Computer Security (CS3801)

advertisement
COMPUTER SECURITY
(CS3801)
Lecture1.2 (Chapter 1)
Prepared by Dr. Lamiaa M. Elshenawy
1
CHAPTER1- OVERVIEW
OUTLINES
Computer Security Concepts
 The OSI Security Architecture
 Security Attacks
 Security Services
 Security Mechanisms

2
CHAPTER1- OVERVIEW
SECURITY ATTACKS

1.
2.

1.
2.
3.
4.
Passive Attacks
Release of message contents
Traffic analysis
Active Attacks
Masquerade
Replay
Modification of messages
Denial of service
3
CHAPTER1- OVERVIEW
PASSIVE ATTACKS
4
CHAPTER1- OVERVIEW
PASSIVE ATTACKS
5
CHAPTER1- OVERVIEW
ACTIVE ATTACKS
6
CHAPTER1- OVERVIEW
ACTIVE ATTACKS
7
CHAPTER1- OVERVIEW
ACTIVE ATTACKS
8
CHAPTER1- OVERVIEW
ACTIVE ATTACKS
9
CHAPTER1- OVERVIEW
SECURITY SERVICES

RFC 2828 defines security service:
A processing or communication service that is provided by a
system to give a specific kind of protection to system resources;
security services implement security policies and are implemented
by security mechanisms.

X.800 divides these services into five
categories and fourteen specific services
X.800: ITU-T standard for security services
10
CHAPTER1- OVERVIEW
SECURITY SERVICES
Authentication
1. Peer Entity Authentication
2. Data-Origin Authentication
 ACCESS CONTROL
Ability to limit and control the access to host
systems and applications via communications
links

11
CHAPTER1- OVERVIEW
SECURITY SERVICES
Data Confidentiality
1. Connection Confidentiality
2. Connectionless Confidentiality
3. Selective-Field Confidentiality
4. Traffic-Flow Confidentiality

12
CHAPTER1- OVERVIEW
SECURITY SERVICES
Data Integrity
1. Connection Integrity with Recovery
2. Connection Integrity without Recovery
3. Selective-Field Connection Integrity
4. Connectionless Integrity
5. Selective-Field Connectionless Integrity

13
CHAPTER1- OVERVIEW
SECURITY SERVICES
Nonrepudiation
1. Nonrepudiation, Origin
2. Nonrepudiation, Destination

14
CHAPTER1- OVERVIEW
SECURITY MECHANISMS
Encipherment
 Digital Signature
 Access Control
 Data Integrity
 Authentication Exchange
 Traffic Padding
 Notarization

15
CHAPTER1- OVERVIEW
SECURITY MECHANISMS
Service
Enciph
erment
Digital
Signature
Peer Entity
Authentication
√
√
Data Origin
Authentication
√
√
Data
Integrity
Authentication
Exchange
Traffic
Padding
Notarization
√
√
Access Control
Confidentiality
√
Traffic Flow
Confidentiality
√
Data Integrity
√
Nonrepudiation
Access
Control
√
√
√
√
√
√
16
17
Download