Chapitre1_Introduction111
Chapitre1_Introduction111
2
Should I take thiscourse?
• Computer Security
– Broad survey course
– Touch on a wide number of security topics and
Evaluate the level of security in a computer system.
• Secure programming, Network, data base, etc.
– Focuses on how to implement securecode
• Introduction to Cryptography and Formal study
of the notion of security.
• Internet of Things, Security and the Cloud
– Paradigms employed in IoT, security and privacy
3
The security problem
Security policy:
- e.g. confidentiality,
integrity, availability,
authenticity, anonymity,
Attacker
6
Attack Example
• In 2012, LinkedIn suffered a massive data breach in
which more than 167 Million users accounts login
details, including encrypted passwords, were posted
online by a Russian hacker.
• Source: http://thehackernews.com/2016/05/linkedin-account-hack.html
7
Attack Example
8
Attack Example
Users attacked: statistic
10
In This class
11
Topics of this class
• Computer Security overview
• Security models
• Cryptography
• Program security
• Operating System, Database, software and Network
security
• Security operations
• Privacy issues
• Legal and ethical issues
• …
12
References
• Books:
– William Stalling and Lawrie Brown, Computer Security: Principles and
Practice, 3rd Edition
– G.T. Gangemi, Rick Lehtinen , Computer Security Basics, 2nd Edition,
2011, O'Reilly Media
– Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, Cryptography
Engineering: Design Principles and Practical Applications, 1st
Edition, Kindle Edition.
• Web Site:
– https://crypto.stanford.edu/cs155/syllabus.html
– https://www.inf.ed.ac.uk/teaching/courses/cs/
13
Lecture 1:
Introduction
!
" #
$
$ "" %
• "
Source: http://www.zenithtechnologies.com/zen-blog/the-cia-triad-and-life-science-manufacturing/
Confidentiality
' & % (
" ) *#
" "
( %
& # $ "
" % % "
& #
" " "
) *
21
"" %
"" % $ 4
% #
.# 5 % ) * "" % % "%
" " "" "" &
#
6# 1 " & )11 *
7#' 8 % 3 "" % % " %
% 5 "" " " " #
" & "" % 2 & "
" #
9# : : ;<
$ 5 &
% #:
11 " ""
& #
Computer Security Challenges
1The attacker tries to take control of
remote machines, for example with a
virus, exploiting a fault or using a
Trojan.
>? 0 0 2 %
#
>? 0 %
2 #
>? 0 " " ) * >?
& % #
" #
" " %
& " & " .
25
>? 0 , "
>? @ ' %
? "" % , " A?A
% & " ),B * " %# & "
)% < 2 %*
• Example ,B ;% < 2 %)CB C*D
, >? ; C A?A E+<38 B @ A<A
B ; CF , B ;
% & %C %C
C C "
txtUserId: 105 OR1=1 SELECT *FROM Users
WHERE
>? "" " "
UserId= 105 OR 1=1
26
Computer Security Challenges
G#8 " 8 % "
" & & "" % %
" & #
H# 3 % "" %
"
" #
& #
I#' & " " % " " #@ " &
% "
" " %
" % " #
" %"
& "
27
Computer Security Terminology
$ & ) % *
$ #
$
$ " ) * &
"" % D " &
& & " " #
) JK L J *
$ & 2
& " " " %
& % ( % ) *
& % % &
#
28
Computer Security Terminology
<
$ , " , "
" "" , " " & " "
" ") * "#
' "
$ " %#
& & & "
#
<
1 D & & D " D
2 D "
2 #
29
Computer Security Terminology
) !*
$ " & " ,
" &
" #
31
Vulnerabilities, Threats and Attacks
M " "
" )" " *
)" % *
& " " & " )" & " " *
32
Scope of Computer Security
33
Computer and Network Assets
34
Security Functional Requirements
"
"
4
% " % # O
"
P P % #@ P
$"# P& 0 "#
& #
@ " $" " %% % ?$" P
" " % % # O P& "
% " ) P
* & & ""
#8 #
4
4 %
35
Security Functional Requirements
8 % "
)$ % & * 4 %
$ ) * % " " ( & %
(https://subgraph.com/vega/download/).
LAB: audit the web site: www.target.com
• certification, accreditation, & security assessments
• contingency planning (' ()* +#), ):
•Contingency planning refers to temporary measures to recover
information system services after a disruption. Temporary measures
may include relocation of information systems and operations to an
alternate site, recovery of information system functions using alternate
equipment, or performance of information system functions using
manual methods.
36
' "4 & "
' " & " %
& "
% ( " & & " "
% "
" " %
" 2 " " # A#%#
" #
•…
37
Security Implementation
' & $ "
"# $" %
" ""
% &
" % "#
< &
) .* % % "
$ , " & &
"
% " &
" # %
38
Security Mechanism
+ %
' & & " % "
1 P& " "
< %
< & " &
what is the
how does itdo does it really
security scheme
it? work?
supposed to do?
40
Security Policy
• formal statement of rules and practices that specify
or regulate security services
• factors to consider:
– value of the protected assets
– vulnerabilities of the system
– potential threats and the likelihood of attacks
• trade-offs to consider:
– ease of use versus security
– cost of security versus cost of failure and recovery
41
' " A, "
$ %
: " % " ) & G
*#
" , 5 " " #
" % " #
" #
" % % .
42
A,
" "" % & " "
% & " "
# $" N #
# 8 N #
# % $" N -.// -. ///#
#$ % ) 1* L N % #
f. Q $" N
" "
% #
%# )2 3* R " N ' %
#
43
? .
.#
6#
"! "
44