Computer Security
Computer Security
1
This course will cover the following topics:
• passwords
• access controls
• symmetric and asymmetric encryption
• confidentiality
• authentication and certification
• security for electronic mail
• key management
2
What is Security?
Security is the protection of assets. The three
main aspects are:
• prevention
• detection
• re-action
3
Some differences between traditional
security and information security
4
Computer Security
deals with the prevention
and detection of
unauthorised actions by
users of a computer
system.
5
There is no single definition of security
6
Confidentiality
• The prevention of unauthorised disclosure
of information.
• Confidentiality is keeping information
secret or private.
• Confidentiality might be important for
military, business or personal reasons.
7
Integrity
• Integrity is the unauthorised writing or
modification of information.
• Integrity means that there is an external
consistency in the system - everything is as it
is expected to be.
• Data integrity means that the data stored on a
computer is the same as the source
documents.
8
Availability
• Information should be accessible and
useable upon appropriate demand by an
authorised user.
• Availability is the prevention of
unauthorised withholding of information.
• Denial of service attacks are a common
form of attack.
9
Non-repudiation
• Non-repudiation is the prevention of either
the sender or the receiver denying a
transmitted message.
• A system must be able to prove that certain
messages were sent and received.
• Non-repudiation is often implemented by
using digital signatures.
10
Authentication
• Proving that you are who you say you are,
where you say you are, at the time you say
it is.
• Authentication may be obtained by the
provision of a password or a scan of your
retina.
11
Access Controls
• The limitation and control of access through
identification and authentication.
• A system needs to be able to indentify and
authenticate users for access to data,
applications and hardware.
• In a large system there may be a complex
structure determining which users and
applications have access to which objects.
12
Accountability
• The system managers are accountable to
scrutiny from outside.
13
Security systems
• A security system is not just a computer
package. It also requires security conscious
personnel who respect the procedures and
their role in the system.
• Conversely, a good security system should
not rely on personnel having security
expertise.
14
Risk Analysis
• The disadvantages of a security system are
that they are time-consuming, costly, often
clumsy, and impede management and
smooth running of the organisation.
• Risk analysis is the study of the cost of a
particular system against the benefits of the
system.
15
Designing a Security System
There are a number of design considerations:
• Does the system focus on the data, operations or the users
of the system?
• What level should the security system operate from?
Should it be at the level of hardware, operating system or
applications package?
• Should it be simple or sophisticated?
• In a distributed system, should the security be centralised
or spread?
• How do you secure the levels below the level of the
security system?
16
Security Models
A security model is a means for formally expressing
the rules of the security policy in an abstract detached
way.