Professional Documents
Culture Documents
Security is the degree of protection against danger, damage, loss, and crime.
4
Background
Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms computer use requires automated tools to protect files and other stored information use of networks and communications links requires measures to protect data during transmission
Definitions
Computer Security - generic name for the collection of tools designed to protect data from hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks
6
Aim of Course
our focus is on Internet Security which consists of measures to deter, prevent, detect, and correct security violations that involve the transmission & storage of information
Aspects of Security
consider 3 aspects of information security:
security attack security mechanism security service
any action that compromises the security of information owned by an organization information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems often threat & attack used to mean same thing have a wide range of attacks
Security Attack
Information Destination
10
Interruption: Any asset of the system is destroyed or becomes unavailable or unusable. Ex. Destroying some H/W -Cutting the communication link -Disabling file system
Information Destination
11
Interception: An unauthorized user group access to an asset. This is a attack on confidentiality. Ex. Wiretapping to capture data in network. -Unauthorized copying of files or programs.
Wiretapping-(Connect a device to listen secretly monitor)
Information Destination
12
Modification: An unauthorized party gains access and tampers an asset. This is attack on integrity. Ex. Changing data files. -Altering a program or the contents of a message.
Information Source
Information Destination
(Modification)
13
Fabrication: An unauthorized party inserts counterfeit object into the system. This is a attack on authenticity. Ex. Insertion of records in data files. -Insertion of spurious messages.
Counterfeit illegally imitate (copy) Spurious fake
Information Source
Information Destination
(Fabrication)
14
A Passive Attack is an attack where an unauthorized attacker monitors or listens communication between two parties. Eavesdropping or monitoring of information transmissions without modifying it.
Eavesdropping Secretly listen to a conversation
Passive Attacks
16
(i) Release of Message contents : Attack on like telephone conversation, an email message, or a transferred file have confidential information.
(ii) Traffic Analysis : Traffic analysis is a interception of message without modification, actually find the location of data and identity of communicating host and observe the frequency and length of messages.
17
Active Attacks
18
Active Attack: Active attack means that the attackers actively attempting to cause harm to a network or system. The attacker is not just monitoring on the traffic but disturb or shutdown a service.
Types of Active attacks Masquerade Attack :- It is a type of attack in which one system assumes the identity of another. (false identity)
Message Replay :- It involves the re-use of captured data at a later time than originally intended in order to repeat some action of benefit to the attacker.
19
1.
2.
Message Modification :- It involve modifying a packet header address for the purpose of directing it to an unintended destination or modifying the user data. Denial of Service (DoS):- It is a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. (Ex-Ping of death (bugs
in TCP/IP implementation)
20
Security Service
enhance security of data processing systems and information transfers of an organization intended to counter security attacks using one or more security mechanisms often replicates functions normally associated with physical documents
which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed
21
Security Services
X.800:
a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers X.800 is a information processing system open systems interconnection
RFC 2828:
a processing or communication service provided by a system to give a specific kind of protection to system resources 22
Access Control is the ability to limit and control the access to host systems and application via communication links. Data Confidentiality is the protection of transmitted data from the assurance to an entity that one can read a particular piece of data except the receiver explicitly intended.
23
Data Integrity In integrity service that a message assures that messages are received as sent, with no duplication, insertion, modification, reordering or replays. Non-Repudiation means the ability to prove that transaction originated from a particular party, so that party cannot deny that he performed a certain transaction. A receiver cannot deny that received a certain message from a sender and sender cannot deny that he sent a message to the receiver.
24
Security Mechanism
feature designed to detect, prevent, or recover from a security attack no single mechanism that will support all services required however one particular element underlies many of the security mechanisms in use:
cryptographic techniques
26
28
29
31
Summary
have considered:
definitions for:
computer, network, internet security
X.800 standard security attacks, services, mechanisms models for network (access) security
32