L1 (Intro)
L1 (Intro)
MIS 1201
(Introduction)
Kasun De Zoysa
Syllabus:
Introduction to information security, Introduction to cryptography, Digital
signatures, Public-Key Infrastructure (PKI),e-mail security, Security Models
and Policies, Program Security, Malicious Software, Operating system
security, Privacy and Privacy Enhancement Tools, Social Engineering,
Security threats on Social networks
Literature:
Matt Bishop, Introduction to Computer Security, Addison Wesley, 2005,
Charles P. Pfleeger, Shari Lawrence Pfleeger, Security in Computing,
Prentice Hall, 2007 2
What do we mean by “secure”?
Financial flows
Industrial cooperation
Availability
Reliability (accountability)
New functionalities
Resistance to attacks
Computer Security
Past Situation (Single
Systems)
Global connectivity
Distributed systems
Attacks on software :
- Software deletion
- Software modification
- Software theft
Attacks on data :
- Data secrecy
- Data integrity
Categories of Threats
– Communications security
– Authentication of unknown users
– Access authorizations
– Verification of transactions
Security is not always about locks,
firewalls, virus scanner and
hardware
• Public Image often gets in the way of defeats
security.
– Would you deposit your money in a bank that just
revealed that it lost fifteen million dollars due to a
computer security oversight?
– Things like this probably happen a lot more often
than we care to have nightmares about.
So what does computer security
concern itself with?
• The entire system:
– Hardware
– Software
– Storage media
– Data
– Memory
– People
– Organizations
– Communications
The Dimensions of Computer Security
Security Goals (Requirements)
• What makes a “secure” system?
– Financial “Security” requirements
– Home “security”
– Homeland “security”
– Physical “security”
– Computer “security”
• All these concepts of security have different
requirements. We are, of course, interested
mostly on computer security; which requires
three items:
Presence of all three
• The presence of all three things yields a
secure system:
Confidentiality
Secure
Integrity
Availability
Thing one:
• Confidentiality:
Computer related assets are only available to authorized
parties. Only those that should have access to
something will actually get that access.
• “Access” isn't limited to reading. But also to viewing,
printing or...
• Simply even knowing that the particular asset exists
(steganography)
– Straight forward concept but very hard to
implement.
Thing two:
• Integrity
Can mean many things: Something has integrity if it is:
• Precise
• Accurate
• Unmodified
• Consistent
• Meaningful and usable
Integrity
• Three important aspects towards providing
computer related integrity:
– Authorized actions
– Seperation and protection of resources
– Error detection and correction.
• Again, rather hard to implement; usually done
so through rigorous control of who or what
can have access to data and in what ways.
Thing three:
• Availability
– There is a timely response to our requests
– There is a fair allocation of resources (no
starvation)
– Reliability (software and hardware failures lead to
graceful cessation of services and not an abrupt
crash)
– Service can be used easily and in the manner it
was intended to be used.
– Controlled concurrency, support for simultaneous
access with proper deadlock and access
management.
Principles of Computer Security
Functionality
Principles of Computer Security
Computer security
are methods and technologies
for protection, integrity,
availability,
authenticity and extended
functionality
of computer programs and data
Goals and Principles
Encryption
SW & HW Controls
Policies
Physical controls
Protection Methods
Physical
controls
Protection Methods
Physical
controls
Protection Methods
Physical
controls
Protection Methods
Encryption Measures for:
isolation of equipment,
SW & HW access to equipment,
Controls authorization for personnel,
backup and archiving
Policies
Physical
controls
Groups of Security Services
Confidentiality
Integrity
Availability
Functionality
Security
Mechanisms
. . . in Single Systems
Confidentiality
Integrity
Availability
Functionality
. . . in Global Networks
Confidentiality
Integrity
Availability
Functionality
Security Reference Model
Security reference model are
components of a security
system and their
relationships (security
protocols) linked into
security infrastructure,
supporting various secure
applications
Security Protocols
User
Security Reference Model
Security
Infrastructure
Security Reference Model
Secure Applications
Course Coordinator: Dr. Kasun De Zoysa
e-mail: [email protected]
50