1 / 75

Evolution of Computer Security: From Mainframes to the Internet

Explore the history of computer security from mainframes to the internet era, covering milestones, threats, and advancements in confidentiality, integrity, and availability. Understand the evolution of security practices over different epochs.

Download Presentation

Evolution of Computer Security: From Mainframes to the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSCD 434 Lecture 2 Spring 2019 Computer Security Overview Chapter 1 – Security+ Guide Text

  2. Overview • History of Computer Security • Definitions • Confidentiality, Integrity, Availability • Examples • Threats to Computer Systems • How bad is it? • Vulnerabilities • Defined, Statistics • Examples

  3. History of Computer Security

  4. History of Computer Security • Computer Security http://di.ionio.gr/~emagos/security/0/Gollmann%27s%20Chapter%201-%20History%20of%20Computer%20Security.pdf Computer security can trace its origins back to 1960s Multi-user systems Needed mechanisms for protecting the system from its users, and the users from each other • We observe that computer security has passed through the following epochs: • 1970s: Age of the Mainframe, • 1980s: Age of the PC, • 1990s: Age of the Internet, • 2000s: Age of the Web

  5. History of Computer Security • Age of the Mainframes • Mainframes were deployed in government departments and in large commercial organizations, prior to individual PC’s • Defense sector saw potential benefits of using computers • Yet, their main concern was • How do we protect classified information from unauthorized use in a mainframe environment? • Developed a formal statemachine model for multi-level security policies regulating access to classified data, • Bell–LaPadula model was highly influential for computer security research into 1980’s • Multics project developed an operating system that had security as one of its main design objectives

  6. History of Computer Security Age of the Mainframes • The solution was to first, model this problem of separation between users with different classifications • Then prove mathematically, data was safe • Developed a formal statemachine model for multi-level security policies regulating access to classified data, Bell–LaPadula modelwas highly influential for computersecurity research into 1980’s • Developed an Operating System based in part on security prinicples of separation of users Multics projectdeveloped an operating system that had security as one of its main design objectives

  7. History of Computer Security Multics, first OS to formally separate users and data https://en.wikipedia.org/wiki/Protection_ring

  8. Time out for a Quiz • What popular operating system was developed based on the Multics Operating System? Unix !!!!

  9. History of Computer Security • Mainframes continued • Multi-level Security(MLS) dominated security research into following decades • Leading to development of high-assurance systems whose design had to be verified employing formal methods Started with the Orange Book, and migrated to the Common Criteria … all governed by NSA • However, these high-assurance systems did not solve problems of following epochs

  10. History of Computer Security • Military dominated computer security • Obsessed with (Multi Level Security) = Confidentiality • Wanted to Prove formally that secrets could remain secret in presence of unclassified people in multi-user environment • Concerned with detecting covert channels where spies or insiders would signal each other • Great Collection of early security papers http://seclab.cs.ucdavis.edu/projects/history/

  11. Multi-level Security in a NutshellBell-Lapadula Model There are security classifications or security levels – Users/principals/subjects have security clearances – Objects have security classifications • Example Top Secret Secret Confidential Unclassified • Top Secret > Secret > Confidential > Unclassified • Security goal (confidentiality): Ensures that information does not flow to those not cleared for that level

  12. Summary of Traditional View 1. Computers were not as networked • Many standalone and mainframe systems 2. Multi-user systems • Concerned with multi-level security • Secrecy - confidentiality of primary concern • Second, was data integrity and maintaining access 3. Adversaries were at the highest levels

  13. History of Computer Security Age of the PC • PC was single user machine, first successful applications were word processors and spreadsheet programs … plus email !!! • Private, so no longer were concerned with classified data • At a stroke, multi-level security and multiuser security became irrelevant … for most users • 1980s also saw first worms and viruses • Proposed in research papers before they later appeared in wild

  14. Second Quiz … Who was the first to use term “computer worm” in print? John Brunner's 1975 novel, The Shockwave Rider

  15. History of Computer Security • Age of the Internet • World Wide Web (1991) and Graphical Web Browsers, 1993 created a whole new paradigm • Both developments fostered a whole new range of applications • Typical end system was PC, not stand-alone or connected to a LAN, but connected to Internet • Connecting a machine to Internet has major ramifications ... 1. System owner no longer controls who can send inputs to this machine 2. System owner no longer controls what input is sent to machine 3. Inputs can come from anywhere in the world

  16. History of Computer Security • Age of the Internet continued ... • Malformed packets could be sent to private computers attached to Internet • Exploit vulnerabilities in software • On-line denial-of-service attacks became possible towards end of 1990’s • This was greatly expanded into 2000's with World Wide Web ...

  17. History of Computer Security • Age of the World Wide Web • Application-level software for Web services has become main target for attacks • Major attack patterns are: • SQL injection • Crosssite scripting • Attacks against domain name system • Application software accounts for increasing number of reported vulnerabilities and real attacks • Attacks have stolen contact data from pretty much everyone …. ransomeware attacks for businesses

  18. History of Computer Security • World Wide Web Continued • Picture of attacker has changed • Hackers of 1990s often matched stereotype • Male in his teens or twenties with limited social skills • In rare cases, attacks were for financial gain • Today, criminal organizations dominate • Criminals have no interest in high profile fast spreading worm attacks … for fun !!! • Place trojans on victims’ machines to harvest sensitive data, passwords, PINs, or Credit Cards or use victims’ machines as part of a botnet • Ransomeware has recently become common

  19. Modern State of Computer Security

  20. Modern State of Computer Security 1. Computers are Connected and Interdependent This codependency magnifies effects of any failures Slammer worm, 2003, Infected 75,000 computers in 11 minutes Continued to scan 55 million computers / sec Blaster worm, 2003, Infected 138,000 in first 4 hours Over 1.4 million computers worldwide Many others ....

  21. Modern State of Computer Security 2. Computing today is very Homogeneous • A single architecture and a handful of OS's dominate • Linux, Mac OS and Windows • In biology, homogeneous populations ... terrible idea • A single disease or virus can wipe them out because they all share the same weakness • The disease needs one infection method!! - Potaoe famine of Ireland • Computers are the animals ... think cows • Internet provides the infection vector ... virus that sickens cows ... Mad Cow disease

  22. Modern State of Computer Security 3. Adversaries are all levels and Global • Range from script kiddies to serious groups such as those that steal defense secrets or industrial espionage • Global reach with many attackers in countries where we can't extradite them • China, Eastern Europe, Russia and S. America Hacker Timeline http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history

  23. Modern State of Computer Security 4. All Data is Vulnerable There have been so many data breeches, nearly everyone is affected A few recent examples: • Equifax, global credit ratings agency who experienced a data breach that affected a staggering 147 Million customers • Yahoo, web giant that suffered a breach affecting every one of its three Billion customer accounts.

  24. Computer Security Definitions

  25. Security Defined • System is Secure if … • Has these properties • Confidentiality • Integrity • Availability C.I.A

  26. Confidentiality Defined • Confidentiality • What does it mean for data to be confidential? • Data must only be accessed, used, copied, or disclosed by persons who have been authorized • To access, use, copy, or disclose information … • You ensure information is not accessed by unauthorized users

  27. Confidentiality Example • Communication between two people should not be compromised Threats We have made an important discovery … Eavesdropping, packet sniffing, illegal copying network

  28. Definitions • More on Confidentiality • How do you prevent confidentiality loss? • Confidentiality is maintained by preventing disclosure of information to unauthorized individuals or systems • Example, credit card transaction on the Internet • System enforces confidentiality by encrypting card number during transmission

  29. Integrity Defined • Integrity • What is Data Integrity? • Data must not be • Created • Changed, or • Deleted without authorization • Ensuring that information is not altered by unauthorized persons

  30. Integrity Defined • Messages should be received as originally intended Threats Intercept messages, tamper, release again I love you darling!! I don’t want to see you again network

  31. Definitions More on Integrity • Integrity means that data cannot be modified without authorization • Example of violation • Integrity is Violated • When an employee (accidentally or with malicious intent) deletes important data files, • When a computer virus infects a computer, • When an employee is able to modify his own salary in a payroll database, • When unauthorized user vandalizes web site

  32. Availability Defined • Availability • Systems function correctly when information is provided when its needed • The opposite of availability is denial of service (DoS)‏

  33. Availability Example • Disrupting communications completely Threats Overwhelm or crash servers, disrupt infrastructure network

  34. Definitions More on Availability • Information must be available when it is needed. • High availability systems goal is remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades • Example of violation? • Ensuring availability also involves preventing DoS attacks denial-of-service attacks

  35. CIA • While a good way to measure system security • DOD environment • Not sufficient for modern computers • Today’s world, computers are more complex • Many more layers of applications and uses • More difficult to both define and measure security

  36. Simple View Computer Security • You have something you want to protect • You have someone or something you want to protect it from • You are willing to expend effort and resources in order to protect it

  37. Question • Is Computer Security a Process or a State?

  38. Security Defined • It is a process, not a state There is no fundamental point when system is secure • Have Risk, • Do Assessment • Manage risk, • Mitigate what can't be managed • Need to identify what’s “Good Enough” • Security is a tradeoff, can't protect everything

  39. Examples

  40. ATM Machine Example • ATM Machine • User asks for cash, spits it out • Door opens, user takes cash, door closes • What happens if user doesn’t take cash?

  41. ATM Machine Example • Assumption if this happens, subsequent user shouldn’t get cash that doesn’t belong to him • All following transactions, machine refuses to open door • Cash could go to wrong user • Creates a DoS for rest of users

  42. Security Protocols Difficult • Hard to get security protocols right • Designers don’t anticipate everything that could go wrong • Users or attackers frequently seem to find the flaw • Even something seemingly simple can have flaws

  43. US Tax System Example • Tax refunds, how hard is that? • Algorithm for processing form • Verify identity of form filled out by a given person • Verify income and with-holding are correct • If these two steps ok && amount of Withholding > tax owed • then send person refund check • What could go wrong?

  44. US Tax System Example • Except … no rule against duplicate checks • Person could file for multiple refund checks under this system • And, that happened for a while • Was eventually caught …

  45. Computer Security Threats

  46. Threats to Computer Security • So, what are the threats? • Passive • Sniffing of data • Viewing of information – physical • Over your shoulder, taking pictures of screens • Dumpster diving • Social Engineering • Active • Interception of data, injection of data • Virus, worm, trojan horse program • DOS or DDOS

  47. Measuring Computer Security • How do you measure security? • How would you do it? • Several ways to estimate computer status • Vulnerabilities in software and systems • Severity of the vulnerability • Reported incidents – Data breeches, attacks • Numbers of malware “signatures” • Reported social engineering explooits

  48. Is Security that Bad? License

  49. US Government Security Incidents https://digital.gov/2016/10/25/federal-cybersecurity-challenges/

  50. How big is the security problem? CERT Vulnerabilities reported http://www.cert.org/stats/

More Related