Professional Documents
Culture Documents
Introduction to
Computer Security
Chapter 1: Introduction
Objectives
● Describe the key security requirements of
confidentiality, integrity, and availability
● Discuss the types of security threats and attacks
that must be dealt with and give examples of the
types of threats and attacks that apply to different
categories of computer and network assets
● Explain the security goals
● Discuss the use of attack surfaces and attack trees
● Understand the available controls
2
The NIST Internal/Interagency Report NISTIR
7298 (Glossary of Key Information Security
Terms , May 2013) defines the term computer
security as follows:
“ Measures and controls that ensure confidentiality,
integrity, and availability of information system
assets including hardware, software, firmware, and
information being processed, stored, and
communicated.”
What Is Computer Security?
● Computer Security is the protection of the items you
value, called the assets of a computer or computer system.
4
Assets
5
Values of Assets
6
Basic Terms
● Vulnerability
● Threat
● Attack
● Countermeasure or Control
Vulnerabilities, Threats, Attacks,
Controls
● Vulnerability is a weakness in the security system.
● (i.e., in procedures, design, or implementation), that might be exploited to
cause loss or harm.
● An attack is a threat that is carried out (threat action) and, if successful, leads to an
undesirable violation of security, or threat consequence. The agent carrying out the
attack is referred to as an attacker, or threat agent.
8
Threat and Vulnerability
Relationship among threats, controls, and vulnerabilities:
• A threat is blocked by control of a vulnerability.
• To devise controls, we must know as much about threats as possible.
9
Types of Threats
10
Types of Attackers
11
Types of Harm
12
Threats
2. Traffic Analysis
Read Contents (Eavesdropping),
Observe Patterns (Packet Sniffing),
Illegal Copying
Network
1. Masquerade
Unauthorized assumption of
another’s identity.
Network
3. Modification of Messages
Intercept messages,
tamper, release again.
Network
4. Denial of Service
Overwhelm or crash servers,
disrupt infrastructure.
Network
22
Security Goals
● When we talk about computer security, we mean that we are addressing
three important aspects of any computer-related system: confidentiality,
integrity, & availability (CIA)
Confidentiality
Secure
Integrity Availability
Key Security Concepts
Authenticity
Anonymity
Assurance
Assurance
● Assurance refers to how trust is provided and managed in computer
systems.
● Trust management depends on:
● Policies, which specify behavioral expectations that people or systems have
for themselves and others.
● For example, the designers of an online music system may specify policies
that describe how users can access and copy songs.
● Permissions, which describe the behaviors that are allowed by the agents
that interact with a person or system.
● For instance, an online music store may provide permissions for limited
access and copying to people who have purchased certain songs.
● Protections, which describe mechanisms put in place to enforce
permissions and polices.
● We could imagine that an online music store would build in protections to
prevent people from unauthorized access and copying of its songs.
Authenticity
● Authenticity is the ability to determine that statements,
policies, and permissions issued by persons or systems
are genuine.
● Primary tool:
● digital signatures 🡪 These are cryptographic computations
that allow a person or system to commit to the authenticity of
their documents in a unique way that achieves nonrepudiation,
which is the property that authentic statements issued by
some person or system cannot be denied.
Anonymity
● Anonymity: the property that certain records or transactions not
to be attributable to any individual.
● Tools:
● Aggregation: the combining of data from many individuals so that
disclosed sums or averages cannot be tied to any individual.
● Mixing: the intertwining of transactions, information, or
communications in a way that cannot be traced to any individual.
● Proxies: trusted agents that are willing to engage in actions for an
individual in a way that cannot be traced back to that person.
● Pseudonyms: fictional identities that can fill in for real identities in
communications and transactions, but are otherwise known only to
a trusted entity.
Controls / Countermeasures
32
Goals of Security
● Prevention
● Prevent attackers from violating security policy
● Detection
● Detect attackers’ violation of security policy
● Recovery
● Stop attack, assess and repair damage
● Continue to function correctly even if attack succeeds
Trust and Assumptions
● Policies
● Unambiguously partition system states
● Correctly capture security requirements
● Mechanisms
● Assumed to enforce policy
● Support mechanisms work correctly
Computer Security Strategy
Security Policy Security
• Formal statement of rules Implementation
and practices that specify or • Involves four complementary
regulate how a system or courses of action:
organization provides
• Prevention
security services to protect
sensitive and critical system • Detection
resources • Response
• Recovery
Assurance Evaluation
• Encompassing both system • Process of examining a
design and system computer product or system
implementation, assurance is with respect to certain criteria
an attribute of an information • Involves testing and may also
system that provides grounds involve formal analytic or
for having confidence that mathematical techniques
the system operates such
that the system’s security
policy is enforced
Different Types of Controls
36
Effectiveness of Controls
● Likelihood of Use
● Of course, no control is effective unless it is used
● Principle of Effectiveness:
● Controls must be used properly to be effective.
● They must be efficient, easy to use, and appropriate.
40