Publication 10 8717 49
Publication 10 8717 49
Publication 10 8717 49
Lecture Outlines:
1.1 Information Security
1.2 New Threats
1.3 Important Challenges in Security
1.4 Security Models
1.5 Security Goals
1.6 Security Attacks
Objectives:
After studying this lecture, you will be able to discuss
✓ Meaning of information security.
✓ The most important new security threats
✓ Important challenges in providing security
✓ Various models in security
✓ Primary goals of security
✓ Two types of security attacks
1
Information Security Lecture 1
2
Information Security Lecture 1
is the computer virus. A virus may be introduced into a system physically when it arrives
on a diskette or optical disk and is subsequently loaded onto a computer. Viruses may
also arrive over an internet. In either case, once the virus is resident on a computer
system, internal computer security tools are needed to detect and recover from the virus.
3
Information Security Lecture 1
no security at all.
4
Information Security Lecture 1
nobody knows about its existence and contents. This approach cannot work for too
long, as there are many ways an attacker can come to know about it.
3. Hot Security: In this scheme, the security for each host is enforced individually.
This is a very safe approach, but the trouble is that it cannot scale well. The
complexity and variety of modern sites/organizations makes the task even harder.
4. Network Security: Host security is tough to achieve as organizations grow and
become more various. In this technique, the focus is to control network access to
various hosts and their services, rather than individual host security. This is a very
efficient and scalable model.
after user A had sent it. User A also does not know about this change. This type
of attack is called modification.
3. Availability
The principle of availability is that resources should be available to authorized
parties at all times. For example, due to the intentional actions of an unauthorized
user C, an authorized user A may not be able to contact a server B. This would failure
the principle of availability. Such an attack is called interruption.
• Release of Message Contents is easily understood (Figure 1). We would like to prevent
an opponent from learning the contents of these transmissions.
6
Information Security Lecture 1
Passive attacks are very difficult to detect because they do not involve any alteration
of the data. Neither the sender nor receiver is aware that a third party has read the
messages or observed the traffic pattern. However, message encryption is a simple
7
Information Security Lecture 1
solution to thwart passive attacks. Thus, the emphasis in dealing with passive attacks
is on prevention rather than detection.
• Replay involves the passive capture of a data unit and its subsequent retransmission
to produce an unauthorized effect (Figure 3).
Figure 3 : Replay
8
Information Security Lecture 1
Figure 4 : Masquerade
9
Information Security Lecture 1
10