Chapter 1
Chapter 1
• For example if sender send message “Hi” receiver should also receive only
“Hi”. (Any addition, subtraction or modification of data should not occur)
Assures that systems work normally and service is not denied to authorized
users. Ensuring timely and reliable access to intended users.
Modification or alteration:
• Unauthorized change of information.
• E.g. Man-in-the-middle attack in which intruder reads messages from
sender and sends modified data to the receiver without knowing the
changes.
Spoofing:
• One entity pretends to be a different entity.
• If a user tries to read a file, but an attacker has arranged for the user to be
given a different file.
Repudiation of origin.
• A false denial that an entity sent or created something.
• A customer sends a letter to a vendor agreeing to pay a large amount of
money for a product. The vendor ships the product and then demands
payment. The customer denies having ordered the product.
Denial of receipt.
• A false denial that an entity received some information or message.
.
Delay
• Usually delivery of a message or service requires some time. If an attacker
can force the delivery to take more time.
• This involves manipulation of system control structures, such as network
components or server components which is a form of attack.
Denial of service
• The attacker prevents a server from providing a service.
• The denial may occur at the source (by preventing the server from
obtaining the resources), at the destination (by blocking the
communications from the server) or along the intermediate path (by
discarding messages from either the client or the server, or both).
Issues with security (Operational issues, Human issues)
• Any security policy and mechanism must balance the benefits and risk
minimization by the mechanism against the cost of designing,
implementing and using the mechanism.
Cost-Benefit Analysis:
• Balance between benefits of the protection and the cost of designing,
implementing and using the mechanism.
• If the data or resources cost less than their protection, adding security
mechanisms or procedures is not cost effective.
– For example : number of student in JMC college.
Risk analysis:
• Priority should be given to the tasks that have higher importance.
• Potential threats and possible effects of attack should be analyzed.
• Risk of any system changes with time.
Human Issue
• Implementing any computer security is complex. Regardless of the
strength of the technical controls, if nontechnical considerations affect
their implementation and use, the effect on security can be severe.
For example: If an authorized user tells another person his secret code, the
unauthorized user can masquerade as the authorized user with significantly
less likelihood of detection.
Lack of technical and soft skills (ethics and manner) in employee will leads to
measure security breach in future.
Security Policies:
A security policy is a written document in an organization outlining how to protect
the organization from threats, including computer security threats, and how to
handle situations when they do occur.
Integrity Policy:
• An integrity policy is a security policy dealing only with integrity.
• Commercial policy may deal with confidentiality also but integrity policy
does not
Access Control
• Access control is a security technique that can be used to regulate the use
of a particular resources by a particular entity.
• Access control is a way of limiting access to a system or to physical or
virtual resources.
• A typical example of DAC is Unix file mode, where when owner create a
file, owner decide what access privileges you want to give to other users.
Mandatory Access Control (MAC) or Rule Based Access Control
• Operating system provides users with access based on data confidentiality
and user clearance levels. In this model, access is granted on a need to
know basis: users have to prove a need for information before gaining
access.
No write-down (* property)
• A user is not allowed write (alter) access to object with lower security
level than the current security level of subject.
Tranquility Principle:
• This principle states that the classification of a subject or object does not
change while it is being referenced.
Limitations:
• Addresses confidentiality but limits integrity.
• Tranquility principle limits the applicability of the model where
security levels do not change dynamically.
• The overall process may take more time due to the transitions
between the states.
Biba Inetgrity Model
6. Explain the impact of various security threats on the component of security with
examples. Differentiate between Bell-LaPadula Model and Biba Integrity model.