Saif_IS_Lecture_01[1]
Saif_IS_Lecture_01[1]
CS-497
Digital signatures
Attacks
Preventions
Course Overview 1/2
The course provides instruction in security for
– Security mechanisms,
– Intrusion detection;
attacks.
– Authentication
– Non-repudiation
Symmetric-key cryptosystem
Public-key cryptosystem
Bruce Schneier,
Counterpane Internet Security, Inc.
Detection
Determine that either an attack is underway or has
occurred and report it
Real-time monitoring
– or, as close as possible
– monitor attacks to provide data about their nature,
severity, and results
Intrusion verification and notification
– intrusion detection systems (IDS)
– typical detection systems monitor various aspects of
the system, looking for actions or information
indicating an attack
example: denial of access to a system when user
repeatedly enters incorrect password
Response
Stop/contain an attack
– must be timely!
incident response plan developed in advance
Assess and repair any damage
Resumption of correct operation
Evidence collection and preservation
– very important
identifies vulnerabilities
strengthens future security measures
Exercises
Classify each of the following as an attack on confidentiality, integrity,
and/or availability (more than one may apply). Justify your answers.