Ch01 NetSec6e
Ch01 NetSec6e
Security
Chapter 1
Introduction
Quotations
The combination of space, time, and strength that must be considered
as the basic elements of this theory of defense makes this a fairly
complicated matter. Consequently, it is not easy to find a fixed point
of departure.
— On War, Carl Von Clausewitz
The art of war teaches us to rely not on the likelihood of the enemy's
not coming, but on our own readiness to receive him; not on the
chance of his not attacking, but rather on the fact that we have
made our position unassailable.
—The Art of War, Sun Tzu
2 2/12/2022
Computer Security
Concepts
• Before the widespread use of data processing equipment, the security of
information valuable to an organization was provided primarily by physical
and administrative means
• With the introduction of the computer, the need for automated tools for
protecting files and other information stored on the computer became evident
• Computer security
• The generic name for the collection of tools designed to protect data and to thwart
hackers
3 2/12/2022
“The protection afforded to
Computer an automated information
Security system in order to attain
the applicable objectives of
preserving the integrity,
availability, and
The NIST Computer Security confidentiality of
Handbook defines the term information system
computer security as: resources (includes
hardware, software,
firmware,
information/data, and
telecommunications)”
4 2/12/2022
Computer Security
Objectives
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or disclosed
to unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them may
be collected and stored and by whom and to whom that information may be
disclosed
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to authorized
users
5 2/12/2022
CIA Triad
6 2/12/2022
Possible additional
concepts:
Authenticity Accountability
• Verifying that users • The security goal
are who they say that generates the
they are and that requirement for
each input arriving at actions of an entity
the system came to be traced uniquely
from a trusted source to that entity
7 2/12/2022
Breach of Security
Levels of Impact
• The loss could be expected to have a severe or
High catastrophic adverse effect on organizational
operations, organizational assets, or individuals
2/12/2022 10
OSI Security
Architecture
• Security attack
• Any action that compromises the security of information
owned by an organization
• Security mechanism
• A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack
• Security service
• A processing or communication service that enhances the
security of the data processing systems and the information
transfers of an organization
• Intended to counter security attacks, and they make use of one
or more security mechanisms to provide the service
11 2/12/2022
Table 1.1
Threats and Attacks (RFC 4949)
12 2/12/2022
Security
Attacks
•A means of classifying security
attacks, used both in X.800 and RFC
4949, is in terms of passive attacks and
active attacks
2/12/2022 13
Passive
Attacks
2/12/2022 14
Active Attacks
• Involve some modification of the
data stream or the creation of a • Takes place when one entity
pretends to be a different entity
false stream Masquerade • Usually includes one of the other
forms of active attack
• Difficult to prevent because of the
wide variety of potential physical,
• Involves the passive capture of a
software, and network data unit and its subsequent
vulnerabilities Replay retransmission to produce an
unauthorized effect
• Goal is to detect attacks and to
recover from any disruption or
• Some portion of a legitimate
delays caused by them Modification message is altered, or messages
of messages are delayed or reordered to
produce an unauthorized effect
16 2/12/2022
X.800 Service Categories
• Authentication
• Access control
• Data confidentiality
• Data integrity
• Nonrepudiation
17 2/12/2022
Table 1.2
Security
Services
(X.800)
20 2/12/2022
Data Confidentiality
• The protection of transmitted data from passive attacks
• Broadest service protects all user data transmitted between
two users over a period of time
• Narrower forms of service include the protection of a single
message or even specific fields within a message
21 2/12/2022
Data Integrity
22 2/12/2022
Nonrepudiation
23 2/12/2022
Availability service
• Availability
• The property of a system or a system resource being
accessible and usable upon demand by an authorized
system entity, according to performance specifications for
the system
• Availability service
• One that protects a system to ensure its availability
• Addresses the security concerns raised by denial-of-
service attacks
• Depends on proper management and control of system
resources
24 2/12/2022
Table 1.3
Security
Mechanisms
(X.800)
26 2/12/2022
Network Access
Security Model
27 2/12/2022
Unwanted Access
• Placement in a computer
system of logic that exploits Programs can
present two kinds of
vulnerabilities in the system threats:
and that can affect
application programs as well
as utility programs
Information access
Service threats
threats
Intercept or modify
Exploit service flaws
data on behalf of
in computers to
users who should
inhibit use by
not have access to
legitimate users
that data
28 2/12/2022
standards
NIST ISOC
• National Institute of Standards and • Internet Society
Technology
• Professional membership society
with worldwide organizational and
• U.S. federal agency that deals with individual membership
measurement science, standards,
and technology related to U.S. • Provides leadership in addressing
government use and to the issues that confront the future of
promotion of U.S. private-sector the Internet
innovation
• Is the organization home for the
groups responsible for Internet
• NIST Federal Information infrastructure standards, including
Processing Standards (FIPS) and the Internet Engineering Task
Special Publications (SP) have a Force (IETF) and the Internet
Architecture Board (IAB)
worldwide impact
• Internet standards and related
specifications are published as
29 Requests for Comments (RFCs) 2/12/2022
Summary
• Computer security concepts • Security services
• Definition • Authentication
• Examples • Access control
• Challenges • Data confidentiality
• Data integrity
• The OSI security
• Nonrepudiation
architecture
• Availability service
• Security attacks
• Security mechanisms
• Passive attacks
• Active attacks • Model for network security
• Standards
30 2/12/2022