L1- Introduction and Security Principles
L1- Introduction and Security Principles
Grading Structure
Introduction to Computer and Network Security CNE417
Percentage of Total
# Assessment task Week Due
Assessment Score
1 Homework 3,4,5,6,7 20%
4 Projects 9 10%
Introduction
Resources
Introduction to Computer and Network Security CNE417
• Textbook:
Mark Stamp, Information security: principles and practice. (3rd Edition)
Wiley, Sep 2021.
Paul C. van Oorschot, Computer Security and the Internet: Tools and Jewels from
Malware to Bitcoin, (2nd Edition). Springer, 2021
● References
R Anderson , Security Engineering - A Guide to Building Dependable Distributed
Systems, (3rd Edition), Wiley , 2021
Matt Bishop, Computer Security Art and Science, (2nd Edition), Addison-Wesley
Professional, 2018
Wenliang , Computer & Internet Security:A Hands-on Approach, (3rd Edition), 2022
4
What is security?
Introduction to Computer and Network Security CNE417
● Security is not safety: Safety is enforcing a desired property, but in the presence
of random nature
○ In other words, making sure systems work as expected
Computer Security
Introduction to Computer and Network Security CNE417
• The art and science of secure systems lies in properly identifying these
properties, adversaries, and designing mechanisms that achieve this goal.
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or disclosed to unauthorized
individuals
• Privacy
• Assures that individuals control or influence what information related to them may be collected
and stored and by whom and to whom that information may be disclosed
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to authorized users 8
Confidentiality
Introduction to Computer and Network Security CNE417
Integrity
Introduction to Computer and Network Security CNE417
10
Availability
Introduction to Computer and Network Security CNE417
• Examples:
– Keep Bob from deleting Alice’s files
– Prevent Mallory from crashing xyz.edu
– Prevent Dave from flooding Bob’s computer with network requests
11
Beyond CIA
Introduction to Computer and Network Security CNE417
13
● Security attack
○ Any action that compromises the security of information owned by an organization
● Security mechanism
○ A process (or a device incorporating such a process) that is designed to detect,
prevent, or recover from a security attack
● Security service
○ A processing or communication service that enhances the security of the data
processing systems and the information transfers of an organization
○ Intended to counter security attacks, and they make use of one or more security
mechanisms to provide the service
14
Security Architecture- OSI (Open Systems Interconnection)
Introduction to Computer and Network Security CNE417
15
● Passive Attack
►Make use of information, but not affect system resources, e.g.
Release message contents
Traffic analysis
►Relatively hard to detect, but easier to prevent
● Active Attack
►Alter system resources or operation, e.g.
Masquerade: one entity pretends to be a different entity
Replay: passive capture of a data unit and its subsequent retransmission to produce an
unauthorized effect
Modification: a legitimate message is altered, or messages are delayed or reordered to
produce an unauthorized effect
Denial of service: Prevents the normal use or management of communications facilities
17
►Relatively hard to prevent, but easier to detect
Types of Attacks
Introduction to Computer and Network Security CNE417
18
Release message contents
Introduction to Computer and Network Security CNE417
19
Traffic Analysis
Introduction to Computer and Network Security CNE417
20
Masquerade
Introduction to Computer and Network Security CNE417
21
Replay
Introduction to Computer and Network Security CNE417
22
Modification of messages
Introduction to Computer and Network Security CNE417
23
24
Security Services
Introduction to Computer and Network Security CNE417
● Access Control
○ The prevention of unauthorized use of a resource (i.e., this service controls who can
have access to a resource, under what conditions access can occur, and what those
accessing the resource are allowed to do).
● Authentication
○ The assurance that the communicating entity is the one that it claims to be.
● Non-repudiation
○ Provides protection against denial by one of the entities involved in a communication of
having participated in all or part of the communication.
○ Nonrepudiation, Origin
■ Proof that the message was sent by the specified party.
○ Nonrepudiation, Destination
■ Proof that the message was received by the specified party.
25
Threats
Introduction to Computer and Network Security CNE417
26
Risk
Introduction to Computer and Network Security CNE417
● R = T * V * C , where …
27
Threat Model
Introduction to Computer and Network Security CNE417
28
Attack Surfaces
Introduction to Computer and Network Security CNE417
29
Layering:
○ the use of multiple, overlapping protection
approaches addressing the people, technology, and
operational aspects of information systems
30
Threat Modeling Approaches
Introduction to Computer and Network Security CNE417
• Diagram-driven • Checklists
– Architectural diagram – From past experience
– Data flow diagram • STRIDE
– User workflow – Spoofing
– Ask: what could go wrong? – Tampering
• Attack Tree – Repudiation
– Attacker goal at top – Information disclosure
– Branches are ways to get to – Denial of service
the goal – Escalation of privilege
31
Adversary Attributes
Introduction to Computer and Network Security CNE417
• Objectives
• Intention and goals of attackers
• Methods
• The anticipated attack techniques, or types of attacks
• Capabilities
• Computing resources (CPU, storage, bandwidth), skills, knowledge,
personnel, opportunity (e.g., physical access to target machines)
32
• Funding level
• Influences attacker determination, methods and capabilities
• Outsider vs. insider
• Outsider is remote attacker, while insider has access to network
Threat Modeling Approaches
Introduction to Computer and Network Security CNE417
33
35
36
STRIDE threat Model
Introduction to Computer and Network Security CNE417
37
38
Attacks
Introduction to Computer and Network Security CNE417
39
41
Trust
Introduction to Computer and Network Security CNE417
• In practice, it is very difficult to completely prevent attacks. We often trust systems that are not
completely secure.
42
Security Models
Introduction to Computer and Network Security CNE417
• A security model is the combination of trust and threat models that address the set
of perceived risks
– What are the security concerns (risks)? Threats?
– Who are our adversaries?
– Who do we trust and to do what?
• Not easy
– Threats and adversaries change over time
– New attacks emerge
43
44