SlideShare a Scribd company logo
1 of 17
Information Security
Information security
 All measures taken to prevent unauthorized use of
electronic data
– unauthorized use includes disclosure, alteration,
substitution, or destruction of the data concerned
 Provision of the following three services
– Confidentiality
 concealment of data from unauthorized parties
– Integrity
 assurance that data is genuine
– Availability
 system still functions efficiently after security
provisions are in place
 No single measure can ensure complete security
Why is information security important?
 Governments, commercial businesses, and individuals
are all storing information electronically
– compact, instantaneous transfer, easy access
 Ability to use information more efficiently has resulted in
a rapid increase in the value of information
 Information stored electronically faces new and
potentially more damaging security threats
– can potentially be stolen from a remote location
– much easier to intercept and alter electronic
communication than its paper-based predecessors
Building blocks of a secure system
 Confidentiality: concealment from unauthorized parties
– identification – unique identifiers for all users
– authentication
 user: assurance that the parties involved in a real-
time transaction are who they say they are
 data: assurance of message source
– authorization - allowing users who have been
identified and authenticated to use certain resources
 Integrity: assurance the data is has not been modified by
unauthorized parties
– non-repudiation
 proof of integrity and origin of data which can be
verified by any third party at any time
Completing the security process
 Confidentiality + integrity  system security
 However, it is not enough for system to be secure
 System must also be available
– must allow guaranteed, efficient and continuous use
of information
– security measures should not prohibitively slow down
or crash system or make it difficult to use
 what good is a secure system if you can’t use it?
 Cryptographic systems
– high level of security and flexibility
– can potentially provide all objectives of information
security: confidentiality, integrity, and availability
Symmetric and public key cryptosystems
Symmetric-key cryptosystem
 same key is used for
encryption and decryption
 system with 1000 users
requires 499,500 keys
– each pair of users requires
a different key
Public-key cryptosystem
 separate keys for encryption
and decryption
 system with 1000 users
requires 2000 keys
– each individual user has
exactly two keys
Public-key encryption: confidentiality
 Alice wants to send
message M to Bob
– uses Bob’s public
key to encrypt M
 Bob uses his private
key to decrypt M
– only Bob has key
– no one else can
decipher M
 Identification provided by public key encryption
 But … anyone can send message to Bob using his
public key
– how are we sure the message came from Alice?
Digital signatures
 Electronic equivalent of
handwritten signatures
 Handwritten signatures
are hard to forge
 Electronic information is
easy to duplicate
 Digital signatures using
public key encryption
– Idea:
 Bob uses his private key to “sign” a message
 Alice verifies signature using Bob’s public key
 Data authentication provided by digital signatures
Signed challenges
 Alice wants assurance of real-time communication
 Bob tries to provide assurance by digital signature
 Alice is assured message originated from Bob
– digital signatures provide data origin authentication
– But … Eve can intercept signature and use it to
authenticate herself as Bob at any later time
 Signed challenge
– Alice sends random number (a challenge) to Bob
– Bob replies with challenge encrypted with signature
 User authentication provided by signed challenges
– combination of digital signature and unpredictability of
Alice's random number challenge
Certification authority
 A third party trusted by all users that creates, distributes,
revokes, & manages certificates
 Certificates bind users to their public keys
 For example, if Alice wants to obtain Bob's public key
– she retrieves Bob's certificate from a public directory
– she verifies the CA's signature on the certificate itself
– if signature verifies correctly, she has assurance from
the trusted CA this really is Bob's public key
– she can use Bob's public key to send confidential
information to Bob or to verify Bob's signatures,
protected by the assurance of the certificate
 Integrity is provided by the certification authority
Attacks
 Compromise systems in ways that affect services of
information security
– attack on confidentiality:
 unauthorized disclosure of information
– attack on integrity:
 destruction or corruption of information
– attack on availability:
 disruption or denial of services
Prevention, detection, response
– proper planning reduces risk of attack and increases
capabilities of detection and response if an attack
does occur
Prevention
 Establishment of policy and access control
– who: identification, authentication, authorization
– what: granted on “need-to-know” basis
 Implementation of hardware, software, and services
– users cannot override, unalterable (attackers cannot
defeat security mechanisms by changing them)
– examples of preventative mechanisms
 passwords - prevent unauthorized system access
 firewalls - prevent unauthorized network access
 encryption - prevents breaches of confidentiality
 physical security devices - prevent theft
 Maintenance
Prevention is not enough!
Bruce Schneier,
Counterpane Internet Security, Inc.
Prevention systems are never perfect.
No bank ever says: "Our safe is so good, we don't need
an alarm system."
No museum ever says: "Our door and window locks are
so good, we don't need night watchmen.“
Detection and response are how we get security in
the real world, and they're the only way we can possibly
get security in the cyberspace world.
Detection
 Determine that either an attack is underway or has
occurred and report it
 Real-time monitoring
– or, as close as possible
– monitor attacks to provide data about their nature,
severity, and results
 Intrusion verification and notification
– intrusion detection systems (IDS)
– typical detection systems monitor various aspects of
the system, looking for actions or information
indicating an attack
 example: denial of access to a system when user
repeatedly enters incorrect password
Response
 Stop/contain an attack
– must be timely!
 incident response plan developed in advance
 Assess and repair any damage
 Resumption of correct operation
 Evidence collection and preservation
– very important
 identifies vulnerabilities
 strengthens future security measures
Exercises
Classify each of the following as an attack on confidentiality, integrity,
and/or availability (more than one may apply). Justify your answers.
1. John copies Mary's homework
2. Paul crashes Linda's system
3. Carol changes the amount of Angelo's check from $100 to $1,000
4. Gina forges Roger's signature on a deed
5. Rhonda registers the domain name "AddisonWesley.com" and
refuses to let the publishing house buy or use that domain name
6. Jonah obtains Peter's credit card number and has the credit card
company cancel the card and replace it with another card bearing a
different account number
7. Henry spoofs Julie's IP address to gain access to her computer
References
Introduction to Information Security
ECC white paper, March 1997
http://www.certicom.com
The Information Security Process: Prevention,
Detection and Response
James LaPiedra
GIAC practical repository, SANS Institute
http://www.giac.org/practical/gsec
InformIT Reference Guides
http://www.informit.com/isapi/articles/index.asp

More Related Content

Similar to Essential Guide to Information Security

Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptPawachMetharattanara
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentationShanonNasoni
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptxFAKHARZAMANPROUD
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurvkarthi314
 
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdfWhat is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdffederaleyecare
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 

Similar to Essential Guide to Information Security (20)

Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Security risk presentation
Security risk presentationSecurity risk presentation
Security risk presentation
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Unit v
Unit vUnit v
Unit v
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
 
computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdfWhat is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdf
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 

Recently uploaded

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 

Recently uploaded (20)

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 

Essential Guide to Information Security

  • 2. Information security  All measures taken to prevent unauthorized use of electronic data – unauthorized use includes disclosure, alteration, substitution, or destruction of the data concerned  Provision of the following three services – Confidentiality  concealment of data from unauthorized parties – Integrity  assurance that data is genuine – Availability  system still functions efficiently after security provisions are in place  No single measure can ensure complete security
  • 3. Why is information security important?  Governments, commercial businesses, and individuals are all storing information electronically – compact, instantaneous transfer, easy access  Ability to use information more efficiently has resulted in a rapid increase in the value of information  Information stored electronically faces new and potentially more damaging security threats – can potentially be stolen from a remote location – much easier to intercept and alter electronic communication than its paper-based predecessors
  • 4. Building blocks of a secure system  Confidentiality: concealment from unauthorized parties – identification – unique identifiers for all users – authentication  user: assurance that the parties involved in a real- time transaction are who they say they are  data: assurance of message source – authorization - allowing users who have been identified and authenticated to use certain resources  Integrity: assurance the data is has not been modified by unauthorized parties – non-repudiation  proof of integrity and origin of data which can be verified by any third party at any time
  • 5. Completing the security process  Confidentiality + integrity  system security  However, it is not enough for system to be secure  System must also be available – must allow guaranteed, efficient and continuous use of information – security measures should not prohibitively slow down or crash system or make it difficult to use  what good is a secure system if you can’t use it?  Cryptographic systems – high level of security and flexibility – can potentially provide all objectives of information security: confidentiality, integrity, and availability
  • 6. Symmetric and public key cryptosystems Symmetric-key cryptosystem  same key is used for encryption and decryption  system with 1000 users requires 499,500 keys – each pair of users requires a different key Public-key cryptosystem  separate keys for encryption and decryption  system with 1000 users requires 2000 keys – each individual user has exactly two keys
  • 7. Public-key encryption: confidentiality  Alice wants to send message M to Bob – uses Bob’s public key to encrypt M  Bob uses his private key to decrypt M – only Bob has key – no one else can decipher M  Identification provided by public key encryption  But … anyone can send message to Bob using his public key – how are we sure the message came from Alice?
  • 8. Digital signatures  Electronic equivalent of handwritten signatures  Handwritten signatures are hard to forge  Electronic information is easy to duplicate  Digital signatures using public key encryption – Idea:  Bob uses his private key to “sign” a message  Alice verifies signature using Bob’s public key  Data authentication provided by digital signatures
  • 9. Signed challenges  Alice wants assurance of real-time communication  Bob tries to provide assurance by digital signature  Alice is assured message originated from Bob – digital signatures provide data origin authentication – But … Eve can intercept signature and use it to authenticate herself as Bob at any later time  Signed challenge – Alice sends random number (a challenge) to Bob – Bob replies with challenge encrypted with signature  User authentication provided by signed challenges – combination of digital signature and unpredictability of Alice's random number challenge
  • 10. Certification authority  A third party trusted by all users that creates, distributes, revokes, & manages certificates  Certificates bind users to their public keys  For example, if Alice wants to obtain Bob's public key – she retrieves Bob's certificate from a public directory – she verifies the CA's signature on the certificate itself – if signature verifies correctly, she has assurance from the trusted CA this really is Bob's public key – she can use Bob's public key to send confidential information to Bob or to verify Bob's signatures, protected by the assurance of the certificate  Integrity is provided by the certification authority
  • 11. Attacks  Compromise systems in ways that affect services of information security – attack on confidentiality:  unauthorized disclosure of information – attack on integrity:  destruction or corruption of information – attack on availability:  disruption or denial of services Prevention, detection, response – proper planning reduces risk of attack and increases capabilities of detection and response if an attack does occur
  • 12. Prevention  Establishment of policy and access control – who: identification, authentication, authorization – what: granted on “need-to-know” basis  Implementation of hardware, software, and services – users cannot override, unalterable (attackers cannot defeat security mechanisms by changing them) – examples of preventative mechanisms  passwords - prevent unauthorized system access  firewalls - prevent unauthorized network access  encryption - prevents breaches of confidentiality  physical security devices - prevent theft  Maintenance
  • 13. Prevention is not enough! Bruce Schneier, Counterpane Internet Security, Inc. Prevention systems are never perfect. No bank ever says: "Our safe is so good, we don't need an alarm system." No museum ever says: "Our door and window locks are so good, we don't need night watchmen.“ Detection and response are how we get security in the real world, and they're the only way we can possibly get security in the cyberspace world.
  • 14. Detection  Determine that either an attack is underway or has occurred and report it  Real-time monitoring – or, as close as possible – monitor attacks to provide data about their nature, severity, and results  Intrusion verification and notification – intrusion detection systems (IDS) – typical detection systems monitor various aspects of the system, looking for actions or information indicating an attack  example: denial of access to a system when user repeatedly enters incorrect password
  • 15. Response  Stop/contain an attack – must be timely!  incident response plan developed in advance  Assess and repair any damage  Resumption of correct operation  Evidence collection and preservation – very important  identifies vulnerabilities  strengthens future security measures
  • 16. Exercises Classify each of the following as an attack on confidentiality, integrity, and/or availability (more than one may apply). Justify your answers. 1. John copies Mary's homework 2. Paul crashes Linda's system 3. Carol changes the amount of Angelo's check from $100 to $1,000 4. Gina forges Roger's signature on a deed 5. Rhonda registers the domain name "AddisonWesley.com" and refuses to let the publishing house buy or use that domain name 6. Jonah obtains Peter's credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number 7. Henry spoofs Julie's IP address to gain access to her computer
  • 17. References Introduction to Information Security ECC white paper, March 1997 http://www.certicom.com The Information Security Process: Prevention, Detection and Response James LaPiedra GIAC practical repository, SANS Institute http://www.giac.org/practical/gsec InformIT Reference Guides http://www.informit.com/isapi/articles/index.asp