Sunteți pe pagina 1din 6

Computer Security.

Vulnerability : weakness in the security


system.
Threat : circumstances that has the
potential to cause loss or harm.
Control : an action, device, procedure or
technique that removes or reduce the
vulnerability.
Attack : exploitation of one or more
vulnerabilities by a threat; tries to defeat
controls

Amateurs : committed most of the


computer crimes reported to date.
Ordinary computer professionals or users.
Crackers : often high school or university
students, attempt to access computing
facilities for which they have not been
authorized.
Career criminals : understand the
target of computer crime. organized crime
and international groups.

Symmetric Cryptosystem

Methods of Defense : The Methods


4 kinds of threat :
Interception : some unauthorized party
has gained access to an asset.
Interruption : an asset of the system
becomes lost, unavailable or unusable.
Modification : unauthorized party not
only accesses but tampers with an asset.
Fabrication : intruder insert spurious
transaction to an existing computing
system.

Controls : strong gate or door.


Encryption : Scrambling process.

Physical Control : locks the door,


backup.

The Meaning of Computer Security :

Encryption : process of encoding a


message so that its meaning is not
obvious.

Confidentiality : ensures that computer


related assets are accessed only by
authorized parties.
Integrity : assets can be modified only
by authorized parties or only in
authorized ways.

Software Controls : OS and


development control.

Cryptanalysis

Hardware Controls : firewalls, intrusion


detecting system.

A cryptanalysts chore is to break an


encryptio.

Policies and Procedures : codes of


ethics.

Caesar Cipher :

Decryption : reverse process,


transforming an encrypted message back
into its normal, original form.

Availability : assets are accessible to


authorized parties at appropriate times.
Computer Criminals :

Asymmetric Cryptosystem

Each letter is translated to a letter


a fixed number of places after it in
alphabet.
Caesar used a shift of 3.

(no asal mesti tambah 3)


Advantages

Encryption Process

*Early one, most


easy to perform in
the field.
*Quite simple,
pattern formula
was easy to

Disadvantages

memorize and
implement.
*Dangerous to
perform
for
soldiers or spies.

The Data Encryption Standard (DES)


Stream Ciphers

*Obvious pattern is
major weakness

Provide high level of security.


Specified and easy to understand.
Available to all users.
Efficient to use.
Exportable.

Double DES :
convert one symbol of plaintext
immediately into a symbol of ciphertext.

Vernam Cipher :

Block Ciphers

Take two keys and perform two


encryption, one on top of the
other.
Assumption is FALSE : two
encryptions are no better than
one.
The double encryption only
double the work for the attacker.

Triple DES

encrypt a group of plaintext symbols as


one block.
Symmetric and Asymmetric
Encryption System

Encrypt with one key, decrypt


with the second, and encrypt with
the first again.
So that 112 bits effective key
length is quite strong and it is
effective against all feasible
known attacks.

Comparing Stream and Block


Algorithms :

DES Flow

The Advanced Encryption Standard


(AES) :

Unclassified.
Publicly disclosed.
Symmetric block cipher algorithm
for blocks of 128 bits
Rivets-Shamir-Adelman (RSA)
Encryption :

RSA cryptosystem is a public key


system.
Confidence in the method grows
as time passes without discovery
of a flaw.
RSA algorithm also operate with
arithmetic mod n.
Using d and e, and it is
interchangeable
Either one can be public key but
the other one must be the private
key.

Explain what happen in the DES key


transformation?
16 rounds on the input bits - substitutions
and permutations.
What is the size of the DES key after
transformation step ?
8 bit use + 8 unused.
Example : RSA by considering the
following parameters p = 19, q = 23, and
e=5
What is the RSA modulus n?
Pxq=n
19 x 23 = 437
n = 437

What is q(n)?
P = 19 , q = 23

Phi (n) = (19-1) x (23-1)


n = 396
What is the decryption key d?
Phi = (p-1) x (q-1)

By themselves, program are


seldom security threats.
The program operate on data,
taking action only when data and
state changes trigger it.
Much of the work done by a
program is invisible to the user,
so they are not likely to be aware
of any malicious activity.

Kind of Malicious Code :

Phi (n) = (19-1) x (23-1)


Phi = 396
396

396

5
79

396-395 = 1
317

396-79 =

d = 317
Buffer Flows : A buffer (or array or
estring)
x d mod
= 1 in which data can be
is aphi
space
5held.
x 317 mod 396 = 1
What can we do to avoid buffer
overflow attacks? Give 2 strategies :

Use higher-level programming


languages that are strongly
typed.
Validate input to prevent
unexpected data from being
processed.

Viruses and Other Malicious Code

How Viruses Attach :


Appended viruses - A program virus
attaches itself to a program then,
whenever the program run, the virus
activated.
Viruses that surround a program Virus that runs the original program but
has control before and after its execution.
Integrated viruses and replacement Integrating itself into the original code of
the target.

Viruses and Targeted Malicious Code


Research :

The Brain Virus.


The Internet Worm.
Code Red.
Web Bugs.
Salami Attack.
Trapdoors. Is the new jargon for
Backdoor Programs or Backdoor
virus in Software field.

Many kinds of viruses:

Mass Mailing Viruses


Macro Viruses
Back Doors a.k.a. Remote
Access Trojans
Cell phone viruses

Control of Access to General Objects


Objects to protect:

Memory
File or data on an auxiliary
storage device
Hardware device
A table of the OS
Data structure such as stack

Complementary goals in protecting


objects:

Check every access revoke


users privilege
Enforce least privilege least task
of every user
Verify acceptable usage yes-no
decision

User Authentication
Authentication mechanisms use any
of three qualities to confirm users
identity:

Something the user knows


password, PIN numbers, mothers
name.
Something the user has identity
badges, physical keys, drivers
license.
Something the user is called
biometrics.

Attacks on passwords:

Try all possible password.


Try passwords likely for the user.
Ask the user.

Password selection criteria:

Use characters other than just AZ.


Choose long password.
Avoid actual names or words

Main concern with the use of


passwords for authentication :

Denial of Service Attacks.


Forgery Attacks.
Server spoofing attacks.

Database Security
Advantages of the database:

Shared access

Data consistency
Minimal redundancy

Security Requirements :

Physical database integrity: the


data of the database are immune
to physical problems such as
power failures.
Logical database integrity: the
structure of the database is
preserve.
Element integrity: the data
contained in each element are
accurate.
User authentication: every user is
positively identified.

Security in Networks
Threats in Networks Threat
precursor:
Port scan - Program that give an
information about three things:

Which standard ports or services


are running and responding?
What operating system is
installed?
What applications and versions of
applications are present?

Social engineering
Involves using social skills and personal
interaction to get someone to reveal
security-relevant information and perhaps
even do something that permits an
attack.

Reconnaissance
Gathering discrete bits of information
from various sources and then putting
them together like the pieces of a puzzle.

so that the application will receive


only requests to act properly.
Legal, Privacy and Ethical Issues in
Computer Security

Availability of documentation
Vendor themselves sometimes distribute
information that is useful to an attacker.
Firewalls :

Firewall is a device that filters all


traffic between a inside network
and a outside network.
The purpose of a firewall is to
keep bad things outside a
protected environment.
Firewalls implement a security
policy.

Copyrights :

Patents :

The design of firewall :

Always invoked.
Tamperproof.
Small and simple enough for
rigorous analysis.

Type of firewalls :

Packet filtering gateways or


screening routers - Most effective.
Control packet from source to
destination.
Stateful inspection firewalls Maintains state information from
one packet to another in the input
stream.
Application proxies - Simulate the
(proper) effects of an application

Copyright are designed to protect


the expression of idea.
Applies to creative work.
The copyright must apply to an
original work.

Patents protect invention, tangible


objects or ways to make them.
Apply to the result of science,
technology and engineering.
Items protected computer
software, recognizing algorithms
like processes and formulas.

Security Awareness :
Security awareness program: one of least
frequently implemented, but most
effective security methods.
What is public key cryptography?
Public-key cryptography, or asymmetric
cryptography, is an encryption scheme
that uses two mathematically related, but
not identical, keys - a public key and a
private key.
What is non-repudiation in the
context of computer security?

Nonrepudiation is a method of
guaranteeing message transmission
between parties via digital signature
and/or encryption.
Describe why the DES algorithm is
generally not considered as secure.
What can be done to improve its
security?

Key length is fixed.


Design decisions not public.

To improve :

Only a single electronic copy a


crucial and sensitive documents.
Key escrow facilitates recovery of
the document if the key lost.

File Protection Mechanisms


All-None Protection :

Lack of trust
Timesharing issues
File listings

Group Protection :
User cannot belong to two groups
Forces one person to be multiple users
Forces user to be put into all groups
User Authentication

Something the user knows


(password, PIN, passphrase,
mothers maiden name).
Something the user has (ID, key,
drivers license, uniform).
Something the user is
(biometrics).

Authentication :

Challenge-Response Systems
Impersonation of Login
Authentication Other than
Passwords

S-ar putea să vă placă și