Introduction To ISA
Introduction To ISA
Assurance
Week 1
Even Semester 2021/2022
Department of Informatics UBAYA
2
Say NO to Plagiarism
• Plagiarism (mencontoh/memberi contoh) in any
assessment (Quiz/PractiseWork) will be penalized by
giving 0 to
ALL assessments
• Plagiarism in UTS/UAS (Mid Term Test/Final Term
Test) will be penalized by giving 0 to ALL PREVIOUS
UTS/UAS (OTHER SUBJECTS)
• DON’T RISK IT !
3
Mark
Grade %
• Authentication
– Verifying the identity of a subject
• Authorization
– Determining what subject can access after
authentication
• Accountability
– What subject did what, where, and when
Security Threats and Attacks
• A threat/vulnerability is a potential violation of security.
– Flaws in design, implementation, and operation.
• An attack is any action that violates security.
– Active adversary
• An attack has an implicit concept of “intent”
– Router mis-configuration or server crash can also cause
loss of availability, but they are not attacks
Classify Security Attacks as
• Passive attacks - eavesdropping on, or monitoring of,
transmissions to:
– obtain message contents, or
– monitor traffic flows
• Active attacks – modification of data stream to:
– masquerade of one entity as some other
– replay previous messages
– modify messages in transit
– denial of service
Owen and Louise wants to
communicate securely
Secure Secure
sender receiver
Data, Data
Channel
Data control message
Eny
Owen Eny (intruder) may intercept, Louise
delete, add messages
Activity - Quest
• Which part of the CIA triad has been broken?
• Alice is buying books from an online retail site, and she finds that she is able to
change the price of a book from £19.99 to £1.99.
• Cynthia is working on her university applications online, when the admissions
website crashes. She is unable to turn in her application on time.
• Tony gets his phone bill in the mail. The bill was supposed to be for £80, but
the mail person spilled water on the bill, smearing the ink. The bill now asks for
£8.
• Kim has taken her A-Level exam and is waiting to get her results by email. By
accident, Kim’s results are sent to Karen.
• Rob opens his fitness tracking app to start logging a workout. The app
crashes, and he is unable to log his workout.
ETCHICAL HACKING
What is hacking ?
Who is a hacker ?
Reconnaissance