Computer Security Set of slides 1 Dr Alexei Vernitski.

36
Computer Security Set of slides 1 Dr Alexei Vernitski

Transcript of Computer Security Set of slides 1 Dr Alexei Vernitski.

Page 1: Computer Security Set of slides 1 Dr Alexei Vernitski.

Computer SecuritySet of slides 1

Dr Alexei Vernitski

Page 2: Computer Security Set of slides 1 Dr Alexei Vernitski.

Information security

• In this module, we concentrate on information security

• We speak less about physical security – for example:

(Millfields Primary School laptop thefts)http://www.lapsafe.com/about-us/case-studies/millfieldshttp://blogs.absolute.com/blog/absolute-software-foils-repeat-thefts-at-millfields-school/

• We do not speak about bugs in computer software – for example:

(Bug in Post Office computer system)http://www.bbc.co.uk/news/uk-23233573

Page 3: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example from a web site

• Your password is stored securely using RSA Encryption with a 1024-bit key, which is the standard used for secure online bank account access.

• We use industry-standard 128 bit secure socket layer SSL encryption to protect data transmissions between your browser and our servers, such as your personal information.

http://www.billmonitor.com/security.html

Page 4: Computer Security Set of slides 1 Dr Alexei Vernitski.

Questions• Your password is stored

securely using RSA Encryption with a 1024-bit key, which is the standard used for secure online bank account access.

• We use industry-standard 128 bit secure socket layer SSL encryption to protect data transmissions between your browser and our servers, such as your personal information.

• What is more secure: 1024 bits or 128 bits?

• Is either of these two encodings secure?

• Or are they both secure? In this case, why use both?

• What is RSA?• Which security goals are

achieved by these measures?

Page 5: Computer Security Set of slides 1 Dr Alexei Vernitski.

Security goals

• Confidentiality• Integrity• Availability

• Some others, such as non-repudiation

(read more in the textbooks)

Page 6: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example: electronic voting system

• http://www.youtube.com/watch?v=QdpGd74DrBM

Page 7: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion

• Confidentiality• Integrity• Availability

• Some others, such as non-repudiation

• Consider an electronic voting system

• How can these goals be achieved or not achieved?

Page 8: Computer Security Set of slides 1 Dr Alexei Vernitski.

Questions• Your password is stored

securely using RSA Encryption with a 1024-bit key, which is the standard used for secure online bank account access.

• We use industry-standard 128 bit secure socket layer SSL encryption to protect data transmissions between your browser and our servers, such as your personal information.

• What is more secure: 1024 bits or 128 bits?

• Is either of these two encodings secure?

• Or are they both secure? In this case, why use both?

• What is RSA?• Which security goals are

achieved by these measures?

Page 9: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example from a web site

• We have industry standard and proprietary network monitoring tools constantly running in our system in order to prevent security breaches and protect the security of your data.

• In addition, our secure page employs industry standard encryption.

http://www.facebook.com/help/212183815469410/

Page 10: Computer Security Set of slides 1 Dr Alexei Vernitski.

Questions

• We have industry standard and proprietary network monitoring tools constantly running in our system in order to prevent security breaches and protect the security of your data.

• In addition, our secure page employs industry standard encryption.

• Which security goals are important for Facebook?

• Which security goals are achieved by the described measures?

Page 11: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example from a news item

• Sony has admitted that the personal data of PSN users, which may have been illegally accessed in a recent attack on the system, was not encrypted.

• Thankfully, credit card information was stored separately to the personal data and was encrypted.

http://www.bit-tech.net/news/gaming/2011/04/28/sony-admits-personal-data-was-not-encrypted/1

Page 12: Computer Security Set of slides 1 Dr Alexei Vernitski.

Questions

• Sony has admitted that the personal data of PSN users, which may have been illegally accessed in a recent attack on the system, was not encrypted.

• Thankfully, credit card information was stored separately to the personal data and was encrypted.

• Which security goals were not achieved by Sony?

• Would encryption help to achieve these goals?

Page 13: Computer Security Set of slides 1 Dr Alexei Vernitski.

From recent research

• Firms using encryption software are more careless about controlling internal access to encrypted data and their employees are more careless about computer equipment containing encrypted data.

http://policybythenumbers.blogspot.co.uk/2011/12/protecting-personal-data-through.html

Page 14: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion

• Firms using encryption software are more careless about controlling internal access to encrypted data and their employees are more careless about computer equipment containing encrypted data.

• Do you agree with these research findings?

• Does this mean that encryption should not be used?

Page 15: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example from a web site

• iCloud is built with industry-standard security practices and employs strict policies to protect your data.

http://support.apple.com/kb/HT4865

• Apple takes precautions — including administrative, technical and physical measures — to safeguard your personal information against loss, theft and misuse, as well as against unauthorised access, disclosure, alteration and destruction.

http://www.apple.com/uk/privacy/

Page 16: Computer Security Set of slides 1 Dr Alexei Vernitski.

Attack analysis

• Threat• Vulnerability• Attack• Control

(read more in the textbooks)

Page 17: Computer Security Set of slides 1 Dr Alexei Vernitski.

Attack analysis

• It is important to remember that in this context, words such as ‘threat’ and ‘control’ are used in special meanings

• A threat describes what can be stolen or damaged

• A control describes how a vulnerability can be stopped or repaired

Page 18: Computer Security Set of slides 1 Dr Alexei Vernitski.

An informal example

Page 19: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion

• Sony has admitted that the personal data of PSN users, which may have been illegally accessed in a recent attack on the system, was not encrypted.

• Analyse this news item using the terms– Threat– Vulnerability– Attack– Control

Page 20: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example from a news item

• MI6 and the CIA have been warned that intelligence may have been compromised by an agent in Switzerland who downloaded vast quantities of data onto portable hard drives and carried it out of a secure building.

http://www.telegraph.co.uk/news/9722715/MI6-secrets-threatened-as-Swiss-spy-steals-a-mountain-of-data.html

• The sources say that he downloaded "terabytes" of classified material from the Swiss intelligence service's servers onto portable hard drives. He then left the government building with a backpack containing the hard drives.

http://www.zdnet.com/swiss-spy-agency-warns-cia-mi6-over-massive-secret-data-theft-7000008282/

Page 21: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion• MI6 and the CIA have been warned

that intelligence may have been compromised by an agent in Switzerland who downloaded vast quantities of data onto portable hard drives and carried it out of a secure building.

• The sources say that he downloaded "terabytes" of classified material from the Swiss intelligence service's servers onto portable hard drives. He then left the government building with a backpack containing the hard drives.

• Analyse this news item using the terms– Threat– Vulnerability– Attack– Control

Page 22: Computer Security Set of slides 1 Dr Alexei Vernitski.

Defence against attack: types of control

You may use the following verbs to describe the action of controls:

• Preempt• Prevent• Deter• Detect• Deflect• Recover

(read more in the textbooks)

Page 23: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion

• Student Rachel Hyndman, 20, from Glasgow, believes she was the victim of webcam hacking. She spotted the camera on her laptop had switched itself on while she was watching a DVD in the bath. She says: "I was sitting in the bath, trying to relax, and suddenly someone potentially has access to me in this incredibly private moment and it's horrifying. To have it happen to you without your consent is horribly violating.“

http://www.bbc.co.uk/news/uk-22967622

Page 24: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion

• She spotted the camera on her laptop had switched itself on while she was watching a DVD in the bath. She says: "I was sitting in the bath, trying to relax, and suddenly someone potentially has access to me in this incredibly private moment and it's horrifying.

• Discuss which types of control could have been used to defend against the attack– Preemption– Prevention– Deterrence– Detection– Deflection– Recovery

Page 25: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion

• Sony has admitted that the personal data of PSN users, which may have been illegally accessed in a recent attack on the system, was not encrypted.

• Discuss which types of control could have been used to defend against the attack– Preemption– Prevention– Deterrence– Detection– Deflection– Recovery

Page 26: Computer Security Set of slides 1 Dr Alexei Vernitski.

Example: online shop

• http://www.amazon.co.uk/• http://www.johnlewis.com/• http://store.apple.com/uk

Page 27: Computer Security Set of slides 1 Dr Alexei Vernitski.

For discussion: online shop

• Confidentiality• Integrity• Availability• (also non-repudiation)

• Threat• Vulnerability• Attack• Control– Preemption– Prevention– Deterrence– Detection– Deflection– Recovery

Page 28: Computer Security Set of slides 1 Dr Alexei Vernitski.

Security policyExample: an excerpt from Amazon security policy• We work to protect the security of your information during transmission by

using Secure Sockets Layer (SSL) software, which encrypts information you input.

• We reveal only the last four digits of your credit card numbers when confirming an order. Of course, we transmit the entire credit card number to the appropriate credit card company during order processing.

• We maintain physical, electronic and procedural safeguards in connection with the collection, storage and disclosure of personally identifiable customer information. Our security procedures mean that we may occasionally request proof of identity before we disclose personal information to you.

• It is important for you to protect against unauthorised access to your password and to your computer. Be sure to sign off when you finish using a shared computer.

Page 29: Computer Security Set of slides 1 Dr Alexei Vernitski.

Homework

• Find the security policy of the University of Essex.

• Read it, paying attention to security goals, attack analysis and controls.

Page 30: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• List three main types of security goals• Apple’s security policy says that Apple takes

measures ‘against unauthorised access, disclosure, alteration and destruction’. Explain precisely which security goals would be compromised by each of the following: unauthorised access, disclosure, alteration and destruction.

Page 31: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• Read the news item:– A former Sun newspaper reporter Ben Ashford has

been charged with an offence of unauthorised access to computer material. The charge alleges that he "caused a computer to perform a function with intent to secure unauthorised access to a program or data held in a computer, knowing that such access was unauthorised".

• Explain precisely which security goals could be compromised by Ben Ashford’s alleged actions

Page 32: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• Explain in your own words what the terms threat and vulnerability mean

• Read the news item:

Social networking website LinkedIn has said some of its members' passwords have been "compromised" after reports that more than six million passwords had been leaked onto the internet.

• Comment on this news item using all the necessary terms for attack analysis

Page 33: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• Read the news item:– Sony has admitted that the personal data of PSN

users, which may have been illegally accessed in a recent attack on the system, was not encrypted.

– Thankfully, credit card information was stored separately to the personal data and was encrypted.

• Comment on this news item using your knowledge of the types of controls

Page 34: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• Read the news item:– MI6 and the CIA have been warned that intelligence may have

been compromised by an agent in Switzerland who downloaded vast quantities of data onto portable hard drives and carried it out of a secure building.

– The sources say that he downloaded "terabytes" of classified material from the Swiss intelligence service's servers onto portable hard drives. He then left the government building with a backpack containing the hard drives.

• Comment on this news item, using the correct terms related to security goals, attack analysis and control types.

Page 35: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• The web site of a company claims:– We have industry standard and proprietary network

monitoring tools constantly running in our system in order to prevent security breaches and protect the security of your data.

– In addition, our secure page employs industry standard encryption.

• Improve this fragment of the company’s security policy, using the correct terms related to security goals, attack analysis and control types.

Page 36: Computer Security Set of slides 1 Dr Alexei Vernitski.

Sample exam questions

• The web site of a company claims: – Your password is stored securely using RSA

Encryption with a 1024-bit key– We use industry-standard 128 bit secure socket

layer SSL encryption • Defend this security policy, explaining why a

1024-bit encryption is used in one case, and a 128-bit encryption in the other.