T1-Computer and Network Security Concepts
T1-Computer and Network Security Concepts
MSI
2017/2018
T1 - Computer and Network Security Concepts
Cryptographic algorithms and protocols can be
grouped into four main areas:
Symmetric encryption
Asymmetric encryption
• Used to conceal small blocks of data, such as encryption keys and hash
function values, which are used in digital signatures
Authentication protocols
measures to deter,
prevent, detect, and
correct security
violations that involve
the transmission of
information
• Security attack
• Security service
• Intended to counter security attacks, and they make use of one or more
security mechanisms to provide the service
• Involve some modification of the • Takes place when one entity pretends
to be a different entity
Masquerade • Usually includes one of the other
data stream or the creation of a
forms of active attack
false stream
• Involves the passive capture of a data
• Difficult to prevent because of the Replay unit and its subsequent
retransmission to produce an
wide variety of potential physical, unauthorized effect
• The ability to limit and control the access to host systems and
applications via communications links
Security
Mechanisms
(ITU-T X.800
Recommendation)
• Fail-safe defaults (lack of access by default) • Isolation (isolate public access systems from critical
resources, process and files isolation, separation of
• Complete meditation (all accesses checks for access
security functions)
control)
• Encapsulation (encapsulate data and functions, isolate
• Open design (design should be open rather secret)
from unauthorized accesses)
Isolation Encapsulation
• Applies in three contexts: • Can be viewed as a specific form of
isolation based on object-oriented
• Public access systems should be isolated functionality
from critical resources to prevent
disclosure or tampering • Protection is provided by encapsulating a
collection of procedures and data objects
• Processes and files of individual users in a domain of its own so that the
should be isolated from one another internal structure of a data object is
except where it is explicitly desired accessible only to the procedures of the
protected subsystem, and the
• Security mechanisms should be isolated
procedures may be called only at
in the sense of preventing access to
designated domain entry points
those mechanisms
Modularity Layering
• Refers both to the development of • Refers to the use of multiple,
security functions as separate, overlapping protection approaches
protected modules and to the use of addressing the people, technology,
a modular architecture for and operational aspects of
mechanism design and information systems
implementation
• The failure or circumvention of any
individual protection approach will
not leave the system unprotected
Least astonishment
• Examples:
• Open ports on outward facing Web and other servers, and code listening on
those ports
• Services available on the inside of a firewall
• Code that processes incoming data, email, XML, office documents, and
industry-specific custom data exchange formats
• Interfaces, SQL, and Web forms
• The security incident that is the goal of the attack is represented as the root
node of the tree, and the ways that an attacker could reach that goal are
represented as branches and subnodes of the tree
• The final nodes on the paths outward from the root, (leaf nodes), represent
different ways to initiate an attack
• The motivation for the use of attack trees is to effectively exploit the
information available on attack patterns
•NIST is a U.S. federal agency that deals with measurement science, standards, and technology related to U.S.
government use and to the promotion of U.S. private-sector innovation
•Despite its national scope, NIST Federal Information Processing Standards (FIPS) and Special Publications (SP) have a
worldwide impact
Internet Society
•ISOC is a professional membership society with world-wide organizational and individual membership
•Provides leadership in addressing issues that confront the future of the Internet and is the organization home for the
groups responsible for Internet infrastructure standards
ITU-T
•The International Telecommunication Union (ITU) is an international organization within the United Nations System in
which governments and the private sector coordinate global telecom networks and services
•The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors of the ITU and whose mission is
the development of technical standards covering all fields of telecommunications
ISO
•The International Organization for Standardization is a world-wide federation of national standards bodies from more
than 140 countries
•ISO is a nongovernmental organization that promotes the development of standardization and related activities with
a view to facilitating the international exchange of goods and services and to developing cooperation in the spheres
of intellectual, scientific, technological, and economic activity
Consider an automated cash deposit machine in which users provide a card or an account number
to deposit cash. Give examples of confidentiality, integrity and availability requirements (and its
degree of importance)
The system must keep personal identification numbers confidential, both in the system and during
transmission for a transaction. It must protect the integrity of account records and of individual
transactions. We may consider that the availability of individual teller machines is of less concern.
What differentiates the network security model and the network access security model?
The network security model refers to the design of the security mechanisms, based on cryptographic
algorithms, for the establishment of security communications between two entities over an insecure
communications medium. On the other hand, the network access security model is concerned with
protecting an information system from unwanted access, e.g. using network and Internet security protocols
• Definition • Authentication
• Standards