Introduction to Security

Similar documents
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Cryptography and Network Security

Chap. 1: Introduction

Cryptography and Network Security Chapter 1

COSC 472 Network Security

Network Security. Instructor: Adam Hahn

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Information System Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

CSCI 4541/6541: NETWORK SECURITY

Notes on Network Security - Introduction

IY2760/CS3760: Part 6. IY2760: Part 6

544 Computer and Network Security

Cryptography and Network Security: Overview

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Table: Security Services (X.800)

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Overview of computer and communications security

Content Teaching Academy at James Madison University

Information Security Basic Concepts

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Basics of Internet Security

IT Security Management Risk Analysis and Controls

Weighted Total Mark. Weighted Exam Mark

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Module 7 Security CS655! 7-1!

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Security Goals Services

INFORMATION TECHNOLOGY SECURITY STANDARDS

Computer Security Threats

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Lecture II : Communication Security Services

CSC 474 Information Systems Security

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Newcastle University Information Security Procedures Version 3

Lesson 4: Introduction to network security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

ISO Controls and Objectives

ISO27001 Controls and Objectives

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Introduction to Computer Security

MSIT-121C (Elective 2): Cryptography and Network Security

Message Authentication Codes

Data Security Incident Response Plan. [Insert Organization Name]

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Compter Networks Chapter 9: Network Security

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Cisco Advanced Services for Network Security

NETWORK SECURITY ASPECTS & VULNERABILITIES

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Chapter 6: Fundamental Cloud Security

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Supporting FISMA and NIST SP with Secure Managed File Transfer

FACT SHEET: Ransomware and HIPAA

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

TELECOMMUNICATION NETWORKS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

CPSC 467: Cryptography and Computer Security

Cybersecurity for the C-Level

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Intrusion Detection for Mobile Ad Hoc Networks

Passing PCI Compliance How to Address the Application Security Mandates

CS 203 / NetSys 240. Network Security

Network Security Administrator

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Authentication requirement Authentication function MAC Hash function Security of

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Exam 1 - CSIS 3755 Information Assurance

Introduction to Information Security

A Framework for Secure and Verifiable Logging in Public Communication Networks

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

It s All About Authentication

INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS

Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services

Observation and Findings

Security Issues with Integrated Smart Buildings

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Security Testing. How security testing is different Types of security attacks Threat modelling

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Wireless Network Security

UoB Risk Assessment Methodology

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Transcription:

2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex, r2958 1 Contents Computer Security Threats, Attacks and Architecture for Communications Security Computer Security

What Is Security? Computer Security The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources. NIST Computer Security Handbook 3 Key Security Objectives Confidentiality Data confidentiality: assure confidential information not made available to unauthorized individuals Privacy: assure individuals can control what information related to them is collected, stored, distributed Integrity Data integrity: assure information and programs are changed only in a authorized manner System integrity: assure system performs intended function Availability Assure that systems work promptly and service is not denied to authorized users 4

Other Security Objectives Authenticity Users and system inputs are genuine and can be verified and trusted Data authentication Source authentication Accountability Actions of an entity can be traced uniquely to that entity Supports: non-repudiation, deterrence, fault isolation, intrusion detection and prevention, after-action recovery and legal action 5 Computer Security Challenges computer security is not as simple as it might first appear to the novice potential attacks on the security features must be considered procedures used to provide particular services are often counter-intuitive physical and logical placement needs to be determined additional algorithms or protocols may be involved attackers only need to find a single weakness, the developer needs to find all weaknesses users and system managers tend to not see the benefits of security until a failure occurs security requires regular and constant monitoring is often an afterthought to be incorporated into a system after the design is complete thought of as an impediment to efficient and user-friendly operation 6

Computer Security System resources that the users/owners wish to protect Hardware, software, data, communication lines Vulnerabilities Weakness in system implementation or operation Can make asset: corrupted, leaky, unavailable Security Policy Set of rules and practices that specifies how a system provides security services to protect assets Threats Potential violation of security policy by exploiting a vulnerability 7 Computer Security Attack A threat that is carried out; a successful attack leads to violation of security policy Active attack: attempt to alter system resources or operation Passive attack: attempt to learn information that does not affect system resources Inside attack: initiated by entity with authorized access to system Outside attack: initiated by unauthorized user of system Countermeasure Means to deal with an attack Prevent, detect, respond, recover Even with countermeasures, vulnerabilities may exist, leading to risk to the assets Aim to minimize the risks 8

10 Computer Security Credit: Figure 1.2 in Stallings and Brown, Computer Security, 2nd Ed., Pearson 2012 9 Contents Computer Security Threats, Attacks and Architecture for Communications Security Computer Security

12 Threat Consequences and Attacks Threat Action An attack Threat Agent Entity that attacks, or is threat to system (adversary, attacker, malicious user) Threat Consequence A security violation that results from a threat action Unauthorized Disclosure: exposure, interception, inference, intrusion Deception: masquerade, falsification, repudiation Disruption: incapacitation, corruption, obstruction Usurpation: misappropriation, misuse See: R. Shirey, Internet Security Glossary, IETF RFC 2828, May 2000. http://www.ietf.org/rfc/rfc2828.txt (or version 2 in RFC 4949). 11 Scope of Computer Security Credit: Figure 1.3 in Stallings and Brown, Computer Security, 2nd Ed., Pearson 2012

14 and Examples of Threats Availability Confidentiality Integrity Hardware Equipment is stolen or disabled, thus denying service. Software Programs are deleted, An unauthorized copy of A working program is modidenying access to users software is made. fied, either to cause it to fail during execution or to cause it to do some unintended task. Data Files are deleted, An unauthorized read Existing files are modified or denying access to users. of data is performed. new files are fabricated. An analysis of statistical data reveals underlying data. Commu- Messages are destroyed Messages are read. The Messages are modified, nication or deleted. traffic pattern of delayed, reordered, or dupli- Lines Communication lines or messages is observed. cated. False messages are networks are rendered fabricated. unavailable. Credit: Table 1.3 in Stallings and Brown, Computer Security, 2nd Ed., Pearson 2012 13 Contents Computer Security Threats, Attacks and Architecture for Communications Security Computer Security

16 Architecture for Communications Security Systematic approach to define requirements for security and approaches to satisfying those requirements ITU-T Recommendation X.800, Security Architecture for OSI Provides abstract view of main issues of security Security aspects: Attacks, mechanisms and services Focuses on security of networks and communications systems also apply to computer security 15 Aspects of Security Security Attack Any action that attempts to compromise the security of information or facilities Security Mechanism A method for preventing, detecting or recovering from an attack Security Service Uses security mechanisms to enhance the security of information or facilities in order to stop attacks

18 Defining a Security Service ITU-T X.800: service that is provided by a protocol layer of communicating systems and that ensures adequate security of the systems or of data transfers IETF RFC 2828: a processing or communication service that is provided by a system to give a specific kind of protection to system resources Security services implement security policies and are implemented by security mechanisms 17 Security Services 1. Authentication Assure that the communicating entity is the one that it claims to be. (Peer entity and data origin authentication) 2. Access Control Prevent unauthorised use of a resource 3. Data Confidentiality Protect data from unauthorised disclosure 4. Data Integrity Assure data received are exactly as sent by authorised entity 5. Non-repudiation Protect against denial of one entity involved in communications of having participated in communications 6. Availability System is accessible and usable on demand by authorised users according to intended goal

20 Attacks on Communication Lines Passive Attack Make use of information, but not affect system resources, e.g. 1. Release message contents 2. Traffic analysis Relatively hard to detect, but easier to prevent Active Attack Alter system resources or operation, e.g. 1. Masquerade 2. Replay 3. Modification 4. Denial of service Relatively hard to prevent, but easier to detect 19 Release Message Contents Credit: Figure 1.2(a) in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011

22 Traffic Analysis Credit: Figure 1.2(b) in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011 21 Masquerade Attack Credit: Figure 1.3(a) in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011

24 On the Internet, nobody knows you re a dog Credit: Peter Steiner, c The New Yorker magazine 23 Replay Attack Credit: Figure 1.3(b) in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011

26 Modification Attack Credit: Figure 1.3(c) in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011 25 Denial of Service Attack Credit: Figure 1.3(d) in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011

28 Security Mechanisms Techniques designed to prevent, detect or recover from attacks No single mechanism can provide all services Common in most mechanisms: cryptographic techniques Specific security mechanisms from ITU-T X.800: Encipherment, digital signature, access control, data integrity, authentication exchange, traffic padding, routing control, notarization Pervasive security mechanisms from ITU-T X.800: Trusted functionality, security label, event detection, security audit trail, security recovery 27 Security Services and Mechanisms Credit: Table 1.4 in Stallings, Cryptography and Network Security, 5th Ed., Pearson 2011

30 Contents Computer Security Threats, Attacks and Architecture for Communications Security Computer Security 29 Computer Security and Principles Policy What is the security scheme supposed to do? Informal description or formal set of rules of desired system behaviour Consider: assets value; vulnerabilities; potential threats and probability of attacks Trade-offs: Ease of use vs security; cost of security vs cost of failure and recovery Implementation How does it do it? Prevention, detection, response, recovery Assurance Does it really work? Assurance: degree of confidence that security measures work as intended Evaluation: process of evaluating system with respect to certain criteria

32 Information Security Principles NIST Guide to General Server Security Simplicity Fail-safe Complete Mediation Open Design Separation of Privilege Least Privilege Psychological Acceptability Least Common Mechanism Defense-in-Depth Work Factor Compromise Recording 31 Contents Computer Security Threats, Attacks and Architecture for Communications Security Computer Security

34 Key Points Objectives: confidentiality, integrity, availability Protect assets: hardware, software, data, comms Attacks: Passive: release message, traffic analysis Active: masquerade, replay, modification, DoS Inside or outside Countermeasures, Security mechanisms: techniques to prevent, detect, recover from attacks; often use cryptographic techniques 33 Areas To Explore Standards and procedures for computer security ISO/ITU, NIST FIPS, IETF, IEEE,... Monitoring and trends in threats and attacks CERT, CVE, NVD... Certification and professional associations SANS, CISSP, CCSP, GIAC, CompTIA,...