SlideShare a Scribd company logo
Review security basic concepts
IT 352 : Lecture 2-
part1
Najwa AlGhamdi , MSc – 2012 /1433
Outline
• Computer Security Concept
• Aspects of Security
• Security Attack
• OSI Security Structure
• Model for Network Security
Computer Security Concept
Computer Security Definition
the protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity,
availability and confidentiality of information system resources
(includes hardware, software, information/data, and
telecommunications)
Computer Security Concept
1. Confidentiality preserving authorized restrictions on
information access and disclosure, including means for
protecting personal privacy and proprietary information.
2. Integrity Guarding against improper information
modification or destruction, and includes ensuring
information non-repudiation and authenticity
3. Availability Ensuring timely and reliable access to and
use of information.
Aspects of Security
• consider 3 aspects of information security:
• security attack
• security mechanism
• security service
• note terms
• threat – a potential for violation of security
• attack – an assault on system security, a deliberate attempt to
evade security services
Security Attack
• Passive Attack
• attempts to learn or make use
of information from the system
but does not affect system
resources.
• Two types of passive
attacks are:
1.Release of message contents
2.Traffic analysis.
Active Attack
• Active Attack
• modification of the data
stream or the creation of a
false stream
• Four types of active attacks
1.masquerade,
2.Replay
3.modification of messages,
4.denial of service.
OSI Security Structure
• The OSI security architecture is useful to managers as a
way of organizing the task of providing security.
• Define Security Services and mechanism
OSI Security Structure – Security
Services
• Authentication - assurance that communicating
entity is the one claimed
• have both peer-entity & data origin authentication
• Access Control - prevention of the unauthorized use
of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure
• Data Integrity - assurance that data received is as
sent by an authorized entity
• Non-Repudiation) - protection against denial by one
of the parties in a communication
• Availability – resource accessible/usable
OSI Security Structure – Security
Mechanism
• specific security mechanisms ( OSI
model)
• Encipherment, digital signatures, access controls, data integrity,
authentication exchange, traffic padding, routing control,
notarization
OSI Security Structure –
Security Mechanism
OSI Security Structure –
Security Mechanism
• pervasive security mechanisms:
• trusted functionality: functionality that can be trusted to perform
as intended.
• security labels: every item is associated with a security label. For
example : a label for sensitivity level.
• event detection : detective and could be corrective mechanism
m for security event.
• security audit trails: Review and Examination of system records
and activities
• security recovery : implementing corrective security mechanisms
and putting them in appropriate place.
Model for Network Security
Model for Network Security
using this model requires us to:
1. design a suitable algorithm for the security transformation
2. generate the secret information (keys) used by the algorithm
3. develop methods to distribute and share the secret
information
4. specify a protocol enabling the principals to use the
transformation and secret information for a security service
Model for Network Security
Model for Network Security
using this model requires us to:
1. select appropriate gatekeeper functions to identify users
2. implement security controls to ensure only authorised users
access designated information or resources
Summary
• topic roadmap & standards organizations
• security concepts:
• confidentiality, integrity, availability
• X.800 security architecture
• security attacks, services, mechanisms
• models for network (access) security
Resources
• Network Security Essential , chapter 1 .

More Related Content

PPT
PPT
ch01.ppt
PDF
Network security chapter 1
PPTX
CS8792 - Cryptography and Network Security
PDF
Chapter 1 Introduction of Cryptography and Network security
PPT
Module-1.ppt cryptography and network security
PPTX
syllabus of information security for 6th semester
PPT
SecurityBasics.ppt a good thing by pakiza
ch01.ppt
Network security chapter 1
CS8792 - Cryptography and Network Security
Chapter 1 Introduction of Cryptography and Network security
Module-1.ppt cryptography and network security
syllabus of information security for 6th semester
SecurityBasics.ppt a good thing by pakiza

Similar to lecture2-1 part one about cryptography.ppt (20)

PPT
Network and Information Security unit 1.ppt
PPT
computer architecture.ppt
PPT
Chapter 1.ppt
PPT
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
PDF
Lec 01.pdf
PPT
its a computer security based ppt which is very useful
PPT
1 network securityIntroduction - MSC.ppt
PDF
20210629_104540Information Security L1.pdf
PPTX
Princinples of information security Lecture_1_Information_Security.pptx
PPTX
osi-security-architectureppt.pptx
PPT
CNS Unit-I_final.ppt
PPTX
Chapter 1: Overview of Network Security
PPT
Nw sec
PPT
ch01-4.ppt
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPT
Network Security 1st Lecture
PPTX
Security Model
PPTX
Cryptography and network Security--MOD-1.pptx
PPT
ch01 cryptography1cryptography1cryptography1
Network and Information Security unit 1.ppt
computer architecture.ppt
Chapter 1.ppt
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
Lec 01.pdf
its a computer security based ppt which is very useful
1 network securityIntroduction - MSC.ppt
20210629_104540Information Security L1.pdf
Princinples of information security Lecture_1_Information_Security.pptx
osi-security-architectureppt.pptx
CNS Unit-I_final.ppt
Chapter 1: Overview of Network Security
Nw sec
ch01-4.ppt
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
Unit 1 Network Fundamentals and Security .pptx
Network Security 1st Lecture
Security Model
Cryptography and network Security--MOD-1.pptx
ch01 cryptography1cryptography1cryptography1
Ad

More from abduganiyevbekzod011 (10)

PDF
Xalqaro_anjumanlar_baza_2025 nskvn nsn snrdg.pdf
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
12_2019_12_03!04_59_50_PM symmetric.pptx
PPTX
typesofattacks-180418113629 255536155.pptx
PPT
Tree-structured indexes lectures for student.ppt
PPT
9910559 jjjgjgjfs lke lwmerfml lew we.ppt
PPT
ch1_intro_HH_upd lectures othe be hand.ppt
PPT
attachment_2356_1635343030 service unit.ppt
PPT
Cryptography subject gor lectures 111.ppt
PPTX
Ta'lim klasteri kontekstida talabalarning ijtimoiy
Xalqaro_anjumanlar_baza_2025 nskvn nsn snrdg.pdf
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
12_2019_12_03!04_59_50_PM symmetric.pptx
typesofattacks-180418113629 255536155.pptx
Tree-structured indexes lectures for student.ppt
9910559 jjjgjgjfs lke lwmerfml lew we.ppt
ch1_intro_HH_upd lectures othe be hand.ppt
attachment_2356_1635343030 service unit.ppt
Cryptography subject gor lectures 111.ppt
Ta'lim klasteri kontekstida talabalarning ijtimoiy
Ad

Recently uploaded (20)

PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Trump Administration's workforce development strategy
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Cell Types and Its function , kingdom of life
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Lesson notes of climatology university.
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Empowerment Technology for Senior High School Guide
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Trump Administration's workforce development strategy
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Cell Types and Its function , kingdom of life
Computing-Curriculum for Schools in Ghana
Final Presentation General Medicine 03-08-2024.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Indian roads congress 037 - 2012 Flexible pavement
Unit 4 Skeletal System.ppt.pptxopresentatiom
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Lesson notes of climatology university.
Paper A Mock Exam 9_ Attempt review.pdf.
A systematic review of self-coping strategies used by university students to ...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Empowerment Technology for Senior High School Guide

lecture2-1 part one about cryptography.ppt

  • 1. Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi , MSc – 2012 /1433
  • 2. Outline • Computer Security Concept • Aspects of Security • Security Attack • OSI Security Structure • Model for Network Security
  • 3. Computer Security Concept Computer Security Definition the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, information/data, and telecommunications)
  • 4. Computer Security Concept 1. Confidentiality preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. 2. Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity 3. Availability Ensuring timely and reliable access to and use of information.
  • 5. Aspects of Security • consider 3 aspects of information security: • security attack • security mechanism • security service • note terms • threat – a potential for violation of security • attack – an assault on system security, a deliberate attempt to evade security services
  • 6. Security Attack • Passive Attack • attempts to learn or make use of information from the system but does not affect system resources. • Two types of passive attacks are: 1.Release of message contents 2.Traffic analysis.
  • 7. Active Attack • Active Attack • modification of the data stream or the creation of a false stream • Four types of active attacks 1.masquerade, 2.Replay 3.modification of messages, 4.denial of service.
  • 8. OSI Security Structure • The OSI security architecture is useful to managers as a way of organizing the task of providing security. • Define Security Services and mechanism
  • 9. OSI Security Structure – Security Services • Authentication - assurance that communicating entity is the one claimed • have both peer-entity & data origin authentication • Access Control - prevention of the unauthorized use of a resource • Data Confidentiality –protection of data from unauthorized disclosure • Data Integrity - assurance that data received is as sent by an authorized entity • Non-Repudiation) - protection against denial by one of the parties in a communication • Availability – resource accessible/usable
  • 10. OSI Security Structure – Security Mechanism • specific security mechanisms ( OSI model) • Encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization
  • 11. OSI Security Structure – Security Mechanism
  • 12. OSI Security Structure – Security Mechanism • pervasive security mechanisms: • trusted functionality: functionality that can be trusted to perform as intended. • security labels: every item is associated with a security label. For example : a label for sensitivity level. • event detection : detective and could be corrective mechanism m for security event. • security audit trails: Review and Examination of system records and activities • security recovery : implementing corrective security mechanisms and putting them in appropriate place.
  • 13. Model for Network Security
  • 14. Model for Network Security using this model requires us to: 1. design a suitable algorithm for the security transformation 2. generate the secret information (keys) used by the algorithm 3. develop methods to distribute and share the secret information 4. specify a protocol enabling the principals to use the transformation and secret information for a security service
  • 15. Model for Network Security
  • 16. Model for Network Security using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources
  • 17. Summary • topic roadmap & standards organizations • security concepts: • confidentiality, integrity, availability • X.800 security architecture • security attacks, services, mechanisms • models for network (access) security
  • 18. Resources • Network Security Essential , chapter 1 .

Editor's Notes

  • #3: The NIST Computer Security Handbook [NIST95] defines the term computer security as shown on this slide. This definition introduces three key objectives that are at the heart of computer security as we see on the next slide.
  • #4: We now provide some examples of applications that illustrate the requirements just enumerated. • Confidentiality - Student grade information is an asset whose confidentiality is considered to be highly important by students. Grade information should only be available to students, their parents, and employees that require the information to do their job. Student enrollment information may have a moderate confidentiality rating. While still coveredby FERPA, this information is seen by more people on a daily basis, is less likely to be targeted than grade information, and results in less damage if disclosed. Directory information, such as lists of students or faculty or departmental lists, may be assigned a low confidentiality rating or indeed no rating. This information is typically freely available to the public and published on a school's Web site. • Integrity – Consider a hospital patient's allergy information stored in a database. The doctor should be able to trust that the information is correct and current. Now suppose that an employee (e.g., a nurse) who is authorized to view and update this information deliberately falsifies the data to cause harm to the hospital. The database needs to be restored to a trusted basis quickly, and it should be possible to trace the error back to the person responsible. Patient allergy information is an example of an asset with a high requirement for integrity. Inaccurate information could result in serious harm or death to a patient and expose the hospital to massive liability. • Availability - The more critical a component or service, the higher is the level of availability required. Consider a system that provides authentication services for critical systems, applications, and devices. An interruption of service results in the inability for customers to access computing resources and staff to access the resources they need to perform critical tasks. The loss of the service translates into a large financial loss in lost employee productivity and potential customer loss.
  • #5: The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: • Security attack: Any action that compromises the security of information owned by an organization. • Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. • Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. In the literature, the terms threat and attack are commonly used to mean more or less the same thing. Table 1.1 provides definitions taken from RFC 2828, Internet Security Glossary. Threat - A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability. Attack - An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.
  • #6: A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms of passive attacks and active attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are: + release of message contents - as shown above in Stallings Figure 1.2a here + traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged These attacks are difficult to detect because they do not involve any alteration of the data.
  • #7: Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: masquerade of one entity as some other replay previous messages (as shown above in Stallings Figure 1.3b) modify/alter (part of) messages in transit to produce an unauthorized effect denial of service - prevents or inhibits the normal use or management of communications facilities Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
  • #8: To assess effectively the security needs of an organization and to evaluate and choose various security products and policies, the manager responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local and wide area networks the problems are compounded. ITU-T Recommendation X.800, Security Architecture for OSI, defines such a systematic approach. The OSI security architecture is useful to managers as a way of organizing the task of providing security.
  • #9: authentication is concerned with assuring that a communication is authentic. Two specific authentication services are defined in X.800: Peer entity authentication: provides corroboration of the identity of a peer entity in an association; and Data origin authentication: provides corroboration of the source of a data unit. access control is the ability to limit and control the access to host systems and applications via communications links. confidentiality is the protection of transmitted data from passive attacks, and the protection of traffic flow from analysis. integrity assures that messages are received as sent, with no duplication, insertion, modification, reordering, replay, or loss. availability is the property of a system / resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system.
  • #10: specific security mechanisms Encipherment: the use of mathematical algorithms to transform data into a form that is not readable (Encryption). Digital signatures: data that is appended to the message that allows the recipient to prove source and the integrity data. Access controls : A variety of mechanisms that enforce access right to resources. Data integrity: : A variety of mechanisms that assure the integrity of the message. Authentication exchange : A mechanism intended to ensure the identity of entity. Notarization : a use of trusted 3rd party to assure certain properties of data exchange. ----------------------------------------------------------------------------------- pervasive security mechanisms: trusted functionality: That which is perceived to be correct with respect to some criteria, for example, as established by a security policy security labels: The marking bound to a resource (which may be a data unit) that names or designates the security attributes of that resource event detection: detection of security relevant events. security audit trails: Data collected and potentially used to facilitate a security audit . security recovery : deal with requests from mechanisms such as event handing
  • #13: In considering the place of encryption, its useful to use the following two models from Stallings section 1.6. The first, illustrated in Figure 1.4, models information being transferred from one party to another over an insecure communications channel, in the presence of possible opponents. The two parties, who are the principals in this transaction, must cooperate for the exchange to take place. They can use an appropriate security transform (encryption algorithm), with suitable keys, possibly negotiated using the presence of a trusted third party
  • #15: The second, illustrated in Figure 1.5, model is concerned with controlled access to information or resources on a computer system, in the presence of possible opponents. Here appropriate controls are needed on the access to and within the system, to provide suitable security. The security mechanisms needed to cope with unwanted access fall into two broad categories (as shown in this figure). The first category might be termed a gatekeeper function. It includes password-based login procedures that are designed to deny access to all but authorized users and screening logic that is designed to detect and reject worms, viruses, and other similar attacks. Once either an unwanted user or unwanted software gains access, the second line of defense consists of a variety of internal controls that monitor activity and analyze stored information in an attempt to detect the presence of unwanted intruders. These issues are explored in Part Four.