Вы находитесь на странице: 1из 8

Information Security Introduction

Information security means protecting information and information

systems from unauthorized access, use, disclosure, disruption, modification,
or destruction.
Information Security - Aspects
A key aspect of Information Security is to preserve the confidentiality,
integrity and availability of an organization's information. It is only with this
information, it can engage in commercial activities. Loss of one or more of
these attributes, can threaten the continued existence of even the largest
corporate entities.
Confidentiality: Assurance that information is shared only among
authorized persons or organizations. Breaches of Confidentiality can occur
when data is not handled in a manner adequate to safeguard the
confidentiality of the information concerned. Such disclosure can take place
by word of mouth, by printing, copying, e-mailing or creating documents and
other data etc. The classification of the information should determine its
confidentiality and hence the appropriate safeguards.
Integrity: Assurance that the information is authentic and complete.
Ensuring that information can be relied upon to be sufficiently accurate for its
purpose. The term Integrity is used frequently when considering Information
Security as it represents one of the primary indicators of security (or lack of
it). The integrity of data is not only whether the data is 'correct', but also
whether it can be trusted and relied upon. For example, making copies (say
by e-mailing a file) of a sensitive document, threatens both confidentiality
and the integrity of the information. Why? because by making one or more
copies, the data is then at risk of change or modification.
Availability: Assurance that the systems responsible for delivering, storing
and processing information are accessible when needed, by those who need
Non-Repudiation: For e-Commerce and other electronic transactions,
including ATMs (cash machines), all parties to a transaction must be
confident that the transaction is secure; that the parties are who they say
they are (authentication), and that the transaction is verified as final.
Systems must ensure that a party cannot subsequently repudiate (reject) a
transaction. To protect and ensure digital trust, the parties to such systems
may employ Digital Signatures, which will not only validate the sender, but
will also 'time stamp' the transaction, so it cannot be claimed subsequently
that the transaction was not authorized not valid etc.

Identification and Authentication of Users

Identification is the process whereby a network element recognizes a valid
user's identity. Authentication is the process of verifying the claimed identity
of a user. A user may be a person, a process, or a system (e.g., an
operations system or another network element) that accesses a network
element to perform tasks or process a call. A user identification code is a
non-confidential auditable representation of a user. Information used to
verify the claimed identity of a user can be based on a password, Personal
Identification Number (PIN), smart card, biometrics, token, exchange of
keys, etc. Authentication information should be kept confidential.
Identification is the process by which the identity of a user is established,
and authentication is the process by which a service confirms the claim of a
user to use a specific identity by the use of credentials (usually a password or
a certificate).
Put very simply, identification involves a claim or statement of identity: I am
John Doe, I am the customer associated with this account, etc.
Many businesses need to identify their customers. While some transactions
(retail sales, for example) can be concluded in complete anonymity, many
other transactions require that the business knows with whom it is dealing.
Identifying a customer allows a business to ensure that the customers
transactions are associated with the correct account, and that records of a
customers transactions are retrievable. The identity that is attached to the
customer need not be a real world identity such as a name (e.g., John
Doe). It could just as easily be an identity created for the purposes of the
business relationship (e.g., customer A167).
When someone presents themselves to the business and claims to be a
customer with whom the business has a relationship, the business typically
needs to authenticate that claim. This is especially critical if the person wants
to conduct a transaction on the customers account, or obtain records relating
to the account.

Spoofing Attacks
A spoofing attack is a situation in which one person or program successfully
masquerades as another by falsifying data and thereby gaining an
illegitimate advantage.
IP Spoofing: In IP spoofing attack, an attacker spoofs Alice into believing
the attacker is Bob, and spoofs Bob into believing the attacker is Alice, thus
gaining access to all messages in both directions without the trouble of any

cryptanalytic effort. The attacker must monitor the packets sent from Alice to
Bob and then guess the sequence number of the packets. Then the attacker
knocks out Alice with a SYN attack and injects his own packets, claiming to
have the address of Alice. Alice's firewall can defend against some spoof
attacks when it has been configured with knowledge of all the IP addresses
connected to each of its interfaces. It can then detect a spoofed packet if it
arrives at an interface that is not known to be connected to the IP address.
Many carelessly designed protocols are subject to spoof attacks, including
many of those used on the Internet.
URL Spoofing and Webpage Spoofing(Phishing): Another kind of
spoofing is "webpage spoofing," also known as phishing. In this attack, a
legitimate web page such as a bank's site is reproduced in "look and feel" on
another server under control of the attacker. The intent is to fool the users
into thinking that they are connected to a trusted site, for instance to harvest
user names and passwords.
This attack is often performed with the aid of URL spoofing, which exploits
web browser bugs in order to display incorrect URLs in the browsers location
bar; or with DNS cache poisoning in order to direct the user away from the
legitimate site and to the fake one. Once the user puts in their password, the
attack-code reports a password error, then redirects the user back to the
legitimate site.

Authentication and Authorization

It is easy to confuse the mechanism of authentication with that of
authorization. In many host-based systems (and even some client/server
systems), the two mechanisms are performed by the same physical hardware
and, in some cases, the same software.
It is important to draw the distinction between these two mechanisms,
however, since they can (and, one might argue, should) be performed by
separate systems.
What, then, distinguishes these two mechanisms from one another?
Authentication is the mechanism whereby systems may securely identify
their users. Authentication systems provide answers to the questions:

Who is the user?

Is the user really who he/she represents himself to be?

An authentication system may be as simple (and insecure) as a plain-text

password challenging system (as found in some older PC-based FTP servers)
or as complicated as the Kerberos system described elsewhere in these

documents. In all cases, however, authentication systems depend on some

unique bit of information known (or available) only to the individual being
authenticated and the authentication system -- a shared secret. Such
information may be a classical password, some physical property of the
individual (fingerprint, retinal vascularization pattern, etc.), or some derived
data (as in the case of so-called smart card systems). In order to verify the
identity of a user, the authenticating system typically challenges the user to
provide his unique information (his password, fingerprint, etc.) -- if the
authenticating system can verify that the shared secret was presented
correctly, the user is considered authenticated.
Authorization, by contrast, is the mechanism by which a system determines
what level of access a particular authenticated user should have to secured
resources controlled by the system. For example, a database management
system might be designed so as to provide certain specified individuals with
the ability to retrieve information from a database but not the ability to
change data stored in the datbase, while giving other individuals the ability
to change data. Authorization systems provide answers to the questions:

Is user X authorized to access resource R?

Is user X authorized to perform operation P?
Is user X authorized to perform operation P on resource R?

Authentication and authorization are somewhat tightly-coupled mechanisms

-- authorization systems depend on secure authentication systems to ensure
that users are who they claim to be and thus prevent unauthorized users
from gaining access to secured resources

Access Control
Access control is the ability to permit or deny the use of a particular resource
by a particular entity. Access control mechanisms can be used in managing
physical resources (such as a movie theater, to which only ticketholders
should be admitted), logical resources (a bank account, with a limited
number of people authorized to make a withdrawal), or digital resources (for
example, a private text document on a computer, which only certain users
should be able to read).
In information security, access control includes authentication, authorization
and audit. It also includes measures such as physical devices, including
biometric scans and metal locks, hidden paths, digital signatures, encryption,
social barriers, and monitoring by humans and automated systems.
In any access control model, the entities that can perform actions in the
system are called subjects, and the entities representing resources to which
access may need to be controlled are called objects. Subjects and objects
should both be considered as software entities, rather than as human users:

any human user can only have an effect on the system via the software
entities that they control. Although some systems equate subjects with
user IDs, so that all processes started by a user by default have the same
authority, this level of control is not fine-grained enough to satisfy the
Principle of least privilege, and arguably is responsible for the prevalence of
malware in such systems.
In some models, for example the object-capability model, any software entity
can potentially act as both a subject and object.
Access control models used by current systems tend to fall into one of two
classes: those based on capabilities and those based on access control lists
(ACLs). In a capability-based model, holding an unforgeable reference or
capability to an object provides access to the object (roughly analogous to
how possession of your house key grants you access to your house); access
is conveyed to another party by transmitting such a capability over a secure
channel. In an ACL-based model, a subject's access to an object depends on
whether its identity is on a list associated with the object (roughly analogous
to how a bouncer at a private party would check your ID to see if your name
is on the guest list); access is conveyed by editing the list. (Different ACL
systems have a variety of different conventions regarding who or what is
responsible for editing the list and how it is edited.)
Both capability-based and ACL-based models have mechanisms to allow
access rights to be granted to all members of a group of subjects (often the
group is itself modeled as a subject).
Access control systems provide the essential services of identification and
authentication (I&A), authorization, and accountability where:

identification and authentication determine who can log on to a

system, and the association of users with the software subjects that
they are able to control as a result of logging in;
authorization determines what a subject can do;
accountability identifies what a subject (or all subjects associated with
a user) did.

Access control techniques

Access control techniques are sometimes categorized as either discretionary
or non-discretionary. The three most widely recognized models are
Discretionary Access Control (DAC), Mandatory Access Control (MAC), and
Role Based Access Control (RBAC). MAC and RBAC are both nondiscretionary.
Discretionary access control

Discretionary access control (DAC) is an access policy determined by the

owner of an object. The owner decides who is allowed to access the object
and what privileges they have.
Two important concepts in DAC are

File and data ownership: Every object in the system has an owner. In
most DAC systems, each object's initial owner is the subject that
caused it to be created. The access policy for an object is determined
by its owner.
Access rights and permissions: These are the controls that an owner
can assign to other subjects for specific resources.

Access controls may be discretionary in ACL-based or capability-based access

control systems. (In capability-based systems, there is usually no explicit
concept of 'owner', but the creator of an object has a similar degree of
control over its access policy.)
Mandatory access control
Mandatory access control (MAC) is an access policy determined by the
system, not the owner. MAC is used in multilevel systems that process highly
sensitive data, such as classified government and military information. A
multilevel system is a single computer system that handles multiple
classification levels between subjects and objects.

Sensitivity labels: In a MAC-based system, all subjects and objects

must have labels assigned to them. A subject's sensitivity label
specifies its level of trust. An object's sensitivity label specifies the
level of trust required for access. In order to access a given object, the
subject must have a sensitivity level equal to or higher than the
requested object.
Data import and export: Controlling the import of information from
other systems and export to other systems (including printers) is a
critical function of MAC-based systems, which must ensure that
sensitivity labels are properly maintained and implemented so that
sensitive information is appropriately protected at all times.

Two methods are commonly used for applying mandatory access


Rule-based access controls: This type of control further defines specific

conditions for access to a requested object. All MAC-based systems
implement a simple form of rule-based access control to determine
whether access should be granted or denied by matching:
o An object's sensitivity label
o A subject's sensitivity label

Lattice-based access controls: These can be used for complex access

control decisions involving multiple objects and/or subjects. A lattice
model is a mathematical structure that defines greatest lower-bound
and least upper-bound values for a pair of elements, such as a subject
and an object.

Few systems implement MAC. XTS-400 is an example of one that does.

Role-based access control
Role-based access control (RBAC) is an access policy determined by the
system, not the owner. RBAC is used in commercial applications and also in
military systems, where multi-level security requirements may also exist.
RBAC differs from DAC in that DAC allows users to control access to their
resources, while in RBAC, access is controlled at the system level, outside of
the user's control. Although RBAC is non-discretionary, it can be
distinguished from MAC primarily in the way permissions are handled. MAC
controls read and write permissions based on a user's clearance level and
additional labels. RBAC controls collections of permissions that may include
complex operations such as an e-commerce transaction, or may be as simple
as read or write. A role in RBAC can be viewed as a set of permissions.
Three primary rules are defined for RBAC:
1. Role assignment: A subject can execute a transaction only if the subject
has selected or been assigned a role.
2. Role authorization: A subject's active role must be authorized for the
subject. With rule 1 above, this rule ensures that users can take on only roles
for which they are authorized.
3. Transaction authorization: A subject can execute a transaction only if the
transaction is authorized for the subject's active role. With rules 1 and 2, this
rule ensures that users can execute only transactions for which they are
Additional constraints may be applied as well, and roles can be combined in a
hierarchy where higher-level roles subsume permissions owned by sub-roles.
Most IT vendors offer RBAC in one or more products.

Focus of Control
When protecting data in a computer system, it is often done using
rules on system behaviour.
These rules may be...

I Limit ways in which data in handled.

I Limit which operations can be performed on which data
I Limit which users can perform certain types of actions.
i.e. security controls can focus on data, operations or users (or
some combination)
e.g. Compartmentalised Operating Systems.