• Tidak ada hasil yang ditemukan

Directory UMM :Networking Manual:computer_network_books:

N/A
N/A
Protected

Academic year: 2017

Membagikan "Directory UMM :Networking Manual:computer_network_books:"

Copied!
46
0
0

Teks penuh

(1)

Slides by H. Johnson & S. Malladi- Modified by SJF-S '06

1

Computer and Information

Security

(2)

Overview

Security Goals

The need for security

OSI Security Architecture

Attacks, services and mechanisms

Security attacks

Security services

Methods of Defense

(3)

Security Goals

Security Goals

Integrity

Confidentiali ty

(4)

Security Goals

• Confidentiality

Concealment of information or

resources

• Integrity

Trustworthiness of data or resources

• Availability

(5)

Confidentiality

Need for keeping information secret

arises from use of computers in

sensitive fields such as government

and industry

Access mechanisms, such as

(6)

Integrity

Often requires preventing unauthorized

changes

Includes data integrity (content) and origin

integrity ( source of data also called

authentication)

Include prevention mechanisms and detection

mechanisms

– Example: Newspaper prints info leaked from White House and gives wrong source

(7)

Availability

Is an aspect of reliability and

system design

Attempts to block availability,

called

denial of service attacks

are

difficult to detect

(8)

The Need for Security

Computer Security

- the

collection of tools designed

to protect data and

to thwart hackers

Network security or internet

security-

security measures

(9)

Security

• Motivation: Why do we need security?

• Increased reliance on Information technology with or with out the use of networks

• The use of IT has changed our lives drastically.

• We depend on E-mail, Internet banking, and several other governmental activities that use IT

• Increased use of E-Commerce and the World wide web on the Internet as a vast repository of various kinds of

(10)

Security Concerns

• Damage to any IT-based system or activity can result in severe disruption of services and losses • Systems connected by networks are more prone

to attacks and also suffer more as a result of the attacks than stand-alone systems (Reasons?)

Concerns such as the following are common

– How do I know the party I am talking on the network is

really the one I want to talk?

– How can I be assured that no one else is listening and learning the data that I send over a network

(11)

Concerns continued…

Is the web site I am downloading

information from a legitimate one, or a

fake?

How do I ensure that the person I just did a

financial transaction denies having done it

tomorrow or at a later time?

I want to buy some thing online, but I don’t

want to let them charge my credit card

(12)

That is why…

..we need security

– To safeguard the confidentiality, integrity,

authenticity and availability of data transmitted over insecure networks

– Internet is not the only insecure network in this world

– Many internal networks in organizations are prone to insider attacks

(13)

(V.Shmatikov)

(14)

However, in reality

• Security is often over looked (not one of the top criteria)

• Availability, efficiency and performance tend to be the ones

• Buggy implementations

• Systems too complex in nature and rich in features can be filled with security holes

• Incorporation of security into networks, not growing with the rapidly growing number and size of networks

• Attacking is becoming so common and easy – there are books clearly explaining how to launch them

• Security and attacks are a perpetual cat-and-mouse

(15)

The Good News...

There a lot of techniques for defense

Educating people on security solves

many problems

About threats and on the existence of

security mechanisms, qualified

personnel, usability and economics

We will study a lot of network

defenses

(16)

OSI Security

Architecture

ITU-T Recommendation X.800

Security Architecture for OSI

International Telecommunications

Union (ITU) is a United Nations

sponsored agency that develops

standards relating to

(17)

OSI Network Stack and Attacks

(V. Shmatikov)

application presentation session transport network data link physical IP TCP email,Web,N FS RPC 802.11

Sendmail, FTP, NFS bugs, chosen-protocol and

version-rollback attacks

SYN flooding, RIP attacks, sequence number prediction IP smurfing and other

address spoofing attacks

RPC worms, portmapper exploits

WEP attacks

(18)

7 Layer Model

Layer

Functions

7 Application How application uses network 6 Presentatio

n How to represent & display data 5 Session How to establish communication

4 Transport How to provide reliable delivery (error checking, sequencing, etc.)

3 Network How addresses are assigned and packets are forwarded

2 Data Link How to organize data into frames & transmit

(19)

Attacks, Services and

Attacks, Services and

Mechanisms

Mechanisms

Security Attack:

Any action that

compromises the security of information.

Security Mechanism:

A mechanism

that is designed to detect, prevent, or

recover from a security attack.

Security Service:

A service that

enhances the security of data processing

systems and information transfers. A

(20)

Security Attacks

(21)

Security Attacks

Security Attacks

Interruption:

This is an attack on

availability

Disrupting traffic

Physically breaking communication line

Interception:

This is an attack on

confidentiality

Overhearing, eavesdropping over a

(22)

Security Attacks

(continued)

Modification:

This is an attack on

integrity

Corrupting transmitted data or

tampering with it before it reaches its

destination

Fabrication:

This is an attack on

authenticity

Faking data as if it were created by a

(23)

Threats and Attacks

Threat

- a potential for violation of

security or a possible danger that

might exploit a vulnerability

Attack

- an assault on system

security- an intelligent act that is a

deliberate attempt to evade

(24)

Threats

• Disclosure

– unauthorized access to

information

• Deception

– acceptance of false data

• Disruption

- interruption or

prevention of correct operation

(25)

Examples of Threats

Snooping intercepting information

(“passive” wiretapping)

Modification or alteration of

information by “active” wiretapping

Masquerading or spoofing

Repudiation of origin

(26)

Safeguards and

Vulnerabilities

A

Safeguard

is a countermeasure to

protect against a threat

A weakness in a safeguard is called a

(27)

Passive and active attacks

Passive attacks

– No modification of content or fabrication

– Eavesdropping to learn contents or other information (transfer patterns, traffic flows etc.)

Active attacks

– Modification of content and/or participation in communication to

• Impersonate legitimate parties • Modify the content in transit

(28)
(29)
(30)
(31)
(32)
(33)

Two types of threats

• Information access threats

– Intercept or modify data on behalf of users who should not have access to that data.

– E.g. corruption of data by injecting malicious code

• Service threats

– Exploit service flaws in computers to inhibit use by legitimate uses.

(34)

Fundamental threats

[McGibney04]

Information leakage

– Disclosure to unauthorized parties

– Prince Charles mobile phone calls, 1993

Integrity violation

– Corruption of data or loss of data

– Coca-Cola website defaced with slogans, 1997

Denial of service

– Unavailability of system/service/network

– Yahoo!, 2000, 1Gbps

Illegitimate use

(35)

Services and Mechanisms

A

security

policy

is a statement of

what is and what is not allowed.

A

security

service

is a measure to

address a threat

– E.g. authenticate individuals to prevent unauthorized access

A

security

mechanism

is a means to

provide a service

(36)

Security Services

A security service is a service

provided by the protocol layer of a

communicating system (X.800)

5 Categories

Authentication

Access Control

Data confidentiality

Data Integrity

(37)

Security Services

Security Services

• Authentication (who created or sent the data) • Access control (prevent misuse of resources) • Confidentiality (privacy)

• Integrity (has not been altered)

• Non-repudiation (the order is final)

• Availability (permanence, non-erasure) – Denial of Service Attacks

(38)

Security Services

Examples

• Authentication

– Ensuring the proper identification of entities and origins of data before communication

• Access control

– Preventing unauthorized access to system resources

• Data confidentiality

– Preventing disclosure to unauthorized parties

• Data integrity

– Preventing corruption of data

• Non-repudiation

– Collecting proof to prevent denial of participation in transaction or communication

• Availability

(39)

Security Mechanisms

Examples

Two types

Specific mechanisms existing to provide certain security services

• E.g. encryption used for authentication

Pervasive mechanisms which are general mechanisms incorporated into the system and not specific to a service

(40)

Model for Network

Security

Basic tasks

Design an algorithm that opponent cannot

defeat

Generate the secret information to be

used with the algorithm

Develop methods for distributing secret

information

Specify a protocol to be used

(41)
(42)
(43)

Methods of Defense

Methods of Defense

• Encryption

• Software Controls

– (access limitations in a data base, in operating system protect each user from other users)

• Hardware Controls

– (smartcard)

• Policies

– (frequent changes of passwords)

(44)

Internet standards and

Internet standards and

RFCs

RFCs

The Internet society

Internet Architecture Board (IAB)

Internet Engineering Task Force (IETF)

(45)

Internet RFC Publication Process

(46)

Recommended Reading

Recommended Reading

• Pfleeger, C. Security in Computing. Prentice Hall, 1997.

• Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001

.

• Rita Summers, Secure Computing: Threats and Safe Guards, McGrawHill.

• Peter Ryan and Steve Schneider, Modeling and analysis of security protocols, Addison Wesley.

• V. Shmatikov, Network security and privacy, University of Texas, Austin, TX.

Referensi

Dokumen terkait

Bapak/Ibu diminta untuk memilih jawaban sesuai dengan apa yang Bapak/Ibu rasakan dengan cara memberi tanda silang (X) di kolom yang tepat..

a. Penyedia telah menyerahkan Jaminan Uang Muka senilai uang muka yang akan diterima. Penyedia telah mengajukan permohonan pengambilan uang muka secara tertulis

24 DINAS Dt,'KCAPIt Penlngkatan Pelayanan Publik dalam Eidana

Unsur-unsur golongan utama dalam sistem periodik terletak pada golongan A. Golongan utama disebut juga unsur representatif. Dalam bab ini yang dipelajari hanya unsur-unsur golongan

Puji Syukur kepada Tuhan Yang Maha Esa, karena berkat rahmat-Nya sehingga penulis dapat menyelesaikan skripsi ini, yang berjudul “Pengaruh Free Cash Flow, IOS, Dan

1) Memberikan informasi kepada pihak sekolah terkait akar permasalahan rendahnya daya saing di SMA Kristen 2 Salatiga. 2) Memberikan masukan kepada pihak sekolah berupa

“Begini Pak, karena pertama kali saya belajar bahasa asing adalah bahasa Arab yang tingkat kesulitannya sepuluh kali lipat ketimbang bahasa Inggris, maka ketika saya belajar bahasa

Hasil rapat Pokja jasa ULP Polda NTB, paket pekerjaan Pengadaan (Catering) makan dan extra fooding siswa Diktukba Polri T.A 2014 SPN Polda NTB adalah menyepakati