WQD7010 Network Security L1
WQD7010 Network Security L1
Availability
• Assures that systems work promptly and service is not denied to
authorized users
Possible additional concepts:
Authenticity Accountability
• Verifying that users are • The security goal that
who they say they are generates the
and that each input requirement for actions
arriving at the system of an entity to be traced
came from a trusted uniquely to that entity
source
Definitions
Computer Security or Information Security
generic name for the collection of tools designed to protect data
and to thwart hackers
Network Security
measures to protect data during their transmission (crucial in
distributed system, networks and communication facilities)
Internet Security
measures to protect data during their transmission over a
collection of interconnected networks (Internetwork security)
Security Focus
Consists of measures to prevent, detect, and correct security
violations that involve the storage and transmission of
information
Few Examples:
• A transmits a sensitive file to B that must be protected from
disclosure. C, not authorized to read the file, monitors the
transmission and captures the file during transmission
• D intercepts a message during transmission, changes the content
and transmits to F as if it originated from E.
• A message is sent from a customer to a stockbroker with
instructions of transactions. Subsequently, the investments lose
value and the customer denies sending the message
Breach of Security: Levels of Impact
• The loss could be expected to have a severe or
catastrophic adverse effect on organizational
Hi operations, organizational assets, or individuals
gh
• The loss could be expected to have a
serious adverse effect on organizational
Patient information
stored in a database – The more critical a
Student grade inaccurate information component or service,
information is an asset could result in serious the higher the level of
whose confidentiality is harm or death to a availability required
considered to be highly patient and expose the
important by students hospital to massive
liability A moderate availability
A Web site that offers a requirement is a public
forum to registered users Web site for a university
to discuss some specific
topic would be assigned
Regulated by the Family a moderate level of An online telephone
Educational Rights and integrity directory lookup
Privacy Act (FERPA) An example of a low- application would be
integrity requirement is classified as a low-
an anonymous online poll availability requirement
Computer Security Challenges
Security is not simple Security mechanisms typically
Potential attacks on the security involve more than a particular
features need to be considered algorithm or protocol
Procedures used to provide Security is essentially a battle of
particular services are often wits between a perpetrator and
counter-intuitive the designer
It is necessary to decide where Little benefit from security
to use the various security investment is perceived until a
mechanisms security failure occurs
Requires constant monitoring Strong security is often viewed
Is too often an afterthought as an impediment to efficient
and user-friendly operation
OSI Layer
OSI Security Architecture
ITU-T X.800 “Security Architecture for OSI” defines a systematic
way of defining and providing security requirements
Provides a useful, if abstract, overview of concepts that we will
study
A systematic approach is necessary to address the task(s)
OSI security architecture provides a useful framework that
defines such a systematic way
− To define the security requirements and
− Adopt approaches to satisfy those requirements
OSI Security Architecture
Focusing on three aspects of information
security
Security Attacks
Security Mechanism
Security Services
Security Attacks
Any action that compromises the security of
information owned by an organization
Vulnerability: a weakness in a computer system that might be exploited
to cause loss or harm
Threat: circumstances that have the potential to cause loss or harm
Control: a protective measure
Information security is about how to prevent attacks,
or failing that, to detect attacks on information-based
systems
often threat & attack are used to mean the same thing
Have a wide range of attacks
Can focus on generic types of attacks
Threats and Attacks (RFC 4949)
Security Attacks - Taxonomy
A security attack may attempt to do one or more of the
following:
– Interruption: an attack on availability
– Interception: an attack on confidentiality
– Modification: an attack on integrity
– Fabrication: an attack on authenticity
Two types of security attacks:
– Passive Attacks
– Active Attacks
Interruption
Also known as denial of services (DoS).
Information resources (hardware, software
and data) are deliberately made unavailable,
lost or unusable, usually through malicious
destruction.
e.g.: cutting a communication line, disabling a
file management system, etc.
Interception
Also known as un-authorized access.
Difficult to trace as no traces of
intrusion might be left.
e.g: illegal eavesdropping or
wiretapping or sniffing, illegal
copying.
Modification
Also known as tampering a resource.
Resources can be data, programs,
hardware devices, etc.
Fabrication
Also known as counterfeiting (of objects such as data,
programs, devices, etc).
Allows to by-pass the authenticity checks.
e.g.: insertion of spurious messages in a network,
adding a record to a file, counterfeit bank notes, fake
cheques,2
impersonation/masquerading
– to gain access to data, services etc..
Security Attacks - Taxonomy
Passive Attacks
Nature: eavesdropping on, or monitoring of, transmission of
information between the communicating parties
Goal: to capture information during transmission
Intercept or modify
Exploit service
data on behalf of
flaws in computers
users who should
to inhibit use by
not have access to
legitimate users
that data
Standards
NIST ISOC
National Institute of Standards Internet Society
and Technology Professional membership society
U.S. federal agency that deals with worldwide organizational and
with measurement science, individual membership
standards, and technology
Provides leadership in addressing
related to U.S. government use
and to the promotion of U.S.
issues that confront the future of
private-sector innovation the Internet
NIST Federal Information Is the organization home for the
Processing Standards (FIPS) and groups responsible for Internet
Special Publications (SP) have a infrastructure standards, including
worldwide impact the Internet Engineering Task
Force (IETF) and the Internet
Architecture Board (IAB)
Internet standards and related
specifications are published as
Requests for Comments (RFCs)
Summary
Computer security Security services
concepts Authentication
Definition Access control
Examples Data confidentiality
Challenges Data integrity
The OSI security Nonrepudiation
architecture Availability service
Security attacks Security mechanisms
Passive attacks Attack surfaces and attack
Active attacks
trees
Model for network security Attack surfaces
Standards Attack trees
Further reading
Chapter 1 of the textbook: Network
Security Essentials- Application &
Standards” by William Stallings 6th
Edition, 2017
http://www.cybersafe.my/cyberyouths-posters.html