Top Banner
Information Security Sunday 10:00 – 13:00
28

Lecture 1

Nov 18, 2014

Download

Education

fadwa_stuka

المحاضرة الأولى - Information Security CS709 - د. ابراهيم المرهاق
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lecture 1

Information Security

Sunday 10:00 – 13:00

Page 2: Lecture 1

Instructor:Dr. Ibrahim Ali [email protected]

Textbook: Information

Security Principles And Practices

Second Edition,

By: Mark Stamp

Publisher: J. Wiley & sons

Pub Date: 2011

Information Security

Page 3: Lecture 1

Course Outline

This module consists of four major partsoCryptography (5 weeks)oAccess control (2 weeks)oProtocols (3 weeks)oSoftware (3 weeks)

Page 4: Lecture 1

Assessment

Final exam 50%

Midterm exam 25%

Course work 25%

oAssay, Project, Seminar,

etc.

Page 5: Lecture 1

Introduction

Alice and Bob are the good guys

Trudy is the bad “guy”

Trudy is our generic “intruder”

Page 6: Lecture 1

Alice’s Online BankAlice opens “Alice’s Online

Bank” (AOB)What are Alice’s security

concerns?If Bob is a customer of AOB,

what are his security concerns?

How are Alice’s and Bob’s concerns similar? How are they different?

How does Trudy view the situation?

Page 7: Lecture 1

CIA

CIA are the three fundamental goals of information security.

CIA == Confidentiality, Integrity, and Availability

Page 8: Lecture 1

ConfidentialityAOB must prevent Trudy from

learning Bob’s account balance

Confidentiality: prevent unauthorized reading of information oCryptography used for

confidentiality

Page 9: Lecture 1

IntegrityTrudy must not be able to

change Bob’s account balanceBob must not be able to

improperly change his own account balance

Integrity: detect unauthorized writing of informationoCryptography used for integrity

Page 10: Lecture 1

AvailabilityAOB’s information must be

available whenever it’s needed

Alice must be able to make transactiono If not, she’ll take her business

elsewhereAvailability: Data is available

in a timely manner when needed

Availability is a “new” security concernoDenial of service (DoS) attacks

Page 11: Lecture 1

Beyond CIA: CryptoHow does Bob’s computer

know that “Bob” is really Bob and not Trudy?

Bob’s password must be verifiedoThis requires some clever

cryptography

What are security concerns of pwds?

Are there alternatives to passwords?

Page 12: Lecture 1

Beyond CIA: Protocols

When Bob logs into AOB, how does AOB know that “Bob” is really Bob?

As before, Bob’s password is verified

Unlike the previous case, network security issues arise

How do we secure network transactions?oProtocols are critically

importantoCrypto plays critical role in

protocols

Page 13: Lecture 1

Beyond CIA: Access Control

Once Bob is authenticated by AOB, then AOB must restrict actions of BoboBob can’t view Charlie’s account

info

oBob can’t install new software, etc.

Enforcing these restrictions: authorization

Access control includes both authentication and authorization

Page 14: Lecture 1

Beyond CIA: SoftwareCryptography, protocols, and

access control are implemented in softwareoSoftware is foundation on which

security restsWhat are security issues of

software?oReal world software is complex

and buggyoSoftware flaws lead to security

flawsoHow does Trudy attack software?oHow to reduce flaws in software

development?oAnd what about malware?

Page 15: Lecture 1

The People ProblemPeople often break security

oBoth intentionally and unintentionally

oHere, we consider the unintentional

For example, suppose you want to buy something onlineoTo make it concrete, suppose you

want to buy Information Security: Principles and Practice, 2nd edition from amazon.com

Page 16: Lecture 1

The People ProblemTo buy from amazon.com

oYour Web browser uses SSL protocol

oSSL relies on cryptographyoAccess control issues ariseoAll security mechanisms are in

softwareSuppose all of this security

stuff works perfectlyoThen you would be safe, right?

Page 17: Lecture 1

The People ProblemWhat could go wrong?Trudy tries man-in-the-middle

attackoSSL is secure, so attack doesn’t

“work”oBut, Web browser issues a

warningoWhat do you, the user, do?

If user ignores warning, attack works!oNone of the security

mechanisms failed oBut user unintentionally broke

security

Page 18: Lecture 1

Cryptography“Secret codes”This topic covers

oClassic cryptographyoSymmetric ciphersoPublic key cryptographyoHash functions++

Page 19: Lecture 1

Access ControlAuthentication

oPasswordsoBiometricsoOther methods of authentication

AuthorizationoAccess Control Lists/CapabilitiesoFirewalls, intrusion detection

(IDS)oMultilevel security (MLS),

security modeling, covert channel, inference control

Page 20: Lecture 1

Protocols“Simple” authentication

protocolsoFocus on basics of security

protocolsoLots of applied cryptography in

protocolsReal-world security protocols

oSSH, SSL, IPSec, KerberosoWireless: WEP, GSM

Page 21: Lecture 1

SoftwareSecurity-critical flaws in

softwareoBuffer overflowoRace conditions, etc.

MalwareoExamples of viruses and wormsoPrevention and detectionoFuture of malware?

Page 22: Lecture 1

SoftwareSoftware reverse engineering

(SRE)oHow hackers “dissect” software

Digital rights management (DRM)oShows difficulty of security in

softwareoAlso raises OS security issues

Software and testingoOpen source, closed source,

other topics

Page 23: Lecture 1

SoftwareOperating systems

oBasic OS security issueso“Trusted OS” requirementsoNGSCB: Microsoft’s trusted OS

for the PCSoftware is a BIG security

topicoLots of material to coveroLots of security problems to

consideroBut not nearly enough time

available…

Page 24: Lecture 1

Think Like TrudyIn the past, no respectable

sources talked about “hacking” in detailoAfter all, such info might help

Trudy

Recently, this has changedoLots of books on network

hacking, evil software, how to hack software, etc.

oClasses teach virus writing, SRE, etc.

Page 25: Lecture 1

Think Like TrudyGood guys must think like bad

guys!A police detective…

o…must study and understand criminals

In information securityoWe want to understand Trudy’s

methodsoMight think about Trudy’s

motivesoWe’ll often pretend to be Trudy

Page 26: Lecture 1

Think Like TrudyIs all of this security

information a good idea?

Bruce Schneier (referring to Security Engineering, by Ross Anderson):o“It’s about time somebody

wrote a book to teach the good guys what the bad guys already know.”

Page 27: Lecture 1

Think Like TrudyWe must try to think like TrudyWe must study Trudy’s

methodsWe can admire Trudy’s

clevernessOften, we can’t help but laugh

at Alice’s and/or Bob’s stupidity

But, we cannot act like TrudyoExcept in this class…

Page 28: Lecture 1

In This Course…Think like the bad guyAlways look for weaknesses

oFind the weak link before Trudy does

It’s OK to break the rulesoWhat rules?

Think like TrudyBut don’t do anything illegal!