SlideShare a Scribd company logo
1
1
11 to 1
Computer Network Administration
Computer and Network Security
Albert Levi
levi@sabanciuniv.edu
FENS 1091, ext.9563
2
2
22 to 2 2
What is this course about?
This course is to discuss
 security needs
 security services
 security mechanisms and protocols
for data stored in computers and
transmitted across computer networks
3
3
33 to 3 3
What we will/won’t cover?
 We will cover
 security threats
 practical security issues (practice in labs)
 security protocols in use
 security protocols not in use
 securing computer systems
 introductory cryptography
 We will not cover
 advanced cryptography
 computer networks
 operating systems
 computers in general
 how to hack 
4
4
44 to 4 4
What security is about in general?
 Security is about protection of assets
 D. Gollmann, Computer Security, Wiley
 Prevention
 take measures that prevent your assets from being
damaged (or stolen)
 Detection
 take measures so that you can detect when, how,
and by whom an asset has been damaged
 Reaction
 take measures so that you can recover your assets
5
5
55 to 5 5
Real world example
 Prevention
 locks at doors, window bars, secure the walls
around the property, hire a guard
 Detection
 missing items, burglar alarms, closed circuit TV
 Reaction
 attack on burglar (not recommended ), call
the police, replace stolen items, make an
insurance claim
6
6
66 to 6 6
Internet shopping example
 Prevention
 encrypt your order and card number, enforce
merchants to do some extra checks, using PIN
even for Internet transactions, don’t send card
number via Internet
 Detection
 an unauthorized transaction appears on your
credit card statement
 Reaction
 complain, dispute, ask for a new card number,
sue (if you can find of course )
 Or, pay and forget (a glass of cold water) 
7
7
77 to 7 7
Information security in past & present
 Traditional Information Security
 keep the cabinets locked
 put them in a secure room
 human guards
 electronic surveillance systems
 in general: physical and administrative
mechanisms
 Modern World
 Data are in computers
 Computers are interconnected
8
8
88 to 8 8
Terminology
 Computer Security
 2 main focuses: Information and Computer itself
 tools and mechanisms to protect data in a computer (actually
an automated information system), even if the
computers/system are connected to a network
 tools and mechanisms to protect the information system itself
(hardware, software, firmware, *ware )
 Against?
 against hackers (intrusion)
 against viruses
 against denial of service attacks
 etc. (all types of malicious behavior)
9
9
99 to 9 9
Terminology
 Network and Internet Security
 measures to prevent, detect, and correct security
violations that involve the transmission of
information in a network or interconnected
networks
10
10
1010 to 1010
A note on security terminology
 No single and consistent terminology in the
literature!
 Be careful not to confuse while reading
papers and books
 See the next slide for some terminology taken
from Stallings and Brown, Computer Security
who took from RFC4949, Internet Security
Glossary
11
11
1111 to 11
Computer
Security
Terminology
RFC 4949,
Internet Security
Glossary, May
2000
12
12
1212 to 12
Relationships among the security
Concepts
12
13
13
1313 to 1313
Security TrendsSkill and knowledge required to
mount an attack
14
14
1414 to 14
The global average cost of cyber crime/attacks
14
2017 Cost of
Cyber Crime
Study by
Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
Steeper
increasing
trend in the
recent years
15
15
1515 to 15
Average cost of cyber crime for
seven countries
15
2017 Cost of
Cyber Crime
Study by
Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
- Germany
has highest
percentage
increase;
- UK, US are
around the
mean in
percentage
increase
254 institutions
responded
16
16
1616 to 16
A Scattergram of Respondents
16
2017 Cost of
Cyber Crime
Study by
Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
- Mean is
US$11.7 M
- High
variance
- 163
institutions
are below
mean (out of
254)
17
17
1717 to 17
Breakdown by Sector
17
2017 Cost
of Cyber
Crime
Study by
Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
- Financial
Services
Sector has
the Highest
Cost due to
Cyber
Crime
18
18
1818 to 18
Types of cyber attacks experienced
18
2017 Cost
of Cyber
Crime
Study by
Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
- Percentage
of the
respondents
experienced
- Ransomware
doubled
19
19
1919 to 19
Deployment Rate of Security
Technologies
19
2017 Cost
of Cyber
Crime
Study by
Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
- Percentage
of the
respondents
experienced
- Ransomware
doubled
20
20
2020 to 20
Annual Return of Investment (RoI)
20
2017 Cost of Cyber Crime
Study by Accenture*
* https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
- More or less in
parallel with
deployment rate
- But AI, Data
Mining based
novel techniques
have higher RoI
- Bad
performance for
encryption and
DLP, but they are
needed
21
21
2121 to 21
Security Objectives: CIA Triad and Beyond
22
22
2222 to 22
Computer Security Objectives
• Data confidentiality
• Assures that private or confidential information is not made available or
disclosed to unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information
may be disclosed
• Data integrity
• Assures that information changed only in a specified and authorized
manner
• System integrity
• Assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation
of the system
• Assures that systems work promptly and service is not denied to
authorized users
23
23
2323 to 23
Additional concepts:
24
24
2424 to 2424
Services, Mechanisms, Attacks
 3 aspects of information security:
 security attacks (and threats)
 actions that (may) compromise security
 security services
 services counter to attacks
 security mechanisms
 used by services
 e.g. secrecy is a service, encryption
(a.k.a. encipherment) is a mechanism
25
25
2525 to 2525
Attacks
 Attacks on computer systems
 break-in to destroy information
 break-in to steal information
 blocking to operate properly
 malicious software
 wide spectrum of problems
 Source of attacks
 Insiders
 Outsiders
26
26
2626 to 2626
Attacks
 Network Security
 Active attacks
 Passive attacks
 Passive attacks
 interception of the messages
 What can the attacker do?
 use information internally
 hard to understand
 release the content
 can be understood
 traffic analysis
 hard to avoid
 Hard to detect, try to prevent
27
27
2727 to 27
Attacks
 Active attacks
 Attacker actively manipulates
the communication
 Masquerade
 pretend as someone else
 possibly to get more privileges
 Replay
 passively capture data
and send later
 Denial-of-service
 prevention the normal use of
servers, end users, or network
itself
28
28
2828 to 2828
Attacks
 Active attacks (cont’d)
 deny
 repudiate sending/receiving a message later
 modification
 change the content of a message
29
29
2929 to 2929
Security Services
 to prevent or detect attacks
 to enhance the security
 replicate functions of physical documents
 e.g.
 have signatures, dates
 need protection from disclosure, tampering, or
destruction
 notarize
 record
30
30
3030 to 3030
Basic Security Services
 Authentication
– assurance that the communicating entity is the one it
claims to be
– peer entity authentication
• mutual confidence in the identities of the parties involved
in a connection
– Data-origin authentication
• assurance about the source of the received data
 Access Control
– prevention of the unauthorized use of a resource
– to achieve this, each entity trying to gain access must
first be identified and authenticated, so that access rights
can be tailored to the individual
31
31
3131 to 3131
Basic Security Services
 Data Confidentiality
 protection of data from unauthorized disclosure
(against eavesdropping)
 traffic flow confidentiality is one step ahead
 this requires that an attacker not be able to observe
the source and destination, frequency, length, or
other characteristics of the traffic on a
communications facility
 Data Integrity
 assurance that data received are exactly as sent
by an authorized sender
 i.e. no modification, insertion, deletion, or
replay
32
32
3232 to 3232
Basic Security Services
 Non-Repudiation
 protection against denial by one of the
parties in a communication
 Origin non-repudiation
 proof that the message was sent by the
specified party
 Destination non-repudiation
 proof that the message was received by the
specified party
33
33
3333 to 3333
Relationships
 among integrity, data-origin
authentication and non-repudiation
Integrity
Authentication
Non-repudiation
34
34
3434 to 34
Security Mechanisms
 Cryptographic Techniques
 will see next
 Software and hardware for access limitations
 Firewalls
 Intrusion Detection and Prevention Systems
 Traffic Padding
 against traffic analysis
 Hardware for authentication
 Smartcards, security tokens
 Security Policies / Access Control
 define who has access to which resources.
 Physical security
 Keep it in a safe place with limited and authorized physical
access
34
35
35
3535 to 3535
Cryptographic Security Mechanisms
 Encryption (a.k.a. Encipherment)
 use of mathematical algorithms to
transform data into a form that is not
readily intelligible
 keys are involved
36
36
3636 to 3636
Cryptographic Security Mechanisms
 Message Digest
 similar to encryption, but one-way (recovery
not possible)
 generally no keys are used
 Digital Signatures and Message
Authentication Codes
 Data appended to, or a cryptographic
transformation of, a data unit to prove the
source and the integrity of the data
 Authentication Exchange
 ensure the identity of an entity by exchanging
some information
37
37
3737 to 3737
Security Mechanisms
 Notarization
 use of a trusted third party to assure certain
properties of a data exchange
 Timestamping
 inclusion of correct date and time within
messages
38
38
3838 to 3838
And the Oscar goes to …
 On top of everything, the most
fundamental problem in security is
SECURE KEY EXCHANGE
 mostly over an insecure channel
39
39
3939 to 3939
A General Model for Network Security
40
40
4040 to 4040
Model for Network Security
 using this model requires us to:
 design a suitable algorithm for the security
transformation
 generate the secret information (keys) used by
the algorithm
 develop methods to distribute and share the
secret information
 specify a protocol enabling the principals to use
the transformation and secret information for a
security service
41
41
4141 to 4141
Model for Network Access
Security
42
42
4242 to 4242
Model for Network Access Security
 using this model requires us to:
 select appropriate gatekeeper functions to
identify users and processes and ensure
only authorized users and processes access
designated information or resources
 Internal control to monitor the activity and
analyze information to detect unwanted
intruders
43
43
4343 to 4343
More on Computer System Security
 Based on “Security Policies”
 Set of rules that specify
 How resources are managed to satisfy the security
requirements
 Which actions are permitted, which are not
 Ultimate aim
 Prevent security violations such as unauthorized access, data
loss, service interruptions, etc.
 Scope
 Organizational or Individual
 Implementation
 Partially automated, but mostly humans are involved
 Assurance and Evaluation
 Assurance: degree of confidence to a system
 Security products and systems must be evaluated using
certain criteria in order to decide whether they assure
security or not
44
44
4444 to 4444
Aspects of Computer Security
 Mostly related to Operating Systems
 Similar to those discussed for Network
Security
 Confidentiality
 Integrity
 Availability
 Authenticity
 Accountability
 Dependability
45
45
4545 to 4545
Aspects of Computer Security
 Confidentiality
 Prevent unauthorised disclosure of information
 Synonyms: Privacy and Secrecy
 any differences? Let’s discuss
 Integrity
 two types: data integrity and system integrity
 In general, “make sure that everything is as it
is supposed to be”
 More specifically, “no unauthorized
modification, deletion” on data (data integrity)
 System performs as intended without any
unauthorized manipulations (system integrity)
46
46
4646 to 4646
Aspects of Computer Security
 Availability
 services should be accessible when needed and without
extra delay
 Accountability
 audit information must be selectively kept and protected
so that actions affecting security can be traced to the
responsible party
 How can we do that?
 Users have to be identified and authenticated to have a
basis for access control decisions and to find out responsible
party in case of a violation.
 The security system keeps an audit log (audit trail) of
security relevant events to detect and investigate intrusions.
 Dependability
 Can we trust the system as a whole?
47
47
4747 to 47
Attack Surfaces
 An attack surface consists of the reachable and
exploitable vulnerabilities in a system
 Examples:
– Open ports on outward facing Web and other servers,
and code listening on those ports
– Services available in a firewall
– Code that processes incoming data, email, XML, office
documents, etc.
– Interfaces and Web forms
– An employee with access to sensitive information
vulnerable to a social engineering attack
48
48
4848 to 48
Attack Surface Categories
 Network attack surface
– Refers to vulnerabilities over an enterprise network,
wide-area network, or the Internet
• E.g. DoS, intruders exploiting network protocol vulnerabilities
 Software attack surface
– Refers to vulnerabilities in application, utility, or
operating system code
 Human attack surface
– Refers to vulnerabilities created by personnel or
outsiders
– E.g. social engineering, insider traitors
49
49
4949 to 4949
Fundamental Dilemma of Security
 “Security unaware users have specific security
requirements but no security expertise.”
 from D. Gollmann
 Solution: level of security is given in predefined
classes specified in some common criteria
 Orange book (Trusted Computer System Evaluation
Criteria) is such a criteria
50
50
5050 to 5050
Fundamental Tradeoff
 Between security and ease-of-use
 Security may require clumsy and
inconvenient restrictions on users and
processes
“If security is an add-on that people have to do
something special to get, then most of the time
they will not get it”
Martin Hellman,
co-inventor of Public Key Cryptography
51
51
5151 to 5151
Good Enough Security
“Everything should be as secure as
necessary, but not securer”
Ravi Sandhu, “Good Enough Security”, IEEE
Internet Computing, January/February 2003, pp.
66- 68.
 Read the full article at
http://dx.doi.org/10.1109/MIC.2003.1167341
52
52
5252 to 5252
Some Other Security Facts
 Not as simple as it might first appear to the novice
 Must consider all potential attacks when designing a system
 Generally yields complex and counterintuitive systems
 Battle of intelligent strategies between attacker and admin
 Requires regular monitoring
 Not considered as a beneficial investment until a security failure
occurs
 Actually security investments must be considered as insurance
against attacks
 too often an afterthought
 Not only from investment point of view, but also from design point
of view

More Related Content

What's hot

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
Information System Security
Information System Security Information System Security
Information System Security Syed Asif Sherazi
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...Nishant Mehta
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network securitymohanad alobaidey
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 

What's hot (20)

OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Information System Security
Information System Security Information System Security
Information System Security
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Security
SecuritySecurity
Security
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Information security
Information securityInformation security
Information security
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
Information security
Information securityInformation security
Information security
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Network security
Network securityNetwork security
Network security
 

Similar to Meeting 15. network security

Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And PrivacyManan Gadhiya
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfVishwanathMahalle
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdfFahadZaman38
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 

Similar to Meeting 15. network security (20)

Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
security IDS
security IDSsecurity IDS
security IDS
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdfUNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cyber security
Cyber securityCyber security
Cyber security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
A01450131
A01450131A01450131
A01450131
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

More from Syaiful Ahdan

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391Syaiful Ahdan
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...Syaiful Ahdan
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774Syaiful Ahdan
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775Syaiful Ahdan
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078Syaiful Ahdan
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723Syaiful Ahdan
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523Syaiful Ahdan
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309Syaiful Ahdan
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149Syaiful Ahdan
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868Syaiful Ahdan
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343Syaiful Ahdan
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755Syaiful Ahdan
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196Syaiful Ahdan
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484Syaiful Ahdan
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352Syaiful Ahdan
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994Syaiful Ahdan
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895Syaiful Ahdan
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administratorSyaiful Ahdan
 

More from Syaiful Ahdan (20)

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administrator
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
 

Recently uploaded

NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfPo-Chuan Chen
 

Recently uploaded (20)

NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 

Meeting 15. network security

  • 1. 1 1 11 to 1 Computer Network Administration Computer and Network Security Albert Levi levi@sabanciuniv.edu FENS 1091, ext.9563
  • 2. 2 2 22 to 2 2 What is this course about? This course is to discuss  security needs  security services  security mechanisms and protocols for data stored in computers and transmitted across computer networks
  • 3. 3 3 33 to 3 3 What we will/won’t cover?  We will cover  security threats  practical security issues (practice in labs)  security protocols in use  security protocols not in use  securing computer systems  introductory cryptography  We will not cover  advanced cryptography  computer networks  operating systems  computers in general  how to hack 
  • 4. 4 4 44 to 4 4 What security is about in general?  Security is about protection of assets  D. Gollmann, Computer Security, Wiley  Prevention  take measures that prevent your assets from being damaged (or stolen)  Detection  take measures so that you can detect when, how, and by whom an asset has been damaged  Reaction  take measures so that you can recover your assets
  • 5. 5 5 55 to 5 5 Real world example  Prevention  locks at doors, window bars, secure the walls around the property, hire a guard  Detection  missing items, burglar alarms, closed circuit TV  Reaction  attack on burglar (not recommended ), call the police, replace stolen items, make an insurance claim
  • 6. 6 6 66 to 6 6 Internet shopping example  Prevention  encrypt your order and card number, enforce merchants to do some extra checks, using PIN even for Internet transactions, don’t send card number via Internet  Detection  an unauthorized transaction appears on your credit card statement  Reaction  complain, dispute, ask for a new card number, sue (if you can find of course )  Or, pay and forget (a glass of cold water) 
  • 7. 7 7 77 to 7 7 Information security in past & present  Traditional Information Security  keep the cabinets locked  put them in a secure room  human guards  electronic surveillance systems  in general: physical and administrative mechanisms  Modern World  Data are in computers  Computers are interconnected
  • 8. 8 8 88 to 8 8 Terminology  Computer Security  2 main focuses: Information and Computer itself  tools and mechanisms to protect data in a computer (actually an automated information system), even if the computers/system are connected to a network  tools and mechanisms to protect the information system itself (hardware, software, firmware, *ware )  Against?  against hackers (intrusion)  against viruses  against denial of service attacks  etc. (all types of malicious behavior)
  • 9. 9 9 99 to 9 9 Terminology  Network and Internet Security  measures to prevent, detect, and correct security violations that involve the transmission of information in a network or interconnected networks
  • 10. 10 10 1010 to 1010 A note on security terminology  No single and consistent terminology in the literature!  Be careful not to confuse while reading papers and books  See the next slide for some terminology taken from Stallings and Brown, Computer Security who took from RFC4949, Internet Security Glossary
  • 11. 11 11 1111 to 11 Computer Security Terminology RFC 4949, Internet Security Glossary, May 2000
  • 12. 12 12 1212 to 12 Relationships among the security Concepts 12
  • 13. 13 13 1313 to 1313 Security TrendsSkill and knowledge required to mount an attack
  • 14. 14 14 1414 to 14 The global average cost of cyber crime/attacks 14 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf Steeper increasing trend in the recent years
  • 15. 15 15 1515 to 15 Average cost of cyber crime for seven countries 15 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf - Germany has highest percentage increase; - UK, US are around the mean in percentage increase 254 institutions responded
  • 16. 16 16 1616 to 16 A Scattergram of Respondents 16 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf - Mean is US$11.7 M - High variance - 163 institutions are below mean (out of 254)
  • 17. 17 17 1717 to 17 Breakdown by Sector 17 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf - Financial Services Sector has the Highest Cost due to Cyber Crime
  • 18. 18 18 1818 to 18 Types of cyber attacks experienced 18 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf - Percentage of the respondents experienced - Ransomware doubled
  • 19. 19 19 1919 to 19 Deployment Rate of Security Technologies 19 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf - Percentage of the respondents experienced - Ransomware doubled
  • 20. 20 20 2020 to 20 Annual Return of Investment (RoI) 20 2017 Cost of Cyber Crime Study by Accenture* * https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf - More or less in parallel with deployment rate - But AI, Data Mining based novel techniques have higher RoI - Bad performance for encryption and DLP, but they are needed
  • 21. 21 21 2121 to 21 Security Objectives: CIA Triad and Beyond
  • 22. 22 22 2222 to 22 Computer Security Objectives • Data confidentiality • Assures that private or confidential information is not made available or disclosed to unauthorized individuals • Privacy • Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed • Data integrity • Assures that information changed only in a specified and authorized manner • System integrity • Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system • Assures that systems work promptly and service is not denied to authorized users
  • 24. 24 24 2424 to 2424 Services, Mechanisms, Attacks  3 aspects of information security:  security attacks (and threats)  actions that (may) compromise security  security services  services counter to attacks  security mechanisms  used by services  e.g. secrecy is a service, encryption (a.k.a. encipherment) is a mechanism
  • 25. 25 25 2525 to 2525 Attacks  Attacks on computer systems  break-in to destroy information  break-in to steal information  blocking to operate properly  malicious software  wide spectrum of problems  Source of attacks  Insiders  Outsiders
  • 26. 26 26 2626 to 2626 Attacks  Network Security  Active attacks  Passive attacks  Passive attacks  interception of the messages  What can the attacker do?  use information internally  hard to understand  release the content  can be understood  traffic analysis  hard to avoid  Hard to detect, try to prevent
  • 27. 27 27 2727 to 27 Attacks  Active attacks  Attacker actively manipulates the communication  Masquerade  pretend as someone else  possibly to get more privileges  Replay  passively capture data and send later  Denial-of-service  prevention the normal use of servers, end users, or network itself
  • 28. 28 28 2828 to 2828 Attacks  Active attacks (cont’d)  deny  repudiate sending/receiving a message later  modification  change the content of a message
  • 29. 29 29 2929 to 2929 Security Services  to prevent or detect attacks  to enhance the security  replicate functions of physical documents  e.g.  have signatures, dates  need protection from disclosure, tampering, or destruction  notarize  record
  • 30. 30 30 3030 to 3030 Basic Security Services  Authentication – assurance that the communicating entity is the one it claims to be – peer entity authentication • mutual confidence in the identities of the parties involved in a connection – Data-origin authentication • assurance about the source of the received data  Access Control – prevention of the unauthorized use of a resource – to achieve this, each entity trying to gain access must first be identified and authenticated, so that access rights can be tailored to the individual
  • 31. 31 31 3131 to 3131 Basic Security Services  Data Confidentiality  protection of data from unauthorized disclosure (against eavesdropping)  traffic flow confidentiality is one step ahead  this requires that an attacker not be able to observe the source and destination, frequency, length, or other characteristics of the traffic on a communications facility  Data Integrity  assurance that data received are exactly as sent by an authorized sender  i.e. no modification, insertion, deletion, or replay
  • 32. 32 32 3232 to 3232 Basic Security Services  Non-Repudiation  protection against denial by one of the parties in a communication  Origin non-repudiation  proof that the message was sent by the specified party  Destination non-repudiation  proof that the message was received by the specified party
  • 33. 33 33 3333 to 3333 Relationships  among integrity, data-origin authentication and non-repudiation Integrity Authentication Non-repudiation
  • 34. 34 34 3434 to 34 Security Mechanisms  Cryptographic Techniques  will see next  Software and hardware for access limitations  Firewalls  Intrusion Detection and Prevention Systems  Traffic Padding  against traffic analysis  Hardware for authentication  Smartcards, security tokens  Security Policies / Access Control  define who has access to which resources.  Physical security  Keep it in a safe place with limited and authorized physical access 34
  • 35. 35 35 3535 to 3535 Cryptographic Security Mechanisms  Encryption (a.k.a. Encipherment)  use of mathematical algorithms to transform data into a form that is not readily intelligible  keys are involved
  • 36. 36 36 3636 to 3636 Cryptographic Security Mechanisms  Message Digest  similar to encryption, but one-way (recovery not possible)  generally no keys are used  Digital Signatures and Message Authentication Codes  Data appended to, or a cryptographic transformation of, a data unit to prove the source and the integrity of the data  Authentication Exchange  ensure the identity of an entity by exchanging some information
  • 37. 37 37 3737 to 3737 Security Mechanisms  Notarization  use of a trusted third party to assure certain properties of a data exchange  Timestamping  inclusion of correct date and time within messages
  • 38. 38 38 3838 to 3838 And the Oscar goes to …  On top of everything, the most fundamental problem in security is SECURE KEY EXCHANGE  mostly over an insecure channel
  • 39. 39 39 3939 to 3939 A General Model for Network Security
  • 40. 40 40 4040 to 4040 Model for Network Security  using this model requires us to:  design a suitable algorithm for the security transformation  generate the secret information (keys) used by the algorithm  develop methods to distribute and share the secret information  specify a protocol enabling the principals to use the transformation and secret information for a security service
  • 41. 41 41 4141 to 4141 Model for Network Access Security
  • 42. 42 42 4242 to 4242 Model for Network Access Security  using this model requires us to:  select appropriate gatekeeper functions to identify users and processes and ensure only authorized users and processes access designated information or resources  Internal control to monitor the activity and analyze information to detect unwanted intruders
  • 43. 43 43 4343 to 4343 More on Computer System Security  Based on “Security Policies”  Set of rules that specify  How resources are managed to satisfy the security requirements  Which actions are permitted, which are not  Ultimate aim  Prevent security violations such as unauthorized access, data loss, service interruptions, etc.  Scope  Organizational or Individual  Implementation  Partially automated, but mostly humans are involved  Assurance and Evaluation  Assurance: degree of confidence to a system  Security products and systems must be evaluated using certain criteria in order to decide whether they assure security or not
  • 44. 44 44 4444 to 4444 Aspects of Computer Security  Mostly related to Operating Systems  Similar to those discussed for Network Security  Confidentiality  Integrity  Availability  Authenticity  Accountability  Dependability
  • 45. 45 45 4545 to 4545 Aspects of Computer Security  Confidentiality  Prevent unauthorised disclosure of information  Synonyms: Privacy and Secrecy  any differences? Let’s discuss  Integrity  two types: data integrity and system integrity  In general, “make sure that everything is as it is supposed to be”  More specifically, “no unauthorized modification, deletion” on data (data integrity)  System performs as intended without any unauthorized manipulations (system integrity)
  • 46. 46 46 4646 to 4646 Aspects of Computer Security  Availability  services should be accessible when needed and without extra delay  Accountability  audit information must be selectively kept and protected so that actions affecting security can be traced to the responsible party  How can we do that?  Users have to be identified and authenticated to have a basis for access control decisions and to find out responsible party in case of a violation.  The security system keeps an audit log (audit trail) of security relevant events to detect and investigate intrusions.  Dependability  Can we trust the system as a whole?
  • 47. 47 47 4747 to 47 Attack Surfaces  An attack surface consists of the reachable and exploitable vulnerabilities in a system  Examples: – Open ports on outward facing Web and other servers, and code listening on those ports – Services available in a firewall – Code that processes incoming data, email, XML, office documents, etc. – Interfaces and Web forms – An employee with access to sensitive information vulnerable to a social engineering attack
  • 48. 48 48 4848 to 48 Attack Surface Categories  Network attack surface – Refers to vulnerabilities over an enterprise network, wide-area network, or the Internet • E.g. DoS, intruders exploiting network protocol vulnerabilities  Software attack surface – Refers to vulnerabilities in application, utility, or operating system code  Human attack surface – Refers to vulnerabilities created by personnel or outsiders – E.g. social engineering, insider traitors
  • 49. 49 49 4949 to 4949 Fundamental Dilemma of Security  “Security unaware users have specific security requirements but no security expertise.”  from D. Gollmann  Solution: level of security is given in predefined classes specified in some common criteria  Orange book (Trusted Computer System Evaluation Criteria) is such a criteria
  • 50. 50 50 5050 to 5050 Fundamental Tradeoff  Between security and ease-of-use  Security may require clumsy and inconvenient restrictions on users and processes “If security is an add-on that people have to do something special to get, then most of the time they will not get it” Martin Hellman, co-inventor of Public Key Cryptography
  • 51. 51 51 5151 to 5151 Good Enough Security “Everything should be as secure as necessary, but not securer” Ravi Sandhu, “Good Enough Security”, IEEE Internet Computing, January/February 2003, pp. 66- 68.  Read the full article at http://dx.doi.org/10.1109/MIC.2003.1167341
  • 52. 52 52 5252 to 5252 Some Other Security Facts  Not as simple as it might first appear to the novice  Must consider all potential attacks when designing a system  Generally yields complex and counterintuitive systems  Battle of intelligent strategies between attacker and admin  Requires regular monitoring  Not considered as a beneficial investment until a security failure occurs  Actually security investments must be considered as insurance against attacks  too often an afterthought  Not only from investment point of view, but also from design point of view