Top Banner
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1
22

By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Jan 20, 2018

Download

Documents

Adelia Higgins

References 3
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

ByMarwan Al-Namari & Hafezah Ben

OthmanAuthor: William Stallings

College of Computer Science at Al-QunfudahUmm Al-Qura University, KSA, Makkah

1

Page 2: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Unit Guide: Computer SecurityTeaching Plan: Weeks 1 – 14.Week 1-6 (In week 4 you will have a Quiz No.1) .Mid Term Holiday.Mid-Term Exam will be after Mid Term Holiday.Week 7-14 (In week 10 you will have a Quiz No.2).Individual Topic Presentation : Every Week.Mode of Assessment : Final Exam (50 %) +

Mid-Term Exam(20%) + Presentation (10%) + Quizzes (10%[5+5]) + Attendance (10%)

 

2

Page 3: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

References

3

Page 4: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

BackgroundInformation Security requirements have

changed in recent timesTraditionally provided by physical and

administrative mechanismsComputer use requires automated tools to

protect files and other stored informationUse of networks and communications

links requires measures to protect data during transmission

4

Page 5: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

DefinitionsComputer Security - generic name for

the collection of tools designed to protect data and to thwart hackers

Network Security - measures to protect data during their transmission

Internet Security - measures to protect data during their transmission over a collection of interconnected networks

5

Page 6: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Aim of CourseOur focus is on Internet SecurityWhich consists of measures to deter, prevent,

detect, and correct security violations that involve the transmission & storage of information

6

Page 7: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security Trends

7

Page 8: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

OSI Security ArchitectureITU-T X.800 “Security Architecture for OSI”Defines a systematic way of defining and

providing security requirementsFor us it provides a useful, if abstract,

overview of concepts we will study

8

Page 9: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Aspects of SecurityConsider 3 aspects of information security:

Security AttackSecurity MechanismSecurity Service

9

Page 10: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security AttackAny action that compromises the security of

information owned by an organizationInformation security is about how to prevent

attacks, or failing that, to detect attacks on information-based systems

Often threat & attack used to mean same thing

Have a wide range of attacksCan focus of generic types of attacks

PassiveActive

10

Page 11: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Passive Attacks

11

Page 12: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Active Attacks

12

Page 13: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security ServiceEnhance security of data processing systems

and information transfers of an organizationIntended to counter security attacksUsing one or more security mechanisms Often replicates functions normally associated

with physical documents Which, for example, have signatures, dates; need

protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed

13

Page 14: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security ServicesX.800:

“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”

RFC 2828:“a processing or communication service

provided by a system to give a specific kind of protection to system resources”

14

Page 15: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security Services (X.800)Authentication - assurance that the

communicating entity is the one claimedAccess Control - prevention of the

unauthorized use of a resourceData Confidentiality –protection of data

from unauthorized disclosureData Integrity - assurance that data

received is as sent by an authorized entityNon-Repudiation - protection against

denial by one of the parties in a communication

15

Page 16: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security MechanismFeature designed to detect, prevent, or

recover from a security attackNo single mechanism that will support all

services requiredHowever one particular element underlies

many of the security mechanisms in use:Cryptographic techniques

Hence our focus on this topic

16

Page 17: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Security Mechanisms (X.800)specific security mechanisms:

Encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization

pervasive security mechanisms:Trusted functionality, security labels,

event detection, security audit trails, security recovery

17

Page 18: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Model for Network Security

18

Page 19: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Model for Network Security Using this model requires us to:

1. Design a suitable algorithm for the security transformation

2. Generate the secret information (keys) used by the algorithm

3. Develop methods to distribute and share the secret information

4. Specify a protocol enabling the principals to use the transformation and secret information for a security service

19

Page 20: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Model for Network Access Security

20

Page 21: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

Model for Network Access Security Using this model requires us to:

1. Select appropriate gatekeeper functions to identify users

2. Implement security controls to ensure only authorised users access designated information or resources

Trusted computer systems may be useful to help implement this model

21

Page 22: By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah…

SummaryHave considered:

Definitions for: Computer, network, internet security

X.800 standardSecurity attacks, services,

mechanismsModels for network (access)

security.22