Introduction Components of computer security Threats Policies and

  • Slides: 23
Download presentation
Introduction Components of computer security Threats Policies and mechanisms Operational Issues Human Issues

Introduction Components of computer security Threats Policies and mechanisms Operational Issues Human Issues

Basic Components (CIA) https: //www. researchgate. net/profile/Ali_Aldallal 2/post/What_is_information_security/attachment/59 d 640 f 979197 b 807799

Basic Components (CIA) https: //www. researchgate. net/profile/Ali_Aldallal 2/post/What_is_information_security/attachment/59 d 640 f 979197 b 807799 d 189/AS%3 A 433099327709184%401480270334665/download/opentext-graphic-for-web-information-security-en. jpg

CONFIDENTIALITY https: //encrypted-tbn 0. gstatic. com/images? q=tbn: ANd 9 Gc. QMry 15 l. Pb

CONFIDENTIALITY https: //encrypted-tbn 0. gstatic. com/images? q=tbn: ANd 9 Gc. QMry 15 l. Pb 2 Qs. US 1 e. PX-y 3 b 7 VD 4 k 0 Bxyc. ODp. K 8 oxg 2 Ln 8_I 7 k. W 1

INTEGRITY Data integrity (integrity, correctness) Origin integrity (authentication, trustworthiness) https: //www. labguru. com/wp-content/uploads/2018/08/post-8 -2018

INTEGRITY Data integrity (integrity, correctness) Origin integrity (authentication, trustworthiness) https: //www. labguru. com/wp-content/uploads/2018/08/post-8 -2018 -b. jpg

DATA INTEGRITY Data integrity (integrity, correctness) https: //images-na. ssl-images-amazon. com/images/I/81 d. Cr. Vjgrb. L.

DATA INTEGRITY Data integrity (integrity, correctness) https: //images-na. ssl-images-amazon. com/images/I/81 d. Cr. Vjgrb. L. _SL 1500_. jpg

ORIGIN INTEGRITY Origin integrity (authentication, trustworthiness)

ORIGIN INTEGRITY Origin integrity (authentication, trustworthiness)

AVAILABILITY https: //www. blackmoreops. com/wp-content/uploads/2015/10/Free-DOS-Attack-Tools-Do. S-attack-black. MORE-Ops. jpg

AVAILABILITY https: //www. blackmoreops. com/wp-content/uploads/2015/10/Free-DOS-Attack-Tools-Do. S-attack-black. MORE-Ops. jpg

Text Encryption & Image Encryption with SCAN (Bourbakis) Encrypt text information in music score,

Text Encryption & Image Encryption with SCAN (Bourbakis) Encrypt text information in music score, each note corresponds to a letter. --- Schott (1608 – 1666)

Information Hiding - Examples APPARENTLY NEUTRAL’S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD

Information Hiding - Examples APPARENTLY NEUTRAL’S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BY-PRODUCTS, EJECTING SUETS AND VEGETABLE OILS. A message sent by a spy in World War II. PERSHING SAILS FROM NY JUNE 1. Extract the second letter from each word.

Information Hiding - Examples (Maniccam & Bourbakis)

Information Hiding - Examples (Maniccam & Bourbakis)

Classes of Threats Threat: potential violation of security; Attack: the actual violation; Attacker: people

Classes of Threats Threat: potential violation of security; Attack: the actual violation; Attacker: people who execute the violation; http: //datasmithnetworks. com/site/wp-content/uploads/2016/06/Screen-Shot-2016 -06 -16 -at-10. 25. 22 -AM. png

Classes of Threats Disclosure Deception Disruption Usurpation

Classes of Threats Disclosure Deception Disruption Usurpation

Disclosure: unauthorized access to information https: //www. consumer. ftc. gov/sites/www. consumer. ftc. gov/files/eqfx-socmed-summary. png

Disclosure: unauthorized access to information https: //www. consumer. ftc. gov/sites/www. consumer. ftc. gov/files/eqfx-socmed-summary. png

Deception: acceptance of false data https: //www. naturalnews. com/wp-content/uploads/sites/91/2018/12/Fake-News-Fact-Truth-Myth-Rumor-Fiction. jpg

Deception: acceptance of false data https: //www. naturalnews. com/wp-content/uploads/sites/91/2018/12/Fake-News-Fact-Truth-Myth-Rumor-Fiction. jpg

Disruption: interruption or prevention of correct operation https: //static 01. nyt. com/images/2017/12/18/us/18 xp-airport 4

Disruption: interruption or prevention of correct operation https: //static 01. nyt. com/images/2017/12/18/us/18 xp-airport 4 -article. Large. jpg? quality=75&auto=webp&disable=upscale

Usurpation: unauthorized control of a part of a system http: //creditfraudalert. org/wp-content/id-theft-protection/2019/05/usurpation-didentite. png

Usurpation: unauthorized control of a part of a system http: //creditfraudalert. org/wp-content/id-theft-protection/2019/05/usurpation-didentite. png

Policies and Mechanisms http: //images. slideplayer. com/15/4818128/slides/slide_4. jpg

Policies and Mechanisms http: //images. slideplayer. com/15/4818128/slides/slide_4. jpg

Goals of Security https: //image. slidesharecdn. com/securing-microservices-151023111758 -lva 1 -app 6892/95/beta-securingmicroservices-20 -638. jpg? cb=1445599262

Goals of Security https: //image. slidesharecdn. com/securing-microservices-151023111758 -lva 1 -app 6892/95/beta-securingmicroservices-20 -638. jpg? cb=1445599262

Types of Mechanisms http: //images. slideplayer. com/16/5133500/slides/slide_30. jpg

Types of Mechanisms http: //images. slideplayer. com/16/5133500/slides/slide_30. jpg

Assurance Assurance: the basis for specifying how much one can trust a system; it

Assurance Assurance: the basis for specifying how much one can trust a system; it includes specification, design, and implementation; Specification Formal statement of desired functionality Requirements analysis Design Translates specifications into components that will implement them; How system will meet specification Implementation Create a system that satisfies the design; Programs/systems that carry out design;

Operational Issues Cost-Benefit Analysis Is it cheaper to prevent or recover? Risk Analysis Should

Operational Issues Cost-Benefit Analysis Is it cheaper to prevent or recover? Risk Analysis Should we protect something? How much should we protect this thing? The level of protection is a function of the probability of an attack occurring and the effects of the attack should it succeed; Laws and Customs Are desired security measures illegal? Will people do them?

Human Issues Organizational Problems Security provides no direct financial rewards to the user; Responsibility

Human Issues Organizational Problems Security provides no direct financial rewards to the user; Responsibility without power causes problems; Lack of trained people or lack of resource; Financial benefits of security is not much; People problems Insiders could be more dangerous than an outsider; Untrained personnel could cause problems;

Tying Together Threats Policy Specification Design Implementation Operation

Tying Together Threats Policy Specification Design Implementation Operation