Data security is ...
• Security is about the protection of
assets (for example, your private home):
– prevention
– detection
– reaction
• Data Security is about the protection of
the asset called data (for example, data
regarding your credit card transactions).
1
Why Data Security?
• ‘Sewage’ Hacker jailed – 8th May
2002
• Analysts: Insiders may pose
security threat – 15th Oct, 2001
• White House DoS attack - May
2001
2
3
Computer
Emergency
Reporting
Team
4
DDOS Attack
Control Agent
Flood
Traffic Traffic
Agent
Handler
Agent Victim
Attacker’s
Controlling
Host
Console Agent
Handler Agent
Agent
5
Hackers have hijacked the account
details of 400,000 Optus Internet
dial-up customers.
6
‘Waterfall’ Model for
Secure System Development
Analyse Threat & Risk
Write Security Policy
Design protection mechanism
7
Data Security Goals
• Confidentiality
– access to data & processes is restricted to
authorised people
• Integrity
– the “system” (hardware + software +
facilities + network + people) hasn’t been
compromised
• Availability
– continuous/ uninterrupted service
8
Data Security Goals
• Non-Repudiation
– You cannot deny that you have performed
some action on the data
• Authentication
– You can prove your identity or the origin of
the data
9
Security Threats
• Interruption
– When your assets become unavailable
• Interception
– Some unauthorised party has gained
access to your assets
• Modification
– Some unauthorised party tampers with
your assets
• Fabrication
– Counterfeits of your assets are made 10
Normal Flow
Information Information
Source Destination
11
Interruption
Attack on availability
Information Information
Source Destination
12
Interception
Attack on confidentiality
Information Information
Source Destination
13
Modification
Attack on integrity
Information Information
Source Destination
14
Fabrication
Attack on authenticity
Information Information
Source Destination
15
Defence Mechanisms
• Involve 3 components in system
Computer People
DATA
DATA
Media
16
Defence Mechanisms
• Low Technology
– Security Policy: A documented plan of
action and principles for an organisation
– Training against deception, blackmail, &
“social engineering”
– Secure disposal of paper & storage media
– Employee vetting & reference checking
– Change control + audit trails + follow-up
– contingency planning + training + rehearsal
17
Defence Mechanisms
• High Technology
–Ciphers and digital signatures
–Access control systems
–Firewalls
–Tamper-resistant systems
–Trusted systems
18
19
“Waterfall” Model
Analyse Threat & Risk
Write Security Policy
Design protection mechanism
20
Threat & Risk Analysis
• A security policy must incorporate a
realistic assessment of threats
– What is to be protected?
– What can go wrong?
– If it goes wrong, how will it affect me?
21
Security Policy
••asset
assetvaluation
valuation
businessneeds
needsanalysis
analysis ••risk
riskanalysis
analysis
business
••impact
impactanalysis
analysis
Security Policy
• security policy is a statement of rules
• security is defined by a security policy
• goal of security is to enforce the policy
• “standards” in OSI 7498-2 RFC 2196 & BS 7799 & AS
4444
22
Security Policy
The Proportionality Principle:
• identifying and invoking a set of
protective mechanisms and
procedures (e.g. data encryption)
• which match the perceived risk to
and
• the value of an organization’s
(information) assets
23
24
Cryptography
Computer People
DATA
DATA
Media
25
Ciphers
encryption
plaintext key ciphertext
encryption encrypted
message
algorithm message
original decryption
message algorithm
decryption key 26
A simple example...
plaintext
this message is highly secret
t ASCII representation
exclusive-OR
0 1 1 1 0 1 0 0 plaintext
key
1 0 1 1 0 1 0 1
1 1 0 0 0 0 0 1 ciphertext
key
1 0 1 1 0 1 0 1
0 1 1 1 0 1 0 0 plaintext t
27
Categories of ciphers...
unbreakable ciphers computationally
e.g Vernan cipher secure ciphers
symmetric-key asymmetric-key
ciphers ciphers
e.g. DES e.g RSA
28
Symmetric-key cipher
same key
key must be
distributed first
Plaintext Encryption Ciphertext Decryption Plaintext
message encryption text decryption message
algorithm transmitted algorithm
+ over +
key network key
Examples...
Data Encryption Standard (DES)
Advanced Encryption Standard (AES) 29
Asymmetric-key cipher
Receiver’s Public Key Receiver’s Private Key
different
keys
Plaintext Encryption Ciphertext Decryption Plaintext
message encryption text decryption message
algorithm transmitted algorithm
+ over +
public key network private key
Examples: RSA (Rivest, Shamir and Adleman),
30
elliptic-curve cipher
Requirements
• E-commerce needs ciphers which are:
– practical to implement and manage,
– computationally efficient,
– computationally secure (highly-effective),
• key management
– scalability across networks,
– cost of key distribution (security)
– cost of key revocation (find and replace
every key),
31
Access Control
&
Authentication
32
Access control and
User Authentication
Computer People
DATA
DATA
Media
33
Basic Principles of Authentication
• something you...
– know
• e.g. password, PIN
– have
• e.g. magnetic-stripe card, smart card
– can do
• e.g. signature, encrypt a message
– are (i.e distinguishing personal traits)
• e.g. biometrics
• more effective if used in combinations
34
Authentication Examples
• biometrics - recognizing a person using
distinguishing traits
– speech, fingerprints, hand geometry, wrist
veins, face, retina, iris, handwritten signature
• One time passwords or challenge-
response protocols to prevent “record and
replay” attacks
• “digitally” signing a message using a
“digital” signature
35
Network
Security
36
Network Security
Computer People
DATA
DATA
Media
37
A view of TCP/IP
client PC server
Browser Web server
router
TCP TCP
Software Software
IP IP IP
Software Software Software
Ethernet Ethernet Ethernet
LAN LAN WAN
LAN
Software Software Software
Software
38
The Secure Sockets Layer
client PC server
Browser Web server
SSL Secure Sockets Layer SSL
TCP TCP
Software Software
IP IP
Software Software
39
Firewalls
Internal Network External Network
Firewall
(trusted) (untrusted)
internal external
router router
bastion host
• filter packets based on IP address
• direct each application to a proxy on the
firewall
40
Views on Data Security
• Data security is often inconvenient
• Data security is often not very secure
• Data security is a balance
• People issue more than a technology
issue
• Reactive not proactive - sometimes the
need for data security is not obvious
until it is too late
41
42
• 1
43
44
45
46
47
48
49
50
51
52