You are on page 1of 3

Lecture 23: Security Computer security aspects

n A set of procedures and computer tools designed to


n Definition, aspects protect the computer data and equipment and ensure
n types of threats unencumbered operation of computer system
n computer assets and typical threats to them n three aspects:
n protection u secrecy - information on computer system is only

u user oriented accessible to authorized users


u data oriented u integrity - computer system assets can be modified

n password protection only by authorized parties and only in authorized way


u availability - computer system assets are available to
n types of intruders and intrusion techniques
authorized users
n malicious programs (viruses and the like)

1 2

Types of threats Computer assets wrt security

n Types of threats are classified by the way the information is asset availability secrecy integrity
compromised on its way from its storage to consumption stolen and disabled
passive threats - hard to detect, have to prevent hardware
n
thus denying service
u interception - unauthorized party gains access to an asset.
modified to cause it to
(attack on part of secrecy - confidentiality) programs deleted or unauthorized copy
software fail during execution or
n active threats corrupted made
to do unintended task
u interruption - the system asset becomes unavailable or unusable
(attack on availability) unauthorized read
existing data modified,
data deleted or corrupted performed,
u modification - unauthorized party gains access and modifies the new data fabricated
asset (attack on secrecy and integrity) statistical analysis
u fabrication - unauthorized party inserts counterfeit assets into messages destroyed messages modified,
the system (attack on part of secrecy - authenticity and integrity) messages read,
or deleted, reordered, duplicated,
network traffic pattern of
communcication lines false messages
messages observed
made unavailable inserted

3 4

More on Network threats Protection


n Passive attacks n User oriented
u common - before being allowed to access the assets of the
u release of message contents - message is captured and
decoded computer system the user has to authenticate herself - by
specifying login and matching password
u traffic analysis - attacker has access to messages but cannot
decode them; analysis of the size, direction and frequency can n data oriented
reveal the nature of communication u different types of authorized users may have different access

n active attacks privileges


u generic model - access matrix
u masquerading - an unauthorized entity pretends to be authorized
entity - usually includes one of the other forms of attack item 1 … item m
u replay - passive replay of captured messages stream subject 1 privileges privileges
u modification of messages - modification the contents of the … …
legitimate messages subject n privileges privileges
u denial of service - prevents or inhibits the normal use of u users and data items in access matrix can be grouped
communication facilities u access matrix can be stored

F by row - capability token

F by column - access control lists


5 6
Password protection Types of intruders
n Problems
n Masquerader - not authorized to use computer
u with improvement of computer equipment brute force attacks
system, penetrates system protection by way of
become feasible
legitimate user account - usually an outsider
u untrained users tend to select easy to guess passwords
n misfeasor - legitimate user who accesses assets that
F study: out of 7000 accounts 3% of passwords had 3 she is not authorized to, or who is authorized but
characters or fewer in length misuses her privileges - usually somebody on the
F pick their names or common words inside
u users tend to be lax about keeping passwords secret or n clandestine user - user who gains supervisory access
changing them regularly to the system - can be either insider or outsider
n password selection strategies
u user education

u computer generated passwords

u reactive password checking

u proactive password checking

7 8

Intrusion techniques Intrusion detection


n No intrusion protection system is able to withstand a determined
n frequently to gain unauthorized privileges the intruders need attack indefinitely
to find out the password that protects these privileges n objective – detect intrusion in a timely manner
n common password learning techniques n principle – behavior of intruder differs from that of legitimate user
u check default passwords n how to detect
u find out passwords by exhaustive search u statistically
u try words from dictionaries F threshold - determine thresholds for the number of certain
u guess password on the basis of personal user event occurrences that are typical of normal usage patters
information - full name, names of relatives, birth dates, F profile - compile a profile of activity of each user
etc. license plate
u rule-based - define a set of rules that signify the behavior of
u use Trojan horse (described later) intruder
u eavesdrop the unencrypted password n audit record - tool for intrusion detection
u native (OS)
u detection specific - only for intrusion detection

9 10

Malicious programs Viruses


n Independent n Virus is a piece of code that inserts itself in a useful program. When
u bacteria - consumes resources by replicating itself this program is executed the virus code takes over the control
u worm - replicates and sends its copies to other computers over n virus features:
the network u parasitic - attaches to executables programs, replicates by

n needs host program finding other executables to infect


u virus - code embedded within a program that causes a copy of u memory resident - lodges in main memory as resident part and

itself to be inserted in other program infects every program that is executed


u trapdoor - secret undocumented entry point into a program, used u boot sector - infects the boot record or boot sector

to grant access without normal methods of access authentication u stealth - hides from being detected - may use compression so

u logic bomb - logic embedded in a computer program that checks that the length of infected program is the same as uninfected,
for certain set of conditions and executes some unauthorized intercepts disk I/O commands to give an impression that the
action when these conditions are met executable is not infected
u Trojan horse - secret undocumented routine embedded within u polymorphic - replicates by creating copies that are functionally

useful program. Execution of program results in the execution of equivalent but have different patterns
the routine

11 12
Anti-virus approaches
n Ideal solution - prevention. Do not allow virus to get into
system
n otherwise:
u detection - check if the virus is present

u identification - recognize what virus it is

u removal - delete the virus

n how to detect
u scan for virus “signature”

u scan for features that look like probable virus infection

u attach checksums to all executables and check if the


program was tampered with
u memory resident program that identifies virus by its
actions

13

You might also like