introduction to computer & network security

Post on 25-Feb-2016

65 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

INTRODUCTION TO COMPUTER & NETWORK SECURITY. Instructor: Dania Alomar. Why S tudy Security ?. Security threats are real… And need protection against Keeping information secure from modification and unauthorized access. Keeping it available is getting increasingly difficult. - PowerPoint PPT Presentation

TRANSCRIPT

INTRODUCTION TO COMPUTER & NETWORK

SECURITYINSTRUCTOR: DANIA ALOMAR

Why Study Security? • Security threats are real…

• And need protection against

•Keeping information secure from modification and unauthorized access.• Keeping it available is getting increasingly difficult.

Computer vs. Network Security•Computer security is the generic term for a collection of tools designed to protect data and to thwart hackers.•Network security is the security measures that are needed to protect data during their transmission.•In most systems, the boundaries between computer security and network security are blurred since most, if not all, of today’s systems are distributed in nature.

Goals of Security• Confidentiality :prevents unauthorized use or disclosure of information.•Integrity: assurance that the information has not been tampered.• Availability: information is accessible to authorized entities at the proper time

Basic Terminology Authentication: Verification that the user’s claimed identity is valid, such as through the use of a password

Authorization: The privileges allocated to an individual (or process) that enable access to a computer resource

Cont. Non-repudiation: offer of evidence that a party is indeed the sender or a receiver of certain information. (prevents a party in a communication from later denying its participation in communication)

Access control: facilities to determine and enforce who is allowed access to what resources, hosts, software, network connections

Data Origin Authentication: provides assurance that a piece of data originated from a particular source.

Mechanisms: e.g. passwords. ◦ Something you know (password, PIN)◦ Something you have (ID, smart card)◦ Something you are (fingerprint, DNA)

Threats and Attacks•A threat : A person, thing, event, or idea which poses some danger to an asset in terms of that asset's confidentiality, integrity or availability.

•An attack: A realization of a threat; Any action that attempts to compromise the security of the information owned by an organization/person.◦ Categories of Attacks

◦ Interruption◦ Interception◦ Modification◦ Fabrication

Interruption• Interruption: an asset of the system becomes lost, unavailable, or unusable. An example is destroy hardware (cutting fiber) or software, erasure of a program or data file, or malfunction of an operating system file manager so that it cannot find a particular disk file.

•Denial of service (DoS):◦ Crashing the server

Interception An interception means that some unauthorized party has gained access to an asset. An examples are Illicit copying of files and programs and packet sniffers and wiretapping.

Modification•Modification: If an unauthorized party not only accesses but tampers with an asset.

•Stop the flow of the message

•Delay and modify the message

•Release the message again

Fabrication•Unauthorized assumption of other’s identity•Generate and distribute objects under this identity

Security Attack•Interruption: This is an attack on availability•Interception: This is an attack on confidentiality•Modification: This is an attack on integrity•Fabrication: This is n attack on authenticity

Security attacks classification•Passive Attacks

◦The attacker eavesdrops and read/record messages in transit.

•Active Attacks◦The attacker may transmit new messages, replay old messages, modify/delete messages on transit.

Virus, Worms, and Trojan Horses•Trojan horse: instructions hidden inside an otherwise useful program that do bad things•Virus: a set of instructions that, when executed, inserts copies of itself into other programs.•Worm: a program that replicates itself by installing copies of itself on other machines across a network.•Trapdoor: an undocumented entry point, which can be exploited as a security flaw•Zombie: malicious instructions installed on a system that can be remotely triggered to carry out some attack with les traceability because the attack comes from another victim.

top related