks …
Modification: act of changing or altering data or information without
authorization.
an attack on integrity.
Traffic analysis:- analyzing patterns the traffic, determine the location and
identity of communicating host and observe the frequency and length of
messages being exchanged
All incoming and outgoing traffic of the network is analyzed, but not altered
Bob observe patterns
message exchange b/n
lily to john
The most important thing, in an active attack, Victim gets informed about
the attack
Types of active attacks
Modification of messages
Replay
Repudiation
Denial of Service
Types of Security Attacks…
Types of active attacks…
E.g. if a legitimate user leaves the terminal or session open and logged in, a
co-worker may act as a masquerade attacker
As the attackers gain access and gets into all the organization's critical data
and can delete or modify, steal sensitive data, or alter routing information
and network configuration.
Types of Security Attacks…
Types of active attacks…
Sender Receiver
Third party
Prevention from Replay Attack : (unauthorize
d
Timestamp : used to ensure that data packets are not accepted if they are too
late
Session key : key can be used only once per transaction and cannot be
reused.
Types of Security Attacks…
Types of active attacks…
Deny the intended users to access the host from the Internet.
It can cause computers and routers to crash and links to bog down.
Training awareness
It show how security service has designed over network to prevent the
opponent from causing a threat to confidentiality or authenticity of
information being transmitted through the network.
It is how messages are shared between sender and receiver securely over the
network
Model for Network Security
Trusted third party:- is responsible for distributing the secret information to
the two principals while keeping from any opponent( e.g. banking server)
Encryption
Penetration testing