120 likes | 242 Views
Computer System Security CSE 5339/7339. August 19 2004. Contents. Class Organization Introduction to Security Review of main concepts Algorithms Operating systems …. Trustworthy Systems. Trustworthiness = Reliability + Security + Privacy + Usability.
E N D
Computer System SecurityCSE 5339/7339 August 19 2004
Contents • Class Organization • Introduction to Security • Review of main concepts • Algorithms • Operating systems • ….
Trustworthy Systems Trustworthiness = Reliability + Security + Privacy + Usability
The Role of Security Security is like adding brakes to cars. The purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. Better security is an enabler for greater freedom and confidence in the Cyber world.
Four Grand Challenges (November 2003) • Eliminate epidemic-style Attacks with 10 years • Viruses and worms • SPAM • Denial of Service Attacks (DOS) • Develop tools and principles that allow the construction of large-scale systems for important societal applications that are highly trustworthy despite being attractive targets • Within 10 years, quantitative information-systems risk management is at least as good as quantitative financial risk management • For the dynamic, pervasive computing environments of the future, give end-users security they can understand and privacy they can control.
Computer-Based System • Hardware • Software • Data • Vulnerability • Weakness (to be exploited) • Threat • Circumstances (Potential to cause harm) • Attack • Exploits vulnerabilities (Threat is blocked by control of a vulnerability)
Control – Protective measure • Action, device, procedure, or technique that removes or reduces a vulnerability • Threats • Interception • Unauthorized party has gained access to an asset • Interruption • An asset becomes lost, unavailable, or unusable • Modification • Unauthorized party tampers with an asset • Fabrication • Unauthorized party may create objects
Assets are accessed only by authorized people Security Goals Confidentiality Availability Integrity Assets can be modified only by authorized people Assets are accessible to authorized people
Main Components in Sending Messages sender Medium receiver Block it Intercept it Modify it Fabricate an authentic looking message Intruder
Cryptography • Secret writing • Disguised data cannot be read, modified, or fabricated easily • Encryption : encoding (encipher) • plaintext cipher text P = <p1, p2, p3, .., pn> C = <c1, c2, c3, .., cm> C = E(c) (E = encryption rule) • Decryption : decoding (decipher) • Cipher text plaintext C = <c1, c2, c3, .., cm> P = <p1, p2, p3, .., pn> P = D(c) (D = decryption rule)
Original plaintext Encryption keyless plaintext ciphertext Encryption Decryption Symmetric key Original plaintext plaintext ciphertext Encryption Decryption Asymmetric key Original plaintext plaintext ciphertext Encryption Decryption
Review of Main Concepts • Algorithms • Operating Systems • …. Students Participation