Computer and Network Security



Similar documents
Chap. 1: Introduction

COSC 472 Network Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Introduction to Security

CPSC 467b: Cryptography and Computer Security

Information Security Basic Concepts

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

CPSC 467: Cryptography and Computer Security

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

IY2760/CS3760: Part 6. IY2760: Part 6

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Security Goals Services

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Securing Data on Microsoft SQL Server 2012

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Content Teaching Academy at James Madison University

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Introduction to Information Security

MS-55096: Securing Data on Microsoft SQL Server 2012

Network Test Labs (NTL) Software Testing Services for igaming

PrivyLink Cryptographic Key Server *

Hardware Security Modules for Protecting Embedded Systems

CS 203 / NetSys 240. Network Security

IoT Security Platform

USB Portable Storage Device: Security Problem Definition Summary

TELECOMMUNICATION NETWORKS

Advanced Authentication

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

UF Risk IT Assessment Guidelines

Database and Data Mining Security

ISO 27002:2013 Version Change Summary

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

CRYPTOGRAPHY AS A SERVICE

Cryptography and Network Security

Embedding Trust into Cars Secure Software Delivery and Installation

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Secure Data Exchange Solution

Notes on Network Security - Introduction

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

UF IT Risk Assessment Standard

A Structured Approach to Computer Security *

USB Portable Storage Device: Security Problem Definition Summary

SENSE Security overview 2014

Cryptography. Digital security domain. Digital signature. Problems in digital signatures. Firewall. An open network

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Security Issues with Integrated Smart Buildings

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

How To Secure An Rsa Authentication Agent

Chapter 10. Cloud Security Mechanisms

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

That Point of Sale is a PoS

Cryptography and Network Security Chapter 1

Module 1: Introduction to Designing Security

Information Security Awareness Training

Patch and Vulnerability Management Program

UNCLASSIFIED Version 1.0 May 2012

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security + Certification (ITSY 1076) Syllabus

Enabling the secure use of RFID

Embedded Java & Secure Element for high security in IoT systems

CNT Computer and Network Security Review/Wrapup

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Fundamentals of Network Security - Theory and Practice-

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Windows Operating Systems. Basic Security

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Module 1: e- Learning

RFID Penetration Tests when the truth is stranger than fiction

Module 7 Security CS655! 7-1!

Penetration Testing Windows Vista TM BitLocker TM

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Summary of Results from California Testing of the ES&S Unity /AutoMARK Voting System

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Chapter 6: Fundamental Cloud Security

Security for Ubiquitous and Adhoc Networks

A Draft Framework for Designing Cryptographic Key Management Systems

With Great Power comes Great Responsibility: Managing Privileged Users

Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Secure USB Flash Drive. Biometric & Professional Drives

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

IBM Crypto Server Management General Information Manual

Transcription:

Computer and Network Security R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Introduction to Computer and Network Security

1 Security Goals 1. Confidentiality 2. Integrity 3. Availability 2

1.1 Confidentiality only authorized entities may read info only authorized entities may know communication is taking place at all 3

1.2 Integrity more difficult - includes: 1. precision 2. accuracy 3. consistency, 4. only modified in acceptable ways by authorized entities 5. 3 aspects (Welke & Mayfield): (a) authorized actions (b) separation & protection of resources (c) error detection & correction 4

1.3 Availability also difficult - data & services - 1. usability 2. capacity to meet needs 3. timely access/results 4. fairness 5

... sometimes also included... 1.4 Authenticity know origin of object or modifications 1.5 Non-repudiation author not able to deny role 6

2 Terms 2.1 computing system h/w, s/w, stg media, data, people that do computing tasks 2.2 Exposure form of loss 2.3 Vulnerability weakness that may be exploited for loss 2.4 Attack an attempt to exploit a vulnerability 2.5 Threat circumstances or agents that could cause loss 2.6 Control measure to reduce vulnerability 7

3 Cost of Controls 3.1 financial 3.2 time 1. deployment 2. operational 3. computer/network delays 3.3 convenience, availability 3.4 CPU cycles 3.5 space 1. physical 2. memory 3. disk 8

Principle of Effectiveness A control is only effective if you use it properly. Use it or lose it 9

4 Risk Analysis and Security Planning 1. Risk Assessment (a) Inventory and valuate assets (b) Evaluate threats (c) Gauge vulnerabilities 2. Recommend Controls 10

4.1 Risk Assessment 4.1.1 Inventory and valuate assets what is functional importance to mission? would organization be able to function without this resource? Note that there are both levels (thresholds) and temporal dependencies... Note also that information resources, especially software and data, are difficult to value properly - incorrect operation of a $39 program could cause great financial liability; incorrect data in an embedded system could cause loss of life and property 4.1.2 Evaluate threats Who/what is likely to cause loss/harm? What valuables could others want to steal or damage? Who may have political or social agendas that would motivate them to attack us? What types of loss in the infrastructure are likely? What forms of natural disasters are likely,...? 4.1.3 Gauge vulnerabilities where are the weak points? Systematic approaches are good, but the system may miss entire vulnerability types... 11

Principle of Easiest Penetration An attacker will exploit any vulnerability available, not just the ones of which we are aware, much less those for which we have the strongest controls. Weak link in chain 12

4.2 Recommend Controls Provide adequate controls to reduce dangerous vulnerabilities (i.e., ones whose exploit would severely impair security of the resource)... for... critical resources (i.e., ones without which the missioncritical tasks cannot be performed adequately)... for which there are... significant threats (i.e., the vulnerability is likely to be tested) 13

Principle of Adequate Protection Protection should be comensurate with the value of the asset. All bikes weigh 50 lbs 14

5 Assets 5.1 H/W CPU, memory, disk space, peripherals 5.2 S/W applications, OS, utilities 5.3 Data config files, application input/output 5.4 People data entry, developers, administrators,... 15

6 Threats types 6.1 Interruption prevent delivery of data, hardware, or services 6.2 Interception passively observe data, hardware, or service use 6.3 Modification actively change data, hardware, or code 6.4 Fabrication actively make up data, hardware, or code 16

7 Controls by Goal 1. Confidentiality 2. Integrity 3. Availability 4. Authenticity 5. Non-repudiation 17

7.1 Confidentiality Encryption Access control (for r) Indirection 18

7.2 Integrity Access control (for w) Consistency checking Integrity checks MACs Concurrency control 19

7.3 Availability Access control (for x, locks) Redundancy Fault tolerance Monitoring Priority mechanisms Scheduling 20

7.4 Authenticity Secrets (e.g., passwords, PINs) Digital signatures (symmetric or asymmetric) 21

7.5 Non-repudiation Digital signatures (asymmetric) Trusted third party 22

8 Control Mechanisms by Type 1. Access Control 2. Cryptography 3. Monitoring 4. Software Controls 5. Policies 23

8.1 Access Control Requires I & A = identification and authentication plus RM = reference monitor Lock & Key ACL CL Change management Obscurity 24

8.2 Cryptography Encryption MACs Digital signatures Cryptographic protocols 25

8.3 Monitoring Audit facilities Resource pinging Network sniffing/protocol analysis IDSs Anomaly detectors 26

8.4 Software Controls Internal program controls (usually I&A, AC) OS controls I&A AC process isolation file protection audit Development Controls Standards for quality, process (ISO 9000) Reviews Testing Separation of duty 27

8.5 Policies Establishing policy Training Enforcement/Monitoring 28

9 Protection 1. Physical Protection 2. H/W-based protection 3. OS-based protection 4. Application-level protection 29

9.1 Physical Protection Doors locks shielding surge protectors UPSs climate control,... 30

9.2 H/W-based protection Mode bits and protected instructions write protection base & bounds registgers VM tagged memory dongles,... 31

9.3 OS-based protection I & A ACLs protection/net groups gates/rights amplification,... 32

9.4 Application-level protection password protection crypto,... 33

10 Effectiveness of Controls 10.1 Policy 10.2 Awareness Need for security/value of resources Procedures 10.3 Operational cost/compliance 10.4 Overlapping controls Principle of security in depth There should be more than one control per vulnerabiliity type so that failure of one control does not completely compromise system Belt & Suspenders 10.5 Periodic Review 34