Lesson 3 Security
Lesson 3 Security
Internet Security
Mehamed Ahmed(Ph.D.)
mohammeda128@gmail.com
The art of war teaches us to rely not on the likelihood of
the enemy's not coming, but on our own readiness to
receive him; not on the chance of his not attacking, but
rather on the fact that we have made our position
unassailable.
—The Art of War, Sun Tzu
2
Background
Information Security requirements have been changing through times
The growing computer use requires automated tools to protect files and
3
Definitions
Computer Security - generic name for the collection of
their transmission
Internet Security - measures to protect data during their
8
OSI Security Architecture
Is useful to managers as a way of organizing the task of
providing security.
ITU-T X.800 “Security Architecture for OSI”
Open systems Interconnection: defines a systematic approach
to provide security at each layer
Defines a systematic way of defining and providing security
requirements
For us it provides a useful, if abstract, overview of concepts
we will study
9
Aspects of Security
consider 3 aspects of information security:
security attack
security mechanism
security service
10
Security Attack
Any action that compromises the security of
information owned by an organization
Information security is about how to prevent attacks,
or failing that, to detect attacks on information-based
systems
Often threat & attack used to mean same thing
We do have a wide range of attacks
Can focus of generic types of attacks
Passive
Active
11
Passive Attacks
Have “passive attacks” which attempt to learn or make
use of information from the system but does not affect
system resources.
By eavesdropping on, or monitoring of, transmissions to:
+ obtain message contents (as shown above in Stallings
Figure 1.3a), or
+ monitor traffic flows
Are difficult to detect because they do not involve any
alteration of the data.
12
Active Attacks
Also have “active attacks” which attempt to alter system
resources or affect their operation.
By modification of data stream to:
+ masquerade of one entity as some other
+ replay previous messages (as shown above in fig)
+ modify messages in transit
+ denial of service
Active attacks present the opposite characteristics of passive
attacks. Whereas passive attacks are difficult to detect,
measures are available to prevent their success.
On the other hand, it is quite difficult to prevent active attacks
absolutely, because of the wide variety of potential physical,
software,and network vulnerabilities. Instead, the goal is to
detect active attacks and to recover from any disruption or
delays caused by them.
13
Security Service
Enhance security of data processing systems
and information transfers of an organization
Intended to counter security attacks
Using one or more security mechanisms
Often replicates functions normally associated
with physical documents
Which, for example, have signatures, dates, need
protection from disclosure, tampering, or destruction;
be notarized or witnessed; be recorded or licensed
14
Security Services
X.800:
“a service provided by a protocol layer of communicating open
systems, which ensures adequate security of the systems or
of data transfers”
15
Security Services (X.800)
1. Authentication - assurance that the communicating
entity is the one claimed
2. Access Control - prevention of the unauthorized use of
a resource
3. Data Confidentiality –protection of data from
unauthorized disclosure
4. Data Integrity - assurance that data received is as sent
by an authorized entity
5. Non-Repudiation - protection against denial by one of
the parties in a communication
16
Security Mechanism
Feature designed to detect, prevent, or recover from a
security attack
No single mechanism that will support all services required
17
Security Mechanisms (X.800)
Specific security mechanisms:
Encipherment, digital signatures, access controls, data
18
Model for Network Security
19
Model for Network Security
This general model shows that there are four basic tasks in
designing a particular security service, as listed.
Using this model requires us to:
1. Design a suitable algorithm for the security transformation
2. Generate the secret information (keys) used by the algorithm
3. Develop methods to distribute and share the secret information
4. Specify a protocol enabling the principals to use the
transformation and secret information for a security service
20
Model for Network Access Security
21
Model for Network Access Security
Using this model requires us to:
1. Select appropriate gatekeeper functions to identify users
2. Implement security controls to ensure only authorised
users access designated information or resources
Trusted computer systems may be useful to help implement
this model
22
Friends and enemies: Alice, Bob, Trudy
Well-known in network security world
Bob, alice (lovers!) Want to communicate “securely”
Trudy (intruder) may intercept, delete, add messages
Alice Bob
data, control
channel
messages
Trudy
Eavesdropping - Message Interception
(Attack on Confidentiality)
Unauthorized access to information
Packet sniffers and wiretappers
Illicit copying of files and programs
A B
Eavesdropper
Integrity Attack - Tampering With
Messages
Stop the flow of the message
Delay and optionally modify the message
Release the message again
A B
Perpetrator
Authenticity Attack - Fabrication
Unauthorized assumption of other’s identity
Generate and distribute objects under this identity
A B
Masquerader: from A
Attack on Availability
Destroy hardware (cutting fiber) or software
Modify software in a subtle way (alias commands)
Corrupt packets in transit
A B
X.800 standard
Security attacks, services, mechanisms
Models for network (access) security
30
Questions
What’s the OSI security architecture
What’s the difference between passive and active security
threats?
List and briefly define categories of passive and active
security attacks.
List and briefly define categories of security services.
List and briefly define categories of security mechanisms.
31