MOD1
MOD1
Introduction: Overview of computer security, Security concepts, Need of Security- Threats- Deliberate
software attacks, Deviation in quality of service, Attacks- malicious code, brute force, Timing attack, sniffers
Access Control Mechanisms - Access Control, Access control matrix, Access control in OS-Discretionary
and Mandatory access control, Role-based access control, case study SELinux
SECURITY CONCEPTS
Three Goals in Computing Security
Three goals of computer security are
1. Confidentiality
2. Integrity
3. Availability
Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps
the most obvious aspect of the CIA(Confidentiality, Integrity and Availability) triad when it comes to security;
but correspondingly, it is also the one which is attacked most often.
Cryptography and Encryption methods are an example of an attempt to ensure confidentiality of data
transferred from one computer to another.
A good example of methods used to ensure confidentiality is an account number or routing number when
banking online.
Data encryption is a common method of ensuring confidentiality. User IDs and passwords constitute a
standard procedure; two-factor authentication is becoming the norm.
Other options include biometric verification and security tokens, key fobs or soft tokens.
In addition, users can take precautions to minimize the number of places where the information appears
and the number of times it is actually transmitted to complete a required transaction.
Different approaches for achieving confidentiality are
- Access control: - specify who can access. One access control mechanism for preserving confidentiality is
cryptography
- Identification and Authentication
Two concepts in confidentiality are
1. Data Confidentiality: - assures that confidential information is not disclosed to authorize individuals.
- Only the people who are authorized to do so can gain access to sensitive data. Imagine your bank
records.
- You should be able to access them, of course, and employees at the bank who are helping you with a
transaction should be able to access them, but no one else should.
2. Privacy: The right of individuals to hold information about themselves in secret, free from the knowledge
of others
•Integrity: it means that assets can be modified only by authorized parties or only in authorized ways.
- Much difficult to measure
Two concepts in integrity are
1. Data Integrity:- Information and programs are changed only in authorized manner
2. System Integrity: - System performs its operation in unimpaired manner that means state of the system
not changed.
Detection mechanisms do not try to prevent violations of integrity; they simply report that the data‘s integrity is
no longer trustworthy. The mechanisms may report the actual cause of the integrity violation (a specific part of a
file was altered), or they may simply report that the file is now corrupt.
•Availability: it means that assets are accessible to authorized users in all time
- Availability applies both to data and to service.
- Failure to this goal (availability)is known as Denial of service.
- Availability is an important aspect of reliability as well as of system design because an unavailable
system is at least as bad as no system at all
One of the challenges in building a secure system is finding the right balance among the goals, which often
conflict.
Along with three objectives system should also ensure
1. Authentication: Computer system be able to verify identity of user.
Authentication technology provides access control for systems by checking to see if a user's credentials
match the credentials in a database of authorized users or in a data authentication server.
Users are usually identified with a user ID, and authentication is accomplished when the user provides a
credential, for example a password, that matches with that user ID.
2. Accountability: Every individual who works with an information system should have specific
responsibilities for information assurance.
3. Non repudiation: non-repudiation is the assurance that someone cannot deny the validity of something.
Non-repudiation is a legal concept that is widely used in information security and refers to a service,
which provides proof of the origin of data and the integrity of the data. In other words, non-repudiation
makes it very difficult to successfully deny who/where a message came from as well as the authenticity of
that message.
NEED OF SECURITY
Why is computer security important?
Computer security is important, primarily to keep your information protected. It‘s also important for your
computer‘s overall health, helping to prevent viruses and malware and allowing programs to run more smoothly.
Security is needed due to following reason
1. Privacy:- It defines the right of individuals to hold information about themselves in secret, free from the
knowledge of others
2. Accuracy: - Most of damages of data is caused by errors and omissions. An organization always needs
accurate data for transaction processing, providing better service and making
3. Threats by dishonest employ
4. Computer Crimes:- When computer resources can be misused for unauthorized or illegal function
5. Threats for fire and Natural Disasters:- fire and natural disasters like floods, storms, lightening etc
THREATS
•A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
- A threat can be an object or person or other entity that represents a constant danger to an asset
•There are many threats to a computer system, including human-initiated and computer- initiated ones.
•A threat is blocked by control of vulnerability (Weakness of the system).
We can view any threat as being one of four
•An interception means that some unauthorized party has gained access to an asset. The outside party can be a
person, a program, or a computing system.
•In an interruption is an asset of the system becomes lost, unavailable, or unusable.
•If an unauthorized party not only accesses but tampers with an asset, is called as a modification.
•An unauthorized party might create a fabrication of counterfeit objects on a computing system.
•The intruder may insert spurious transactions to a network communication system or add records to an
existing database.
Kinds of threats
• Interruption
- An asset of the system is destroyed of becomes unavailable or unusable
– Attack on availability
ATTACKS
- Attack is the process of gaining the access of data by unauthorized user.
- It is an Act or attack that exploit vulnerability(Weakness of the system)
An attack is an information security threat that involves an attempt to obtain, alter, destroy, remove, implant or
reveal information without authorized access or permission. It happens to both individuals and organizations.
The third party sends the same message to the receiver and receiver receives it with the name of sender.
- Here receiver receives two messages. One from sender and another from third party.
- Receiver did not know which one is correct
3. Data Modification attack
4. Denial of Service
• A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent
legitimate users from accessing the service.
• In a DoS attack, the attacker usually sends excessive messages asking the network or server to
authenticate requests that have invalid return addresses.
• The network or server will not be able to find the return address of the attacker when sending the
authentication approval, causing the server to wait before closing the connection.
-
MALICIOUS CODE (MALWARE)
- It is a software written into intentionally cause undesirable effect
- Can do anything that a normal program can do
- Designed to damage a computer system without owners concern
- Gets installed in your device and perform unwanted tasks
- Mainly designed to transmit information about your web browsing.
- It comes from different sources such as website, email, physical media etc
- In some cases it spreads itself to other computers though email or infected discs.
- Malware or Malicious software is software designed to damage a computer system without the owner's
concerns.
4. Trapdoor
A computer trapdoor, also known as a back door, provides a secret -- or at least undocumented --
method of gaining access to an application, operating system or online service.
• Entry point into a program that allows someone who is aware of trapdoor to gain access
• used by programmers to debug and test programs
– Avoids necessary setup and authentication
– Method to activate program if something wrong with authentication procedure
5. Logic Bomb
Code embedded in a legitimate program that is set to ―explode‖ when certain conditions are met
– Presence or absence of certain files
– Particular day of the week
6. Spyware
• Software that is installed into a computer without the user's knowledge.
• Transmits information about the user's computer, and user activities over the Internet.
• Redirect to sites which spoil the culture and the computer.
Symptoms when Spy ware affects to your computer:
- Sending user‘s important data to others.
- Unauthorized Software installation.
- Redirect Web browser to dangerous web sites.
- Change Computer settings.
- Using anti-spyware we can minimize the damages.
7. Time Bomb
• This is simply some code on a computer which does not immediately trigger.
• Instead, it is set to cause it's damage at some point in the future.
• Usually Time bombs are designed to take revenge towards a company or an organization. E.g.: Sending
messages such as ―You are a great FOOL!!!!‖ on April first. OR ―Am the vampire who suck ur blood‖ at
12 P.M
Way of work
• A Brute Force Attack simply uses the cryptography algorithm.
• When we attempt to login and our page request is sent from the server to the client machine hackers are more
active to access the account.
• They attempt all possible combinations to unlock it.
• There is a computer program that runs automatically to get the password.
The characteristics:-
- Need very high processing speed
- Produces many number of passwords for a particular user using permutations and combinations May
take months years to crack the password
• It is a fairly simplistic attack that doesn't require a lot of work to setup or initiate.
Disadvantage:
• Hardware intensive : consume lots of processing power
• Extends the amount of time needed to crack the code by huge margin.
Active Sniffing:
A switch learns a CAM (Content Addressable Memory) table that has the MAC addresses of the destinations.
Basis this table the switch is able to decide what network packet is to be sent where.
In active sniffing, the sniffer will flood the switch with bogus requests(fake request) so that the CAM
table gets full. Once the CAM is full the switch will act as a switch and send the network traffic to all ports. Now,
this is legitimate traffic that gets distributed to all the ports. This way the attacker can sniff the traffic from the
switch.
Access control is the intermediate layer between malicious user and protected system
Access control consists of four elements:
– subjects,
– objects,
– operations,
– a reference monitor
Subjects are system users and groups of users while objects are files and resources such as memory,
printers, and scanners including computers in a network.
An access operation comes in many forms including Web access, server access, memory access, and
method calls.
The job of the reference monitor is to check on the hierarchy of rules that specify certain restrictions
• This is a mechanism grants access privileges to users based on control policies that govern the
access of subjects to objects using the subjects‘ identity and authorization rules.
• These mechanisms are discretionary in that they allow subjects to grant other users
authorization to access the data.
• They are highly flexible, making them suitable for a large variety of application domains.
• However, the same characteristics that make them flexible also make them vulnerable to
malicious attacks, such as Trojan Horses embedded in application programs.
• The reason is that discretionary authorization models do not impose any control on how
information is propagated and used once it has been accessed by users authorized to do so.
• A general approach to DAC is Access Control Matrix (Write Access Control Matrix also in
this topic)
• Mandatory policies, unlike the discretionary ones seen above, ensure a high degree of protection
in that they prevent any illegal flow of information through the enforcement of multilevel
security by classifying the data and users into various security classes.
• They are, therefore, suitable for contexts that require structured but graded levels of security such
as the military.
• However, mandatory policies have the drawback of being too rigid, in that they require a strict
classification of subjects and objects in security levels, and are, therefore, applicable only to very
few environments.
• opposite of DAC and is most restrictive access control model
• MAC assigns users‘ access controls strictly according to custodian‘s desires and user has no freedom to
set any controls
• two key elements to MAC:
- labels - every entity is an object (laptops, files, projects, and so on) and assigned classification
label (confidential, secret, and top secret) while subjects assigned privilege label (a clearance)
- levels - hierarchy based on labels is also used, both for objects and subjects (top secret higher
level than secret)
• major implementations
- lattice model - subjects and objects are assigned ―rung‖ on lattice and multiple lattices can be
placed beside each other
- bell-lapadula - similar to lattice model but subjects may not create new object or perform specific
functions on lower level objects
- biba integrity model - goes beyond blp model and adds protecting data integrity and
confidentiality
- mandatory integrity control (mic) - based on biba model, mic ensures data integrity by
controlling access to securable objects
Role
Perm Object
User
Users in Role Can
Access Objects Using
Permissions Perm Object
User