SlideShare a Scribd company logo
2/24/2013
1
TOPIC 1
Basic Security Concepts
INTRODUCTION
What is security?
Security is about the protection of assets.
- Computer-related assets.
Computing system :- hardware, software,
storage media, data and people.
Principle of Easiest Penetration
Intruder must be expected to use all
available means of penetration. Use the
‘weakest point’.
INTRODUCTION
There are 3 classification of protection:
– Prevention: take measures that prevent your
assets from being damaged.
– Detection: take measures that allow you to
detect when an asset has been damaged
– Reaction: take measures that allow you to
recover your assets or to recover from damage
to your assets.
Example from physical world:
– Prevention: locks at the door or window bars,
wall around the property
– Detection: you detect when something has been
stolen if it is no longer there, a burglar alarm
goes on when break-in occurs, cctv provide
information that allows you to identify intruders
– Reaction: you can call the police or you may
decide to replace the stolen item
INTRODUCTION
INTRODUCTION
Example from cyber world: consider credit card fraud
cases.
– Prevention: use encryption when placing an order,
rely on the merchant to perform some checks on
the caller before accepting a credit card order or
don’t use credit card number on the Internet.
– Detection: a transaction that you had not authorized
appears on your credit card statements.
– Reaction: you can ask for new credit card number,
the cost of the fraudulent may be recovered by the
card holder or the merchant where the fraudster
had made the purchase or the credit card issuer.
SECURITY
GOALS
INTEGRITY: An assets can be
modified only by authorized or
only in authorized ways.
CONFIDENTIALITY: an assets of
computing systems are available
only by authorized parties (also
known as secrecy).
AVAILABILITY : An assets are
accessible to authorized parties
when needed without any
delay.
2/24/2013
2
SECURITY
THREATS
INTERRUPTION: An asset of the
system is destroyed or become
unavailable or unusable – attack
on AVAILABILTY
INTERCEPTION: An unauthorized
party (program, person,
computer) gains access to an
asset – attack on
CONFIDENTIALITY
MODIFICATION: An unauthorized
party not only gain access to but
tampers with an assets – attack
on INTEGRITY
FABRICATION: An unauthorized
party insert counterfeit objects
into the system – an attack on
AUTHENTICITY
Information
source
Information
destination
INTERRUPTION
Information
source
Information
destination
MODIFICATION
Information
source
Information
destination
INTERCEPTION
Information
source
Information
destination
FABRICATION
Middle
man
Middle
man
Middle
man
SECURITY THREATS
Examples of security threats/attacks:
Interruption
~ destruction of piece of hardware (hard disk)
~ cutting of communication line or
~ disabling of the file management system
Interception
~ wiretapping
~ illicit copy of files or programs
Modification
~ changing values in data file,
~ altering a program so that
it performs differently,
~ modifying the content of messages being transmitted in a network.
Fabrication
~ addition of records to a file,
~ insertion of spurious messages in a network
Vulnerabilities
Vulnerabilities: a weaknesses in the security
system that might be exploited to cause
loss or harm.
DATASOFTWARE
HARDWARE
Interception
(Theft)
Interruption
(Denial of service)
Interruption
(Deletion)
Interception
(piracy)
Modification
Interruption
(Loss)
Interception
Modification
Fabrication
Vulnerabilities in Computing Systems
Vulnerabilities
Threats to Hardware
• involuntary machine-slaughter: accidental acts not intended to
do serious damage.
• voluntary machine-slaughter: intended to do harm
Threats to Software
• deletion
• modification – trojan horse, virus, trapdoor, logic bomb
• theft - piracy
2/24/2013
3
Vulnerabilities
Threats to Data
• loss of data
•interception
• modification
• fabrication
Threats to other exposed assets
• storage media – consider backups
• networks – very expose medium, access from distant
• access – steal computer time, denial of service
• key people – disgruntled employees
Methods of Defense
Encryption provides
~ confidentiality for data
~ integrity
~ basis for protocol
SOFTWARE/HARDWARE
CONTROLSENCRYPTION
POLICIES
Software controls:
~ Internal program controls
~ Operating system controls
~ Development controls
Hardware controls:
~ hardware devices :
- smartcard (encryption)
- circuit board ctrl disk
drives in PCs~ frequent changes
of password
~ training
Legal and ethical controls
~ codes of ethics ~ locks of doors
~ backup copies of important s/w and data
~ physical site planning (reduce natural disasters)
PHYSICAL CONTROLS
METHODS OF
DEFENSE
Who are the people?
Amateurs: not career criminal but normal people
who observe a flaw in a security system – have
access to something valuable.
Crackers: may be university or high school
students who attempt to access computing facilities
for which they have not been authorized.
Career criminal: understands the targets of
computer crime, international groups, electronic
spies, information brokers.
Hackers: someone with deep knowledge and
interest in operating systems or multiple OS. Do not
attempt to intentionally break any system (non-
malicious).
How to makes a system secure?
There are four methods how computer security provide
protection:
(1) System Access Control: ensuring that unauthorized
users don’t get into the system.
(2) Data Access Control: monitoring who can access what
data and for what purposes.
(3) System and Security Administration: performing
certain procedures (system administrator’s responsibilities or
training users appropriately)
(4) System Design: Taking advantage of basic hardware
and software security characteristics.
System Access Control
The first way in which system provides computer
security is by controlling access to that system:
– Who’s allowed to log in?
– How does the system decide whether a user is legitimate?
Identification and authentication provides the
above.
Identification & Authetication
Identification tells the system who you are
Authentication proves to the system that you are
who you are.
There are 3 ways to prove ourselves:
– Something you know
– Something you have
– Something you are
System Access Control
2/24/2013
4
e.g.: password
~ you know the
password,
you the owner
AUTHENTICATION
IDENTIFICATION
&
AUTHENTICATION
SOMETHING YOU
HAVE
SOMETHING YOU
KNOW
SOMETHING YOU
ARE
e.g.: tokens,keys &
smart cards
~ you have the key,
you must be the owner
of it
e.g: fingerprints,retina pattern,handprint etc.
Username and Password
Typical first line of defense
User name (Login ID) – identification
Password – authentication
Login will succeed if you entered a valid user name
and corresponding password.
System Access Control
User plays an important role in
password protection – authentication
is compromised when you gave away
your own password by telling others.
Common threats on password:
– Password guessing: exhaustive search
and intelligent search
– Password spoofing
– Compromise of the password file
System Access Control
How we can defend password security:
– Compulsory to set a password
– Change default password
– Password length
– Password format
– Avoid obvious passwords
How system help to improve password security:
– Password checkers
– Password generation
– Password ageing
– Limit login attempts
– Inform users
System Access Control
Data Access Control
On the most elementary level, a subject
may observe an object or alter an object,
therefore the common access modes are
defined as below:
– Observe: look at the contents of an object
– Change: change the contents of an object
Data Access Control
Observe
Change
execute append read write
√
√ √
√
Access rights in the Bell-LaPadula model
{execute, read, write}
Alice
Bill
bill.doc edit.exe fun.com
{read, write}
{execute}
{execute}
{execute, read}-
An access control matrix
2/24/2013
5
Effectiveness of Controls
Awareness of Problems: people will cooperate
with security requirements only if they understand
why security is appropriate in each specific
situation.
Likelihood of use: controls must be used to be
effective – therefore it must be easy to use and
appropriate.
Overlapping controls: combinations of control on
one exposure.
Periodic review: ongoing task in judging the
effectiveness of a control.
The End

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
woyaoni
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
Computer security
Computer securityComputer security
Computer security
OZ Assignment help
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
 
Unit v
Unit vUnit v
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
Ali Habeeb
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
CreatorsCircle
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
Wiliam Ferraciolli
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
T. J. Saotome
 
Security
Security Security
Security
chian417
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
Imran Khan
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
cavapyta
 
System security
System securitySystem security
System security
sommerville-videos
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
Arti Ambokar
 

What's hot (19)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
06. security concept
06. security concept06. security concept
06. security concept
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Unit v
Unit vUnit v
Unit v
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
System Security
System SecuritySystem Security
System Security
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Security
Security Security
Security
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
System security
System securitySystem security
System security
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 

Viewers also liked

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
8 zastosowań landing page w e-commerce
8 zastosowań landing page w e-commerce8 zastosowań landing page w e-commerce
8 zastosowań landing page w e-commerce
Landingi
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
E commerce website features
E commerce website featuresE commerce website features
E commerce website features
Muhammad Jamshed
 
Security testing
Security testingSecurity testing
Security testing
Khizra Sammad
 
Technology In Education
Technology  In  EducationTechnology  In  Education
Technology In Education
Shailaja Shah
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
8 E-Commerce
8 E-Commerce8 E-Commerce
8 E-Commerce
Raymond Gao
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Ict ppt
Ict pptIct ppt

Viewers also liked (12)

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
8 zastosowań landing page w e-commerce
8 zastosowań landing page w e-commerce8 zastosowań landing page w e-commerce
8 zastosowań landing page w e-commerce
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
E commerce website features
E commerce website featuresE commerce website features
E commerce website features
 
Security testing
Security testingSecurity testing
Security testing
 
Technology In Education
Technology  In  EducationTechnology  In  Education
Technology In Education
 
Security testing
Security testingSecurity testing
Security testing
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
8 E-Commerce
8 E-Commerce8 E-Commerce
8 E-Commerce
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Ict ppt
Ict pptIct ppt
Ict ppt
 

Similar to Basic security concepts_chapter_1_6perpage

Network Security
Network Security Network Security
Network Security
Vipul Mosaic
 
Intro
IntroIntro
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
Rishabha Garg
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
satonaka3
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
LAVANYAsrietacin
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
123aleena
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
FAKHARZAMANPROUD
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
deepakbharathi16
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
ZeeshanMajeed15
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
Shyma Jugesh
 
Security and management
Security and managementSecurity and management
Security and management
ArtiSolanki5
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
shahadd2021
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
Haseeb Ahmed Awan
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 

Similar to Basic security concepts_chapter_1_6perpage (20)

Network Security
Network Security Network Security
Network Security
 
Intro
IntroIntro
Intro
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
Security and management
Security and managementSecurity and management
Security and management
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 

More from nakomuri

Business entrepreneur presentation
Business entrepreneur presentationBusiness entrepreneur presentation
Business entrepreneur presentation
nakomuri
 
C programming language notes (9)
C programming language notes (9)C programming language notes (9)
C programming language notes (9)
nakomuri
 
C programming language notes (7)
C programming language notes (7)C programming language notes (7)
C programming language notes (7)nakomuri
 
C programming language notes (6)
C programming language notes (6)C programming language notes (6)
C programming language notes (6)
nakomuri
 
C programming language notes (5)
C programming language notes (5)C programming language notes (5)
C programming language notes (5)
nakomuri
 
C programming language notes (4)
C programming language notes (4)C programming language notes (4)
C programming language notes (4)nakomuri
 
C programming language notes (2)
C programming language notes (2)C programming language notes (2)
C programming language notes (2)nakomuri
 
C programming language notes (1)
C programming language notes (1)C programming language notes (1)
C programming language notes (1)
nakomuri
 
C programming language notes (8)
C programming language notes (8)C programming language notes (8)
C programming language notes (8)nakomuri
 
Atm flowchart
Atm flowchartAtm flowchart
Atm flowchart
nakomuri
 
Nikah khitbah
Nikah khitbahNikah khitbah
Nikah khitbahnakomuri
 
Twitter
TwitterTwitter
Twitter
nakomuri
 
Senarai organisasi
Senarai organisasiSenarai organisasi
Senarai organisasi
nakomuri
 
Silibus stij3053 - Network Design
Silibus stij3053 - Network DesignSilibus stij3053 - Network Design
Silibus stij3053 - Network Design
nakomuri
 
Chapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network DesignChapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network Design
nakomuri
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
nakomuri
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
nakomuri
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
nakomuri
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
nakomuri
 
Sukatan pelajaran kursus_bwff1013 - Basic Finance
Sukatan pelajaran kursus_bwff1013 - Basic FinanceSukatan pelajaran kursus_bwff1013 - Basic Finance
Sukatan pelajaran kursus_bwff1013 - Basic Finance
nakomuri
 

More from nakomuri (20)

Business entrepreneur presentation
Business entrepreneur presentationBusiness entrepreneur presentation
Business entrepreneur presentation
 
C programming language notes (9)
C programming language notes (9)C programming language notes (9)
C programming language notes (9)
 
C programming language notes (7)
C programming language notes (7)C programming language notes (7)
C programming language notes (7)
 
C programming language notes (6)
C programming language notes (6)C programming language notes (6)
C programming language notes (6)
 
C programming language notes (5)
C programming language notes (5)C programming language notes (5)
C programming language notes (5)
 
C programming language notes (4)
C programming language notes (4)C programming language notes (4)
C programming language notes (4)
 
C programming language notes (2)
C programming language notes (2)C programming language notes (2)
C programming language notes (2)
 
C programming language notes (1)
C programming language notes (1)C programming language notes (1)
C programming language notes (1)
 
C programming language notes (8)
C programming language notes (8)C programming language notes (8)
C programming language notes (8)
 
Atm flowchart
Atm flowchartAtm flowchart
Atm flowchart
 
Nikah khitbah
Nikah khitbahNikah khitbah
Nikah khitbah
 
Twitter
TwitterTwitter
Twitter
 
Senarai organisasi
Senarai organisasiSenarai organisasi
Senarai organisasi
 
Silibus stij3053 - Network Design
Silibus stij3053 - Network DesignSilibus stij3053 - Network Design
Silibus stij3053 - Network Design
 
Chapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network DesignChapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network Design
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 
Sukatan pelajaran kursus_bwff1013 - Basic Finance
Sukatan pelajaran kursus_bwff1013 - Basic FinanceSukatan pelajaran kursus_bwff1013 - Basic Finance
Sukatan pelajaran kursus_bwff1013 - Basic Finance
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

Basic security concepts_chapter_1_6perpage

  • 1. 2/24/2013 1 TOPIC 1 Basic Security Concepts INTRODUCTION What is security? Security is about the protection of assets. - Computer-related assets. Computing system :- hardware, software, storage media, data and people. Principle of Easiest Penetration Intruder must be expected to use all available means of penetration. Use the ‘weakest point’. INTRODUCTION There are 3 classification of protection: – Prevention: take measures that prevent your assets from being damaged. – Detection: take measures that allow you to detect when an asset has been damaged – Reaction: take measures that allow you to recover your assets or to recover from damage to your assets. Example from physical world: – Prevention: locks at the door or window bars, wall around the property – Detection: you detect when something has been stolen if it is no longer there, a burglar alarm goes on when break-in occurs, cctv provide information that allows you to identify intruders – Reaction: you can call the police or you may decide to replace the stolen item INTRODUCTION INTRODUCTION Example from cyber world: consider credit card fraud cases. – Prevention: use encryption when placing an order, rely on the merchant to perform some checks on the caller before accepting a credit card order or don’t use credit card number on the Internet. – Detection: a transaction that you had not authorized appears on your credit card statements. – Reaction: you can ask for new credit card number, the cost of the fraudulent may be recovered by the card holder or the merchant where the fraudster had made the purchase or the credit card issuer. SECURITY GOALS INTEGRITY: An assets can be modified only by authorized or only in authorized ways. CONFIDENTIALITY: an assets of computing systems are available only by authorized parties (also known as secrecy). AVAILABILITY : An assets are accessible to authorized parties when needed without any delay.
  • 2. 2/24/2013 2 SECURITY THREATS INTERRUPTION: An asset of the system is destroyed or become unavailable or unusable – attack on AVAILABILTY INTERCEPTION: An unauthorized party (program, person, computer) gains access to an asset – attack on CONFIDENTIALITY MODIFICATION: An unauthorized party not only gain access to but tampers with an assets – attack on INTEGRITY FABRICATION: An unauthorized party insert counterfeit objects into the system – an attack on AUTHENTICITY Information source Information destination INTERRUPTION Information source Information destination MODIFICATION Information source Information destination INTERCEPTION Information source Information destination FABRICATION Middle man Middle man Middle man SECURITY THREATS Examples of security threats/attacks: Interruption ~ destruction of piece of hardware (hard disk) ~ cutting of communication line or ~ disabling of the file management system Interception ~ wiretapping ~ illicit copy of files or programs Modification ~ changing values in data file, ~ altering a program so that it performs differently, ~ modifying the content of messages being transmitted in a network. Fabrication ~ addition of records to a file, ~ insertion of spurious messages in a network Vulnerabilities Vulnerabilities: a weaknesses in the security system that might be exploited to cause loss or harm. DATASOFTWARE HARDWARE Interception (Theft) Interruption (Denial of service) Interruption (Deletion) Interception (piracy) Modification Interruption (Loss) Interception Modification Fabrication Vulnerabilities in Computing Systems Vulnerabilities Threats to Hardware • involuntary machine-slaughter: accidental acts not intended to do serious damage. • voluntary machine-slaughter: intended to do harm Threats to Software • deletion • modification – trojan horse, virus, trapdoor, logic bomb • theft - piracy
  • 3. 2/24/2013 3 Vulnerabilities Threats to Data • loss of data •interception • modification • fabrication Threats to other exposed assets • storage media – consider backups • networks – very expose medium, access from distant • access – steal computer time, denial of service • key people – disgruntled employees Methods of Defense Encryption provides ~ confidentiality for data ~ integrity ~ basis for protocol SOFTWARE/HARDWARE CONTROLSENCRYPTION POLICIES Software controls: ~ Internal program controls ~ Operating system controls ~ Development controls Hardware controls: ~ hardware devices : - smartcard (encryption) - circuit board ctrl disk drives in PCs~ frequent changes of password ~ training Legal and ethical controls ~ codes of ethics ~ locks of doors ~ backup copies of important s/w and data ~ physical site planning (reduce natural disasters) PHYSICAL CONTROLS METHODS OF DEFENSE Who are the people? Amateurs: not career criminal but normal people who observe a flaw in a security system – have access to something valuable. Crackers: may be university or high school students who attempt to access computing facilities for which they have not been authorized. Career criminal: understands the targets of computer crime, international groups, electronic spies, information brokers. Hackers: someone with deep knowledge and interest in operating systems or multiple OS. Do not attempt to intentionally break any system (non- malicious). How to makes a system secure? There are four methods how computer security provide protection: (1) System Access Control: ensuring that unauthorized users don’t get into the system. (2) Data Access Control: monitoring who can access what data and for what purposes. (3) System and Security Administration: performing certain procedures (system administrator’s responsibilities or training users appropriately) (4) System Design: Taking advantage of basic hardware and software security characteristics. System Access Control The first way in which system provides computer security is by controlling access to that system: – Who’s allowed to log in? – How does the system decide whether a user is legitimate? Identification and authentication provides the above. Identification & Authetication Identification tells the system who you are Authentication proves to the system that you are who you are. There are 3 ways to prove ourselves: – Something you know – Something you have – Something you are System Access Control
  • 4. 2/24/2013 4 e.g.: password ~ you know the password, you the owner AUTHENTICATION IDENTIFICATION & AUTHENTICATION SOMETHING YOU HAVE SOMETHING YOU KNOW SOMETHING YOU ARE e.g.: tokens,keys & smart cards ~ you have the key, you must be the owner of it e.g: fingerprints,retina pattern,handprint etc. Username and Password Typical first line of defense User name (Login ID) – identification Password – authentication Login will succeed if you entered a valid user name and corresponding password. System Access Control User plays an important role in password protection – authentication is compromised when you gave away your own password by telling others. Common threats on password: – Password guessing: exhaustive search and intelligent search – Password spoofing – Compromise of the password file System Access Control How we can defend password security: – Compulsory to set a password – Change default password – Password length – Password format – Avoid obvious passwords How system help to improve password security: – Password checkers – Password generation – Password ageing – Limit login attempts – Inform users System Access Control Data Access Control On the most elementary level, a subject may observe an object or alter an object, therefore the common access modes are defined as below: – Observe: look at the contents of an object – Change: change the contents of an object Data Access Control Observe Change execute append read write √ √ √ √ Access rights in the Bell-LaPadula model {execute, read, write} Alice Bill bill.doc edit.exe fun.com {read, write} {execute} {execute} {execute, read}- An access control matrix
  • 5. 2/24/2013 5 Effectiveness of Controls Awareness of Problems: people will cooperate with security requirements only if they understand why security is appropriate in each specific situation. Likelihood of use: controls must be used to be effective – therefore it must be easy to use and appropriate. Overlapping controls: combinations of control on one exposure. Periodic review: ongoing task in judging the effectiveness of a control. The End