computer security overview n.
Skip this Video
Loading SlideShow in 5 Seconds..
Computer security overview PowerPoint Presentation
Download Presentation
Computer security overview

Loading in 2 Seconds...

play fullscreen
1 / 16

Computer security overview - PowerPoint PPT Presentation

  • Uploaded on

Computer security overview. Tuomas Aura CSE-C3400 Information security. Aalto University , autumn 2014. Outline. Timeline of computer security What is security anyway?. Timeline of computer security. 70s. Multi-user operating systems  need for protection

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Computer security overview

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Computer security overview Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014

    2. Outline • Timeline of computer security • What is security anyway?

    3. Timeline of computer security

    4. 70s • Multi-user operating systems  need for protection • Access control models: multi-level security, Bell-LaPadula 1976, BIBA 1977 • DES encryption algorithm 1976  cryptanalysis, need for key distribution • Public-key cryptosystems:Diffie-Hellman 1976, RSA 1978 • Key distribution:  certificates 1978 key exchange protocols: Needham-Schroeder 1978

    5. 80s • Anonymity, Chaum’s mixes 1981, anonymous payment 1982 • Orange Book 1985: mandatory access control • Commercial security models from accounting and auditing rules: Clark-Wilson 1987 • X.509 PKI 1988 • IBM PC  software copy protection floppy disk virus 1987 • Internet Morris worm 1988

    6. 90s • More methodological approach to security research:  Information flow security  Secure operating systems: SEVMS until 1996  Formal analysis of key exchange protocols • Wider availability of cryptography • GSM cellular network 1991 • Open-source cryptography: PGP 1991 • Password sniffers  SSH 1995 • Commercial Internet SSL and VeriSign CA 1995 • RSA patent expired in 2000 • Windows 95  insecure PCs connected to Internet • Spam: Cantor and Siegel 1994 • PKI criticism  trust management research • Research intrusion detection • Macro virus: Melissa 1999 • DRM

    7. 2000s • Malware • Fast-spreading Internet worms: Code Red 2001  secure programming, safe languages security analysis and testing tools • Botnets, spyware, malware analysis • Computer crime: phishing • Total information awareness 2002- • Mobile device operating systems, app permissions • Enterprise identity management • Research on security in mobility, ah-hoc networks, sensor networks • Security has become integral part of most areas of computing and computer science • Connections to law, sociology, psychology, management, usability, design • Social networks, privacy concerns

    8. 2010s • Cyber defense and attack • Stuxnet 2010, malware business, government sponsors • Snowden 2013, PRISM (2007-) • Advanced persistent threat • Flaws still found in key security technologies: Heartbleed 2014, fake SSL certificates • Critical infrastructure protection, smart grid security • Mobile app security, cloud computing • Mobile payments • Bitcoin, ransomware • Research on Internet of Things, vehicular communication • What else?

    9. What is security

    10. What is security • When talking about security, we are concerned about bad eventscaused with malicious intent • Security vs. reliability • Terminology: • Threat = bad event that might happen • Attack = someone intentionally causes the bad thing to happen • Vulnerability = weakness in an information system that enables an attack • Exploit = implementation of an attack • Risk = probability of an attack × damage in dollars • Security is a non-functional property of a system

    11. Security Goals • CIA = confidentiality, integrity, availability • Confidentiality — protection of secrets • Integrity — only authorized modification of data and system configuration • Availability — no denial of service, business continuity • Examples: secret agent names, web server • The CIA model is a good starting point but not all: • Access control — no unauthorized use of resources • Privacy — control of personal data and space • What else?

    12. Security is a continuous process • Continuous race between attackers and defenders • Attackers are creative • No security mechanisms will stop all attacks; attackers just move to new methods and targets • Some types of attacks can be eliminated but others will take their place • Compare with crime statistics: Do locks or prisons reduce crime in the long term? • Security mechanisms will fail and new threats will arise → Monitoring and auditing for new attacks → Contingency planning: how to recover from a breach

    13. Cost vs. benefit • Rational attackers compare the cost of an attack with the gains from it • Attackers look for the weakest link; thus, little is gained by strengthening the already strong bits • Rational defenders compare the risk of an attack with the cost of implementing defenses • Lampson: “Perfect security is the enemy of good security” • But human behavior is not always rational: • Attackers follow each other and flock all to the same path • Defenders buy a peace of mind; avoid personal liability by doing what everyone else does → Many things are explained better by group behavior than rational choice

    14. Who is the attacker? • We partition the world into good and bad entities • Honest parties vs. attackers, red vs. blue • Good ones follow specification, bad ones do not • Different partitions lead to different perspectives on the security of the same system • Typical attackers: • Curious or dishonest individuals — for personal gain • Friends and family • Hackers, crackers, script kiddies — for challenge and reputation • Companies — for business intelligence and marketing • Organized criminals — for money • Governments and security agencies — NSA, SVR, GCHQ, DGSE, etc. • Military SIGINT — strategic and tactical intelligence, cyber defense • Insiders are often the greatest threat • Employee, administrator, service provider, customer, family member • Often, not all types of attackers matter • Who would you not want to read your diary or email?

    15. Reading material • Dieter Gollmann: Computer Security, 2nd ed. chapters 1–2; 3rd ed. chapters 1 and 3 • Matt Bishop: Introduction to computer security, chapter 1 ( • Edward Amoroso: Fundamentals of Computer Security Technology, chapter 1 • Ross Anderson: Security Engineering, 2nd ed., chapter 1 (1st ed.

    16. Exercises • What security threats and goals are there in the postal (paper mail) system? • What different entities are there in the postal system? • Do they have the same of different security concerns? • Who could be the attacker? Does the answer change if you think from a different entity’s viewpoint? Who are insiders? • Can you think of attacks where it is necessary for two or more malicious parties to collude? • What is the role of laws and punishment in computer security? • Can the development of information security technology be unethical, or is engineering value neutral? Give examples. • When is it (or when could it be) ok for you to attack against IT systems? Give examples. • How do the viewpoints of security practitioners (e.g. system admin or company security officer) differ from academic researchers? • How have the Snowden leaks in 2013 changed the overall picture of information security?