Lesson 11 Multimedia, Security and QoS
Lesson 11 Multimedia, Security and QoS
Definition of Multimedia
Components of Multimedia
Applications of Multimedia
It is also hard to quantify security. You can say that a `product is 2 times faster'
and convince every consumer with some notion of why and how much better the
product is, even though this statement is usually much more complex than it
seems. However, what does `this product is 2 times more secure' mean?
There are many discussions on which product is more secure, e.g. comparisons
between Windows and Linux, Firefox and Windows Explorer, Mac and PC, etc.
Claims are supported by quoting the number of bugs/vulnerabilities reported,
the number of security incidents, etc. But how well do any of these really affect
the overall `security' of a system. Thinking back to the earlier discussion about
what is `security of a system' one can see that no single number could really
adequately capture this. Still, what quantification is possible? If we try to focus
our attention on a single aspect of security and a single application area, one may
be able to give some numbers that make sense (just remember that, the more
general the statement the less objective a score is likely to be).
For cryptographic primitives one can look at the (computational) cost of breaking
a system. This is often expressed by the entropy that it offers in a given setting,
e.g. `this crypto system offers 80-bits of security' effects that the amount of
computation needed to break it is similar to brute-forcing an 80 bits key, i.e.
trying 280 different possibilities. This is generalized to a measure for security of
systems by considering the cost (computational or otherwise) of breaking the
system's security; e.g. it would take 2 years and a budget of 10 million euros to
break this system (i.e. violate a specific security goal of the system).
For web applications several security metrics have been defined by checking for
common security issues and assigning a risk to each of them. For example, the
CCWAPSS common criteria for web application security scoring, computes a
score based on a list of eleven criteria. Each criteria has to be checked (rating the
web service on a scale from 1 to 3 for each item) and assigned a risk level based
on the difficulty and impact of an attack.
Security Requirement Engineering
As already mentioned several times, to really evaluate the security of a system
you have to consider it as a whole, know the security goals and the potential
threats against these goals.
To gather these we need to perform Security Requirement Engineering.
Throughout the design, implementation, deployment and use of a system we
should consider the requirements that the users will have from the system and
how attackers will try to exploit the system. Based on this we can come up with
and/or evaluate a security design, which combines several security solutions to
achieve the best possible trade-offs.
Other approaches may work just as well, what is important is that the security
requirements are considered throughout in a structured and consistent way.
Identify actors and goals. The first step in gathering the requirements is
determining the stakeholders and their interests. The stakeholders are those
parties with a legitimate interest in the system that we are designing.
Their interest and goals thus have to be considered (though not necessarily
completely reached - we may need to make trade-offs between the different goals
of the participants).
The stakeholders and their interests become the initial actors and goals in the
requirements gathering process. If an agent has the right capabilities, it may
adopt a goal, i.e. take responsibility to achieve it. If an agent does not adopt the
goal it may be delegated to other agents (either existing or new or be split into
new sub goals. Agents do not work in isolation; agents and their goals may
depend on/interact with each other. These dependencies should be identified
and could lead to new goals and/or agents. They also lead to potential
vulnerabilities, e.g. when agents' goals conflict.
So far the process matches a typical functional requirement engineering
approach. In order to deal with security requirements we also need to consider
attackers and possible attacks on the system.
Identify attackers, vulnerabilities and attacks. Outsiders may try to attack our
system and they need to be considered along with their goals.
However, also the risk of attacks by insiders needs to be accounted for.
Each agent in the system could potentially become an attacker, using its
capabilities and place in the system to reach their goals at the expense of the
goals of other agents. Both type of attackers are modeled as agents in the system
but with malicious intent as their goal.
Based on vulnerabilities and the malicious intent of attacker agents we identify
potential attacks and assign countermeasures to protect against such attacks. The
countermeasures themselves may lead to new actors/goals and/or open the
possibility for new attacks which need to be considered.
Refinement of the system continues until all goals have been assigned,
dependencies taken into account, and vulnerabilities addressed.
Summary
The goal of this section was to introduce the most basic and fundamental
concepts of computer networks and network security, as well as the motivations
for their existence.
You now know the principle nuts and bolts of a computer network, the idea
behind network protocols and protocol layering. A simple overview of the
Internet and the Internet protocol stack have been provided, together with an
outlook into the future of the Internet dominated by machine-to-machine
communication, i.e. the Internet of Things. After our security discussion, you will
never look at the word `secure' in the same way again: Whenever you encounter
`secure' always think - what set of security requirements (which security
attributes for which resources) are really meant by `secure' (what are the security
policy and model) and what type of attacker is considered (what is the attacker
model).
• Jitter is defined as the variation in delay for packets belonging to the same flow.
• High Jitter means the difference between delays is large and low jitter means the
variation is small.
• For example, if four packets depart at times 0, 1,2,3 and arrive at 20, 21,22, 23, all have
same delay, 20 units of time. On the other hand, if the above four packets arrive at
21,23,21, and 28 they will have different delays of21, 22, 19 and 24.
Bandwidth
https://ecomputernotes.com/computernetworkingnotes/communication-
networks/quality-of-service
http://www.idc-
online.com/technical_references/pdfs/data_communications/Notes_on_Network_Sec
urity_Introduction.pdf