Uploaded by sonivaishali09

Lec 01 - Introduction to Information Security

advertisement
INTRODUCTION TO INFORMATION
SECURITY
Compiled By :
Vaishali Soni
WHAT IS SECURITY?

In the context of computers, security generally means
three things:

Confidentiality


Integrity


When you ask for data, you get the “right” data
Availability


Access to systems or data is limited to authorized parties
The system or data is there when you want it
A computing system is said to be secure if it has all
three properties

Well, usually
Pillars of Security:
Confidentiality, Integrity, Availability
CONFIDENTIALITY(CIA)
: WHO IS AUTHORIZED?
INTEGRITY: IS DATA „GOOD?”
AVAILABILITY: CAN ONE ACCESS DATA WHENEVER
NEEDED?
Integrity
Confidentiality
S
Availability
S = secure
[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
BALANCING CIA
Payroll
Data
Biographical
Data
Integrity
Confidentiality
S
Sensitive
Data
Availability
S = secure
Need to balance CIA
Ex: Disconnect computer from
Internet to increase
confidentiality (availability
suffers, integrity suffers due to
lost updates)
Ex: Have extensive data checks
by different people/systems to
increase integrity (confidentiality
suffers as more people see data,
availability suffers due to locks
on data under verification)
Packet
Switch
Bridge
File
Server
Gateway
Other
Networks
[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
Health
Data
CONFIDENTIALITY
 Use
the “need to know” basis for data access

How do we know who needs what data?
Approach: access control specifies who can access what

How do we know a user is the person she claims to be?
Need her identity and need to verify this identity
Approach: identification and authentication
 Analogously:
“need to access/use” basis for access
to physical assets

E.g., access to a computer room, use of a desktop
 Confidentiality


is:
Difficult to ensure
Easiest to assess in terms of success

Binary in nature: Yes / No
 Integrity
INTEGRITY
vs. Confidentiality

Integrity - concerned with unauthorized modification of
assets (= resources)
Confidentiality - concered with access to assets

Integrity is more difficult to measure than confidentiality
Not binary – degrees of integrity
Context-dependent - means different things in different
contexts
Could mean any subset of these asset properties:
{ precision / accuracy / currency / consistency /
meaningfulness / usefulness / ...}
 Types


of integrity—an example
A quotation from a politician
Preserve the quotation (data integrity) but mis-attribute
(origin integrity)
AVAILABILITY

We can say that an asset (resource) is available if:





Timely request response
Fair allocation of resources (no starvation!)
Fault tolerant (no total breakdown)
Easy to use in the intended way
Provides controlled concurrency (concurrency control, deadlock
control, ...)
[Pfleeger & Pfleeger]
VULNERABILITIES, THREATS, AND CONTROLS
 Understanding
Vulnerabilities, Threats, and
Controls
Vulnerability = a weakness in a security system
 Threat = circumstances that have a potential to cause harm
 Controls = means and ways to block a threat, which tries to exploit
one or more vulnerabilities


Most of the class discusses various controls and their effectiveness
[Pfleeger & Pfleeger]

Attack

= exploitation of one or more vulnerabilities by a threat; tries to
defeat controls

Attack may be:
Successful
 resulting in a breach of security, a system
penetration, etc.
 Unsuccessful
 when controls block a threat trying to exploit a
vulnerability

[Pfleeger & Pfleeger]
 Examples


Fig. 1-1 (p.6)
New Orleans disaster (Hurricane Katrina):
What were city vulnerabilities, threats, and controls
SECURITY AND RELIABILITY
Security has a lot to do with reliability
 A secure system is one you can rely on to (for example):

Keep your personal data confidential
 Allow only authorized access or modifications to resources
 Give you correct and meaningful results when you want
them

SOME TERMINOLOGY

Assets

Things we might want to protect, such as:
Hardware
 Software
 Data


Vulnerabilities
Weaknesses in a system that may be able to be exploited in
order to cause loss or harm
 e.g., a file server that doesn't authenticate its users

SOME TERMINOLOGY

Threats



A loss or harm that might befall a system
e.g., users' personal files may be revealed to the public
There are four major categories of threats:
Interception
 Interruption
 Modification
 Fabrication


When we design a system, we need to state a threat model
This is the set of threats we are undertaking to defend against
 Whom do we want to stop from doing what?

SOME TERMINOLOGY

Attack



An action which exploits a vulnerability
e.g., telling the file server you are a different user in an
attempt to read or modify their files
Control
Removing or reducing a vulnerability
 You control a vulnerability to prevent an attack and block a
threat.
 How would you control the file server vulnerability?
 Our goal: control vulnerabilities

KINDS OF THREATS
 Kinds

Interception


an asset becomes lost, unavailable, or unusable
Modification


an unauthorized party (human or not) gains access to an asset
Interruption


of threats:
an unauthorized party changes the state of an asset
Fabrication

an unauthorized party counterfeits an asset
[Pfleeger & Pfleeger]
Download