Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

Information Protection, Reliability

and Cryptography
Basics of Information Security
Professor dr.sc.ing. Viktor Gopejenko
Department of Computer Technologies and Natural Sciences
ISMA University of Applied Science, Riga, Latvia
Lecture 1
Overview
Learning Objectives

 The key security requirements of confidentiality, integrity and


availability

 The types of security threats and attacks that must be dealt with
and examples of the security threats and attacks that apply to
different categories of computer and network assets

 The functional requirements for computer security

 X.800 security architecture for OSI

 Key trends in security threats and countermeasures


Detailed Content:

 Computer Security Concepts

 Threats, Attacks and Assets

 Security Functional Requirements

 Security Architecture for Open Systems

 Computer Security Trends

 Computer Security Strategy


Computer Security Overview

The NIST Computer Security Handbook defines


the term Computer Security as:
“The protection afforded to an automated
information system in order to attain the
applicable objectives of preserving the integrity,
availability and confidentiality of information
system resources” (includes hardware, software,
firmware, information/data, and
telecommunications).
The CIA Triad
Confidentiality
- data confidentiality
- privacy

Integrity
- data integrity
- system integrity

Availability
Key Security Concepts

Confidentiality Integrity Availability

• preserving • guarding against • ensuring timely


authorized improper and reliable access
restrictions on information to and use of
information access modification or information
and disclosure, destruction,
including means for including ensuring
protecting personal information
privacy and nonrepudiation
proprietary and authenticity
information
Key Security Concepts

Authenticity Accountability

• The property of being • The security goal that generates


genuine and being able the requirement for actions of an
to be verified and trusted entity to be traced uniquely to that
• This means verifying entity
that users are who they • This supports nonrepudiation,
say they are and that deterrence, fault isolation,
each input arriving at the intrusion detection and
system came from a prevention, and after-action
trusted source recovery and legal action
Computer Security Challenges
 computer security is not as  attackers only need to find a
simple as it might first appear single weakness, the
to the novice developer needs to find all
 potential attacks on the weaknesses
security features must be  users and system managers
considered tend to not see the benefits of
 procedures used to provide security until a failure occurs
particular services are often  security requires regular and
counterintuitive constant monitoring
 physical and logical placement  is often an afterthought to be
needs to be determined incorporated into a system
 additional algorithms or after the design is complete
protocols may be involved  thought of as an impediment
to efficient and user-friendly
operation
Table 1.1

Computer
Security
Terminology
RFC 2828, Internet
Security Glossary,
May 2000
Security Concepts and Relationships

Figure 1.2
Vulnerabilities, Threats
and Attacks
 categories of vulnerabilities
 corrupted (loss of integrity)
 leaky (loss of confidentiality)
 unavailable or very slow (loss of availability)

 threats
 capable of exploiting vulnerabilities
 represent potential security harm to an asset

 attacks (threats carried out)


 passive – does not affect system resources
 active – attempt to alter system resources or affect their operation
 insider – initiated by an entity inside the security perimeter
 outsider – initiated from outside the perimeter
Countermeasures

• prevent
means used to deal with • detect
security attacks • recover

may introduce new


vulnerabilities

residual vulnerabilities
may remain

goal is to minimize residual


level of risk to the assets
Table 1.2

Threat
Consequences
Scope of Computer Security

Figure 1.3
Computer and Network Assets
Examples of Threats

Table 1.3 Computer and Network Assets, with Examples of Threats. Table 1.3
Passive and Active Attacks
 Passive attacks attempt to learn or make use of information
from the system but does not affect system resources
 eavesdropping/monitoring transmissions
 difficult to detect
 emphasis is on prevention rather than detection
 two types:
 release of message contents
 traffic analysis

 Active attacks involve modification of the data stream


 goal is to detect them and then recover
 four categories:
 masquerade
 replay
 modification of messages
 denial of service
Security Requirements (FIPS PUB 200)
Security Functional Requirements

functional areas that functional areas that functional areas that overlap
primarily require computer primarily require computer security technical
security technical measures management controls and measures and management
include: procedures include: controls include:

• access control; • awareness & training; audit • configuration management;


identification & & accountability; incident response; and
authentication; system & certification, accreditation, media protection
communication protection; & security assessments;
and system & information contingency planning;
integrity maintenance; physical &
environmental protection;
planning; personnel
security; risk assessment;
and systems & services
acquisition
Security Architecture For
Open Systems
 ITU-T Recommendation X.800, Security Architecture for
OSI
 systematic way of defining the requirements for security and
characterizing the approaches to satisfying them
 was developed as an international standard
 focuses on:
 security attacks – action that compromises the security of
information owned by an organization
 security mechanism – designed to detect, prevent, or recover
from a security attack
 security service – intended to counter security attacks
Security Services
X.800 RFC 2828
 defines a security service  defines a security service
as a service that is as a processing or
provided by a protocol communication service
layer of communicating that is provided by a
open systems and ensures system to give a specific
adequate security of the kind of protection to
systems or of data system resources;
transfers security services
implement security
policies and are
implemented by security
mechanisms
Table 1.5

Security
Services

Source: From X.800, Security Architecture for OSI


 Data Origin Authentication
 provides for the corroboration of the
source of a data unit
Authentication  does not provide protection against
the duplication or modification of
Service data units
 this type of service supports
applications like email where there
are no prior interactions between the
communicating entities

 concerned with assuring that a  Peer Entity Authentication


communication is from the  provides for the corroboration of the
source that it claims to be from identity of a peer entity in an
association
 provided for use at the
 must assure that the connection
establishment of, or at times during
is not interfered with by a third the data transfer phase of, a
party masquerading as one of connection
the two legitimate parties  attempts to provide confidence that
an entity is not performing either a
masquerade or an unauthorized
replay of a previous connection
Access Control Nonrepudiation
Service Service

 prevents either sender or


 the ability to limit and control the
receiver from denying a
access to host systems and
transmitted message
applications via communications
links
 receiver can prove that the
alleged sender in fact sent
 each entity trying to gain access the message
must first be identified, or
authenticated, so that access rights  the sender can prove that
can be tailored to the individual the alleged receiver in fact
received the message
 protects the traffic flow from analysis
 this requires that an attacker not
be able to observe the source and
Data destination, frequency, length, or
Confidentiality other characteristics of the traffic
on a communications facility
Service
 connectionless confidentiality
 protection of all user data in a
single data block
 the protection of transmitted
data from passive attacks  selective-field confidentiality
 confidentiality of selected fields
 the broadest service protects all within the user data on a
user data transmitted between connection or a single data block
two users over a period of time
 traffic-flow confidentiality
 connection confidentiality
 protection of the information that
 the protection of all user data might be derived from observation
on a connection of traffic flows
 a connection-oriented integrity
service assures that messages are
received as sent, with no
Data duplication, insertion
Integrity modification, reordering, or
Service replays
 destruction of data is also
covered under this service
 addresses both message
stream modification and denial
of service
 can apply to a stream of
messages, a single message,
 need to make a distinction
or selected fields within a
between the service with and
message
without recovery
 concerned with detection
 a connectionless integrity rather than prevention
service generally provides  the incorporation of automated
protection against message recovery mechanisms is the
modification only more attractive alternative
 a variety of attacks can result in
the loss of or reduction in
availability
 some of these attacks are
Availability amenable to authentication
Service and encryption
 some attacks require a
physical action to prevent or
recover from loss of
availability

 X.800 treats availability as a


 a service that protects a property to be associated with
system to ensure its various security services
availability
 defined as the property of a  addresses the security
system or a system concerns raised by denial-of-
resource being accessible
and usable upon demand service attacks
by an authorized system
entity, according to  depends on proper
performance specifications
of the system
management and control of
system resources
Table 1.6
X.800
Security
Mechanisms
Figure
1.4

Security
Trends

Types of attacks experienced by respondents


Figure 1.5

Security
Technologies
Used
Computer Security Strategy

specification/policy implementation/mechanisms correctness/assurance

what is the
how does it do does it really
security scheme
it? work?
supposed to do?
Security Policy
 formal statement of rules and practices that specify or
regulate how a system or organization provides security
services to protect sensitive and critical system resources

 factors to consider:  trade-offs to consider:


 value of the assets being  ease of use versus security
protected
 cost of security versus cost of
 vulnerabilities of the system failure and recovery
 potential threats and the
likelihood of attacks
Security Implementation

prevention response
detection response
• secure encryption • upon detection,
•algorithms
intrusion detection •being
uponable
detection,
to halt
systems being able to halt
an attack and
• prevent an attack
prevent and
further
•unauthorized
detection of denial prevent further
of service damage
access to attacks damage
encryption keys
involves four
complementary
courses of action:
detection
recovery
• intrusion detection prevention
•systems
use of backup involves four
systems of denial • secure encryption
complementary
• detection
algorithms
of service attacks courses of
• prevent
action:
unauthorized
access to
encryption keys
Assurance and Evaluation

 assurance
 the degree of confidence one has that the security measures
work as intended to protect the system and the information
it processes
 encompasses both system design and system
implementation

 evaluation
 process of examining a computer product or system with
respect to certain criteria
 involves testing and formal analytic or mathematical
techniques
Summary
 security concepts  security architecture
 CIA triad  security services – enhances the
security of systems and information
 confidentiality – preserving the
transfers, table 1.5
disclosure of information
 security mechanisms – mechanisms
 integrity – guarding against
designed to detect, prevent, or
modification or destruction of recover from a security attack, table
information 1.6
 availability – ensuring timely and  security attack – any action that
reliable access to information compromises the security of
 terminology – table 1.1 information owned by an
 threats – exploits vulnerabilities
organization
 attack – a threat carried out  security trends
 countermeasure – means to deal  figure 1.4
with a security attack  security strategy
 assets – hardware, software,  policy, implementation,
data, communication lines, assurance and evaluation
networks  functional requirements
 table 1.4

You might also like