Professional Documents
Culture Documents
Introduction
With the advent of information systems, information
has become the life blood of the modern world. Given
its importance, modern organisations aren’t always as
careful as they could be with it. Whether it’s their
customer details, details of their business transactions
or their intellectual property, information is almost
casually shared when it shouldn’t be.
In this course, Information security, you’ll explore
what it is about information that makes it so valuable.
Course Objectives
To provide an understanding of principal concepts,
major issues, technologies and basic approaches in
information security.
Develop an understanding of information assurance as
practiced in computer operating systems, distributed
systems, networks and representative applications.
Gain familiarity with prevalent network and distributed
system attacks, defenses against them and forensics to
investigate the aftermath.
Course Objectives
Develop a basic understanding of cryptography, how it
has evolved and some key encryption techniques used
today.
Develop an understanding of security policies (such as
authentication, integrity and confidentiality), as well
as protocols to implement such policies in the form of
message exchanges
Course Outcomes
On successful completion of the course, you will be able
to:
1.To master information security governance, and related
legal and regulatory issues.
2.To be familiar with how threats to an organization are
discovered, analyzed, and dealt with
3.To be familiar with network security threats and
countermeasures
4.To be familiar with network security designs using
available secure solutions (such as PGP,SSL, IPSec, etc)
5.To be familiar with advanced security issues and
technologies (such as DDoS attack detection and
containment, and anonymous communications,)
Basic Components
Confidentiality
Keeping data and resources hidden
Integrity
Data integrity (integrity)
Origin integrity (authentication)
Mechanisms: Prevention and Detection
Availability
Enabling access to data and resources
Confidentiality
A good example is cryptography, which traditionally is
used to protect secret messages. But cryptography is
traditionally used to protect data, not resources.
Resources are protected by limiting information, for
example by using firewalls or address translation
mechanisms.
Integrity:
A good example here is that of an interrupted
database transaction, leaving the database in an
inconsistent. Trustworthiness of both data and origin
affects integrity. That integrity is tied to
trustworthiness makes it much harder to quantify than
confidentiality. Cryptography provides mechanisms
for detecting violations of integrity, but not preventing
them (e.g., a digital signature can be used to determine
if data has changed).
Availability
This is usually defined in terms of “quality of service,”
in which authorized users are expected to receive a
specific level of service (stated in terms of a metric).
Denial of service attacks are attempts to block
availability
Classes of Threats
Threat
Potential violation of security through attacks
Disclosure
Unauthorized access to information
Snooping (passive wiretapping)
Deception
Acceptance of false data
Modification, spoofing, repudiation of origin, denial of
receipt
Disruption
Interruption or prevention of correct operation
Modification
Usurpation
Unauthorized control of some part of a system
Modification, spoofing, delay, denial of service
Snooping : An example is passive wiretapping,
where the attacker monitors communications.
Mechanisms:
may be
Technical, in which controls in the computer enforce
the policy; for example, the requirement that a user
supply a password to authenticate herself before using
the computer
Mechanisms:
may be
Procedural, in which controls outside the system
enforce the policy; for example, firing someone for
ringing in a disk containing a game program obtained
from an untrusted source
The composition problem requires checking for
inconsistencies among policies. If, for example, one
policy allows students and faculty access to all data,
and the other allows only faculty access to all the data,
then they must be resolved (e.g., partition the data so
that students and faculty can access some data, and
only faculty access the other data).
Goals of Security
A policy defines “secure” and “non-secure” actions and
mechanisms aim for the following:
Prevention
Prevent attackers from violating security policy
Cumbersome, reduce flexibility
Detection
Detect attackers’ violation of security policy
Recovery
Stop attack, assess and repair damage
Continue to function correctly even if attack succeeds
Prevention is ideal, because then there are no successful
attacks.
Detection occurs after someone violates the policy. The
mechanism determines that a violation of the policy has
occurred (or is underway), and reports it. The system (or
system security officer) must then respond appropriately.
Recovery means that the system continues to function
correctly, possibly after a period during which it fails to
function correctly. If the system functions correctly always,
but possibly with degraded services, it is said to be
intrusion tolerant. This is very difficult to do correctly;
usually, recovery means that the attack is stopped, the
system fixed (which may involve shutting down the system
for some time, or making it unavailable to all users except
the system security officers), and then the system resumes
correct operations.
Trust and Assumptions
Underline all aspects of security
Policies
Unambiguously partition system states (secure, not
secure)
Correctly capture security requirements
Mechanisms
Assumed to enforce policy
Support mechanisms work correctly
All security policies and mechanisms rest on
assumptions. Here is a taste of the assumptions.
Policy
Specification
Design
Implementation
Operation
Tying Together
The point to the previous slide is that each step feeds
into the earlier steps. In theory, each of these should
only affect the one before it, and the one after it. In
practice, each affects all the ones that come before it.
Feedback from operation and maintenance is critical,
and often overlooked. It allows one to validate the
threats and the legitimacy of the policy.
Key Points
Policy defines security, and mechanisms enforce
security
Confidentiality
Integrity
Availability
Trust and knowing assumptions
Importance of assurance
The human factor