Wk1 1 Intro

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Chapter 0 – Reader’s Guide

Cryptography and
Network Security The art of war teaches us to rely not on the
Overview & Chapter 1 likelihood of the enemy's not coming, but
on our own readiness to receive him; not
on the chance of his not attacking, but
Fifth Edition rather on the fact that we have made our
by William Stallings position unassailable.
Lecture slides by Lawrie Brown —The Art of War, Sun Tzu
(with edits by RHB)

Roadmap Standards Organizations


• Cryptographic algorithms • International Organization for
– context Standardization (ISO)
– symmetric encryption • National Institute of Standards &
– asymmetric encryption Technology (NIST)
– hash functions, MACs
• Internet Society (ISOC)
– digital signatures
• International Telecommunication Union
– quantum cryptography
Telecommunication Standardization
• mutual trust between remote entities Sector (ITU-T)
• computer and network security
Chapter 1 – Introduction Outline
We will look at:
• The combination of space, time, and • security concepts:
strength that must be considered as the – confidentiality, integrity, availability
basic elements of this theory of defense • threat landscape
makes this a fairly complicated matter.
• X.800 security architecture
Consequently, it is not easy to find a fixed
point of departure.. • security attacks, services, mechanisms
— On War, Carl Von Clausewitz • models for network (access) security

Computer Security Typical malware characteristics


• the protection afforded to an automated • rootkits, botnets, etc.
information system in order to attain the • viruses, worms, etc.
applicable objectives of preserving the • ransomware
integrity, availability and confidentiality of
• malware design/configuration tools
information system resources (includes
hardware, software, firmware, • 20,000 novel signatures per day
information/data, and telecommunications) • 2 million signatures seen per day
• etc.
Key Security Concepts Levels of Impact
• can define 3 levels of impact from a
security breach
– Low
– Moderate
– High

Examples of Security
Computer Security Challenges
Requirements
1. not simple
• confidentiality – student grades, personal 2. must consider potential attacks
information, sensitive information 3. procedures used counter-intuitive
• integrity – patient information, public 4. involve algorithms and secret info
critical information 5. must decide where to deploy mechanisms
• availability – authentication service, online 6. battle of wits between attacker / admin
access (especially in critical situations) 7. requires regular monitoring
8. not perceived of benefit until fails
9. too often an after-thought
10. regarded as impediment to using system
OSI Security Architecture Aspects of Security
• ITU-T X.800 “Security Architecture for OSI” • consider 3 aspects of information security:
• defines a systematic way of defining and – security attack
providing security requirements – security mechanism
– security service
• for us it provides a useful, if abstract,
overview of concepts we will study • note terms
– threat – a potential for violation of security
– attack – an assault on system security, a
deliberate attempt to evade security services

Passive Attacks
Active Attacks

Security Services
• X.800:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data
transfers”

• RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
Security Services (X.800) Security Service
• Authentication - assurance that communicating
entity is the one claimed – enhance security of data processing systems
– have both peer-
peer-entity & data origin authentication and information transfers of an organization
• Access Control - prevention of the – intended to counter security attacks
unauthorized use of a resource – use one or more security mechanisms
• Data Confidentiality - protection of data from
– often replicates functions normally associated
unauthorized disclosure
with physical documents
• Data Integrity - assurance that data received is
• which, for example, have signatures, dates; need
as sent by an authorized entity
protection from disclosure, tampering, or
• Non-Repudiation - protection against denial by destruction; are notarized or witnessed; are
one of the parties in a communication recorded or licensed
• Availability - resource accessible/usable

Security Mechanism Security Mechanisms (X.800)


• feature designed to detect, prevent, or • specific security mechanisms:
recover from a security attack – encipherment, digital signatures, access
• no single mechanism will support all controls, data integrity, authentication
services required … need several exchange, traffic padding, routing control,
notarization
• however one particular element underlies
many of the security mechanisms in use: • pervasive security mechanisms:
– cryptographic techniques – trusted functionality, security labels, event
• hence our focus on this topic detection, security audit trails, security
recovery
Model for Network Security Model for Network Security
Using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service

Model for Network Access Security Model for Network Access Security
Using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated
information or resources

You might also like