01 Introduction
01 Introduction
Security
Overview & Chapter 1
Sixth Edition
by William Stallings
Lecture slides by Lawrie Brown
DR: Hayam MOUSA
Chapter 0 – Reader’s Guide
• High
– The loss could be expected to have a severe or catastrophic adverse effect on
organizational operations, organizational assets, or individuals.
– (i) cause a severe degradation in or loss of mission capability to an extent and
duration that the organization is not able to perform one or more of its
primary functions;
– (ii) result in major damage to organizational assets;
– (iii) result in major financial loss; or (iv) result in severe or catastrophic harm to
individuals involving loss of life or serious, life-threatening injuries.
Examples of Security Requirements
• Confidentiality – student grades
• Integrity – patient information
• Availability – authentication service
Computer Security Challenges
1. not simple
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived on benefit until fails
8. requires regular monitoring
9. too often an after-thought
10. regarded as impediment to using system
OSI Security Architecture
• ITU-T X.800 “Security Architecture for OSI”
• defines a systematic way of defining and
providing security requirements
• for us it provides a useful, if abstract, overview
of concepts we will study
Aspects of Security
• security attack
– Any action that compromises the security of
information owned by an organization.
• security mechanism
– A process (or a device incorporating such a process)
that is designed to detect, prevent, or recover from a
security attack.
• security service
– A process (or a device incorporating such a process)
that is designed to detect, prevent, or recover from a
security attack.
Threat VS. Attack
• Vulnerabilities
• It is the weaknesses of the system
• Threat
– A potential for violation of security, which exists when
there is a circumstance, capability, action, or event that
could breach security and cause harm. That is, a threat is a
possible danger that might exploit a vulnerability.
• Attack
– An assault on system security that derives from an
intelligent threat; that is, an intelligent act that is a
deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the
security policy of a system.
Passive Attacks
• A passive attack attempts to learn or make use of information from the system
but does not affect system resources.
• Release message contents
• Traffic Analysis
Passive attacks are very difficult to detect, because they do not involve any
alteration of the data. Typically, the message traffic is sent and received in an
apparently normal fashion, and neither the sender nor receiver is aware that a third
party has read the messages or observed the traffic pattern. However, it is feasible
to prevent the success of these attacks, usually by means of encryption. Thus, the
emphasis in dealing with passive attacks is on prevention rather than detection.
Active Attacks
• RFC 2828:
“a processing or communication service provided by
a system to give a specific kind of protection to
system resources”
Security Services (X.800)
• Authentication - assurance that communicating
entity is the one claimed
– have both peer-entity & data origin authentication
• Access Control - prevention of the unauthorized use
of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure
• Data Integrity - assurance that data received is as
sent by an authorized entity
• Non-Repudiation - protection against denial by one
of the parties in a communication
• Availability – resource accessible/usable
Security Mechanism
• Feature designed to detect, prevent, or
recover from a security attack
• No single mechanism that will support all
services required
• However one particular element underlies
many of the security mechanisms in use:
– cryptographic techniques
• hence our focus on this topic
Security Mechanisms (X.800)
• Specific security mechanisms:
– May be incorporated into the appropriate
protocol layer in order to provide some of the OSI
security services.
• Encipherment
• Digital signatures
• Access controls,
• Data integrity,
• Authentication exchange,
• Traffic padding,
• Routing control,
• Notarization
Security Mechanisms (X.800)
• Pervasive security mechanisms:
– Mechanisms that are not specific to any particular
OSI security service or protocol layer.
• Trusted functionality,
• Security labels,
• Event detection,
• Security audit trails,
• Security recovery
Security Services VS. Mechanisms
Model for Network Security
Model for Network Security
• Using this model requires us to:
1. Design a suitable algorithm for the security
transformation
2. Generate the secret information (keys) used by
the algorithm
3. Develop methods to distribute and share the
secret information
4. Specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Access Security
• Information access threats: Intercept or modify data
on behalf of users who should not have access to that
data.
• Service threats: Exploit service flaws in computers to
inhibit use by legitimate users.
Model for Network Access Security
• using this model requires us to:
1. Select appropriate gatekeeper functions to
identify users
2. Implement security controls to ensure only
authorised users access designated information
or resources.
Summary
• topic roadmap & standards organizations
• security concepts:
– confidentiality, integrity, availability
• X.800 security architecture
• security attacks, services, mechanisms
• models for network (access) security