Unit 1
Unit 1
1.1 Objectives 6
1.2 Goals of Computer Security 6
1.2.1 Integrity
1.2.2 Coafidentiality
1.2.3 Availability
1.3 Security Problem and Requirements
1.3.1 Identifying the Assets
1.3.2 ldentifylng the Threats
1.3.3 ldentifyjngthe Impact
1.4 Threats and Vulnerabilities
1.5 User Authentication
1.6 Security System and Facilities
1.6.1 System Access Control
1.6.2 Password Management
1.6.3 Privileged User Management
1.6.4 User Account Management
1.6.5 Data Resource Protection
1.6.6 Sensitive System Protection
1.7 Cryptography 17
1.8 Intrusion Detection 18
I .9 Computer- Security Classifications 19
1.10 Summary 21
1.0 INTRODUCTION
Computer Security can be defined as technological and managerial procedures applied
to computer systems to ensure the availability, integrity, and confidentiality ofthe
information managed by the computer. It means the protection of Integrity, Availability
and Confidentiality of Computer Assets and Services from associated Threats and
vulnerabilities.
Security is divided into two categories; (a) computer security and (b) network security.
In generic terms, computer security is the process of securing a single, standalone
computer; while network security is the process of securing an entire network of
computers.
1.1 OBJECTIVES
After going through this unit you will be able to:
know of the threats to computer security;
understand what causes these threats, and
know various security techniques.
1.2.1 Integrity
The data Integrity in computer security deals with the knowledge that data has not
been modified. Data Integrity is related to data accuracy, but integrity and accuracy
are not the same. For example, if information is entered incorrectly, it will remain
incorrect. So, it is possible to have Data Integrity without Data Accuracy.
Integrity means preventing unauthorised modification. To preserve the integrity of an
item means that the item is unmodified, precise, accurate, modified in an acceptable
way by authorised people, or consistent.
1.2.2 Confidentiality
Confidentiality means preventing unauthorised access. It ensures that only the
authorised person accesses the computer system. Not all data available on the
computer falls in the category of confidential data. There is data that can be made
public and there is data that is considered sensitive. It is this critical or sensitive dsr~a
that will require confidentiality. Data confidentiality cannot be enforced unless data
integrity is present. The following items could require data confidentiality: credit card
files, medical records, personnel data, mission-critical data, and R&D data etc.
1.2.3 Availability
There is no point in making the computer system so secure that no users can access
the data they need to perform their jobs effectively.
The system should be accessible to authorised persons at appropriate times.
A computer system is available if
The response time is acceptable
There is a fair allocation of resources
Fault tolerance exists
It is user friendly
Concurrency control and deadlock management exists. Terms like concurrency
control and deadlock manbgeinent will be discussed in the operating system course. Security Concepts
Identifying impact.
b
Assessing the consequences of each threat;
Estimating the cost'of each attack;
Estimating the cost of potential counter measure, and
Selecting the optimum and cost effective security system.
The consequence of a threat materialised in an organisation could result in one or more Security Concepts
impacts. For example, an impact can be:
Infringement of privacy
Financial loss
Disruption of activities.
A threat can be accidental or deliberate and the various types of security breaches can
be classified as (a) interruption, (b) interception, (c) modification and (d) fabrication.
Interception: Some uilauthorised entity can gain access to a computer asset. This
unauthorised entity can be a person, a program, or a computer system.
Modification: Some unauthorised party not only accesses but also tampers with
the computer asset.
Alter a program
Modification in hardware.
Opportunity: Opportuility means the right time and right access to perform
the attack.
A computer system has three valuable components as pointed out earlier: hardware,
software and data. Vulnerability is a weakness in the system. This weakness may be
exploited by threats causing lossldamage or harm to the system. Vulnerability does not
cause any harm unti! exploited. It can be a weakness in: (a) Procedures, (b) Design
and (c) Implementation.
The various vulnerability examples are: insufficient security training, lack of security
awareness, inadequate recruitment procedures, insufficient preventive maintenance,
lack of identification and authentication mechanisms, transfer of password in readable
form (clear text), unprotected public network connections, poor password management,
well-known flaws in the software, unsupervised work by external staff, no security
policy, exposedJunprotected communication lines, poor cable joint, inadequate system
management, no audit-trail, wrong allocation of access rights or permissions, lack of
docu~nentationand dialup connections, etc.
................................................................................................................................
................................................................................................................................
................................................................................................................................
2) Justifj, the following statement:
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
\ f
Two or more methods can be combined for more solid authentication; for example, an
identity card and PIN combination.
The computer system needs a system in place to be sure that only authorised users
have access to its resources. On the computer system, one of the critical areas of
security is who has access to what.
There are two types of access control that can be implemented:
Mandatory Access Control (MAC) : MAC is an access control policy that
supports a system with highly secret or sensitive information. Government
agencies typically use a MAC.
Discretionary Access Control (DAC) : DAC is an access control policy that uses
the identity of the user or group that they belong to allow authorised access. It is
discretionary in that the administrator can control who has access, to what and
what type of access will they have, such as create or write, read, update, or
delete.
Authentication occurs when a user provides the requested information to an
authentication verification authority. The traditional method of authentication is to
provide a password.
To increase the level of reliability, biometric authentication can be introduced. The user
is not only identified digitally, but by their physical characteristics such as fingerprint
scan, iris scans or hand geometry.
Authentication Token: It is a portable device used for authenticating a user. The
tokens are devices that operate by using systems such as:
Hardware Tokens
-
Challenge and response: It is an authentication technique using a calculator
type of token that contains identical security keys or algorithms as Access
Server, which sends an unpredictable challenge to the user, who compupes a
response using their authentication response token.
Time-based challenge response "'Token:The Time-based Token ~ltilisesan
authentication method where the security token and server use an identical
algorithm. To gain access, the user takes the code generated by the token and
adds his or her user name and PIN to create a pass code. The pass code is
combined with a seed value and the current time, encrypted with an algorithm
and sent to the server. The server authenticates the user by generating its own
version of the valid code by accessing the pre-registered PIN and using the same
seed value and algorithm for validation.
Security and Software Token
Management
If an organisation does not wish to purchase hardware tokens, it may opt for a
software type instead. A software token is an authentication process using portable
devices such as a Palm Pilot, Palm PC, or wireless telephone to carry the embedded
software.
Firewall
The firewall is the first line of defense for any computer system or network. All
packets that enter the network should come through this point. A modern firewall is a
system of applications and hardware working together. A sophisticated firewall
performs a combination of packet filtering, network address translation (NAT), and
proxy services. These applications are depicted in Figures 2, 3 and 4 respectively.
Firewalls have two general methods of implementing security for a network. Although
variations between these two exist, most modifications belongs to one or the other of
the following:
Packet Filtering were designed to look at header information of the packet. Packet
Filtering, shown in Figure 2, was the first type of firewall used by many organisations
to protect their network. The general method of implementing a packet filter was to
use a router. These routers had the ability to either permit or deny packets based on
simple rules.
Proxy Servers use software to intercept network traffic that is destined for a given
application. The proxy server, shown in Figure 3, recognises the request, and on
behalf of the client makes the request to the server. In this, the internal client never
makes a direct connection to the external server. Instead, the proxy functions as man-
in-the-middle and speaks to both the client and server, relaying the message back and
forth. The addition of proxy server capabilities added to lhe firewalls created a much
more solid security product than a pure packet filter. Proxy software can make
a
decisions based on more than the header information of a packet.
Packet Private
INTERNET Filtering Network
Router
Private
b Network
A firewall can have a negative impact on the network by blocking access to the
desired resources. This is due to improper configuration of a firewall that makes the
desired resource unavailable. Additionally, if an ordinary PC has been configured to be
the firewall (a multi-homed computer) it may not have the internal speed to perform all
the functions of the firewall fast enough, resulting in increased latency.
Encryption
Central to all security meclianisni
Confidentiality of data
Some protocols rely on encryption to ensure availability of resources. Security Concepts
The encryption process as a whole is taking data that is plain text (readable form), and
using a mathematical technique to make the text unreadable. The receiver then
performs a similar technique to decrypt the message. The process of encrypton and
decrypton is shown in Figure 4.
Ellcryption Key , Decryption Key Cipher text
Software Controls
lnternal program controls
OS controls
Development controls.
Hardware controls
Locks or blocks limitingaccess
Hardware or smart card based encryption
Devices for user's authentication
Physical Controls
Easy to implement, effective and less costly
Include locks on doors, guards at entrylexit points
Backup copies of critical software and data
. Access Control
Media Control
Precautions against water and fire damage
Air conditioning
Physical site planning that minimizes the risk of natural disasters.
System Security
International Security Standards: Most computer vendors nowadays adopt
international standards into building security facilities into their system.
Computer Virus
Computer should be equipped with updated virus protection and detection
software.
' Virus detection software must check storage drives both internal and external to
the system on a regular basis.
All diskettes and software shall be screened and verified by virus scanner
software before being loaded onto the computer system.
Personnel Security
I
Personnel security is everything involving employees, who are potential elements of
breaches of security.
Hiring them
Training them
Monitoring them
1I
Handling their departure
Why personnel Security?
Most of the Security breaches are caused by people only like, break-ins, virus
generation etc.
' Statistics reveal that the most common perpetrators of significant computer crime
are the legitimate users of the computer system.
Some studies show that over 80% of incidents are due to internal users. 1
Auditing r ,
1) l d e ~ i t i computer
f~ assets in your organisation.
...............................................................................................................................
................................................................................................................................
.................................................................................................................................
..............................................................................................................................
................................................................................................................................
...............................................................................................................................
.............................................................................................................................
...............................................................................................................................
................................................................................................................................
1.7 CRYPTOGRAPHY
A cryptosystern is an algorithm, plus all possible plaintexts, cipher texts, and keys.
A cryptographic algorithm, also called a cipher, is the mathematical function used for
encryption (E) and decryption (D). The key is a large number. The range of possible
values of the key is called the key space. Both encryption and decryption use this key
space.
E,[M] = C
D,[C] =M
PLAIN TFXT
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
Controls can be applied at the level of the data, the programs, the system, the physical
devices, the communication lines, the environment, and the personnel.
a) Data integrity
b) Data confidentiality
c) Data availability
1) This includes hardware, sofhvare, data, people related to system operation and
managenlent, documentations, and supplies, etc.
( 2) Threats are of two types: (1) accidental threats, (2) intentional threats.
3) The impact of security attacks could be: (1) infringement of privacy, (2) financial
loss, or (3) disruption of activities.
I) a) A threat is a set of instances that has the capability of causing loss or harm
to the computer system. There are many threats to a computer system and
can be (a) Human initiated, (b) Computer initiated, and (c) Natural disasters
like flood or earthquake. A threat can be accidental or deliberate and tlie
various types of security breaches can be classified as (a) interruption,
(b) interception, (c) modification, and (d) fabrication.