1 / 21

Computer Security: Principles and Practice

Computer Security: Principles and Practice. Chapter 1 – Overview. First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown. Overview.

kobe
Download Presentation

Computer Security: Principles and Practice

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security: Principles and Practice Chapter 1 – Overview First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown

  2. Overview • Computer Security: protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). • Hardware, firmware/software (protocols), policy

  3. Key Security Concepts • Common security targets: • Confidentiality: ensuring that information ia only accessible to authorized users • Integrity: safeguarding the accuracy and completeness of information and processing methods • Availability: ensuring that authorized users have access to information and associated assets when needed

  4. Other aspects of security • authenticity: verification of the claimed identity • accountability: tracing the actions of an entity to that entity • to support non-repudiation: origin/reception of a message cannot be denied

  5. Variants of Confidentiality • personal data privacy and fair collection and use of personal data • anonymity/untraceability: ability to use a resource without disclosing identity/location • unlinkability: ability to use a resource multiple times without others being able to link these uses (e.g., HTTP cookies were introduced to provide linkability)

  6. Computer Security Challenges • not simple • must consider potential attacks • procedures used counter-intuitive • involve algorithms and secret info • must decide where to deploy mechanisms • battle of wits between attacker / admin • not perceived on benefit until fails • requires regular monitoring • too often an after-thought • regarded as impediment to using system

  7. Security Terminology

  8. Vulnerabilities and Attacks • system resource vulnerabilities may • be corrupted (loss of integrity) • become leaky (loss of confidentiality) • become unavailable (loss of availability) • attacks are threats carried out and may be • passive • active • insider • outsider

  9. Countermeasures • means used to deal with security attacks • prevent (authentication, firewalls, encryption, access control) • detect (IDS, auditing, monitoring) • recover (backup, logging, restore points) • may result in new vulnerabilities • will have residual vulnerability • goal is to minimize risk given constraints

  10. Threat Consequences (Table 1.2) • unauthorized disclosure • exposure, interception, inference, intrusion • deception • masquerade (impersonate), falsification, repudiation • disruption • incapacitation (prevent use), corruption (alter data), obstruction (hinder) • usurpation • misappropriation (unauthorized control of a resource), misuse

  11. Scope of Computer Security (Threats and Assets)

  12. Assets/Examples of Threats

  13. Security Functional Requirements • technical measures • access control; identification & authentication; system & communication protection; system & information integrity • management controls and procedures • awareness & training; audit & accountability; certification, accreditation, & security assessments; contingency planning; maintenance; physical & environmental protection; planning; personnel security; risk assessment; systems & services acquisition • overlapping technical and management • configuration management; incident response; media protection

  14. X.800 Security Architecture • X.800, Security Architecture for OSI • systematic way of defining requirements for security and characterizing approaches to satisfying them • defines: • security attacks - compromise security • security mechanism - act to detect, prevent, recover from attack • security service - counter security attacks

  15. A Security Taxonomy

  16. Security Trends

  17. Security Trend [2]

  18. Computer Security Losses

  19. Security Technologies Used

  20. Computer Security Strategy • specification/policy • what is the security scheme supposed to do? • codify in policy and procedures • implementation/mechanisms • how does it do it? • prevention, detection, response, recovery • correctness/assurance • does it really work? • assurance, evaluation

  21. Summary • security concepts • terminology • functional requirements • security architecture • security trends • security strategy

More Related