Chapter 1 - Introduction & Overview
Chapter 1 - Introduction & Overview
Applications 407312
Introduction
Course Overview
Textbook:
Computer
Security
Principles & Practices
– 4th Edition
Willian Stalling
& Lawrie Brown
Chapters: Overview:
01
• Computer Security Concepts
• Threats, Attacks, and Assets
• Security Functional Requirements
• Fundamental Security Design Principles
• Attack Surfaces and Attack Trees
• Computer Security Strategy
Cryptography:
02
• cryptographic algorithms important element in security services
• review various types of elements
symmetric encryption
public-key (asymmetric) encryption
digital signatures and key management
secure hash functions
• example is use to encrypt stored data
User Authentication:
• Electronic user authentication principles
03
• Password-based authentication
• Token-based authentication
• Biometric authentication
• Remote user authentication
• Security issues for user authentication
• Practical application: an iris biometric system
Access Control:
04
• introduced access control principles
• subjects, objects, access rights
• discretionary access controls
• role-based access control
Malware:
• introduced types of malicious software
05
• incl backdoor, logic bomb, trojan horse, mobile
• virus types and countermeasures
• worm types and countermeasures
• bots
• rootkits
Evaluation Method
No.6
A successful student in this course will be
able to understand how countermeasures
works and how intruders may bypass se-
curity countermeasures.
Chapter 1: Overview
8
Chapter 1 Overview
Learning Objectives
NIST 1995
11
Three Key Objectives
(The CIA Triad)
• Confidentiality
Data confidentiality: Assures that confidential information
is not disclosed to unauthorized individuals
Privacy: Assures that individual control or influence what
information may be collected and stored
• Integrity
Data integrity: assures that information and programs are
changed only in a specified and authorized manner
System integrity: Assures that a system performs its
operations in unimpaired manner
• Availability: assure that systems works promptly and
service is not denied to authorized users
12
Threat Consequences
Examples Of Threats
26
• Isolation
Public access should be isolated from critical
resources (no connection between public and
critical information)
Users files should be isolated from one another
(except when desired)
Security mechanism should be isolated (i.e.,
preventing access to those mechanisms)
• Encapsulation: similar to object concepts (hide
internal structures)
• Modularity: modular structure
31
Fundamental Security Design Principles [4/5]
Attack Surfaces
Attack Trees
An Attack Tree
36
Security Taxonomy
38
Security Trends
39
Summary
• Security concepts
• Terminology
• Functional requirements
• Security design principles
• Security strategy
End of Chapter 1