Professional Documents
Culture Documents
SECURITY TRENDS
2.
4.
5.
EXAMPLES.
EXAMPLES
EXAMPLES
STATISTICS
COMPUTER SECURITY
KEY OBJECTIVES
KEY OBJECTIVES
CIA TRIAD
Confidentiality:
Confidentiality is roughly equivalent to privacy. Measures undertaken to
ensure confidentiality are designed to prevent sensitive information from
reaching the wrong people, while making sure that the right people can in fact
get it: Access must be restricted to those authorized to view the data in
question.
A good example of methods used to ensure confidentiality is an account
number or routing number when banking online. Data encryption is a common
method of ensuring confidentiality. User IDs and passwords constitute a
standard procedure; two-factor authentication is becoming the norm.
Integrity:
Integrityinvolves
maintaining the consistency,
accuracy, and trustworthiness of data over its entire
life cycle. Data must not be changed in transit, and
steps must be taken to ensure that data cannot be
altered by unauthorized people (for example, in a
breach of confidentiality). These measures include file
permissions and useraccess controls. Version control
maybe used to prevent erroneous changes or
accidental deletion by authorized users becoming a
problem. Examples are an electromagnetic pulse (
EMP) or servercrash. Backupsor redundancies must
be available to restore the affected data to its correct
state.
Availability:
Availability
is best ensured by rigorously
maintaining allhardware, performing hardware
repairs immediately when needed and maintaining a
correctly functioning operating system environment
that is free of software conflicts. Fast and
adaptivedisaster recoveryis essential for the worst
case scenarios. Safeguards against data loss or
interruptions
in
connections
must
include
unpredictable events such as natural disasters and
fire. To prevent data loss from such occurrences,
abackupcopy may be stored in a geographicallyisolated location, perhaps even in a fireproof,
waterproof safe.
In the literature, the terms threat and attack are commonly used
to mean more or less the same thing. Following Table provides
definitions taken from RFC 2828, Internet Security Glossary.
SECURITY ATTACKS
SECURITY ATTACKS
A useful means of classifying security attacks,
used both in X.800 and RFC 2828, is in terms of
passive attacks and active attacks.
A passive attack attempts to learn or make use
of information from the system but does not
affect system resources.
An active attack attempts to alter system
resources or affect their operation.
Traffic Analysis
Traffic Analysis
Modification
of messages, and
Denial of service.
MASQUERADE
REPLAY
MODIFICATION OF MESSAGE
DENIAL OF SERVICE
DENIAL OF SERVICE
DENIAL OF SERVICE
DENIAL OF SERVICE
SECURITY SERVICES
SECURITY SERVICES
ACCESS CONTROL
The prevention of unauthorized use of a resource (i.e.,
this service controls who can have access to a resource,
under what conditions access can occur, and what
those accessing the resource are allowed to do).
DATA CONFIDENTIALITY
The protection of data from unauthorized disclosure.
Connection Confidentiality
The protection of all user data on a connection.
Connectionless Confidentiality
The protection of all user data in a single data block.
SECURITY SERVICES
Selective-Field Confidentiality
The confidentiality of selected fields within the user data on
a connection or in a single data block.
Traffic-Flow Confidentiality
The protection of the information that might be derived
from observation of traffic flows.
DATA INTEGRITY
The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion,
deletion, or replay).
Connection Integrity with Recovery
Provides for the integrity of all user data on a connection
and detects any modification, insertion, deletion, or replay
of any data within an entire data sequence, with recovery
attempted.
.
SECURITY SERVICES
SECURITY SERVICES
Access Control
A variety of mechanisms that enforce access rights
to resources.
Data Integrity
A variety of mechanisms used to assure the
integrity of a data unit or stream of data units.
Authentication Exchange
A mechanism intended to ensure the identity of an
entity by means of information exchange.
Traffic Padding
The insertion of bits into gaps in a data stream to
frustrate traffic analysis attempts.
Routing Control
Enables selection of particular physically secure
routes for certain data and allows routing changes,
especially when a breach of security is suspected.
Notarization
The use of a trusted third party to assure certain
properties of a data exchange.
Trusted Functionality
That which is perceived to be correct with respect to
some criteria (e.g., as established by a security policy).
Security Label
The marking bound to a resource (which may be a data
unit) that names or designates the security attributes
of that resource.
Event Detection
Detection of security-relevant events.
INTERNET STANDARD
INTERNET STANDARD
Standard Type
Associated Protocols
Web
Internet Directory
X.500, LDAP
Application
Videoconferencing
INTERNET SOCIETY
The Internet Society (ISOC) is an international,
non-profit organization founded in 1992 to
provide leadership in Internet related standards,
education, and policy.
It states that its mission is "to assure the open
development, evolution and use of the Internet
for the benefit of all people throughout the
world".
ASSIGNMENT 1 (A)
2.
3.
4.
5.
6.
7.
8.
ASSIGNMENT 1 (B)
1.
2.
3.
4.
5.
6.
7.
8.
9.
THANKS