A brief introduction to information security
Part II Tyler Moore
Computer Science & Engineering Department, SMU, Dallas, TX
August 28 & 30, 2012
Engineered defenses to achieve protection goals Security threats Countering security threats
Outline
1
Engineered defenses to achieve protection goals Threat models Access control for system security Cryptography for communication security
2
Security threats System vulnerabilities: violating engineering assumptions Cryptanalysis: violating physical or mathematical assumptions Violating assumptions about attacker behavior Violating assumptions about defender behavior
3
Countering security threats Ex post countermeasures Ex ante countermeasures
2 / 57 Engineered defenses to achieve protection goals Security threats Countering security threats
Let’s recap last time
Safety vs. security Information security protection goals
1
Confidentiality: information is accessible only to authorized parties
2
Integrity: modification of information can be detected
3
Availability: authorized parties can access information (and use resources) when and where it is needed
Identification vs. authentication vs. authorization Computer systems and networks
3 / 57 Engineered defenses to achieve protection goals Security threats Countering security threats
Information security overview
Protection Goals Confidentiality Integrity Availability
- 1. Engineer defenses
Satisfy goals
- 2. Security threats
- 3. Countering security threats
4 / 57