Overview of Information Security Lecture By Dr Richard Boateng , - - PowerPoint PPT Presentation

overview of information security
SMART_READER_LITE
LIVE PREVIEW

Overview of Information Security Lecture By Dr Richard Boateng , - - PowerPoint PPT Presentation

Overview of Information Security Lecture By Dr Richard Boateng , UGBS, Ghana Email: richard@pearlrichards.org Original Slides by Elisa Bertino CERIAS and CS &ECE Departments, Purdue University Pag. 1 Purdue University and UGBS Elisa


slide-1
SLIDE 1

Elisa Bertino and Richard Boateng

Overview of Information Security

Lecture By Dr Richard Boateng, UGBS, Ghana Email: richard@pearlrichards.org

Original Slides by Elisa Bertino CERIAS and CS &ECE Departments, Purdue University

Purdue University and UGBS

  • Pag. 1
slide-2
SLIDE 2

Elisa Bertino and Richard Boateng

Outline

  • Information Security: basic concepts
  • Privacy: basic concepts and comparison with security

Purdue University

  • Pag. 2
slide-3
SLIDE 3

Elisa Bertino and Richard Boateng

Information Security: Basic Concepts

Purdue University

  • Pag. 3
slide-4
SLIDE 4

Elisa Bertino and Richard Boateng

Information Security

  • A state of being free from

– unauthorized use of the system and its resources, – misuse of the system and its resources, and – disturbance of the system's operations

  • The field of study about techniques for

achieving and maintaining such a secure state

Purdue University

  • Pag. 4
slide-5
SLIDE 5

Elisa Bertino and Richard Boateng

Information Protection - Why?

  • Information are an important strategic and
  • perational asset for any organization
  • Damages and misuses of information affect not
  • nly a single user or an application; they may

have disastrous consequences on the entire

  • rganization
  • Additionally, the advent of the Internet as well

as networking capabilities has made the access to information much easier

Purdue University

  • Pag. 5
slide-6
SLIDE 6

Elisa Bertino and Richard Boateng

Information Security: Main Requirements

Purdue University

  • Pag. 6

Information Security Availability Confidentiality Integrity

slide-7
SLIDE 7

Elisa Bertino and Richard Boateng

Information Security: Examples

  • Consider a payroll database in a

corporation, it must be ensured that:

– salaries of individual employees are not disclosed to arbitrary users of the database – salaries are modified by only those individuals that are properly authorized – paychecks are printed on time at the end of each pay period

Purdue University

  • Pag. 7
slide-8
SLIDE 8

Elisa Bertino and Richard Boateng

Information Security: Examples

  • In a military environment, it is important

that:

– the target of a missile is not given to an unauthorized user – the target is not arbitrarily modified – the missile is launched when it is fired

Purdue University

  • Pag. 8
slide-9
SLIDE 9

Elisa Bertino and Richard Boateng

Information Security - main requirements

  • Confidentiality - it refers to information protection from

unauthorized read operations – the term privacy is often used when data to be protected refer to individuals

  • Integrity - it refers to information protection from

modifications; it involves several goals:

– Assuring the integrity of information with respect to the original information (relevant especially in web environment) – often referred to as authenticity – Protecting information from unauthorized modifications – Protecting information from incorrect modifications – referred to as semantic integrity

  • Availability - it ensures that access to information is not

denied to authorized subjects

Purdue University

  • Pag. 9
slide-10
SLIDE 10

Elisa Bertino and Richard Boateng

Information Security – additional requirements

  • Information Quality – it is not considered

traditionally as part of information security but it is very relevant

  • Completeness – it refers to ensure that subjects

receive all information they are entitled to access, according to the stated security policies

Purdue University

  • Pag. 10
slide-11
SLIDE 11

Elisa Bertino and Richard Boateng

Possible Targets of Security Threats

  • Information: Unauthorized Access to the Information Stored

in the System

  • Control: Executing Unauthorized Control of the System or Its

Component(s)

  • Functionality / Performance / Availability: Disabling or

Degrading the functionality, Performance or Availability of the System

Purdue University

  • Pag. 11
slide-12
SLIDE 12

Elisa Bertino and Richard Boateng

Classes of Threats

  • Disclosure

– Snooping, Trojan Horses

  • Deception and Social Engineering

– Modification, spoofing, repudiation of origin, denial

  • f receipt
  • Disruption

– Modification

  • Usurpation

– Modification, spoofing, delay, denial of service

Purdue University

  • Pag. 12
slide-13
SLIDE 13

Elisa Bertino and Richard Boateng

Possible Source(s) of Threats

  • Inside the System
  • Outside the System
  • Interface to the System (including

communication channels)

Purdue University

  • Pag. 13
slide-14
SLIDE 14

Elisa Bertino and Richard Boateng

Information Security: A Complete Solution

  • It consists of:

– first defining a security policy – then choosing some mechanism to enforce the policy – finally providing assurance that both the mechanism and the policy are sound

Purdue University

  • Pag. 14

SECURITY LIFE-CYCLE

slide-15
SLIDE 15

Elisa Bertino and Richard Boateng

Policies and Mechanisms

  • Policy says what is, and is not, allowed

– This defines “security” for the information

  • Mechanisms enforce policies
  • Composition of policies

– If policies conflict, discrepancies may create security vulnerabilities

Purdue University

  • Pag. 15
slide-16
SLIDE 16

Elisa Bertino and Richard Boateng

Approaches to Information Security

  • 1. Prevention of Threats → Policies
  • Attempt to design a system so that it's perfectly secure
  • 2. Exclusion of Unknown Entities → Identification and

Authentication

  • Attempt to distinguish well-known entities from suspicious entities
  • 3. Hiding Important Information → Cryptography
  • Attempt to make critical information incomprehensible

Theoretically, except one-time pad, there is no encryption scheme perfectly secure.

  • 4. Detection of Potential Threats → Monitoring, Auditing,

Detection, and Confinement

  • Attempt to identify violation of security policies or possible trials of intrusion

to a system

Purdue University

  • Pag. 16
slide-17
SLIDE 17

Elisa Bertino and Richard Boateng

Encryption

  • In cryptography, encryption is the process of

transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special information, usually referred to as a key.

  • The result of the process is encrypted information (in

cryptography, referred to as ciphertext).

Purdue University

  • Pag. 17
slide-18
SLIDE 18

Elisa Bertino and Richard Boateng

Information Security – Mechanisms

  • Confidentiality is enforced by the access control

mechanism

  • Integrity is enforced by the access control mechanism

and by the semantic integrity constraints

  • Availability is enforced by the recovery mechanism and

by detection techniques for DoS attacks – an example of which is query flood

Purdue University

  • Pag. 18
slide-19
SLIDE 19

Elisa Bertino and Richard Boateng

Information Security – How? Additional mechanisms

  • User authentication - to verify the identity of subjects

wishing to access the information

  • Information authentication - to ensure information

authenticity - it is supported by signature mechanisms

  • Encryption - to protect information when being

transmitted across systems and when being stored on secondary storage

  • Intrusion detection – to protect against impersonation of

legitimate users and also against insider threats

Purdue University

  • Pag. 19
slide-20
SLIDE 20

Elisa Bertino and Richard Boateng

Information Security – How?

  • Information must be protected at various

levels:

– The operating system – The network – The data management system – Physical protection is also important

Purdue University

  • Pag. 20
slide-21
SLIDE 21

Elisa Bertino and Richard Boateng

Data vs Information – which is important?

  • Computer security is about controlling access to

information and resources

  • Controlling access to information can sometimes be

quite elusive and it is often replaced by the more straightforward goal of controlling access to data

  • The distinction between data and information is

subtle but it is also the root of some of the more difficult problems in computer security

  • Data represents information. Information is the

(subjective) interpretation of data

Purdue University

  • Pag. 21
slide-22
SLIDE 22

Elisa Bertino and Richard Boateng

Inference - Example

Name Sex Programme Units Grade Ave

Alma F MBA 8 63 Bill M CS 15 58 Carol F CS 16 70 Don M MIS 22 75 Errol M CS 8 66 Flora F MIS 16 81 Gala F MBA 23 68 Homer M CS 7 50 Igor M MIS 21 70

Purdue University

  • Pag. 22
slide-23
SLIDE 23

Elisa Bertino and Richard Boateng

Assurance

Assurance is a measure of how well the system meets its requirements; more informally, how much you can trust the system to do what it is supposed to do. It does not say what the system is to do; rather, it only covers how well the system does it.

  • Specification

– Requirements analysis – Statement of desired functionality

  • Design

– How system will meet specification

  • Implementation

– Programs/systems that carry out design

Purdue University

  • Pag. 23
slide-24
SLIDE 24

Elisa Bertino and Richard Boateng

Case Studies

Purdue University

  • Pag. 24
slide-25
SLIDE 25

Elisa Bertino and Richard Boateng

Management and Legal Issues

  • Cost-Benefit Analysis

– Is it more cost-effective to prevent or recover?

  • Risk Analysis

– Should we protect some information? – How much should we protect this information?

  • Laws and Customs

– Are desired security measures illegal? – Will people adopt them?

Purdue University

  • Pag. 25
slide-26
SLIDE 26

Elisa Bertino and Richard Boateng

Human Factor Issues

  • Organizational Problems

– Power and responsibility – Financial benefits

  • People problems

– Outsiders and insiders – Social engineering

Purdue University

  • Pag. 26
slide-27
SLIDE 27

Elisa Bertino and Richard Boateng

Key Points

  • Policies define security, and mechanisms

enforce security

– Confidentiality – Integrity – Availability

  • Importance of assurance
  • The human factor

Purdue University

  • Pag. 27