InfSec 1 Overview
InfSec 1 Overview
Chapter 01
Content
3
Information Security
5
CIA Model
C = Confidentiality
I = Integrity
A = Availability
7
Confidentiality (C)
9
Integrity (I)
11
Availability (A)
13
Analysis of the CIA
15
AAA Strategy (RFC 3127)
17
Access Control
23
Deploy security solutions
25
Security policy
Security policy can be expressed in natural language or
mathematical language.
Natural language representation: In a system, to secure a
particular resource, the security policy stipulates that only users
belonging to the system administrator group have access rights,
and other users do not.
The mathematical language is as follows:
U is the set of users in the system.
A is the set of users belonging to the admin group.
O is the collection of objects (resources) in the system
The Access(u, o) operation gives the value TRUE if user u has access to the object o,
otherwise it gives the value FALSE.
The security policy provision p is stated as follows:
∀u ∈U, ∀o ∈O: Access(u, o) = TRUE ⇔u ∈A
27
Security mechanism
29
For example:
The university's computer lab rules: students are not allowed to copy
other students' work that has been saved on the server. This is a
regulation of the privacy policy. To implement this regulation, the
mechanisms applied include: creating separate folders on the server
for each student, assigning access rights for each student to these
folders and requiring students to save assignments in separate
folders; whenever you leave the computer, you must logout from the
system
31
Building a security system
In order to clearly Evaluating the safety
separate the states of a mechanism:
of the system: Policy P: set of all states of the system
Q: set of security states as
• Safe Definition defined by security policy
• Unsafe R: set of system states after
applying security mechanisms.
R Q: System is
absolutely safe.
If there is a state r R so
that rQ: System is unsafe
To prevent the Mechanism
system from Implementation
entering an unsafe
state
33
The goals of System Security
An ideal system is one (which is difficult to build):
Have a policy that accurately and completely defines the
security states of the system.
Having a mechanism to fully and effectively enforce the
regulations of the policy.
When building a safety system, the goal is set for the
mechanism:
Prevention
Detection
Recovery
35
X.800 Security Model (ITU-T)
37
Security attack
Passive attacks:
Disclosure
Traffic analysis
Active attacks:
Change information
Denial of service
39
Security services
Access Control
Authentication
Data Confidentiality
Data Integrity
Non-repudiation
40
Security mechanisms
46
System security risks in practice
Intentional attacks
White hat hackers
Script kiddies
Black hat hackers
Internal threats
The destructive software (malicious code)
48
Attacks on information systems
50
The destructive software (malicious code)
Virus
Worm
Logic bomb
Trojan horse
Backdoor
Spammer
Zoombie
52
Discussion
+ Threats?
Mối đe dọa: hacker, nhân viên nội bộ, đối thủ
+ Vulnerability?
Điểm yếu, lỗ hổng
+ Risk?
Rủi ro, nguy cơ
53