1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services



Similar documents
Notes on Network Security - Introduction

Introduction to Security

Chap. 1: Introduction

COSC 472 Network Security

Network & Information Security Policy

IY2760/CS3760: Part 6. IY2760: Part 6

ISO Controls and Objectives

Chapter 6: Fundamental Cloud Security

Chapter 4 Information Security Program Development

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Cryptography and Network Security

Information System Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Managing IT Security with Penetration Testing

Information Security Basic Concepts

Security Issues with Integrated Smart Buildings

Security Goals Services

Network Security. Instructor: Adam Hahn

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Overview of computer and communications security

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Risk Management Handbook

Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

ISO27001 Controls and Objectives

Physical Security of Remote Pilot Stations and Aircrafts (when On Ground)

Content Teaching Academy at James Madison University

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Cyber Security for SCADA/ICS Networks

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

FINAL May Guideline on Security Systems for Safeguarding Customer Information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

INFORMATION TECHNOLOGY SECURITY STANDARDS

SECURING A STORAGE AREA NETWORKS

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

UoB Risk Assessment Methodology

Security aspects of e-tailing. Chapter 7

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

CPSC 467: Cryptography and Computer Security

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Third Party Security Requirements Policy

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Better secure IT equipment and systems

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data


SECURITY CONSIDERATIONS FOR LAW FIRMS

Cybersecurity Awareness. Part 1

Cybersecurity for the C-Level

Standard: Information Security Incident Management

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

How To Write A Transport Layer Protocol For Wireless Networks

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS

Course: Information Security Management in e-governance

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

HIPAA Security Alert

Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C.

Table: Security Services (X.800)

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CYBER SECURITY CONTROLS CHECKLIST

Network Security. Network Security Hierarchy. CISCO Security Curriculum

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Technical Proposition. Security

IBX Business Network Platform Information Security Controls Document Classification [Public]

Data Storage Security in Cloud Computing

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Cryptography and Network Security Chapter 1

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

Information Security

Information Security Policy Manual

Lecture II : Communication Security Services

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

Hackers: Detection and Prevention

SECURITY. Risk & Compliance Services

Computer and Network Security

CPSC 467b: Cryptography and Computer Security

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Unit 3 Cyber security

Transcription:

1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1

1.1 Definitions A computer security system is the set of mechanisms and techniques that protect a computer system (assets) from loss or harm, e.g. unauthorized access, unauthorized disclosure, and Undesirable interference with operations. Mar 2012 ICS413 network security 2

Computer system Assets Resources Hardware, software, communication channels, people Data Files, databases, messages Mar 2012 ICS413 network security 3

Security system goals System Availability System Integrity Confidentiality of Information Mar 2012 ICS413 network security 4

Security Terms (ref. Pfleeger) Exposure A form of possible loss or harm Threats Circumstances that have potential to cause loss or harm Vulnerability A weakness in the system that can potentially lead to loss or harm Mar 2012 ICS413 network security 5

Terms (cont.) Attack The act of attempting to exploit a vulnerability and therefore cause loss or harm Adversary, attacker, intruder One who perpetrates an attack Security control Protective measure to reduce vulnerability, or reduce loss/harm Mar 2012 ICS413 network security 6

1.2 Security threat analysis Exposures and threats Need to Identify What security breaches can occur Where they can occur How they can occur o E.g., do a quick threat analysis of an 1. email system, 2. a web server Mar 2012 ICS413 network security 7

Exposures and threats e.g File store Processor data link Switching node data link Terminal node People???? Mar 2012 ICS413 network security 8

Exposures (what can happen) On information e.g. Theft, copying, disclosure Modification, corruption or fabrication Destruction (deletion) Repudiation Mar 2012 ICS413 network security 9

Exposures (what can happen) On resource, e.g. Theft, Destruction, degradation License expiry unauthorized modification unauthorized use interference with operation Denial of access to authorized user(s) Mar 2012 ICS413 network security 10

Sources of threats Competitors Threats to System Availability System Integrity Confidentiality of Information Disgruntled, compromised: employees, consultants; also ex- Government agencies, military & industrial spies Mar 2012 ICS413 network security 11

Sources of threats Hackers/crackers, pranksters Amateur criminals Career criminals Terrorists Mar 2012 ICS413 network security 12

Sources of threats Natural disasters Accidents Unreliable software, bugs etc. Mar 2012 ICS413 network security 13

Passive vs. active attacks Passive attacks, e.g. Observe information without interference Message content: break confidentiality Message traffic analysis: frequency, length, source, destination Mar 2012 ICS413 network security 14

Active attack, e.g. Modify message contents or stream: delete, delay, reorder, replay, insert Masquerade as authorized user Disrupt, degrade service availability Theft, destruction Mar 2012 ICS413 network security 15

Security Analysis After identifying assets, exposures and potential threats proceed to: Vulnerability analysis: identify potential weak elements within system Threat assessment: likelihood of a threat being transformed into an attack which exploits an existing vulnerability. How to assess? Risk analysis: potential consequences of problems arising from security breach and the estimated cost of successful attack Mar 2012 ICS413 network security 16

Security Analysis(cont.) Prevention techniques: what can be done to prevent security breaches and what are the costs? Cost benefit analysis: do the consequences of security breaches justify the cost of protection? [Consider also the inconvenience, loss of performance.] [Recovery may be less costly than prevention!] Mar 2012 ICS413 network security 17

Principle of adequate protection: (ref. Pfleeger) Computer items must be protected only until they lose their value. Must be protected to a degree consistent with their value Mar 2012 ICS413 network security 18

1.3 Security mechanisms and techniques: Broad classification Physical Administrative Logical security Mar 2012 ICS413 network security 19

Physical security controls physical measures or mechanisms put in place to control exposure of and physical access to the computer system resources in order to avoid loss or harm Mar 2012 ICS413 network security 20

Physical security controls: examples Secure computer rooms no windows, locked doors, guards, fireproof, etc Secure terminals or terminal rooms Dedicate terminals to users No remote access, disconnect from network Secure (physically) the switching nodes Use fiber-optic cables, secure cable ducts,... etc. Mar 2012 ICS413 network security 21

Administrative security controls administrative measures, mechanisms, systems or procedures put in place to protect the computer system and resources from loss or harm Mar 2012 ICS413 network security 22

Administrative security controls - examples Organization policies Administrative procedures System development standards, procedures Operational procedures Legal provisions Professional Ethics etc. Mar 2012 ICS413 network security 23

Logical security controls Measures incorporated within the computer system to protect its resources from threats and attacks That may have breached physical and administrative controls, or For which physical and administrative controls are inadequate. Mar 2012 ICS413 network security 24

1.4 Some Security Services The security system should provide Access control Confidentiality Authentication Integrity Non-Repudiation Availability Mar 2012 ICS413 network security 25

Access control: define and enforce who has access to services or resources Confidentiality: prevent disclosure of information to unauthorized users Authentication: establish validity of the identity of an entity Mar 2012 ICS413 network security 26

Integrity: prevent modification of information by unauthorized users includes no duplication, replays, insertions, or reordering Availability: prevent denial of service e.g. by disruption, theft, overload, etc Non Repudiation: (accountability) prevent denial of sending or receipt of a message, creating or modifying data. Mar 2012 ICS413 network security 27

Principle of effectiveness: (ref. Pfleeger) Controls used must be effective. They must be efficient, easy to use and appropriate. Mar 2012 ICS413 network security 28

Summary Definition Security threat analysis Classifications of security controls Security services Mar 2012 ICS413 network security 29

Next Access control User authentication Authorization Mar 2012 ICS413 network security 30