L1 NwSecurityIntro BEng
L1 NwSecurityIntro BEng
L1 NwSecurityIntro BEng
SECURITY
INTRO
DR. NOR FADZILAH ABDULLAH
JKEES, FKAB
COURSE SYNOPSIS
2
BOOKS
• STALLINGS, W., CRYPTOGRAPHY AND • TANENBAUM & WETHERALL, COMPUTER
NETWORK SECURITY, 6TH EDITION, NEW NETWORKS, 5TH EDITION. MASSACHUSETTS:
JERSEY, PRENTICE HALL, 2013. PRENTICE HALL, 2010.
3
COURSE STRUCTURE
No. Topic
1 Introduction to Network & Security
2 Classical Encryption Techniques
3 Block Ciphers: DES and AES
4 Public-Key Cryptography and RSA
5 Message Authentication, Hash Functions and MAC.
6 Digital Signatures
7 Key Management & Distribution, User Authentication
4
THE DANGER:
WHY NETWORKS AND DATA ARE
ATTACKED
WAR
STORIES
HIJACKED PEOPLE
A hacker set up an open “rogue” wireless hotspot posing as a legitimate wireless
network.
https://www.youtube.com/watch?v=zcmmFQGxMNU
WAR STORIES
RANSOMED COMPANIES
An employee receive an email from his CEO,containing an attached
PDF.
https://www.youtube.com/watch?v=4gR562GW7TI
WAR
STORIES
TARGETED
NATIONS
Stuxnet Worm
9
EXAMPLE : FAKE WEBSITE
10
RECENT ATTACKS (E.G.)
http://www.ibtimes.com/google-malaysia-website-apparently-hacked-company-
says-dns-attack-1880764
RECENT ATTACKS (E.G.)
http://www.theguardian.com/technology/2013/oct/03/adobe-hacking-data-
breach-cyber-attack
13
https://www.theguardian.com/technology/2016/aug/31/dropbox-hack-
passwords-68m-data-breach
14
https://techcrunch.com/2016/06/08/twitter-hack/
15
http://fortune.com/2016/09/22/yahoo-hack-qa
JUST WAITING FOR TROUBLE?
http://www.prweb.com/releases/2015/01/prweb12456779.htm
SAFEGUARDS
17
• The NIST computer security handbook defines the term computer
security as:
“The protection afforded to an automated information system in order to
attain the applicable objectives of preserving the integrity, availability
and confidentiality of information system resources” (includes hardware,
software, firmware, information/data, and telecommunications)
SECURITY OBJECTIVES
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or
disclosed to unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information may
be disclosed
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to
authorized users
CONFIDENTIALITY
23
POSSIBLE ADDITIONAL CONCEPTS:
Authenticity Accountability
• Verifying that users are • The security goal that
who they say they are generates the
and that each input requirement for actions
arriving at the system of an entity to be traced
came from a trusted uniquely to that entity
source
BREACH OF SECURITY LEVELS OF IMPACT
ATM system:
• Confidentiality: high impact (the system must keep personal
identification numbers, both in the host system and during transmission
for a transaction).
• Integrity: high impact (must protect the integrity of account records and
of individual transactions).
• Availability:
• host system: medium impact (important to the economic well being
of the bank, but not to its trustee/fiduciary responsibility).
• individual teller machines: low impact.
26
EXAMPLE 2: SECURITY REQUIREMENTS
• Integrity:
• individual transactions: low impact (lasting damage will not be
incurred by occasionally losing a call or billing record).
• control programs and configuration records: high impact (switching
function would be defeated without it).
• Availability: high impact (to ensure switching function would not be
compromised)
27
EXAMPLE 3: SECURITY REQUIREMENTS
28
EXAMPLE 4: SECURITY REQUIREMENTS
29
COMPUTER SECURITY CHALLENGES
• Security is not simple • Security mechanisms typically involve
• Potential attacks on the more than a particular algorithm or
security features need to be protocol
considered • Security is essentially a battle of wits
• Procedures used to provide between a perpetrator and the
particular services are often designer
counter-intuitive • Little benefit from security investment
is perceived until a security failure
• It is necessary to decide where
occurs
to use the various security
mechanisms • Strong security is often viewed as an
impediment to efficient and user-
• Requires constant monitoring
friendly operation
• Is too often an afterthought
OSI SECURITY ARCHITECTURE: FOCUS
AREAS
• Security attack
• Any action that compromises the security of information owned by an
organization
• Security mechanism
• A process (or a device incorporating such a process) that is designed to detect,
prevent, or recover from a security attack
• Security service
• A processing or communication service that enhances the security of the data
processing systems and the information transfers of an organization
• Intended to counter security attacks, and they make use of one or more security
mechanisms to provide the service
THREATS AND ATTACKS (RFC 4949)
THREAT ACTORS
AMATEURS
Known as script kiddies.
https://www.youtube.com/watch?v=BHHCvcCUOWU
Threat Impact
PII AND PHI
https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-
cyber-crime-is-the-greatest-threat-to-every-company-in-the- 39
world/#7f4eaff73f07
THREAT IMPACT
LOST COMPETITIVE
ADVANTAGE
Could result in lost competitive
advantage.
• Corporate espionage in cyberspace.
• Loss of trust that comes when a
company is unable to protect its
customers’personal data.
Threat Impact
POLITICAL AND NATIONAL
SECURITY
• Traffic analysis
• Find the electronic address (such as the e-mail address) of
the sender or the receiver, collect pairs of requests and
responses to guess the nature of the transaction.
ACTIVE ATTACKS
• Involve some modification of the • Takes place when one entity
Masquerade pretends to be a different entity
data stream or the creation of a / Spoofing • Usually includes one of the other
forms of active attack
false stream
• Difficult to prevent because of the • Involves the passive capture of a
wide variety of potential physical, data unit and its subsequent
Replay retransmission to produce an
software, and network unauthorized effect
vulnerabilities
• Some portion of a legitimate
• Goal is to detect attacks and to Modification message is altered, or messages
recover from any disruption or of messages are delayed or reordered to
produce an unauthorized effect
delays caused by them
S D
normal transmission
S D S D S D S D
A
A A A
48
ACTIVE AND PASSIVE THREATS
release of traffic
message analysis
contents
49
EXAMPLES: ACTIVE ATTACKS
• Masquerading /spoofing
• An attacker might steal the bank card and PIN of a bank
customer and pretend that she is that customer (sender).
• A user tries to contact a bank, but another site pretends
that it is the bank (receiver) and obtains some information
from the user.
• Replaying
• A person sends a request to her bank to ask for payment
to the attacker, who has done a job for her. The attacker
intercepts the message and sends it again to receive
another payment from the bank.
EXAMPLES: ACTIVE ATTACKS
• Modification
• A customer sends a message to a bank to initiate some
transaction. The attacker intercepts the message and changes the
type of transaction to benefit herself.
• Denial of service (dos)
• Client send many bogus requests to a server until the server
crashes due to heavy load.
• Intercept and delete a server’s response to a client, making the
client believe that the server is not responding.
• Bank with two servers – one server is blocked, the other provides
false information
• Intercept requests from the clients, causing the clients to send
requests many times and overload the system.
STANDARDS
National Institute of Standards and Technology
• NIST is a U.S. federal agency that deals with measurement science, standards, and technology related to
U.S. government use and to the promotion of U.S. private-sector innovation
• Despite its national scope, NIST Federal Information Processing Standards (FIPS) and Special Publications
(SP) have a worldwide impact
Internet Society
• ISOC is a professional membership society with world-wide organizational and individual membership
• Provides leadership in addressing issues that confront the future of the Internet and is the organization home
for the groups responsible for Internet infrastructure standards
ITU-T
• The International Telecommunication Union (ITU) is an international organization within the United Nations
System in which governments and the private sector coordinate global telecom networks and services
• The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors of the ITU and whose
mission is the development of technical standards covering all fields of telecommunications
ISO
• The International Organization for Standardization is a world-wide federation of national standards bodies
from more than 140 countries
• ISO is a nongovernmental organization that promotes the development of standardization and related
activities with a view to facilitating the international exchange of goods and services and to developing
cooperation in the spheres of intellectual, scientific, technological, and economic activity
• AUTHENTICATION
• ACCESS CONTROL
• DATA CONFIDENTIALITY
• DATA INTEGRITY
• NONREPUDIATION
1 Design