Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford...

17
Working Connection Working Connection Computer and Network Computer and Network Security Security - Introduction - - Introduction - Dr. Hwajung Lee Dr. Hwajung Lee Radford University Radford University

Transcript of Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford...

Page 1: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Working ConnectionWorking Connection

Computer and Network Computer and Network SecuritySecurity

- Introduction -- Introduction -

Working ConnectionWorking Connection

Computer and Network Computer and Network SecuritySecurity

- Introduction -- Introduction -Dr. Hwajung LeeDr. Hwajung Lee

Radford UniversityRadford University

Page 2: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Assignment• A description of yourself, which

includes:– Your name, email, affiliation– Your area specialty (be specific)– The reason you are taking this class– A statement saying your level of

knowledge on computer networks and discrete mathematics.

Page 3: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Topics will include:1. Introduction

– a. Security, Threats, and Vulnerabilities– b. Security Models– c. Cryptography and Cryptanalysis

2. Security Basics and Theory– a. Authentication– b. Protocols

3. Network Security– a. IPsec– b. Firewalls

4. Special Topics– a. Web security

Page 4: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Course textbookTextbook:

Kaufman, C., Perlman, R. and Speciner, M., Network Security (Private Communication in a Public World), 2nd edition, Prentice Hall 2002.

References:William Stalling, Cryptography and Network Security, 2nd edition, Prentice Hall 1999.

Class notes: Computer Security, Pennsylvania State University http://www.cse.psu.edu/~cg543/

Page 5: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Class website• http://www.radford.edu/~hlee3/class

es/itec693/itec693_SecurityBasic/ITEC693_schedule.htm

• Group Presentation– See details in the class website

Page 6: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

You need a basic understanding of

• Networks• Discrete Mathematics

Page 7: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

What is Computer/Information Security?• Garfinkel and Spafford (1991)

– “A computer is secure if you can depend on it and its software to behave as expected.”

– Not really satisfactory – does not truly capture that security speaks to the behavior of others

• Expected by whom?• Under what circumstances?

• McDaniel (2003)– “… information security (research) is the study oftechnologies that guarantee the privacy, access,

andquality of electronic resources.”

Page 8: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Risk• At-risk valued resources that can be misused

– Monetary– Data (loss or integrity)– Time– Confidence– Trust

• What does being misused mean?– Privacy (personal)– Confidentiality (communication)– Integrity (personal or communication)– Availability (existential or quality)

• Q: What is at stake in your life?

Page 9: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Threat• A threat is a specific means by which a

risk can be realized– Context specific (a fact of the environment)– An attack vector is a specific threat (e.g., key

logger)

• A threat model is a collection of threats that deemed important for a particular environment– E.g., should be addressed– A set of “ security requirements” for a system

Page 10: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Vulnerability• A vulnerability is a systematic artifact that

exposes the user, data, or system to a threat– E.g., buffer-overflow, WEP key leakage

• What is the source of a vulnerability?– Bad software (or hardware)– Bad design, requirements– Bad policy/configuration– System Misuse

• unintended purpose or environment• E.g., student IDs for liquor store

Page 11: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Adversary• An adversary is any entity trying to

circumvent the security infrastructure– The curious and otherwise generally clueless

(e.g., scriptkiddies)– Casual attackers seeking to understand

systems– Venal people with an ax to grind– Malicious groups of largely sophisticated users

(e.g, chaos clubs)– Competitors (industrial espionage)– Governments (seeking to monitor activities)

Page 12: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Are Users Adversaries?

• Have you ever tried to circumvent the security of a system you were authorized to access?

• Have you ever violated a security policy (knowingly or through carelessness)?

Page 13: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Attacks• An attack occurs when someone attempts

to exploit a vulnerability

• Kinds of attacks– Passive (e.g., eavesdropping)– Active (e.g., password guessing)

• A compromise occurs when an attack is successful– Typically associated with taking over/altering

resources

Page 14: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Participants• Participants are expected system entities

– Computers, agents, people, enterprises, …– Depending on context referred to as: servers,

clients, users, entities, hosts, routers, …– Security is defined with respect to these

entitles• Implication: every party may have unique view

• A trusted third party– Trusted by all parties for some set of actions– Often used as introducer or arbiter

Page 15: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Trust• Trust refers to the degree to which an entity is

expected to behave– What the entity not expected to do?

• E.g., not expose password– What the entity is expected to do (obligations)?

• E.g., obtain permission, refresh

• A trust model describes, for a particular environment, who is trusted to do what?

• Note: you make trust decisions every day– Q: What are they?– Q: Whom do you trust?

Page 16: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Security Model• A security model is the combination of a trust and threat

models that address the set of perceived risks– The “security requirements” used to develop some cogent and

comprehensive design– Every design must have security model

• LAN network or global information system• Java applet or operating system

– The single biggest mistake seen in use of security is the lack of a coherent security model

– It is very hard to retrofit security (design time)• This class is going to talk a lot about security models

– What are the security concerns (risks)?– What are the threats?– Who are our adversaries?– Who do we trust and to do what?

• Systems must be explicit about these things to be secure.

Page 17: Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.

Example: Security Models• Assume we have a University website

that hosts courses through the web– Syllabus, other course information– Assignments submissions– Online Grading

• In class: elements of the security model– Participants– Adversaries– Risks– Threats