1 Security
1 Security
“The
most secure
computers are those
not connected
to the Internet and
shielded
from any interference”
Outline
1. Fundamentals of computer security
Overview: history, vulnerabilities,
countermeasures, physical security
2. Goal of computer security
3. Security mechanisms and techniques
Authentication, access control,
Computer Security and privacy
Computer security is a branch of
Computer Science, focusing on
creating a secure environment for
the use of computers.
Not Sufficient!!
Internet
Security Goals
To ensure :CIA
Confidentiality Safeguards
Confidentiality
information from being
accessed by individuals without
the proper clearance, access
level, and need to know.
Integrity Availaibility Integrity: Results from the
protection of unauthorized
modification or destruction of
information.
Availability: Information
services are accessible when
they are needed.
Computer Security / History
Until 1960s computer security was limited to physical
protection of computers
In the 60s and 70s
Evolutions
Computers became interactive
Multiuser/Multiprogramming was invented
More and more data started to be stored in computer
databases
Organizations and individuals started to worry about
What the other persons using computers are doing to their
data
What is happening to their private data stored in large
databases
Cont…
In the 80s and 90s
Evolutions
Personal computers were popularized
LANs and Internet invaded the world
Applications such as E-commerce, E-government and
E-health started to develop
Viruses become majors threats
Organizations and individuals started to worry
about
Who has access to their computers and data
Whether they can trust a mail, a website, etc.
Whether their privacy is protected in the connected
world
Cont…
Security Attacks
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
Computer security/ Threats & Vulnerabilities
Threat
A threat is anything that can disrupt the operation, functioning, integrity,
or availability of a network or system.
Threats are potential causes of unwanted events that may result in harm
to the agency and its assets.
A threat is a manifestation of vulnerability.
Threats exploit vulnerabilities causing impact to assets
There are four main classes of threats:
Structured threats
Implemented by a technically skilled person who is trying to
gain access to your network.
Unstructured threats
Created by an inexperienced /non-technical person who is
trying to gain access to your network.
Cont…
Internal threats
Occurs when someone from inside your network creates a security
threat to your network.
External threats
Occurs when someone from outside your network creates a security
threat to your network.
Vulnerabilities
A vulnerability is an inherent weakness in the design, configuration,
implementation, or management of a network or system that
renders it susceptible to a threat.
Vulnerabilities are what make networks susceptible to information
loss and downtime. Every network and system has some kind of
vulnerability.
A threat is blocked by control of a vulnerability.
Cont…
Types of Vulnerabilities/ Susceptible to attack
3. Network
Unprotected communication lines
Insecure network architecture
4. Personnel
inadequate recruiting process
inadequate security awareness
5. Site
area subject to flood, unreliable power source
6. Organizational
lack of regular audits, lack of continuity plans
Cont…
The vulnerability is not the attack, but rather exploiting the
weak point/loops in order to gain access.
Fig. Threat agents, attack vectors, weakness, controls, IT asset and business impact
Computer Security /Security policies
Why Policy?
Policies are the least expensive means of control and often the most difficult to
implement
Basic rules for shaping a policy
Policy should never conflict with law
Policy must be able to stand up in court if challenged
Policy must be properly supported and administered
Computer Security / Countermeasures
Safe area
Safe area often is a locked place where only authorized personnel
can have access
-Are the locks reliable?
The effectiveness of locks depends on the design,
manufacture, installation and maintenance of the keys!
Surveillance with guards
The most common in Ethiopia
Not always the most reliable since it adds a lot of human factor
Surveillance with video
Uses Closed Circuit Television (CCTV)
Software Security
Risk Management …
Methods of risk treatment:
Mitigate or suppress
Accept
Transfer (insurance)
Ignore (poor – often used)
Types of countermeasures
Preventive
Detective
Corrective
In case of risk acceptance
Request documented justification
Get formal approbation (sign-off) by senior management
Have the decision reviewed after a year
Cont…
Selecting Technologies
Languages
The choice of a programming language has an
impact on how secure the software will be
Security problems are common for some
languages
C, C++ => Buffer overflow
Java => Exception handling, etc
High level languages hide what they are doing
(ex. Swapping to disk)
The programmer doesn’t know that
The attackers may use this
Cont…
Selecting Technologies…
Operating systems
Typical Operating Systems (Windows, Linux,
etc) have
Authentication of users
Resource access control (authorization & limitation)
Memory, Files, etc.
Integrity of shared resources
Operating systems have different levels of
security
Cont…
Selecting Technologies…
Authentication technologies
Password
Host-Based (ex. IP)
Physical token (ex. Smartcard)
Biometrics
Cont…
Open Source or Closed Source
Free Software
Freedoms to use, copy, study, modify and redistribute both modified
and unmodified copies of software programs
Open Source
Similar in idea to "free software" but slightly less rigid
FOSS/FLOSS
Free/Libre/Open-Source Software is the name used by those who
wish to be inclusive
We use the common name Open source Software
(OSS)
Cont…