Chapter 1 Fundamental of Software Security
Chapter 1 Fundamental of Software Security
By: Melkamu D.
1
Outlines
Introduction to security
.
Key Objectives of Security
Computer Security Challenges
Security Services and Mechanisms
Security Attacks
Security Techniques
Model for Network Security
2
Fundamental of Security
Security:- Prevents unauthorized access to organizational assets
E.g. BIOS
How to protect ??? password , full disk encryption.
6
Fundamental of Security
Key Objectives of computer Security …
Standard measures to guarantee integrity include:
Cryptographic checksums
Using file permissions
Uninterrupted power supplies
Data backups
Data only has value if the right people can access at the right time.
Implementing firewalls
Data redundancy
All cyber attacks have the potential to threaten one or more of the
three parts of the CIA triad.
to public cloud. 10
Types of Computer Security
5. Internet security:- protecting computer systems and networks from threats
that originate from the internet.
E.g. secure browsing and filtering, that protect against malicious websites
Apply and monitor endpoint security policies throughout the entire network
12
Computer security threats
Threats are any type of activity or event that has potential to harm or
compromise security and privacy of computer systems, networks, or users.
An infected program or file is executed, virus can spread to other files and
systems.
Can infect a large number of systems quickly and can be difficult to detect
and remove.
E.g. Use up hard disk space b/c a worm can replicate in great volume and
speed.
Can remotely control the bots to carry out sending spam emails, launching
DDoS attacks, stealing sensitive data, and spreading malware.
16
Computer Security Practices
The common protection of the computer security threats are:
Activating firewall
Use Internet with cares and ignore pop-ups drive-by downloads while
browsing
Lack of awareness: users are not aware of the risks if do not follow security best
practices.
Security service
Security mechanism
Security attack
20
Security services…
The classification of security services are as follows:
25
Security mechanisms
It is mechanism designed to detect, prevent, or recover from a
security attack.
Specific mechanism
27
Security mechanisms …
Encipherment:- the process of applying mathematical algorithms for
converting data into a form that is not intelligible.
reversible & irreversible
28
Security mechanisms…
Specific Security Mechanisms…
Data Integrity: used to assure the integrity of a data unit or stream of data units.
32
Security Attacks
A malicious attempts to gain unauthorized access to networks, steal
data, software computer, disrupt services to computer systems.
33
Security Attacks …
There are four general categories of attacks are:
Interruption: act of disrupting or halting normal functioning of a computer
system or network.
Attack on availability
Attacks on confidentiality.
34
Security Attacks …
Modification: act of changing or altering data or information without
authorization.
An attack on integrity.
35
Types of Security Attacks
There are two types of attacks:
1. Passive Attacks:- an attacker attempts to access information or data without
altering or disrupting the normal functioning of a computer system.
37
Types of Security Attacks
Passive attacks are of two types…
All incoming and outgoing traffic of the network is analyzed, but not
Bob observe patterns of
altered. message exchange b/n
Lily to John
38
Types of Security Attacks…
Active attacks:- the attacker efforts to change or modify the content of
messages.
The most important thing, in an active attack, Victim gets informed about
the attack.
Types of active attacks:-
Masquerade
Modification of messages
Replay
Repudiation
Denial of Service
39
Types of Security Attacks…
Types of active attacks…
E.g. if a legitimate user leaves the terminal or session open and logged in, a
co-worker may act as a masquerade attacker.
As the attackers gain access and gets into all the organization's critical data
and can delete or modify, steal sensitive data, or alter routing information
and network configuration.
41
Types of Security Attacks…
Types of active attacks…
Sender Receiver
Third party
Prevention from Replay Attack :
(unauthorize
Timestamp : used to ensure that data packets
d are not accepted if they are
too late.
Session key : key can be used only once per transaction and cannot be
reused. 43
Types of Security Attacks…
Types of active attacks…
Deny the intended users to access the host from the Internet.
It can cause computers and routers to crash and links to bog down.
44
Security Techniques
Reading Assignment
Training awareness
45
Model for Network Security
It show how security service has designed over network to prevent the
opponent from causing a threat to confidentiality or authenticity of
information being transmitted through the network.
It is how messages are shared between sender and receiver securely over the
network.
46
Model for Network Security
Trusted third party:- is responsible for distributing the secret information
to the two principals while keeping from any opponent.( e.g. banking
server)
48
Model for Network Security
Network access security model…
1. Hacker: one who is interested in penetrating into the system( ethical or
unethical).
2. Intruders: attackers intend to do damage to the system or obtain
information from the system which can be used to achieve financial gain.
This leads to two kinds of risks:
1. Information threat (e.g. modification of data)
2. Service threat ( e.g. disable access)
Two ways to secure the system from an attacker:
Gatekeeper function (login-id and passwords or firewall) keep away unwanted
access.
Internal control: detect the unwanted user trying to access the system by
analyzing system activities. e.g. antivirus 49
Software Security
Software security is a measures and techniques used to ensure that
software systems are secure and protected against unauthorized
access, use, or modification.
50
Software Security
Software Security Measures And Techniques Include:
51
End of Chapter One
Questions
! !!
OU
Y
N K
A
TH
52