1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being...

71
1 Security in Computing Module 1 Introduction

Transcript of 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being...

Page 1: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

1

Security in Computing

Module 1Introduction

Page 2: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

What Is Security?

• “The quality or state of being secure—to be free from danger”

2

Page 3: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security - Years back

• Physical security– Information was primarily on paper– Lock and key– Safe transmission

• Administrative security– Control access to materials– Personnel screening– Auditing

3

Page 4: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Why Do We Need Security?

• Increased reliance on Information technology with or with out the use of networks

• The use of IT has changed our lives drastically.

• We depend on E-mail, Internet banking, and several other governmental activities that use IT

4

Page 5: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Why Do We Need Security?

• Increased use of E-Commerce and the World wide web on the Internet as a vast repository of various kinds of information (immigration databases, flight tickets, stock markets etc.)

5

Page 6: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Why Do We Need Security?

• Protect sensitive resources– Prevent loss– Prevent damage

• In the context of information systems– Prevent unauthorized users from

reading information (loss)• Guarantee confidentiality

6

Page 7: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

– Prevent unauthorized users from tampering with information (damage)• Guarantee integrity

• Computing Systems:– Hardware, software, storage media,

data & people

7

Page 8: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

What is Computer Security?

• Wikipedia: Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) cannot perform actions that they are not allowed to perform, but can perform the actions that they are allowed to.

• A computer is secure if you can depend on it and its software to behave as you expect.

8

Page 9: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

• “Measures and tools to protect data and thwart hackers is called Computer Security”.

Network security or internet security- security measures needed to protect data during their transmission

9

Page 10: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Some differences between traditional security and

information security

• Information can be stolen - but you still have it

• Confidential information may be copied and sold - but the theft might not be detected

• The criminals may be on the other side of the world

10

Page 11: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

What features should a computer security system

provide?

• Confidentiality– Concealment of information or resources– the protection of information from

unauthorized or accidental disclosure

• Integrity– Trustworthiness of data or resources– assures information is as entered and

intended; that the information has not been incorrectly modified, corrupted or destroyed.

11

Page 12: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

What features should a computer security system

provide?

• Availability– Ability to use information or

resources.– assures that assets are available

when needed to support the organizational enterprise on a timely and reliable basis.

12

Page 13: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security GoalsSecurity Goals

Integrity

Confidentiality

Availability

Secure

13

Page 14: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Attacks, Services and Attacks, Services and MechanismsMechanisms

• Security Attack: Any action that compromises the security of information.

• Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.

• Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms

14

Page 15: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks

• Vulnerability• Threats• Attacks

15

Page 16: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security AttacksSecurity Attacks

16

Page 17: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security AttacksSecurity Attacks

• Interruption: This is an attack on availability– Destruction of hardware device– Malfunction of OS file manager– Physically breaking communication

line– Disrupting traffic

17

Page 18: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Interruption

18

Page 19: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks (continued)

• Interception: This is an attack on confidentiality– Overhearing, eavesdropping over a

communication line

19

Page 20: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks (continued)

Interception

20

Page 21: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks (continued)

• Modification: This is an attack on integrity– Corrupting transmitted data or

tampering with it before it reaches its destination

21

Page 22: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks (continued)

Modification

22

Page 23: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks (continued)

• Fabrication: This is an attack on authenticity– Faking data as if it were created by a

legitimate and authentic party

23

Page 24: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Attacks (continued)

Fabrication

24

Page 25: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Passive and active attacks• Passive attacks

– No modification of content or fabrication– Eavesdropping to learn contents or other

information (transfer patterns, traffic flows etc.)

• Active attacks– Modification of content and/or participation in

communication to• Impersonate legitimate parties• Modify the content in transit• Launch denial of service attacks

25

Page 26: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

26

Page 27: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Passive and active attacks• Passive attacks:eavesdropping on, or

monitoring of, transmissions to:– obtain message contents, or– monitor traffic flows

• Active attacks:modification of data stream to:– masquerade of one entity as some other– replay previous messages– modify messages in transit– denial of service

27

Page 28: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

28

Passive Attacks and Active Attacks

Page 29: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Passive Attacks

29

Page 30: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Passive Attacks

30

Page 31: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

31

Active Attacks

• Active attacks involve some sort of modification of the data stream or the creation of a false stream.

• Four sub-categories:– Masquerade– Replay– Modification of Messages– Denial of service

Page 32: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

32

Masquerade

• An entity pretends to be another.• For the purpose of doing some

other form of attack.• Spoofing,impersonation.

Page 33: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

33

Replay

• First passive capture of data and then its retransmission to produce an unauthorized effect.

Page 34: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

34

Modification of Messages

• Some portion of a legitimate message is altered or messages are delayed or reordered to produce an unauthorized effect.

Page 35: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

35

Denial of Service - DOS

• Prevents the normal use or management of communication facilities.

• Such attacks have become very common on the Internet especially against web servers.

• On the Internet remotely located hackers can crash the TCP/IP software by exploiting known vulnerabilities in various implementations.

• One has to constantly look out for software updates and security patches to protect against these attacks.

Page 36: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Active Attacks

36

Page 37: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Active Attacks

37

Page 38: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Problems

• Passive attacks– Difficult to detect– Protection approach - prevention

• Active attacks– Easy to detect but difficult to prevent– Recovery

38

Page 39: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Network Security

Computer networks are widely used to connect computers at distant locations.

Raises additional security problems:o Data in transmission must be

protected.o Network connectivity exposes each

computer to more vulnerabilities.

39

Page 40: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Model for Network Security

• Two components:– Security related transformation

• Encryption• Additional codes

– Secret information • Encryption key

• May need a trusted third part to assist

40

Page 41: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

41

Page 42: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Model for Network Security

• Basic tasks in designing security service:– Design an algorithm that opponent

cannot defeat– Generate the secret information to be

used with the algorithm– Develop methods for distributing secret

information– Specify a protocol to be used

42

Page 43: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Computer Criminals• Amateurs: regular users, who exploit the

vulnerabilities of the computer system– Motivation: easy access to vulnerable

resources• Crackers: attempt to access computing

facilities for which they do not have the authorization– Motivation: enjoy challenge, curiosity

• Career criminals: professionals who understand the computer system and its vulnerabilities– Motivation: personal gain (e.g., financial)

43

Page 44: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

44

• Hackers• Crackers

Page 45: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Malicious Software

45

Page 46: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

46

Virus Virus lifecycle:1. Dormant phase: the virus is idle. (not

all viruses have this stage)2. Propagation phase: the virus places

an identical copy of itself into other programs of into certain system areas.

3. Triggering phase: the virus is activated to perform the function for which it was created.

4. Execution phase: the function is performed. The function may be harmless or damaging.

Page 47: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Functional structure of Virus

47

VIRUS

Anti-detection routine

Search Copy

Page 48: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

48

How Viruses Append

Originalprogram

Virus code

Originalprogram

Virus code

Virus appended to program

+ =

Page 49: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

49

How Viruses Append

Originalprogram

Virus code

Originalprogram

Virus code Part a

Virus surrounding a program

+ =

Virus code Part b

Page 50: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

50

How Viruses Append

Originalprogram

Virus code

Originalprogram

Virus-1

Virus integrated into program

+ =

Virus-2

Virus-3Virus-4

Page 51: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Home for Viruses

• High risk virus properties: – Hard to detect– Hard to destroy– Spread infection widely– Can re-infect– Easy to create – Machine & OS independent

• Earlier – repeated execution of code so that virus could multiply

51

Page 52: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Home for Viruses

• One-Time execution– E-mail attachment

• Boot Sector viruses• Memory –Resident viruses• Application programs

– Macro

• Libraries

52

Page 53: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Types of viruses

• Parasitic virus: Most common form. Attaches itself to a file and replicates when the infected program is executed.(File virus-executable files)

• Memory resident virus: Lodged in main memory as part of a resident system program. Virus may infect every program that executes.

53

Page 54: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Types of viruses• Boot Sector Viruses:

– Infects the boot record and spreads when system is booted.

– Gains control of machine before the virus detection tools.

– Very hard to notice– Carrier files: AUTOEXEC.BAT,

CONFIG.SYS,IO.SYS

• Multipartite Viruses: infects both(files & boot sector)

54

Page 55: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Types of viruses

• Stealth virus: a form of virus explicitly designed to hide from detection by antivirus software.

• Polymorphic virus: a virus that mutates with every infection, making detection by the “signature” of the virus difficult.

55

Page 56: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Example

• Code red worm signature

56

Page 57: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Types of viruses

• Macro viruses: infect macro-enabled documents, especially the Microsoft Office suite of applications -Word and Excel. When opened, an infected document executes a macro automatically or the user does so accidentally. Then infects other documents on the disk.

• Email virus

57

Page 58: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Other Malicious Programs• Virus - A hidden, self-replicating section of computer software,

usually malicious logic, that propagates by infecting (i.e., inserting a copy of itself into and becoming part of) another program. A virus cannot run by itself; it requires that its host program be run to make the virus active.

• Worm - A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively.

• Trojan horse - A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

58

Page 59: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Other Malicious Programs• Logic bomb - Malicious [program] logic that activates when

specified conditions are met. Usually intended to cause denial of service or otherwise damage system resources.

• Time bomb – is a logic bomb whose trigger is a time or date.

• Trapdoor or backdoor - A hidden computer flaw known to an intruder, or a hidden computer mechanism (usually software) installed by an intruder, who can activate the trap door to gain access to the computer without being blocked by security services or mechanisms.

• Zombie – A program that secretly takes over another Internet attached computer and then uses that computer to launch attacks. Difficult to trace zombie’s creator. Used for DoS attacks

• Rabbit59

Page 60: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Services and Mechanisms

• A security policy is a statement of what is and what is not allowed.

• A security service is a measure to address a threat – E.g. authenticate individuals to prevent

unauthorized access

• A security mechanism is a means to provide a service – E.g. encryption, cryptographic protocols

60

Page 61: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Services• A security service is a service

provided by the protocol layer of a communicating system (X.800)

• 5 Categories– Authentication– Access Control– Data Confidentiality– Data Integrity– Nonrepudiation – (Availability)

61

Page 62: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Services

• Security services (X.800) falls under five categories:

• Authentication:The assurance that the communicating entity is the one that it claims to be– Peer Entity Authentication– Data-Origin Authentication

62

Page 63: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Services• Access Control : The prevention of

unauthorized use of a resource - Who can access, Under what conditions, What they are allowed to do

• Data Confidentiality :The protection of data from unauthorized disclosure– Connection Confidentiality– Connectionless Confidentiality– Selective-Field Confidentiality– Traffic-flow Confidentiality

63

Page 64: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Services

• Data Integrity: The assurance that data received are exactly as sent by an authorized entity (i.e. contain no modification, insertion, deletion, or replay)– Connection Integrity with Recovery– Connection Integrity without Recovery– Selective-Field Connection Integrity– Connectionless Integrity– Selective-Field Connectionless Integrity

64

Page 65: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Services

• NonRepudiation: Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication– NonRepudiation, origin– NonRepudiation, destination

65

Page 66: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Services Examples

• Authentication– Ensuring the proper identification of entities and origins of

data before communication• Access control

– Preventing unauthorized access to system resources• Data confidentiality

– Preventing disclosure to unauthorized parties• Data integrity

– Preventing corruption of data• Non-repudiation

– Collecting proof to prevent denial of participation in transaction or communication

• Availability– Protection against denial-of-service

66

Page 67: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Security Mechanisms• Security Mechanisms :A mechanism

that is designed to detect, prevent or recover from a security attack.

• Two types– Specific mechanisms existing to provide

certain security services• E.g. encryption used for authentication

– Pervasive mechanisms which are general mechanisms incorporated into the system and not specific to a service

• E.g. security audit trail

67

Page 68: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Specific Security Mechanisms

•  1. Specific Security Mechanisms• May be incorporated into the appropriate protocol layer

in order to provide some of the OSI security services

– Encipherment– Digital Signature– Access Control– Data Integrity– Authentication Exchange– Traffic Padding– Routing Control– Notarization

68

Page 69: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Pervasive Security Mechanisms

• Pervasive Security Mechanisms

Mechanisms those are not specific to any particular OSI security service or protocol layer.

• Trusted Functionality– That which is perceived to be true by some criteria

• Security Label– The marking of (bound to) a resource that names or

designates the security attributes of the resource

69

Page 70: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Pervasive Security Mechanisms

• Event Detection– Intrusion detection– Detection of specific hacks (detector hardware)– Too many log in attempts

• Security Audit Trail– Logging of all system events

• Security Recovery– Recovery based on requests from security

mechanisms and/or event handling.

70

Page 71: 1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.

Methods of DefenseMethods of Defense

• Encryption• Software Controls

– (access limitations in a data base, in operating system protect each user from other users)

• Hardware Controls – (smartcard)

• Policies – (frequent changes of passwords)

• Physical Controls71