System and Network Security
System and Network Security
- System features/functionalities
- System Correctness
- Security
Integrity
- Integrity includes
o Data integrity: the content of the information
o Origin integrity: the source of the data, often called authentication
- Integrity mechanisms fall into 2 classes
o Prevention
Seek to maintain the integrity of the data by blocking any unauthorised
attempts to change the data or any attempts to change the data in
unauthorised ways
E.G., Access control
o Detection mechanisms
Do not try to prevent violations of integrity; they simply report that the
data’s integrity is no longer trustworthy
E.g., MAC, digital signatures
- With confidentiality the data is either compromised or it is not, but integrity include
both the correctness and the trustworthiness of the data
- The origin of the data (how and from whom it was obtained), how well the data was
protected before it arrived at the current machine all affect the integrity of the data
- Thus, evaluating integrity is often difficult
Availability
- Authenticity
o The origin of assets should be assured, and the assets should be unforgeable by
unauthorised parties.
o E.g., Impersonation, forgery of digital signatures
- Accuracy
o Be free from mistakes and errors
o Provide information as end user expects
o E.g., $ = AUD/USD/…?
Security Issues
- Vulnerabilities: A weakness in the system that is could be exploited to harm the system
or assets
o Account password is too simple: 12345678
- Attack: An exploitation of one or more system vulnerabilities by using specific
techniques to cause some damage
o Guess/Brute force password to gain the access to account
Attacks
- Security attacks
o Consists of goals and a set of actions that exploits vulnerability in controlled
system
o Accomplished by threat agent that damages or steals information
- Relationship with CIA
o An attack aims at breaking one or more properties of CIA
o CIA provides directions of defending specific attacks
Security Threats