1 / 26

EEC 688/788 Secure and Dependable Computing

This lecture provides an introduction to computer security, covering security concepts, vulnerabilities, threats, attacks, and controls. It explores the importance of securing valuable computer-related assets such as hardware, software, and data, and discusses methods to achieve security in various computing systems.

agail
Download Presentation

EEC 688/788 Secure and Dependable Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EEC 688/788Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

  2. Outline • Introduction to computer security • Security concept • Vulnerabilities, threats, attacks, and Controls Security in Computing, 4th Edition By CharlesP.Pfleeger, ShariLawrencePfleeger • http://proquest.safaribooksonline.com/0132390779 EEC688/788: Secure & Dependable Computing

  3. Security in Computing Systems • Security in computing systems = protecting valuable computer-related asset • Computer-related asset (valuable components): • Hardware, software, and data • Means to achieve security • Protecting programs • Protecting operating systems • Protecting networks EEC688/788: Secure & Dependable Computing

  4. Vulnerabilities, Threats, Attacks, & Controls • A vulnerability is a weakness in the security system • A threat to a computing system is a set of circumstances that has the potential to cause loss or harm • A human who exploits a vulnerability perpetrates an attack on the system. • How do we address these problems? We use a control as a protective measure • A control is an action, device, procedure, or technique that removes or reduces a vulnerability • A threat is blocked by control of a vulnerability EEC688/788: Secure & Dependable Computing

  5. Threats, Vulnerabilities, and Controls EEC688/788: Secure & Dependable Computing

  6. Type of Threats • An interception means that some unauthorized party has gained access to an asset • In an interruption, an asset of the system becomes lost, unavailable, or unusable • If an unauthorized party not only accesses but tampers with an asset, the threat is a modification • An unauthorized party might create a fabrication of counterfeit objects on a computing system EEC688/788: Secure & Dependable Computing

  7. Type of Threats EEC688/788: Secure & Dependable Computing

  8. Interception • An interception means that some unauthorized party has gained access to an asset • Example: illicit copying of program or data files, or wiretapping to obtain data in a network • Unlike a loss, which may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected EEC688/788: Secure & Dependable Computing

  9. Interruption • In an interruption, an asset of the system becomes lost, unavailable, or unusable • Example: malicious destruction of a hardware device • Example: erasure of a program or data file • Example: (distributed) denial of service attacks EEC688/788: Secure & Dependable Computing

  10. Modification • If an unauthorized party not only accesses but tampers with an asset, the threat is a modification • Example: someone might change the values in a database, alter a program so that it performs an additional computation • Example: modify message being transmitted over the network • Some cases of modification can be detected with simple measures, but other, more subtle, changes may be almost impossible to detect EEC688/788: Secure & Dependable Computing

  11. Fabrication • An unauthorized party might create a fabrication of counterfeit objects on a computing system • Example: the intruder may insert spurious transactions to a network communication system or add records to an existing database • Sometimes these additions can be detected as forgeries, but if skillfully done, they are virtually indistinguishable from the real thing EEC688/788: Secure & Dependable Computing

  12. Threats: Methods, Opportunity, and Motive • A malicious attacker must have three things: • Method: the skills, knowledge, tools, and other things with which to launch an attack • Opportunity: the time and access to accomplish the attack • Motive: a reason to want to perform this attack against this system EEC688/788: Secure & Dependable Computing

  13. The Meaning of Computer Security • The purpose of computer security is to devise ways to prevent the weaknesses from being exploited • What we mean when we say that a system is secure: • Confidentiality: computer-related assets are accessed only by authorized parties. Confidentiality is sometimes called secrecy or privacy • Integrity: assets can be modified only by authorized parties or only in authorized ways • Availability: assets are accessible to authorized parties at appropriate times EEC688/788: Secure & Dependable Computing

  14. Relationship of Security Goals • A secure system must meet all three requirements • The challenge is how to find the right balance among the goals, which often conflict • For example, it is easy to preserve a particular object's confidentiality in a secure system simply by preventing everyone from reading that object • However, this system is not secure, because it does not meet the requirement of availability for proper access => There must be a balance between confidentiality and availability EEC688/788: Secure & Dependable Computing

  15. Relationship of Security Goals EEC688/788: Secure & Dependable Computing

  16. Confidentiality • Confidentiality is the security property we understand best because its meaning is narrower than the other two • However, it is not trivial to ensure confidentiality. For example, • Who determines which people or systems are authorized to access the current system? • By "accessing" data, do we mean that an authorized party can access a single bit? pieces of data out of context? • Can someone who is authorized disclose those data to other parties? EEC688/788: Secure & Dependable Computing

  17. Integrity • It is much harder to ensure integrity. One reason is that integrity means different things in different context • For example, if we say that we have preserved the integrity of an item, we may mean that the item is: • precise • accurate • unmodified • modified only in acceptable ways • modified only by authorized people • modified only by authorized processes • consistent • internally consistent • meaningful and usable EEC688/788: Secure & Dependable Computing

  18. Integrity • Aspects of integrity: computerized data are the same as those in source documents; they have not been exposed to accidental or malicious alteration or destruction • Aspects of integrity: authorized actions, separation and protection of resources, and error detection and correction • Integrity can be enforced in much the same way as can confidentiality: by rigorous control of who or what can access which resources in what ways EEC688/788: Secure & Dependable Computing

  19. Availability • Availability applies both to data and to services (i.e., to information and to information processing • We say a data item, service, or system is available if • There is a timely response to our request • There is a fair allocation of resources, so that some requesters are not favored over others • The service or system involved are fault tolerant - hardware or software faults lead to graceful cessation of service or to workarounds rather than to crashes and abrupt loss of information • The service or system can be used easily and in the way it was intended to be used • …. EEC688/788: Secure & Dependable Computing

  20. Availability • The security community is just beginning to understand what availability implies and how to ensure it • A small, centralized control of access is fundamental to preserving confidentiality and integrity, but it is not clear that a single access control point can enforce availability • Much of computer security's past success has focused on confidentiality and integrity; full implementation of availability is security's next great challenge EEC688/788: Secure & Dependable Computing

  21. Vulnerabilities • Vulnerabilities: would prevent us from reaching one or more of our three security goals • The three assets (hardware, software and data) and the connections among them are all potential security weak points EEC688/788: Secure & Dependable Computing

  22. Vulnerabilities EEC688/788: Secure & Dependable Computing

  23. Software Vulnerabilities • Software is surprisingly easy to delete and to copy • Software is vulnerable to modifications that either cause it to fail or cause it to perform an unintended task • Trojan horse: a program that overtly does one thing while covertly doing another • Virus: a specific type of Trojan horse that can be used to spread its "infection" from one computer to another • … EEC688/788: Secure & Dependable Computing

  24. Data Vulnerabilities • Data items have greater public value than hardware and software, because more people know how to use or interpret data • By themselves, out of context, pieces of data have essentially no intrinsic value • On the other hand, data items in context do relate to cost: e.g., measurable by the cost to reconstruct or redevelop damaged or lost data EEC688/788: Secure & Dependable Computing

  25. Data Vulnerabilities • Confidential data leaked to a competitor may narrow a competitive edge • Data incorrectly modified can cost human lives • Inadequate security may lead to financial liability if certain personal data are made public • The value of data over time is far less predictable or consistent • Quite often, data is valuable only for a period of time EEC688/788: Secure & Dependable Computing

  26. Security of Data Integrity prevents unauthorized modification Confidentiality prevents unauthorized disclosure of a data item Availability prevents denial of authorized access EEC688/788: Secure & Dependable Computing

More Related