chapter 1

22
Chapter 1 Is There a Security Problem in Computing? Network Security / G. Steffen 1

Upload: tori

Post on 22-Feb-2016

36 views

Category:

Documents


0 download

DESCRIPTION

Chapter 1. Is There a Security Problem in Computing? . In This Chapter. The risks involved in computing The goal of secure computing: confidentiality, integrity, availability The threats to security in computing: interception, interruption, modifications, fabrication - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter 1

1

Chapter 1Is There a Security Problem in

Computing?

Network Security / G. Steffen

Page 2: Chapter 1

2

In This ChapterThe risks involved in computingThe goal of secure computing: confidentiality,

integrity, availability The threats to security in computing:

interception, interruption, modifications, fabrication

Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, laws and ethics

Network Security / G. Steffen

Page 3: Chapter 1

Network Security / G. Steffen 3

What Does “Secure” Mean?Are you Secure?

What makes you feel secure?Example: Banks

Yesterday – learning from the pastToday

Protecting ValuablesProtecting Money Vs. Protecting Information

Size and Portability (large vs. small) Ability to Avoid Physical Contact (lots vs. little) Value of Asset (very high vs. variable)

Page 4: Chapter 1

Network Security / G. Steffen 4

Developing an UnderstandingExamine the risk of security in computing

Consider available countermeasures or controls

Stimulate thought about uncovered vulnerabilities

Identify areas where more work is needed

Page 5: Chapter 1

Network Security / G. Steffen 5

Characteristics of Computer IntrusionAny computer system can be a target:

Hardware, Software, Storage, Data, People/UserAny system is most vulnerable at its weakest point.Principle of Easiest Penetration - An intruder

must be expected to use any available means of penetration. Penetration may not necessarily be by the most obvious means, nor via the one we have the most defense against.Consider all the means of penetrationChecked repeated times Don’t underestimate the attacker/think like an attackerStrengthening one thin might weaken another

Page 6: Chapter 1

Network Security / G. Steffen 6

AttacksThe components to attack:

HardwareSoftwareData

Vulnerability – a weakness in the security system that could be exploited to cause harm or loss.

Threat – a set of circumstances that has the potential to cause loss or harm.

Wall holding back waterThreat to get wetVulnerability is a crack in the wall

Page 7: Chapter 1

Network Security / G. Steffen 7

Page 8: Chapter 1

Network Security / G. Steffen 8

Attack – human who exploits a vulnerabilityControl – a protective measure against an

attackA threat is blocked by control of

vulnerabilityType of System Security Threats in

computingInterceptionInterruptionModificationFabrication

Page 9: Chapter 1

Network Security / G. Steffen 9

Page 10: Chapter 1

Network Security / G. Steffen 10

Method, Opportunity & MotiveWhy? Who? What? When? Where?

Attacker must have three things:

Method – the skill, knowledge and tool

Opportunity – the time and access

Motive – a reason to want to perform an attack

Page 11: Chapter 1

Network Security / G. Steffen 11

Security GoalsSecure is:

Confidentiality (Secrecy or Privacy)- assets accessed only by authorized parties Not only reading but viewing, printing or knowing

about the assetIntegrity – assets modified only by authorized

parties Includes writing, changing, changing the status,

deleting or creatingAvailability – assets are accessible to

authorized parties at appropriate times. Denial of Service

Page 12: Chapter 1

Network Security / G. Steffen 12

Page 13: Chapter 1

Network Security / G. Steffen 13

VulnerabilitiesHardware

It is very visibleEasy to attackWater, burned, frozen, gassed and

electrocuted, dust, time, rodents, environment Voluntary Machine Slaughter or Machinicide

SoftwareSoftware DeletionSoftware Modification Software Theft

Page 14: Chapter 1

Network Security / G. Steffen 14

Page 15: Chapter 1

Network Security / G. Steffen 15

Malicious Modification of Software Logic Bomb Trojan Horse Virus Trapdoor Information leaks

Data VulnerabilitiesEffects everyoneData is more than just an electronic filePrinciple of Adequate Protection – Computer items

must be protected only until they lose their value.Data ConfidentialityData Integrity

Other Exposed AssetsNetworksAccessKey People

Page 16: Chapter 1

Network Security / G. Steffen 16

Page 17: Chapter 1

Network Security / G. Steffen 17

Computer CriminalsAmateurs

Crackers or Hackers

Career Criminal

Terrorists

Page 18: Chapter 1

Network Security / G. Steffen 18

Methods of DefenseHarm occurs when a threat is realized

against a vulnerabilityRisk – the possibility of harmDealing with Harm

Prevent itDeter it,Deflect it,Detect it,And Recover from it.

Page 19: Chapter 1

Network Security / G. Steffen 19

ControlsControl – attempt to prevent the exploitation of a

vulnerabilityComputer Security has lots of controls

Simple or DifficultyInexpensive or Expensive

Type of ControlEncryption – formal name for the scrambling process

deals with confidentially and integrity Does not solve computer security problems.

Cleartext Ciphertext Protocols

Page 20: Chapter 1

Network Security / G. Steffen 20

Software Controls Programs must be secure to prevent attacksProgram Controls:

Internal Program Controls Operating System and Network System Controls Independent Control Programs (virus checker) Development Controls (quality standards in

construction)Software controls effect the user

Hardware ControlsSmart cards, locks, devices to ID users, firewalls,

intrusion detection systems, circuitry controlPolicies and Procedures

Policies – an agreement of way things are done Must be written and training provided

Physical Controls – locks/security officer/backups

Page 21: Chapter 1

Network Security / G. Steffen 21

Effectiveness of ControlsControls must be properly used!Awareness of ProblemLikelihood of Use

Principles of Effectiveness - Control must be used-and used properly- to be effective. They must be efficient, easy to use, and appropriate.

Overlapping Controls (good)Periodic Review – controls are not permanent

Principle of Weakest Link – Security can be no stronger than its weakest link.

Page 22: Chapter 1

Network Security / G. Steffen 22

ConclusionThe risks involved in computingThe goal of secure computing: confidentiality,

integrity, availability The threats to security in computing:

interception, interruption, modifications, fabrication

Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, laws and ethics