SlideShare a Scribd company logo
1
241-427-SV-2-2553-COE-PSU 1
241-427 Computer Security
Chapter I: Introduction
Dr. Sangsuree Vasupongayya
241-427-SV-2-2553-COE-PSU 2
A Brief History of the World
241-427-SV-2-2553-COE-PSU 3
Why do we need security?
Protect vital information while still allowing access
to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for
resources
Ex: AFS
Guarantee availability of resources
Ex: 5 9’s (99.999% reliability)
2
241-427-SV-2-2553-COE-PSU 4
Who is vulnerable?
Financial institutions and banks
Internet service providers
Pharmaceutical companies
Government and defense agencies
Contractors to various government agencies
Multinational corporations
ANYONE ON THE NETWORK
241-427-SV-2-2553-COE-PSU 5
Common security attacks
Finding a way into the network
Firewalls
Exploiting software bugs, buffer overflows
Intrusion Detection Systems
Denial of Service
Ingress filtering, IDS
TCP hijacking
IPSec
Packet sniffing
Encryption (SSH, SSL, HTTPS)
Social problems
Education
241-427-SV-2-2553-COE-PSU 6
Basic Components
Confidentiality
Keeping data and resources hidden
Integrity
Data integrity (integrity)
Origin integrity (authentication)
Availability
Enabling access to data and resources
3
241-427-SV-2-2553-COE-PSU 7
Goals of Security
Prevention
Prevent attackers from violating security policy
Detection
Detect attackers’ violation of security policy
Recovery
Stop attack, assess and repair damage
Continue to function correctly even if attack succeeds
241-427-SV-2-2553-COE-PSU 8
Trust and Assumptions
Underlie all aspects of security
Policies
Unambiguously partition system states
Correctly capture security requirements
Mechanisms
Assumed to enforce policy
Support mechanisms work correctly
241-427-SV-2-2553-COE-PSU 9
Assurance
Specification
Requirements analysis
Statement of desired functionality
Design
How system will meet specification
Implementation
Programs/systems that carry out design
4
241-427-SV-2-2553-COE-PSU 10
Security standards
ISO
ISO 17799, ISO 27002, ISO 27001
NIST
NIST SP 800-12, NIST SP 800-14, NIST SP 800-18,
NIST SP 800-26, NIST SP 800-30
In Thailand
http://www.mict.go.th/
พ.ร.บ.วาดวยการกระทําผิดเกี่ยวกับคอมพิวเตอร พ.ศ. 2550
พ.ร.บ. วาดวยธุรกรรมทางอิเล็กทรอนิกส พ.ศ. 2554 (on going)
241-427-SV-2-2553-COE-PSU 11
Operational Issues
Cost-Benefit Analysis
Is it cheaper to prevent or recover?
Risk Analysis
Should we protect something?
How much should we protect this thing?
Laws and Customs
Are desired security measures illegal?
Will people do them?
241-427-SV-2-2553-COE-PSU 12
Human Issues
Organizational Problems
Power and responsibility
Financial benefits
People problems
Outsiders and insiders
Social engineering
5
241-427-SV-2-2553-COE-PSU 13
Key Points
Policy defines security, and mechanisms enforce
security
Confidentiality
Integrity
Availability
Trust and knowing assumptions
Importance of assurance
The human factor
241-427-SV-2-2553-COE-PSU 14
Client-side Security Doesn’t Work
Client-side: a computer that the user has control
over and can do whatever he/she like with it
Client-side security: some sort of security
mechanism that is being enforced solely on the
client
Problem: a person has absolute control over it
E.g., a software package that tries to limit its use in
some way
Debuggers, disassembles, hex editors, operating
system modification, monitoring systems, unlimited
copies of the software
Conclusion: cannot maintain trusted software
running on an untrusted machine
241-427-SV-2-2553-COE-PSU 15
Viruses and Trojans
Viruses and Trojans cannot be 100 percent
protected against
Virus replicates and requires other programs to
attach to
Trojan horse pretend to be something else
Usually attached to a program you wanted, or
arrived on media you inserted
How does antivirus software work?
Before program execution can take place, the
antivirus software will scan the program or media for
“bad things”
“bad things” based on signature files that are
hopefully unique to a particular virus or trojan
Usually signature files can be produced based on a
seen virus or trojan
Delay in getting new virus information
6
241-427-SV-2-2553-COE-PSU 16
Firewalls
Firewalls cannot protect you 100% from attack
Sits between internal network and the rest of the
network and attempts to prevent bad things from
happening without preventing food things from
happening
allow some kinds of traffic, while stopping others
Difficulties
The firewall administrators can’t very easily limit
traffic to exactly the type they would like
Attacks
Social engineering via email (e.g., Melissa virus)
Attack the firewall directly
241-427-SV-2-2553-COE-PSU 17
241-427-SV-2-2553-COE-PSU 18
Spam Statistics
Email considered Spam 40% of all email
Daily Spam emails sent 12.4 billion
Daily Spam received per person 6
Annual Spam received per person 2,200
Spam cost to all non-corp. Internet users $255 million
Spam cost to all U.S. Corporations in 2002 $8.9 billion
Email address changes due to Spam 16%
Estimated Spam increase by 2007 63%
Annual Spam in 1,000 employee company 2.1 million
Users who reply to Spam email 28%
Users who purchased from Spam email 8%
Corporate email that is considered Spam 15-20%
Wasted corporate time per Spam email 4-5 seconds
http://spam-filter-review.toptenreviews.com/spam-statistics.html
7
241-427-SV-2-2553-COE-PSU 19
Open Problems in Security
Definition of metrics to assess the security of a
system or protocol.
Formal methods to verify the security of a system.
Realistic models of adversaries.
Emergency preparedness and response.
Development of secure protocols and systems.
(Scalability and efficiency.)
Need to bridge the huge gap between
cryptographers and systems
designers/developers.
Scarcity of professionals in the area.
Lack of basic training in the area of security.
241-427-SV-2-2553-COE-PSU 20
References
Justin Weisz, “Network Security”, Lecture
slides, Fall 2002.
Matt Bishop, “Introduction to Computer
Security”, 2004.

More Related Content

PDF
Supplier security assessment questionnaire
DOCX
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
DOC
Csec 610 Inspiring Innovation--tutorialrank.com
DOC
Csec 610 Motivated Minds/newtonhelp.com
PDF
3rd party information security assessment guideline
PDF
3rd Party Outsourcing Information Security Assessment Questionnaire
PDF
Azstec cyber-security-workbook
PDF
NASA OIG Report
Supplier security assessment questionnaire
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Motivated Minds/newtonhelp.com
3rd party information security assessment guideline
3rd Party Outsourcing Information Security Assessment Questionnaire
Azstec cyber-security-workbook
NASA OIG Report

What's hot (16)

PDF
Paper4
DOC
Cyb 610 Motivated Minds/newtonhelp.com
PPTX
gas_company_PT
DOC
Cyb 610 Inspiring Innovation--tutorialrank.com
PDF
Third party datasecurity assurance questionnaire
PDF
Trackment
PPTX
Patch Management Best Practices 2019
PPTX
Are You Prepared For More High-Impact Vulnerabilties?
PDF
Thinking of choosing Sophos?
PDF
NIST CSD Cybersecurity Publications 20160417
PDF
Healthcare It Security Necessity Wp101118
PDF
Patch management policy_final
PPTX
Network Security Risks and Challenges for Enterprises
PPTX
OPERATING SYSTEM
PPTX
operating system
DOC
Cst 610 Motivated Minds/newtonhelp.com
Paper4
Cyb 610 Motivated Minds/newtonhelp.com
gas_company_PT
Cyb 610 Inspiring Innovation--tutorialrank.com
Third party datasecurity assurance questionnaire
Trackment
Patch Management Best Practices 2019
Are You Prepared For More High-Impact Vulnerabilties?
Thinking of choosing Sophos?
NIST CSD Cybersecurity Publications 20160417
Healthcare It Security Necessity Wp101118
Patch management policy_final
Network Security Risks and Challenges for Enterprises
OPERATING SYSTEM
operating system
Cst 610 Motivated Minds/newtonhelp.com
Ad

Similar to Ch01-Computer Security (20)

PPTX
Chapter 12 - Securing a Network CompTIA Network+
PPT
Security practivce and their best way to lear
PPT
Security for database administrator to enhance security
PPT
PBL PROJECT - B2- (54,56,50,40) (2) (1).ppt
PPTX
Security and control in Management Information System
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PPT
cryptographic security
PDF
Chapter 1 - Introduction.pdf
PPTX
Network security
PDF
Sec0001 .pdf
PPTX
LIS3353 SP12 Week 9
PPT
hel1.ppt
PPT
PPT
hel1.ppt
PPT
PPT
Computer security power point prsentation.ppt
PPT
PPT
Introduction to Computer Security.ppt
Chapter 12 - Securing a Network CompTIA Network+
Security practivce and their best way to lear
Security for database administrator to enhance security
PBL PROJECT - B2- (54,56,50,40) (2) (1).ppt
Security and control in Management Information System
Computer Securityyyyyyyy - Chapter 1.ppt
cryptographic security
Chapter 1 - Introduction.pdf
Network security
Sec0001 .pdf
LIS3353 SP12 Week 9
hel1.ppt
hel1.ppt
Computer security power point prsentation.ppt
Introduction to Computer Security.ppt
Ad

More from Attaporn Ninsuwan (20)

PDF
J query fundamentals
PDF
Jquery enlightenment
PDF
Jquery-Begining
PDF
Br ainfocom94
PDF
Chapter 12 - Computer Forensics
PDF
Techniques for data hiding p
PDF
Stop badware infected_sites_report_062408
PDF
Steganography past-present-future 552
PDF
Ch03-Computer Security
PDF
Ch02-Computer Security
PDF
Ch8-Computer Security
PDF
Ch7-Computer Security
PDF
Ch6-Computer Security
PDF
Ch06b-Computer Security
PDF
Ch5-Computer Security
PDF
Ch04-Computer Security
PDF
Chapter5 - The Discrete-Time Fourier Transform
PDF
Chapter4 - The Continuous-Time Fourier Transform
PDF
Chapter3 - Fourier Series Representation of Periodic Signals
PDF
Chapter2 - Linear Time-Invariant System
J query fundamentals
Jquery enlightenment
Jquery-Begining
Br ainfocom94
Chapter 12 - Computer Forensics
Techniques for data hiding p
Stop badware infected_sites_report_062408
Steganography past-present-future 552
Ch03-Computer Security
Ch02-Computer Security
Ch8-Computer Security
Ch7-Computer Security
Ch6-Computer Security
Ch06b-Computer Security
Ch5-Computer Security
Ch04-Computer Security
Chapter5 - The Discrete-Time Fourier Transform
Chapter4 - The Continuous-Time Fourier Transform
Chapter3 - Fourier Series Representation of Periodic Signals
Chapter2 - Linear Time-Invariant System

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Pre independence Education in Inndia.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Complications of Minimal Access Surgery at WLH
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Anesthesia in Laparoscopic Surgery in India
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
Pharmacology of Heart Failure /Pharmacotherapy of CHF
human mycosis Human fungal infections are called human mycosis..pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
Sports Quiz easy sports quiz sports quiz
Complications of Minimal Access Surgery at WLH
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Basic Mud Logging Guide for educational purpose
Supply Chain Operations Speaking Notes -ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf

Ch01-Computer Security

  • 1. 1 241-427-SV-2-2553-COE-PSU 1 241-427 Computer Security Chapter I: Introduction Dr. Sangsuree Vasupongayya 241-427-SV-2-2553-COE-PSU 2 A Brief History of the World 241-427-SV-2-2553-COE-PSU 3 Why do we need security? Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. Provide authentication and access control for resources Ex: AFS Guarantee availability of resources Ex: 5 9’s (99.999% reliability)
  • 2. 2 241-427-SV-2-2553-COE-PSU 4 Who is vulnerable? Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK 241-427-SV-2-2553-COE-PSU 5 Common security attacks Finding a way into the network Firewalls Exploiting software bugs, buffer overflows Intrusion Detection Systems Denial of Service Ingress filtering, IDS TCP hijacking IPSec Packet sniffing Encryption (SSH, SSL, HTTPS) Social problems Education 241-427-SV-2-2553-COE-PSU 6 Basic Components Confidentiality Keeping data and resources hidden Integrity Data integrity (integrity) Origin integrity (authentication) Availability Enabling access to data and resources
  • 3. 3 241-427-SV-2-2553-COE-PSU 7 Goals of Security Prevention Prevent attackers from violating security policy Detection Detect attackers’ violation of security policy Recovery Stop attack, assess and repair damage Continue to function correctly even if attack succeeds 241-427-SV-2-2553-COE-PSU 8 Trust and Assumptions Underlie all aspects of security Policies Unambiguously partition system states Correctly capture security requirements Mechanisms Assumed to enforce policy Support mechanisms work correctly 241-427-SV-2-2553-COE-PSU 9 Assurance Specification Requirements analysis Statement of desired functionality Design How system will meet specification Implementation Programs/systems that carry out design
  • 4. 4 241-427-SV-2-2553-COE-PSU 10 Security standards ISO ISO 17799, ISO 27002, ISO 27001 NIST NIST SP 800-12, NIST SP 800-14, NIST SP 800-18, NIST SP 800-26, NIST SP 800-30 In Thailand http://www.mict.go.th/ พ.ร.บ.วาดวยการกระทําผิดเกี่ยวกับคอมพิวเตอร พ.ศ. 2550 พ.ร.บ. วาดวยธุรกรรมทางอิเล็กทรอนิกส พ.ศ. 2554 (on going) 241-427-SV-2-2553-COE-PSU 11 Operational Issues Cost-Benefit Analysis Is it cheaper to prevent or recover? Risk Analysis Should we protect something? How much should we protect this thing? Laws and Customs Are desired security measures illegal? Will people do them? 241-427-SV-2-2553-COE-PSU 12 Human Issues Organizational Problems Power and responsibility Financial benefits People problems Outsiders and insiders Social engineering
  • 5. 5 241-427-SV-2-2553-COE-PSU 13 Key Points Policy defines security, and mechanisms enforce security Confidentiality Integrity Availability Trust and knowing assumptions Importance of assurance The human factor 241-427-SV-2-2553-COE-PSU 14 Client-side Security Doesn’t Work Client-side: a computer that the user has control over and can do whatever he/she like with it Client-side security: some sort of security mechanism that is being enforced solely on the client Problem: a person has absolute control over it E.g., a software package that tries to limit its use in some way Debuggers, disassembles, hex editors, operating system modification, monitoring systems, unlimited copies of the software Conclusion: cannot maintain trusted software running on an untrusted machine 241-427-SV-2-2553-COE-PSU 15 Viruses and Trojans Viruses and Trojans cannot be 100 percent protected against Virus replicates and requires other programs to attach to Trojan horse pretend to be something else Usually attached to a program you wanted, or arrived on media you inserted How does antivirus software work? Before program execution can take place, the antivirus software will scan the program or media for “bad things” “bad things” based on signature files that are hopefully unique to a particular virus or trojan Usually signature files can be produced based on a seen virus or trojan Delay in getting new virus information
  • 6. 6 241-427-SV-2-2553-COE-PSU 16 Firewalls Firewalls cannot protect you 100% from attack Sits between internal network and the rest of the network and attempts to prevent bad things from happening without preventing food things from happening allow some kinds of traffic, while stopping others Difficulties The firewall administrators can’t very easily limit traffic to exactly the type they would like Attacks Social engineering via email (e.g., Melissa virus) Attack the firewall directly 241-427-SV-2-2553-COE-PSU 17 241-427-SV-2-2553-COE-PSU 18 Spam Statistics Email considered Spam 40% of all email Daily Spam emails sent 12.4 billion Daily Spam received per person 6 Annual Spam received per person 2,200 Spam cost to all non-corp. Internet users $255 million Spam cost to all U.S. Corporations in 2002 $8.9 billion Email address changes due to Spam 16% Estimated Spam increase by 2007 63% Annual Spam in 1,000 employee company 2.1 million Users who reply to Spam email 28% Users who purchased from Spam email 8% Corporate email that is considered Spam 15-20% Wasted corporate time per Spam email 4-5 seconds http://spam-filter-review.toptenreviews.com/spam-statistics.html
  • 7. 7 241-427-SV-2-2553-COE-PSU 19 Open Problems in Security Definition of metrics to assess the security of a system or protocol. Formal methods to verify the security of a system. Realistic models of adversaries. Emergency preparedness and response. Development of secure protocols and systems. (Scalability and efficiency.) Need to bridge the huge gap between cryptographers and systems designers/developers. Scarcity of professionals in the area. Lack of basic training in the area of security. 241-427-SV-2-2553-COE-PSU 20 References Justin Weisz, “Network Security”, Lecture slides, Fall 2002. Matt Bishop, “Introduction to Computer Security”, 2004.