01 - Introduction To Computer Security Security
01 - Introduction To Computer Security Security
to
Computer
Security
Class General Rules
• Food and Drink during lecture
• Attendance
• Mobile Phone
• Are you late?
• Means of Communications:
• Whatsapp
• Microsoft Teams
• Class Disturbance
2
Asking questions during class
• All questions are considered
3
Text Book
• “Computer Security: Principles and Practice,” Stallings and
Brown, 3rd or 4th Edition
4
Grade Percentage
5
Topics
• M01: Introduction to Information Security
• M02: Introduction to Cryptography
• M03: User Authentication, Access Control, and Operating Systems
• M04: Malicious Software and Denial of Service Attacks
• M05: Intrusion Detection System
• M06: Firewalls
• M07: Internet Protocols and Standards
6
Topics
• M01: Introduction to Information Security
• M02: Introduction to Cryptography
• M03: User Authentication, Access Control, and Operating Systems
• M04: Malicious Software and Denial of Service Attacks
• M05: Intrusion Detection System
• M06: Firewalls
• M07: Wireless, IoT, and Cloud Security
• M08: Internet Protocols and Standards
• M09: Security Auditing, Legal and Ethical Aspects
7
Introduction to Information Security
• Integrity
o Data integrity: assure information and programs are changed only in an authorized
manner
o System integrity: assure system performs intended function
• Availability
o Assure that systems work promptly and service is not denied to authorized users
CIA Triad
Key Security Concepts
• Preserving
• Guarding against • Ensuring timely
authorized
improper and reliable access
restrictions on
information to and use of
information access
modification or information
and disclosure,
destruction,
including means
including ensuring
for protecting
information
personal privacy
nonrepudiation
and proprietary
and authenticity
information
1. Computer security is not as simple as it might first appear to the novice
2. In developing a particular security mechanism or algorithm, one must always consider potential attacks on those
security features
5. Security mechanisms typically involve more than a particular algorithm or protocol and also require that participants be in
possession of some secret information which raises questions about the creation, distribution, and protection of that secret
information
6. Attackers only need to find a single weakness, while the designer must find and eliminate all weaknesses to
achieve perfect security
7. Security is still too often an afterthought to be incorporated into a system after the design is complete, rather than
being an integral part of the design process
9. There is a natural tendency on the part of users and system managers to perceive little benefit from security
investment until a security failure occurs
10. Many users and even security administrators view strong security as an obstacle to efficient and user-friendly
operation of an information system or use of information
Computer Security Concepts
• Assets
• Security Policies
• Vulnerabilities
• Threats
• Attacks
• Countermeasure
Assets of a Computer System
(things that we want to protect)
Hardware (computer)
Data (files/databases/passwords)
• Example in the university there is a policy for who can access student’s data
(Confidentiality).
• Categories of vulnerabilities
• Corrupted (loss of integrity – ex: asset doesn’t do its function)
• Unavailable or very slow (loss of availability - ex: users can’t access the asset)
Residual
vulnerabilities
may remain
Goal is to
May itself
minimize
introduce new
residual level of
vulnerabilities
risk to the assets
Threat Consequences and Attacks
Passive attacks
Active attacks
Passive and Active Attacks
Passive attacks: are in the nature of eavesdropping on, or monitoring of, transmissions. The goal
of the attacker is to obtain information that is being transmitted.
Two types of passive attacks are:
a) release of message contents
b) traffic analysis.
Active attacks: involve some modification of the data stream or the creation of a false stream.
Fours types of active attacks are:
a) Replay attack
b) Masquerade attack
c) Modification of messages attack
d) Denial of service.
Aspects of Security
• Security Attack: Any action that attempts to compromise the security of information or facilities
• Security Mechanism: A method for preventing, detecting or recovering from an attack (example:
encryption)
• Security Service: is provided by a protocol layer of communicating systems that ensures adequate security of
the systems or of data transfers. It is implemented by security mechanisms
Security Mechanisms
• Specific security mechanisms from ITU-U X.800 (cryptographic
techniques)
1. Encryption/Decryption
2. Digital Signature
3. Access Control
4. Data Integrity
5. Authentication Exchange
6. Traffic Padding (hide traffic pattern)
Security Services
1. Authentication Assure that the communicating entity is the one that it
claims to be. (Peer entity and data origin authentication)
4. Data Integrity Assure data received are exactly as sent by authorized entity