Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

introduction to security system, Essays (university) of Computer Security

survey for the security topic which describe goals, tools

Typology: Essays (university)

2018/2019

Uploaded on 04/02/2019

r123456r
r123456r 🇪🇬

3

(1)

2 documents

1 / 37

Related documents


Partial preview of the text

Download introduction to security system and more Essays (university) Computer Security in PDF only on Docsity! Chapter 1 - Introduction What is a “Secure” Computer System?  To decide whether a computer system is “secure”, you must first decide what “secure” means to you, then identify the threats you care about. You Will Never Own a Perfectly Secure System!  Threats - examples  Viruses, trojan horses, etc.  Denial of Service  Stolen Customer Data  Modified Databases  Identity Theft and other threats to personal privacy  Equipment Theft  Espionage in cyberspace  Hack-tivism  Cyberterrorism  … Computer Security Goals 5 Confidentiality AvailabilityIntegrity • To prevent the weakness from being exploited while preserving three very important aspects s S= secure Confidentiality, Integrity, Availability (CIA)  CIA  Confidentiality: Who is authorized to use data?  Integrity: Is data „good?”  Availability: Can access data whenever need it? C I A S S = Secure  CIA or CIAAAN…  (other security components added to CIA)  Authentication  Authorization  Non-repudiation  … Need to Balance CIA  Example 1: C vs. I+A  Disconnect computer from Internet to increase confidentiality  Availability suffers, integrity suffers due to lost updates  Example 2: I vs. C+A  Have extensive data checks by different people/systems to increase integrity  Confidentiality suffers as more people see data, availability suffers due to locks on data under verification)  Encryption: the transformation of information using a secret, called an encryption key, so that the transformed information can only be read using another secret, called the decryption key (which may, in some cases, be the same as the encryption key). Tools for Confidentiality  Authentication: the determination of the identity or role that someone has. This determination can be done in a number of different ways, but it is usually based on a combination of  –something the person has (like a smart card or a radio key fob storing secret keys),  –something the person knows (like a password),  –something the person is (like a human with a fingerprint). Tools for Confidentiality  Access control: rules and policies that limit access to confidential information to those people and/or systems with a “need to know.”  –This need to know may be determined by identity, such as a person’s name or a computer’s serial number, or by a role that a person has, such as being a manager or a computer security specialist. Tools for Confidentiality  Availability: the property that information is accessible and modifiable in a timely fashion by those authorized to do so.  •Tools:  –Physical protections: infrastructure meant to keep information available even in the event of physical challenges.  –Computational redundancies: computers and storage devices that serve as fallbacks in the case of failures. Availability Definitions  Intruder : is the one who exploit any available mean of hacking to hack a system.  Vulnerability: is a weakness in the security system (i.e, design, implementation..etc. any point can be exploited to cause loss or harm to the system)  Threat: is a set of circumstances that has the potential to cause harm or loss Vulnerabilities, Threats, and Controls  Vulnerability = a weakness in a security system  Threat = circumstances that have a potential to cause harm  Controls = means and ways to block a threat, which tries to exploit one or more vulnerabilities  Threats are blocked by control of Vulnerability  Attack (materialization of a vulnerability/threat combination)  = exploitation of one or more vulnerabilities by a threat; tries to defeat controls  Attack may be:  Successful (a.k.a. an exploit)  resulting in a breach of security, a system penetration, etc.  Unsuccessful  when controls block a threat trying to exploit a vulnerability  Eavesdropping: the interception of information intended for someone else during its transmission over a communication channel. Threats and Attacks Alteration: unauthorized modification of information. – Example: the man-in-the-middle attack, where a network stream is intercepted, modified, and retransmitted. Threats and Attacks  Denial-of-service: the interruption or degradation of a data service or information access.  –Example: email spam, to the degree that it is meant to simply fill up a mail queue and slow down an email server. Threats and Attacks  Correlation and traceback: the integration of multiple data sources and information flows to determine the source of a particular data stream or piece of information. Threats and Attacks The message M is called the plaintext. • Alice will convert plaintext M to an encrypted form using an encryption algorithm E that outputs a ciphertext C for M. Encryption and Decryption Symmetric Encryption  Or conventional / private-key / single-key  Sender and recipient share a common key  All traditional schemes are symmetric / single key / private-key encryption algorithms, with a single key, used for both encryption and decryption. Since both sender and receiver are equivalent, either can encrypt or decrypt messages using that common key. Requirements  Two requirements for secure use of symmetric encryption:  A strong encryption algorithm  A secret key known only to sender / receiver  Mathematically have: Y = EK(X) X = DK(Y)  Plaintext X, ciphertext Y, key K, encryption algorithm EK, decryption algorithm DK. Cryptography  characterize cryptographic system by:  Type of encryption operations used  Substitution  Transposition  Number of keys used  Single-key or private  Two-key or public  Way in which plaintext is processed  Block  Stream Cryptanalysis  Typically objective is to recover the key in use rather then simply to recover the plaintext of a single ciphertext.  There are two general approaches:  Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext-ciphertext pairs.  Brute-force attacks  try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average,half of all possible keys must be tried to achieve success.  Replace each letter with the one “three over”  in the alphabet Caesar Cipher  Bob has two keys: a private key, SB, which Bob  keeps secret, and a public key, PB, which Bob  broadcasts widely.  – In order for Alice to send an encrypted message to  Bob, she need only obtain his public key, PB, use  that to encrypt her message, M, and send the  result, C = EPB (M), to Bob. Bob then uses his  secret key to decrypt the message as M = DSB (C). Public-Key Cryptography  Separate keys are used for encryption and decryption. Public-Key Cryptography
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved