IANS Unit 1 Part1
IANS Unit 1 Part1
5
Real world example
• Prevention
– locks at doors, window bars, secure the walls around
the property, hire a guard
• Detection
– missing items, burglar alarms, closed circuit TV
• Reaction
– attack on burglar (not recommended ), call the
police, replace stolen items, make an insurance claim
6
Internet shopping example
• Prevention
– encrypt your order and card number, enforce merchants to
do some extra checks, using PIN even for Internet
transactions, don’t send card number via Internet
• Detection
– an unauthorized transaction appears on your credit card
statement
• Reaction
– complain, dispute, ask for a new card number, sue (if you
can find of course )
– Or, pay and forget (a glass of cold water)
7
Information security in past & present
• Traditional Information Security
– keep the cabinets locked
– put them in a secure room
– human guards
– electronic surveillance systems
– in general: physical and administrative mechanisms
• Modern World
– Data are in computers
– Computers are interconnected
9
Terminology
• Network and Internet Security
– measures to prevent, detect, and correct security
violations that involve the transmission of information
in a network or interconnected networks
10
A note on security terminology
• No single and consistent terminology in the
literature!
• Be careful not to confuse while reading papers and
books
11
Computer
Security
Terminology
RFC 4949, Internet
2000
Relationships among the security Concepts
13
Skill and knowledge required to
Security Trends
mount an attack
14
Loss due to Attacks
• CSI Computer Crime and Security Survey 2008 (
http://gocsi.com/sites/default/files/uploads/CSIsurvey2008.pdf but g
ocsi.com
has discountinued)
15
Security goals
ATTACKS
ATTACKS
Attacks threatening Confidentiality
• Snooping:
unauthorized access/interception of data
for prevention data is made non intelligent by using encipherment techniques
• Traffic Analysis:
by monitoring online traffic and guessing imps
Attacks threatening Integrity
• Modification
modifies the information for benefit/ delete/delays
• Masquedrading(spoofing)
attacker impersonates somebody else
• Replaying
obtains a copy of a message sent by a user and later tries to replay it
• Repudiation
performed by one of the two parties in communication
ATTACKS
Attacks threatening Availablity
• Denial of service:
may slow down or totally interrupt the service
bogus requests for crashing the server/ delete server’s
response/intercepting the client’s request for overloading the server
• Traffic Analysis:
by monitoring online traffic and guessing imps
Security services
33333334
44444444
3
Security mechanisms
Security mechanisms
• Encipherment
hiding/covering data,cryptography & stegnagraphy
• Data Integrity
appends to data a short checkvalue
• Digital Signature
electronically signs and verified
• Authentication exchanged
exchange messages to prove identity
• Traffic padding
inserting bogus data to divert traffic analysis
Security mechanisms
• Routing Control
selecting and continuously changing routes
• Notarization
selecting a third party to control the communication (to
repudiation)
• Access Control
uses methods to prove that a user has access right to the data
Services vs Mechanism