44
System Security Prof. Rupesh Mishra System Security - Introduction

Security

Embed Size (px)

Citation preview

Page 1: Security

System SecurityProf. Rupesh Mishra

System Security - Introduction

Page 2: Security

Prerequisites

• Computer Networks

• Operating Systems

• Algorithm & Programming

• Computer Organization and Architecture

• Data Structure

System Security - Introduction 2

Page 3: Security

Syllabus

• 150 = 100 + 25 + 25

• Cryptography

• Access Control

• Software Security

• Network Security

System Security - Introduction 3

Page 4: Security

• Text Book

1. Cryptography and Network Security by Behrouz A.

Forouzan, TATA McGraw hill.

2. Security in Computing by Charles P. Pfleeger ,

Pearson Education

• Reference Book

1. Cryptography and Network Security, William

Stalling, Prentice hall

System Security - Introduction 4

Page 5: Security

Information Asset

System Security - Introduction 5

Page 6: Security

Computing System

Software

Hardware

Data

System Security - Introduction 6

Page 7: Security

VulnerabilityWeakness in the security

system

ThreatCircumstances that cause

harm or loss to system

AttackExploiting the

vulnerability of system

System Security - Introduction 7

Page 8: Security

Control

• An action, device, procedure or technique to

remove or reduce vulnerability.

• A threat is blocked by controlling

vulnerability.

System Security - Introduction 8

Page 9: Security

•Interception

•Interruption

•Modification

•Fabrication

Threats

System Security - Introduction 9

Page 10: Security

Interception

System Security - Introduction 10

Page 11: Security

Interception

• Unauthorized party has gained access to an

asset.

• Unauthorized party can be a Person,

Program or System.

• Copying data , Wiretapping

System Security - Introduction 11

Page 12: Security

Interruption

System Security - Introduction 12

Page 13: Security

Interruption

• An asset of the system becomes

unavailable or unusable.

oDestruction of hardware devices.

oDeleting program or data file.

oMalfunction of O.S.

System Security - Introduction 13

Page 14: Security

Modification

• Unauthorized tempering of asset.

oChange database value

oAlter program to perform additional

computation

oModify data to be transmitted

System Security - Introduction 14

Page 15: Security

Fabrication• Fabrication of counterfeit objects on a

computing system.

oAdd records to an existing database

System Security - Introduction 15

Page 16: Security

Software Vulnerability

• Software Deletion(Interruption)

• Software Modificationo Logic Bomb

o Trojan Horse

o Virus

o Trap Door

o Information Leak

• Software Theft

System Security - Introduction 16

Page 17: Security

System Security - Introduction 17

Page 18: Security

Security

Confident-iality

IntegrityAvailability

System Security - Introduction 18

Page 19: Security

Confidentiality

• No unauthorized disclosure of information

System Security - Introduction 19

I Don’t want anyone to steal my credit card

number

Page 20: Security

Confidentiality

• Only authorized party can access the

protected data.

• Determine authorized people

• Determine data access policy

• Awareness of sensitivity of data

System Security - Introduction 20

Page 21: Security

Integrity

• No unauthorized modification of information

System Security - Introduction 21

I Don’t want anyone to change my

report

Page 22: Security

Asp

ects

of

Inte

gri

tyAuthorized Action

Separation and Protection

Error Detection & Correction

System Security - Introduction 22

Page 23: Security

Availability

• System should be available for legitimate

use.

System Security - Introduction 23

I want to check my E-Mails

24/7

Page 24: Security

Availability

• Applicable to data and services.

o Timely response to the request

o Fault Tolerance

o Easy to use

oConcurrency Controlled

oDeadlock Management

System Security - Introduction 24

Page 25: Security

Computer Security

• The protection afforded to an automated

information system in order to attain the

applicable objectives of preserving the

integrity , availability and confidentiality of

resources.

System Security - Introduction 25

Page 26: Security

Security Attack

Active Attack

Passive attack

System Security - Introduction 26

Page 27: Security

Snooping

System Security - Introduction 27

Page 28: Security

Snooping

System Security - Introduction 28

Page 29: Security

Traffic Analysis

System Security - Introduction 29

Page 30: Security

Modification

System Security - Introduction 30

Page 31: Security

Modification

System Security - Introduction 31

Page 32: Security

Masquerading

System Security - Introduction 32

Page 33: Security

Masquerading

System Security - Introduction 33

Page 34: Security

Replay

System Security - Introduction 34

Page 35: Security

Repudiation

System Security - Introduction 35

Page 36: Security

Denial of Service

System Security - Introduction 36

Page 37: Security

Denial of Service

System Security - Introduction 37

Page 38: Security

Active Attack Passive Attack

Access and modify information

Access information

System is harmed No harm to system

Easy to detect than preventDifficult to detect than prevent

Threat to Integrity, Availability Threat to Confidentiality

Masquerading, Repudiation, DOS

Snooping, Traffic analysis

System Security - Introduction 38

Page 39: Security

Security Attack

Confidentiality (Passive)

Snooping

Traffic Analysis

Integrity (Active)

Modification

Masquerading

Replaying

Repudiation

Availability (Active)

DOS

System Security - Introduction 39

Page 40: Security

Service Security Mechanism

Data Confidentiality

Encipherment , Routing Control

Data IntegrityEncipherment , Digital Signature, Data Integrity

AuthenticationEncipherment , Digital Signature, Authentication Exchange

NonrepudiationDigital Signature, Data Integrity, Notarization

Access Control Access Control

System Security - Introduction 40

Page 41: Security

System Security - Introduction 41

Page 42: Security

Encipherment

Cryptography

Steganography

System Security - Introduction 42

Page 43: Security

Cryptography

• Secret writing

• Encryption * Decryption

• Symmetric * Asymmetric

System Security - Introduction 43

Page 44: Security

Steganography

This course is about cryptography,

not on steganography

Thank You !!!!!!!

System Security - Introduction 44