computer-security-chapter-1
computer-security-chapter-1
Chapter One
Introduction to Computer Security
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 1
lOMoARcPSD|3010134
Course objectives:
By the end of this course, students will be able to:
◦ Understand the basic concepts in information security, including security
attacks/threats, security vulnerabilities, security policies, security models, and security
mechanisms.
◦ Understand the concepts, principles and practices related to elementary cryptography,
including plain-text, cipher-text, the four techniques for crypto-analysis, symmetric
cryptography, asymmetric cryptography, digital signature, message authentication code,
hash functions, and modes of encryption operations.
◦ Understand issues related to program security and the common vulnerabilities in
computer programs; including buffer overflow vulnerabilities, time-of-check to time-of-
use flaws, incomplete mediation.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 3
lOMoARcPSD|3010134
Course objectives:
Cont…
◦ Understand the basic requirements for trusted operating systems, and describe
the independent evaluation, including evaluation criteria and evaluation process.
◦ Describe security requirements for database security, and describe techniques
for ensuring database reliability and integrity, secrecy, inference control, and
multi-level databases.
◦ Describe threats to networks, and explain techniques for ensuring network
security, including encryption, authentication, firewalls, and intrusion detection.
◦ Explain the requirements and techniques for security management, including
security policies, risk analysis, and physical threats and controls.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 4
lOMoARcPSD|3010134
Course Outline:
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 5
lOMoARcPSD|3010134
Course Outline:
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 6
lOMoARcPSD|3010134
Course Outline:
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 7
lOMoARcPSD|3010134
Course Outline:
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 8
lOMoARcPSD|3010134
NB: "Education is the passport to the future, for tomorrow belongs to those who prepare
for it today."
–Malcolm X
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 9
lOMoARcPSD|3010134
Chapter objectives
Up on completion of this chapter you should be able to: –
◦ Understand what computer and network security means.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 10
lOMoARcPSD|3010134
Overview
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 11
lOMoARcPSD|3010134
Overview(definition)
Computer security, is the protection of computer systems from attacks by
malicious actors that may result in unauthorized information disclosure, theft of,
or damage to hardware, software, or data, as well as from the disruption or
misdirection of the services they provide. (Wikipedia)
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 12
lOMoARcPSD|3010134
Overview…
Computer Security when there is connection to networks (Network security)
on the other hand deals with policies, processes and practices adopted to
prevent and monitor unauthorized access, misuse, modification, or denial of the
computer network and network-accessible resources. (Wikipedia)
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 13
lOMoARcPSD|3010134
Overview…
“The most secure computers are those not connected to the
Internet and shielded from any interference”
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 14
lOMoARcPSD|3010134
History
Until 1960s computer security was limited to physical protection of
computers.
The late 1960s and 1970s
◦ Evolutions
Computers became interactive
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 15
lOMoARcPSD|3010134
History…
Computer security was almost non-existing before 1980s (besides
physical protection).
In the 1980s and 1990s
◦ Evolution
Personal computers were popularized
LANs and Internet invaded the world
Applications started to develop such as E-commerce (good & services), E-
government(online tax filing, voting) and E-health(remote patient monitoring, data
record).
Viruses become major threats
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 18
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 19
lOMoARcPSD|3010134
History…
Legal Issues (Worldwide)
In the US, legislation was enacted with regards to computer security and privacy
starting from late 1960s
The World Summit for Information Society considered computer security and
privacy as a subject of discussion in 2003 and 2005
(In Ethiopia)
The Ethiopian Penal Code of 2005 has articles on data and computer related
crimes
Cybercrime Proclamation of 2016 (Computer Crime Proclamation No. 958/2016)
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 22
lOMoARcPSD|3010134
Privacy: Assures that individuals control what information related to them may be
collected and stored and by whom and to whom that information may be disclosed.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 23
lOMoARcPSD|3010134
Security Objectives…
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 24
lOMoARcPSD|3010134
Security Objectives…
Availability: Assures that systems work promptly and service is not denied to
authorized users
Supplements to CIA:
◦ Authentication
How do I know it's really you?
◦ Authorization
Now that you are here, what are you allowed to do?
◦ Accountability
Who did what, and, perhaps, who pays the bill?
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 25
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 26
lOMoARcPSD|3010134
Vulnerabilities
Physical vulnerabilities
◦ break into your server room, device theft, steal backup media and etc.
Locks, guards, surveillance cams, Burglar alarms
Natural vulnerabilities
◦ Vulnerable to natural disasters and to environmental threats, power loss
◦ Natural disasters: fire, flood, earthquakes, lightning
◦ Environmental factors: Dust, humidity, and uneven temperature conditions
air conditioning and heating systems……UPS,…..backups
Hardware and Software vulnerabilities
◦ protection features failure lead to open security holes
◦ open some "locked" systems by introducing extra hardware
◦ Software failures: antivirus ,firewall failures
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 27
lOMoARcPSD|3010134
Vulnerabilities…
Media vulnerabilities
◦ can be stolen, damaged by dust or electromagnetic fields.
keep backup tapes and removable disks clean and dry
Communication vulnerabilities
◦ Wires can be tapped, physically damaged, EMI
Fiber optics
Human vulnerabilities
◦ the greatest vulnerability of all
◦ Employees, contractors
Choose employees carefully
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 28
lOMoARcPSD|3010134
Threats
Threats fall into three main categories based on the source: natural,
unintentional, and intentional.
◦ Natural threats: fires, floods, power failures, and other disasters.
fire alarms, temperature gauges, and surge protectors
backing up critical data off-site.
◦ Unintentional threats: delete a file, change of security passwords
Training , security procedures and policies
◦ Intentional threats: outsiders and insiders
Outsiders may penetrate systems in a variety of ways:
simple break-ins of buildings and computer rooms;
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 29
lOMoARcPSD|3010134
Threats
Estimates are that as many as 80 percent of system penetrations are by fully
authorized users who abuse their access privileges to perform unauthorized
functions.
◦ "The enemy is already in, we hired them.”
Insiders are sometimes referred as living Trojan horses
There are a number of different types of insiders.
◦ fired or disgruntled employee might be trying to steal revenge ; employee might have been
blackmailed or persuaded by foreign or corporate enemy agents.
◦ greedy employee might use her inside knowledge to divert corporate or customer funds for
personal benefit.
◦ insider might be an operator, a systems programmer, or even a casual user who is willing to
share a password.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 30
lOMoARcPSD|3010134
Threats
Don't forget, one of the most dangerous insiders may simply be lazy or
untrained.
◦ He doesn't bother changing passwords,
◦ Doesn't learn how to encrypt email messages and other files,
◦ Leaves sensitive printouts in piles on desks and floors, and ignores the paper
shredder when disposing of documents.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 31
lOMoARcPSD|3010134
Security Attacks
A threat that is carried out.
An attack occurs when a threat actor exploits a vulnerability to compromise a system's
security.
Attacks can take many forms, including unauthorized access, data theft, malware infection,
denial of service, and social engineering.
Classification security attacks:
◦ passive attacks and active attacks.
A passive attack attempts to learn or make use of information from the system but
does not affect system resources.
An active attack attempts to alter system resources or affect their operation.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 32
lOMoARcPSD|3010134
Categories of Attacks
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 34
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 35
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 36
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 37
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 38
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 39
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 40
lOMoARcPSD|3010134
Security Attacks…
To summarize the two categories of attacks:
◦ In a passive attack, no modification of data occurs and the target does not
know about its occurrence unless they have a monitoring and alert system.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 41
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 42
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 44
lOMoARcPSD|3010134
Security services
RFC 2828 defines a service as
◦ "A processing or communication service that is provided by a system to give a specific
kind of protection to system resources".
◦ Security services implement security policies, and implemented by security
mechanisms.
Authentication Service
Authentication service deals with assuring the identity of the communicating parties and
also no third party masquerade as the legitimate parties for unauthorized reception of
messages.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 45
lOMoARcPSD|3010134
Security services…
Data Integrity Service
◦ It assures that messages are received as sent by an authorized entity, with no duplication,
insertion, modification, reordering, replay, or loss.
Access Control Service
It is the ability to limit and control the access to host systems and applications via
communications links.
To implement access control, each entity trying to gain access must first be identified, or
authenticated, so that access rights can be tailored to the individual.
The prevention of unauthorized use of a resource (i.e., this service controls who can have
access to a resource, under what conditions access can occur, and what those accessing the
resource are allowed to do).
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 46
lOMoARcPSD|3010134
Security services…
Nonrepudiation Service
◦ This service does not allow the sender or receiver of a message to refuse the claim of not
sending or receiving that message.
Nonrepudiation, Origin: Helps the receiver to prove that the message was sent by the
specified sender.
Nonrepudiation, Destination: Helps the sender to prove that the message was
delivered to the intended receiver.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 47
lOMoARcPSD|3010134
Security services…
Availability Service
◦ Both X.800 and RFC 4949 defines availability as the property of a system/resource
being accessible and usable upon demand by an authorized system entity, according
to performance specifications for the system.
network resources.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 48
lOMoARcPSD|3010134
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 49
lOMoARcPSD|3010134
Goals of Security
Given a security policy’s specification of “secure” and “non-secure” actions, security
mechanisms can prevent (defend) the attack, detect the attack, or recover from the attack
Detection: is most useful when an attack cannot be prevented, but it can also indicate
the effectiveness of preventative measures.
Detection mechanisms accept that an attack will occur;
determine that an attack is underway, or has occurred, and report it.
The attack may be monitored, however, to provide data about its nature, severity, and results.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 50
lOMoARcPSD|3010134
Goals of Security
Recovery/Reaction: requires resumption of correct operation. Has two forms.
The first is to stop an attack and to assess and repair any damage caused by that attack.
E.g if the attacker deletes a file, recovery restore the file from backup tapes.
The attacker may return, so recovery involves identification and fixing of the vulnerabilities
used by the attacker to enter the system
A fourth approach is deterrence; involves active steps to beat off attacks; discourage
them even to try attacking.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 51
lOMoARcPSD|3010134
Physical Security
“The most robustly secured computer that is left sitting unattended in an
unlocked room is not at all secure !” [Chuck Easttom]
In the early days of computing, physical security was simple because computers
were big, standalone, expensive machines
They were very few and it is affordable to spend on physical security for them
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 52
lOMoARcPSD|3010134
Physical Security…
Today
Computers are more and more portable (PC, laptop, Smart phone)
There are too many of them to have good physical security for each of them
They are not “too expensive” to justify spending more money on physical
security until a major crisis occurs
Users don’t accept restrictions easily
Accessories (e.g., network components) are not considered as important for
security until there is a problem.
Access to a single computer may endanger many more computers connected
through a network
Security Challenges
Security is not simple: terminology seems to be straight forward but mechanism to
meet requirements are very complex.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 54
lOMoARcPSD|3010134
Security Challenges…
Always a battle of wits between perpetrator and a designer/administrator.
Attackers looks for holes and admin tries to close them.
System managers tend to perceive little benefit on security investment until a
security failure happens.
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 56
lOMoARcPSD|3010134
End of Chapter-1
Questions?
Read More…..
1/15/2024
Downloaded by shemse shukre ([email protected]) Compiled by: Naol G. (MSc.) 57