CYB 215: Fundamentals of Information Assurance By: Saleh Almowuena
CYB 215: Fundamentals of Information Assurance By: Saleh Almowuena
measures to prevent,
detect, and correct
security violations that
involve the
transmission of
information
Motivation Examples
n A transmits file contains sensitive information to B
¨ C, unauthorized, monitor transmission and get a copy of the file
during its transmission
n Network manager, D, sends file to computer E to update
accounts file with new users
¨ F intercept message, add/delete, transmit
n F constructs his own message and send it to E as if it
had come from D
n Fired employee delays a message to deactivate his
account until he retrieves sensitive information
n Customer sends instructions to stockbroker
¨ investments lose value; customer denies sending
3
Computer Security
The NIST Computer Security Handbook defines
the term computer security as:
“the protection afforded to an automated
information system in order to attain the
applicable objectives of preserving the
integrity, availability and confidentiality of
information system resources” (includes
hardware, software, firmware, information/
data, and telecommunications)
Computer Security Objectives
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or
disclosed to unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information may
be disclosed
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to
authorized users
Possible additional concepts:
Authenticity Accountability
• Verifying that users • The security goal
are who they say that generates the
they are and that requirement for
each input arriving at actions of an entity to
the system came be traced uniquely to
from a trusted source that entity
Breach of Security - Levels of Impact
9
OSI* Security Architecture
n Security attack
¨ Any action that compromises the security of information
owned by an organization
n Security mechanism
¨ A process (or a device incorporating such a process)
that is designed to detect, prevent, or recover from a
security attack
n Security service
¨ A processing or communication service that enhances
the security of the data processing systems and the
information transfers of an organization
¨ Intended to counter security attacks, and they make use
of one or more security mechanisms to provide the
service
*(OSI) Open Systems Interconnection model
Security Attacks
We can classify the security
attacks in terms of passive
attacks and active attacks
• A passive attack attempts to
learn or make use of
information from the system
but does not affect system
resources
• An active attack attempts to
alter system resources or
affect their operation
Passive Attacks
• Are in the nature of
eavesdropping on, or
monitoring of,
transmissions
• Goal of the opponent is to
obtain information that is
being transmitted
n RFC 4949:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
14
Security Services (X.800)
n Authentication - assurance that communicating
entity is the one claimed
n Access Control - prevention of the
unauthorized use of a resource
n Data Confidentiality –protection of data from
unauthorized disclosure
n Data Integrity - assurance that data received is
as sent by an authorized entity
n Non-Repudiation - protection against denial by
one of the parties in a communication
n Availability – resource accessible/usable
15
Slides of W. Stallings 5/E by L. Brawn.
Goals of Security
• Prevention:
- Prevent attackers from violating security
policy;
• Detection:
- Detect attackers’ violation of security policy;
• Recovery:
- Stop attack, assess and repair damage;
- Continue to function correctly even if attack
succeeds;
• Specification:
- Requirements analysis;
- Statement of desired functionality;
• Design:
- How system will meet specification;
• Implementation:
- Programs/systems that carry out design;
• Cost-Benefit Analysis:
- Is it cheaper to prevent or recover?
• Risk Analysis:
- Should we protect something?
- How much should we protect this thing?
• Laws and Customs:
- Are desired security measures illegal?
- Will people do them?
• Organizational Problems:
- Power and responsibility;
- Financial benefits;
• People problems:
- Outsiders and insiders;
- Social engineering;
Threats
Policy
Specification
Design
Implementation
Operation