Вы находитесь на странице: 1из 70

Computer and Information

Security
Chapter 1
Introduction

Network Security Essentials


William Stallings
Fourth Edition

Overview

Security Goals
The need for security
OSI Security Architecture
Attacks, services and mechanisms
Security attacks
Security services
Methods of Defense
A model for Internetwork Security
Internet standards and RFCs
V.THILEEBAN B.Sc(Hons)

Computer Security
Is defined as the protection afforded
to an automated information system in
order to attain the applicable objectives
of preserving the integrity, availability
and confidentiality of information
system resources (includes hardware,
software, firmware, information/data,
and telecommunications)
V.THILEEBAN B.Sc(Hons)

CIA Triad

V.THILEEBAN B.Sc(Hons)

Key Objectives
Confidentiality
Data Confidentiality-information not disclosed to
unauthorized individuals
Privacy individuals control how their information is
collected, stored, shared

Integrity
Data Integrity
System Integrity

Availability service not denied to authorized users


V.THILEEBAN B.Sc(Hons)

Security Goals
Confidentiality

Integrity

Avalaibility

V.THILEEBAN B.Sc(Hons)

Security Goals
Confidentiality
Concealment of information or resources

Integrity
Trustworthiness of data or resources

Availability
Ability to use information or resources

V.THILEEBAN B.Sc(Hons)

Confidentiality
Need for keeping information secret arises
from use of computers in sensitive fields such
as government and industry
Access mechanisms, such as cryptography,
support confidentiality
Example: encrypting income tax return
Lost through unauthorized disclosure of
information
V.THILEEBAN B.Sc(Hons)

Integrity
Often requires preventing unauthorized
changes
Includes data integrity (content) and origin
integrity (source of data also called
authentication)
Include prevention mechanisms and detection
mechanisms

Example: Newspaper prints info leaked from White


House and gives wrong source

Includes both correctness and trustworthiness


Lost through unauthorized modification or
10
destruction of information

Availability
Is an aspect of reliability and system design
Attempts to block availability, called denial of
service attacks (DoS) are difficult to detect
Example: bank with two servers one is blocked, the
other provides false information

Ensures timely and reliable access to and use


of information
Lost through disruption of access to
information or information system
V.THILEEBAN B.Sc(Hons)

11

Authenticity and
Accountability
Two additional objectives:
Authenticity- being genuine and able to be
verified or trust; verifying that users are who
they say they are
Accountability-actions of an entity can be
traced uniquely to that entity; supports
nonrepudiation, deterrence, fault isolation,
intrusion, detection and prevention.
V.THILEEBAN B.Sc(Hons)

12

Levels of Impact
We can define 3 levels of impact from
a security breach:
Low
Moderate
High

V.THILEEBAN B.Sc(Hons)

13

Security Breach
Low Impact
Loss has limited adverse effect
For example:
Effectiveness of the functions of an
organization are noticeably reduced
Results in minor damage to organizational
assets
Results in minor financial loss
Results in minor harm to individuals
V.THILEEBAN B.Sc(Hons)

14

Security Breach
Moderate Impact
Loss may have serious adverse effect on
organizational operations, assets or individuals.
For example:
Effectiveness of the functions of an
organization are significantly reduced
Results in significant damage to organizational
assets
Results in significant financial loss
Results in significant harm to individuals
V.THILEEBAN B.Sc(Hons)

15

Security Breach
High Impact
Loss is expected to have severe or catastrophic adverse
effect on organizational operations, assets or individuals.
For example:
Effectiveness of the functions of an organization are
reduced so that the organization cannot perform its
primary function(s).
Results in major damage to organizational assets
Results in major financial loss
Results in severe or catastrophic harm to individuals,
involving loss of life or serious life-threatening
injuries
V.THILEEBAN B.Sc(Hons)

16

Examples of Security
Requirements
Confidentiality student grades
High confidentiality - grades
Regulated by FERPA
Only available to students, parents and employees
(who need it to do their job)

Moderate confidentiality enrollment


Low confidentiality Directory information
Lists of departments, faculty, students
Available to the public
Often published on Web site
V.THILEEBAN B.Sc(Hons)

17

Examples of Security
Requirements
Integrity- patient information
High requirement for integrity
Medical database, if falslified or inaccurate, could
cause harm ( allergies, etc.)

Medium requirement for integrity


Web site that offers a forum for discussion of
medical topics, not for research

Low requirement for integrity


Anonymous poll (such as a patient satisfaction)
V.THILEEBAN B.Sc(Hons)

18

Examples of Security
Requirements
Availability - The more critical a component or
service is, the higher the level of availability
required:
High availability- authentication service

Interruption of service results in being unable to


access computing resources

Moderate availability- College web site


Provides information but is not critical

Low availability- online phone directory


Other sources of information are available

19

The Need for Security


Computer Security - the collection of
tools designed
to protect data and
to thwart hackers

Network security or internet securitysecurity measures needed to protect


data during their transmission
V.THILEEBAN B.Sc(Hons)

20

Security
Motivation: Why do we need security?
Increased reliance on Information technology with or
with out the use of networks
The use of IT has changed our lives drastically.
We depend on E-mail, Internet banking, and several
other governmental activities that use IT
Increased use of E-Commerce and the World wide web
on the Internet as a vast repository of various kinds of
information (immigration databases, flight tickets,
stock markets etc.)
21

Security Concerns
Damage to any IT-based system or activity can result
in severe disruption of services and losses
Systems connected by networks are more prone to
attacks and also suffer more as a result of the
attacks than stand-alone systems (Reasons?)
Concerns such as the following are common

How do I know the party I am talking on the network is really


the one I want to talk?
How can I be assured that no one else is listening and
learning the data that I send over a network
Can I ever stay relaxed that no hacker can enter my network
and play havoc?
V.THILEEBAN B.Sc(Hons)

22

Concerns continued
Is the web site I am downloading information
from a legitimate one, or a fake?

How do I ensure that the person I just did a


financial transaction denies having done it
tomorrow or at a later time?
I want to buy some thing online, but I dont
want to let them charge my credit card
before they deliver the product to me
V.THILEEBAN B.Sc(Hons)

23

That is why
..we need security
To safeguard the confidentiality, integrity,
authenticity and availability of data transmitted
over insecure networks
Internet is not the only insecure network in this
world
Many internal networks in organizations are prone
to insider attacks
In fact, insider attacks are greater both in terms
of likelihood of happening and damage caused
V.THILEEBAN B.Sc(Hons)

24

https://

V.THILEEBAN B.Sc(Hons)

25

However, in reality
Security is often over looked (not one of the top criteria)
Availability, efficiency and performance tend to be the
ones
Buggy implementations
Systems too complex in nature and rich in features can
be filled with security holes
Incorporation of security into networks, not growing with
the rapidly growing number and size of networks
Attacking is becoming so common and easy there are
books clearly explaining how to launch them
Security and attacks are a perpetual cat-and-mouse play.
The only way to avoid attacks is to keep up-to-date with
latest trends and stay ahead of malicious netizens
V.THILEEBAN B.Sc(Hons)

26

The Good News...


There a lot of techniques for defense
Educating people on security solves
many problems
About threats and on the existence
of security mechanisms, qualified
personnel, usability and economics
We will study a lot of network
defenses
Certainly not all

V.THILEEBAN B.Sc(Hons)

27

Computer Security
Challenges
Computer Security is both fascinating and
complex:
1. not simple
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy
mechanisms
V.THILEEBAN B.Sc(Hons)

28

Computer Security
Challenges
battle of wits between attacker/administrator
7. not perceived to be a benefit until fails
8. requires regular monitoring
9. too often an after-thought
10. regarded as impediment to efficient and user
friendly use of system
These difficulties will be explored
throughout the course.
6.

V.THILEEBAN B.Sc(Hons)

29

OSI Security Architecture


ITU-T Recommendation X.800 Security
Architecture for OSI which defines a
systematic approach to assessing and providing
security
International Telecommunications Union (ITU)
is a United Nations sponsored agency that
develops standards relating to
telecommunications and to Open system
Interconnection (OSI)
V.THILEEBAN B.Sc(Hons)

30

OSI Model
(Details in Appendix D)
7 Layer Model
Describes the protocols and details of
transmitting data at each layer
Please do not throw sausage pizza away.

V.THILEEBAN B.Sc(Hons)

31

7 Layer OSI Model


Layer

Functions

7 Application

How application uses network

6 Presentation

How to represent & display data

5 Session

How to establish communication

4 Transport

How to provide reliable delivery (error checking,


sequencing, etc.)

3 Network

How addresses are assigned and packets are


forwarded

2 Data Link

How to organize data into frames & transmit

1 Physical

How to transmit bits

32

OSI Network Stack and Attacks


(V. Shmatikov)
application

email,Web,NFS

presentation
session
transport
network

data link

RPC
TCP
IP
802.11

Sendmail, FTP, NFS bugs,


chosen-protocol and
version-rollback attacks
RPC worms, portmapper exploits

SYN flooding, RIP attacks,


sequence number prediction
IP smurfing and other
address spoofing attacks
WEP attacks

physical

Only as secure as the single weakest layer

33

OSI Security Architecture


ITU-T X.800 Security Architecture for
OSI defines a systematic way of defining
and providing security requirements
for us it provides a useful, if abstract,
overview of concepts we will study
The OSI security architecture focuses
on security attacks, mechanisms and
services
V.THILEEBAN B.Sc(Hons)

34

Aspects of Security
consider 3 aspects of information security:
security attack
security mechanism
security service

note terms:

threat a potential for violation of security


attack an assault on system security, a
deliberate attempt to evade security services
V.THILEEBAN B.Sc(Hons)

35

Threats and Attacks


Threat - a potential for violation of
security or a possible danger that might
exploit a vulnerability
Attack - an assault on system securityan intelligent act that is a deliberate
attempt to evade security services and
violate the security policy of a system.
V.THILEEBAN B.Sc(Hons)

36

Attacks, Services and


Mechanisms
Security Attack: Any action (active or

passive) that compromises the security of


information.
Security Mechanism: A mechanism that is
designed to detect, prevent, or recover from a
security attack.
Security Service: A service that enhances
the security of data processing systems and
information transfers. A security service
makes use of one or more security mechanisms
V.THILEEBAN B.Sc(Hons)

37

Security Threats/Attacks

38

Security Attacks
Interruption: This is an attack on
availability

Disrupting traffic
Physically breaking communication line

Interception: This is an attack on


confidentiality
Overhearing, eavesdropping over a
communication line
V.THILEEBAN B.Sc(Hons)

39

Security Attacks (continued)


Modification: This is an attack on
integrity

Corrupting transmitted data or tampering


with it before it reaches its destination

Fabrication: This is an attack on


authenticity

Faking data as if it were created by a


legitimate and authentic party
V.THILEEBAN B.Sc(Hons)

40

Threats
Disclosure unauthorized access to
information
Deception acceptance of false data
Disruption- interruption or prevention
of correct operation
Usurpation- unauthorized control of
some part of a system
V.THILEEBAN B.Sc(Hons)

41

Examples of Threats
Snooping intercepting information
(passive wiretapping)
Modification or alteration of
information by active wiretapping
Masquerading or spoofing
Repudiation of origin
Delay or denial of service
V.THILEEBAN B.Sc(Hons)

42

Safeguards and
Vulnerabilities
A Safeguard is a countermeasure to protect
against a threat

A weakness in a safeguard is called a


vulnerability

V.THILEEBAN B.Sc(Hons)

43

Passive and Active Attacks


Security attacks are usually classified as
passive or active:
Passive- attempts to learn or make use
of information from the system, but
does not affect system resources.
Active- attempts to alter system
resources or affect their operation.
V.THILEEBAN B.Sc(Hons)

44

Passive and active attacks


Passive attacks- goal to obtain information

No modification of content or fabrication


Eavesdropping to learn contents or other
information (transfer patterns, traffic flows etc.)
Release of message contents
Traffic analysis

Active attacks- modification of content and/or


participation in communication to

Impersonate legitimate parties (Masquerade)


Replay or retransmit
Modify the content in transit
Launch denial of service attacks
V.THILEEBAN B.Sc(Hons)

45

Passive Attacks

V.THILEEBAN B.Sc(Hons)

46

Passive Attacks

V.THILEEBAN B.Sc(Hons)

47

Active Attacks

V.THILEEBAN B.Sc(Hons)

48

Active Attacks

V.THILEEBAN B.Sc(Hons)

49

Summary of Passive and Active Threats

V.THILEEBAN B.Sc(Hons)

50

Services and Mechanisms


A security policy is a statement of what is
and what is not allowed.
A security service is a measure to address a
threat
E.g. authenticate individuals to prevent
unauthorized access

A security mechanism is a means to provide


a service
E.g. encryption, cryptographic protocols
V.THILEEBAN B.Sc(Hons)

51

Security Services
enhance security of data processing systems
and information transfers of an organization
are intended to counter security attacks
use one or more security mechanisms
often replicate functions normally associated
with physical documents
which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; are notarized or witnessed; are
recorded or licensed
V.THILEEBAN B.Sc(Hons)

52

Security Services
(X.800) defines a security service as a service
provided by the protocol layer of a
communicating system, that ensures adequate
security of the systems or data transfers

5 Categories

Authentication
Access Control
Data confidentiality
Data Integrity
Nonrepudiation (and Availability)
V.THILEEBAN B.Sc(Hons)

53

Security services
RFC 2828 defines a security service
as a processing or communication
service provided by a system to give a
specific kind of protection to system
resources
Security services implement security
policies and are implemented by
security mechanisms.
V.THILEEBAN B.Sc(Hons)

54

Security Services
Authentication (who created or sent the data)
Access control (prevent misuse of resources)
Confidentiality (privacy)
Integrity (has not been altered)
Non-repudiation (the order is final)

Availability (permanence, non-erasure)


Denial of Service Attacks
Virus that deletes files
V.THILEEBAN B.Sc(Hons)

55

Security Services
Examples
Authentication
Ensuring the proper identification of entities and origins of
data before communication
have both peer-entity & data origin authentication
Access control
Preventing unauthorized access to system resources

Data confidentiality

Preventing disclosure to unauthorized parties

Data integrity

Preventing corruption of data

Non-repudiation

Collecting proof to prevent denial of participation in transaction or


communication

Availability

Protection against denial-of-service


V.THILEEBAN B.Sc(Hons)

56

Security Mechanism
feature designed to detect, prevent, or
recover from a security attack
no single mechanism that will support all
services required
however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques

hence our focus on this topic


V.THILEEBAN B.Sc(Hons)

57

Security Mechanisms
Examples
Two types
Specific mechanisms existing to provide certain
security services
E.g. encryption used for authentication
Other examples: encipherment, digital signatures, access
controls, data integrity, authentication exchange, traffic
padding, routing control, notarization

Pervasive mechanisms which are general mechanisms


incorporated into the system and not specific to a
service
E.g. security audit trail
Other examples: trusted functionality, security labels,
event detection, security audit trails, security recovery

58

Model for Network Security


Basic tasks

Design an algorithm that opponent cannot


defeat
Generate the secret information to be used
with the algorithm
Develop methods for distributing secret
information
Specify a protocol to be used

May need a trusted third party to assist


V.THILEEBAN B.Sc(Hons)

59

Model for Network Security

V.THILEEBAN B.Sc(Hons)

60

Security Models
Part 1 and 2 of this book concentrate on the
model for Network Security
There are other security related situations that
do not fit into this model and are covered in
Part 3.
A Network Access Security Model reflects the
concern for protecting an information system
from unwanted access, for example by hackers
or malware (malicious programs).
V.THILEEBAN B.Sc(Hons)

61

Two Types of Program


Threats
Information access threats
Intercept or modify data on behalf of users who
should not have access to that data.
E.g. corruption of data by injecting malicious code

Service threats
Exploit service flaws in computers to inhibit use by
legitimate uses.

Viruses and worms are examples of software


attacks.
V.THILEEBAN B.Sc(Hons)

62

General Security
Access Model

V.THILEEBAN B.Sc(Hons)

63

Model for Network Access


Security

Security mechanisms for controlling unwanted


access fall into two categories.
Using this model requires us to:

1.

select appropriate gatekeeper functions to


identify users (for example, password-based login
procedures)
2. implement security controls to ensure only
authorised users access designated information or
resources (for example, monitor activities and
analyze stored information to detect the presence
of intruders
V.THILEEBAN B.Sc(Hons)

64

Fundamental threats [McGibney04]


Information leakage

Disclosure to unauthorized parties


Prince Charles mobile phone calls, 1993

Integrity violation

Corruption of data or loss of data


Coca-Cola website defaced with slogans, 1997

Denial of service

Unavailability of system/service/network
Yahoo!, 2000, 1Gbps

Illegitimate use

Morris Internet worm spread to 5% of machines on the


Internet, 1988
V.THILEEBAN B.Sc(Hons)

65

Methods of Defense
Encryption
Software Controls

(access limitations in a data base, in operating


system protect each user from other users)

Hardware Controls
(smartcard)

Policies

(frequent changes of passwords)

Physical Controls

V.THILEEBAN B.Sc(Hons)

66

Internet standards and


RFCs
National Institute of Standards and
Technology (NIST)
The Internet Society (ISOC)

Internet Architecture Board (IAB)


Internet Engineering Task Force (IETF)
Internet Engineering Steering Group (IESG)
These organizations developed standards,
published as Request for Comments (RFC)
V.THILEEBAN B.Sc(Hons)

67

Internet RFC Publication Process

V.THILEEBAN B.Sc(Hons)

68

Outline of Course
Part One - Introduction
Part TwoUse of Cryptographic algorithms and
security protocols to provide security over the
Internet. Topics include: key management,
authentication, as well as transport-level,
wireless, email and IP security
Part Three-Deals with security facilities to
protect against threats, including intruders,
viruses and worms.
V.THILEEBAN B.Sc(Hons)

69

Summary
topic roadmap & standards organizations
security concepts:
confidentiality, integrity, availability

X.800 security architecture


security attacks, services, mechanisms
models for network (access) security
V.THILEEBAN B.Sc(Hons)

70

Вам также может понравиться