290 likes | 429 Views
An Overview of Computer Security. Outline. Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues. Status of security in computing. In terms of security, computing is very close to the wild west days.
E N D
An Overview ofComputer Security csci5233 computer security & integrity
Outline • Components of computer security • Threats • Policies and mechanisms • The role of trust • Assurance • Operational Issues • Human Issues csci5233 computer security & integrity
Status of security in computing • In terms of security, computing is very close to the wild west days. • Some computing professionals & managers do not even recognize the value of the resources they use or control. • In the event of a computing crime, some companies do not investigate or prosecute. csci5233 computer security & integrity
Characteristics of Computer Intrusion • A computing system: a collection of hardware, software, data, and people that an organization uses to do computing tasks • Any piece of the computing system can become the target of a computing crime. • The weakest point is the most serious vulnerability. • The principles of easiest penetration csci5233 computer security & integrity
Security Breaches- Terminology • Exposure • a form of possible loss or harm • Vulnerability • a weakness in the system • Attack • Threats • Human attacks, natural disasters, errors • Control – a protective measure • Assets – h/w, s/w, data csci5233 computer security & integrity
Types of Security Breaches • Disclosure: unauthorized access to info • Snooping • Deception: acceptance of false data • Modification, spoofing, repudiation of origin, denial of receipt • Disruption: prevention of correct operation • Modification, man-in-the-middle attack • Usurpation: unauthorized control of some part of the system (usurp: take by force or without right) • Modification, spoofing, delay, denial of service csci5233 computer security & integrity
Security Components • Confidentiality: The assets are accessible only by authorized parties. • Keeping data and resources hidden • Integrity: The assets are modified only by authorized parties, and only in authorized ways. • Data integrity (integrity) • Origin integrity (authentication) • Availability: Assets are accessible to authorized parties. • Enabling access to data and resources csci5233 computer security & integrity
Computing System Vulnerabilities • Hardware vulnerabilities • Software vulnerabilities • Data vulnerabilities • Human vulnerabilities ? csci5233 computer security & integrity
Software Vulnerabilities • Destroyed (deleted) software • Stolen (pirated) software • Altered (but still run) software • Logic bomb • Trojan horse • Virus • Trapdoor • Information leaks csci5233 computer security & integrity
Data Security • The principle of adequate protection • Storage of encryption keys • Software versus hardware methods csci5233 computer security & integrity
Other Exposed Assets • Storage media • Networks • Access • Key people csci5233 computer security & integrity
People Involved in Computer Crimes • Amateurs • Crackers • Career Criminals csci5233 computer security & integrity
Methods of Defense • Encryption • Software controls • Hardware controls • Policies • Physical controls csci5233 computer security & integrity
Encryption • at the heart of all security methods • Confidentiality of data • Some protocols rely on encryption to ensure availability of resources. • Encryption does not solve all computer security problems. csci5233 computer security & integrity
Software controls • Internal program controls • OS controls • Development controls • Software controls are usually the 1st aspects of computer security that come to mind. csci5233 computer security & integrity
Policies and Mechanisms • Policy says what is, and is not, allowed • This defines “security” for the site/system/etc. • Mechanisms enforce policies • Mechanisms can be simple but effective • Example: frequent changes of passwords • Composition of policies • If policies conflict, discrepancies may create security vulnerabilities • Legal and ethical controls • Gradually evolving and maturing csci5233 computer security & integrity
Principle of Effectiveness • Controls must be used to be effective. • Efficient • Time, memory space, human activity, … • Easy to use • appropriate csci5233 computer security & integrity
Overlapping Controls • Several different controls may apply to one potential exposure. H/w control + S/w control + Data control csci5233 computer security & integrity
Goals of Security • Prevention • Prevent attackers from violating security policy • Detection • Detect attackers’ violation of security policy • Recovery • Stop attack, assess and repair damage • Continue to function correctly even if attack succeeds csci5233 computer security & integrity
Trust and Assumptions • Underlie all aspects of security • Policies • Unambiguously partition system states • Correctly capture security requirements • Mechanisms • Assumed to enforce policy • Support mechanisms work correctly csci5233 computer security & integrity
Types of Mechanisms secure broad precise set of reachable states set of secure states csci5233 computer security & integrity
Assurance • Specification • Requirements analysis • Statement of desired functionality • Design • How system will meet specification • Implementation • Programs/systems that carry out design csci5233 computer security & integrity
Operational Issues • Cost-Benefit Analysis • Is it cheaper to prevent or to recover? • Risk Analysis • Should we protect something? • How much should we protect this thing? • Laws and Customs • Are desired security measures illegal? • Will people do them? csci5233 computer security & integrity
Human Issues • Organizational Problems • Power and responsibility • Financial benefits • People problems • Outsiders and insiders • Social engineering csci5233 computer security & integrity
Tying Together Threats Policy Specification Design Implementation Operation csci5233 computer security & integrity
Key Points • Policy defines security, and mechanisms enforce security • Confidentiality • Integrity • Availability • Trust and knowing assumptions • Importance of assurance • The human factor csci5233 computer security & integrity