Fundamentals of Security
Fundamentals of Security
Text/Reference books
William Stallings,
SWE 3002 Cryptography & Network Security - Principles and Practices, 6th
Edition by Pearson Publishers, 2014.
Information and Charles p. Pfleeger,
Systems Security Security in computing, 4th Edition, Pearson, 2009.
Module -1
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
3 4
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
Cryptography & Network Security - Principles and Practices, William Stallings Cryptography & Network Security - Principles and Practices, William Stallings
5 6
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
Cryptography & Network Security - Principles and Practices, William Stallings
7 8
Confidentiality Integrity
Ensuring confidentiality can be difficult. Precise Data Integrity
Accurate
Who determines which people or systems are authorized to Unmodified
System Integrity
access the current system? Consistent
By "accessing" data, Modified only by authorized people
Do we mean that an authorized party can access by authorized processes
A single bit? in acceptable ways
Pieces of data out of context? Meaningful and usable
the whole collection of data? Separation and protection of resources
Error detection and correction
Can someone who is authorized disclose those data to other
Integrity can be enforced in same way as can confidentiality
parties? By rigorous control of
who or what can access which resources in what ways
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
9 10
Availability Availability
System, data , services are present in a usable form. The service or system can be used easily
Readable, Accessible
Timely response to service request In the way it was intended to be used.
The service is completed in an acceptable period of time. Concurrency is controlled
It is making clear progress Simultaneous access,
Wait mode - it has a bounded waiting time.
Not stuck in a loop, or never attended to Deadlock management, and
Applies to Data, Service Exclusive access are supported as required.
Information and information processing Fault tolerance
It has enough capacity to meet the service's needs.
Memory, Bandwidth, Computing capacity Failure leads to
Fair allocation of resource Graceful cessation of service or
Requests are not favored over others. To work-around
Rather than to crashes and abrupt loss of information.
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
11 12
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
13 14
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
15 16
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
17 18
Cryptography & Network Security - Principles and Practices, William Stallings Cryptography & Network Security - Principles and Practices, William Stallings
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
19 20
Cryptography & Network Security - Principles and Practices, William Stallings Cryptography & Network Security - Principles and Practices, William Stallings
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
21 22
Cryptography & Network Security - Principles and Practices, William Stallings Cryptography & Network Security - Principles and Practices, William Stallings
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
23 24
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
25 26
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
27 28
Cryptography & Network Security - Principles and Practices, William Stallings Cryptography & Network Security - Principles and Practices, William Stallings
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
29 30
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
31 32
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
33 34
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
35 36
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
37 38
Access System
Request Reference Monitor Decision
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
39 40
41 42
Computer Security: Principles and Practice : William Stallings Lawrie brown Computer Security: Principles and Practice : William Stallings Lawrie brown
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
43 44
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
45 46
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security
47 48
49 50
51 52
53
Prof. Rajesh Kumar SWE 3002 Information & Systems Security Prof. Rajesh Kumar SWE 3002 Information & Systems Security