Chapter One
Introduction to Computer Security
 What is Security?
 Security : “the quality or state of being free from danger” Or
 “ measures taken to guard against espionage, sabotage, crime,
 attack, or escape.”
Security is about
 • Threat: is any potential occurrence, malicious or
 otherwise, that could harm an asset. In other words, a
 threat is any bad thing that can happen to your assets.
 • Vulnerability: is a weakness that makes a threat
 possible. This may be because of poor design,
 configuration mistakes, or inappropriate and insecure
 coding techniques
 • Attacks: is an action that exploits a vulnerability or
 enacts a threat. Examples of attacks include sending
 malicious input to an application or flooding a network
 2
 in an attempt to deny service.
 Computer Security
 Computer security is about provisions and policies adopted to
 protect information and property from unauthorized access,
 use, alteration, degradation, destruction, theft, corruption,
 natural disaster, etc. while allowing the information and
 property to remain accessible and productive to its intended use
 Privacy: The right of the individual to be protected against
 intrusion into his personal life or affairs, or those of his family
 Physical Security
 3
 Computer Security: when there is connection to networks
 (Network security) it deals with provisions and policies adopted to
 prevent and monitor unauthorized access, misuse, modification, or
 denial of the computer network and network-accessible resources
 Physical Security
 4
 “The most secure computers are those not connected to the
 Internet and shielded from any interference”
 5
Threats, vulnerabilities, Controls
 Vulnerability is a point where a system is susceptible to
 attack.
 Threat is a possible danger to the system.
 It might be a person (cracker or a spy),
 a thing (a faulty piece of equipment),
 an event (a fire or a flood) that might exploit a vulnerability of
 the system.
Countermeasures are techniques for protecting your
 system.
 6
Vulnerabilities
 Physical vulnerabilities
  break into your server room, device theft, steal backup
 media and printouts,
  Locks, guards, Surveillance cams, Burglar alarms
 Natural vulnerabilities
  vulnerable to natural disasters and to environmental
 threats, power loss
  Natural disasters:
 disasters fire, flood, earthquakes, lightning
  environmental threats:
 threats Dust, humidity, and uneven
 temperature conditions
  air conditioning and heating systems……UPS,…..back ups
 7
Vulnerabilities…
 Hardware and Software vulnerabilities
  protection features failure lead to open security
 holes
  open some "locked" systems by introducing extra
 hardware
  Software failures: antivirus ,firewall failures
 Media vulnerabilities
  can be stolen, damaged by dust or electromagnetic
 fields.
  keep backup tapes and removable disks clean and
 dry
 8
Vulnerabilities…
Communication vulnerabilities
  Wires can be tapped, physicaly damaged, EMI
  Fiber optics
Human vulnerabilities
  the greatest vulnerability of all
  Employees, contractors
  Choose employees carefully
 9
The Human Factor
 The human factor is an important component of computer security
 Some organizations view technical solutions as “their solutions”
 for computer security. However:
  Technology is fallible
  Eg. UNIX holes that opened the door for Morris worm
  The technology may not be appropriate
  Eg. It is difficult to define all the security requirements and
 find a solution that satisfies those requirements
  Technical solutions are usually (very) expensive
  Eg. Antivirus purchased by ETC to protect its Internet
 services
Threats
Threats fall into three main categories based on
 the source: natural, unintentional, and
 intentional.
Natural: fires, floods, power failures, and other
 disasters
 fire alarms, temperature gauges, and surge protectors
 backing up critical data off-site.
Unintentional threats: delete a file, change of
 security passwords
 Training , security procedures and policies
 11
 Threats…
• Intentional threats: outsiders and insiders
• Outsiders may penetrate systems in a variety of ways:
 • simple break-ins of buildings and computer rooms;
 • disguised entry as maintenance personnel;
 • anonymous, electronic entry through modems and
 network connections;
 • and bribery or coercion of inside personnel.
• Although most security mechanisms protect best
 against outside intruders, surveys indicates that most
 attacks are by insiders.
 12
Threats…
• Estimates are that as many as 80 percent of
 system penetrations are by fully authorized users
 who abuse their access privileges to perform
 unauthorized functions.
 • "The enemy is already in, we hired them.”
• Insiders are sometimes referred as living Trojan
 horses
• There are a number of different types of insiders.
 • fired or disgruntled employee might be trying to steal
 revenge ; employee might have been blackmailed or
 bribed by foreign or corporate enemy agents.
 13
Threats…
 • greedy employee might use her inside knowledge to
 divert corporate or customer funds for personal
 benefit.
 • insider might be an operator, a systems
 programmer, or even a casual user who is willing to
 share a password.
• Don't forget, one of the most dangerous insiders
 may simply be lazy or untrained.
 • He doesn't bother changing passwords,
 • doesn't learn how to encrypt email messages and
 other files,
 • leaves sensitive printouts in piles on desks and
 floors, and ignores the paper shredder when
 disposing of documents.
 14
Security Attacks
• Any action that compromises the security of
 information owned by an organization.
• Classification security attacks
 • passive attacks and active attacks.
• A passive attack attempts to learn or make use of
 information from the system but does not affect
 system resources.
• An active attack attempts to alter system resources or
 affect their operation.
 operation
 15
Security attacks
 Normal flow of information
 Interception
 Interruption
 Modification Fabrication
 16
 Countermeasures
Authentication
  Physical security
  Password,cards,biometrics
  Laws
 Encryption
  Backups
 Auditing
  Standards
 Administrative procedures
 17
Basic Security Objectives (Pillars) - CIA
 Confidentiality: This term covers two Confidentiality
 related concepts:
  Data confidentiality: Assures that
 private or confidential information
 or resources (resource and
 configuration hiding) are not made Integrity Availability
 available or disclosed to
 unauthorized individuals
  Is compromised by reading and copying
  In network communication, it means only sender and
 intended receiver should “understand” message contents
  Privacy: Assures that individuals control or influence what
 information related to them may be collected and stored and
 by whom and to whom that information may be disclosed
 18
  Integrity: This term covers two related concepts
  Data integrity: Assures that information and programs are
 changed only in a specified and authorized manner
  In network communication, sender and receiver want to
 ensure that the message is not altered (in transit or
 afterwards) without detection
  System integrity: Assures that a system performs its intended
 function in an unimpaired manner, free from deliberate or
 inadvertent unauthorized manipulation of the system
  Is compromised by deleting, corrupting, and tampering with
 Availability: Assures that systems work promptly and service is
 not denied to authorized users
 Authenticity: Some say it is a missing component of objectives in
 CIA. It is the property of being genuine and being able to be
 verified and trusted; confidence in the validity of a transmission, a
 message, or message originator; or sender and receiver want to
 confirm the identity of each other 19
1.1.2 Policy and Mechanism
 A security policy is a statement of what is, and what is not,
 allowed by users of a system
 A security mechanism is a method, tool, or procedure for
 enforcing a security policy
 More on this in Chapter 5 - Security Mechanisms and
 Techniques
 20
1.1.3 Goals of Security
 Given a security policy’s specification of “secure” and “nonsecure”
 actions, security mechanisms can prevent (defend) the attack,
 detect the attack, or recover from the attack
  Prevention/Defence: take measures to prevent the damage; it
 means that an attack will fail; e.g., passwords to prevent
 unauthorised users or Intrusion Prevention Systems (IPSs)
  Detection: if an attack cannot be prevented; when, how and
 who of the attack have to be identified; e.g., when a user
 enters a password three times; Intrusion Detection Systems
 (IDSs)
  Recovery/Reaction: take measures to recover from the
 damage; e.g., restore deleted files from backup; sometimes
 retaliation (attacking the attacker’s system or taking legal
 actions to hold the attacker accountable)
 The three strategies are usually used together
 A fourth approach is deterrence; involves active steps to beat off
 21
 attacks; discourage them even to try attacking
 Example 1: Protecting valuable items at home from a burglar
  Prevention: locks on the door, guards, hidden places, etc.
  Detection: burglar alarm, guards, Closed Circuit Television
 (CCTV), etc.
  Recovery: calling the police, replace the stolen item, etc.
 Example 2: Protecting a fraudster from using our credit card in
 Internet purchase
  Prevention: Encrypt when placing order, perform some check
 before placing order, or don’t use credit card on the Internet
  Detection: A transaction that you had not authorized appears
 on your credit card statement
  Recovery: Ask for new card, recover cost of the transaction
 from insurance, the card issuer or the merchant
 22
 Software security assurance
• Software security is the idea of software engineering so that it
 continues to function correctly under malicious attack.
• Software security is an idea implemented to protect software against
 malicious attack and other hacker risks so that the software
 continues to function correctly under such potential risks
 • Any compromise to integrity, authentication and availability
 makes a software unsecure.
 • Software systems can be attacked to steal information, monitor
 content, introduce vulnerabilities and damage the behaviour of
 software.
 • Malware can cause DoS (denial of service) or crash the system
 itself.
 23
Software Security Threats
  Software defects with security ramifications including
 • implementation bugs such as buffer overflows and
 • design flaws such as inconsistent error handling.
  Buffer overflow, stack overflow, command injection
 and SQL injections are the most common attacks on
 the software.
  Buffer and stack overflow attacks overwrite the
 contents of the heap or stack respectively by writing
 extra bytes.
 24
Software Security Threats
• Command injection can be achieved on the software code
 when system commands are used predominantly.
• New system commands are appended to existing commands
 by the malicious attack.
• Sometimes system command may stop services and cause
 DoS.
• SQL injections use malicious SQL code to retrieve or modify
 important information from database servers.
• SQL injections can be used to bypass login credentials.
• Sometimes SQL injections fetch important information from a
 25
Software security assurance
• Malicious intruders can hack into systems by exploiting software
 defects
• Software security includes:
 • software design principles including the principles of
 • least privilege,
 • fail-safe stance, and
 • defence-in-depth (These also included in Computer Security)
• Internet-enabled software applications present the most common
 security risk encountered today, with software’s ever-expanding
 complexity and extensibility adding further fuel to the fire.
 26