9
9/13/2010 CS 686 Definition of Security/Privacy EJ Jung [email protected] CS 686 Special Topics in CS Privacy and Security 9/13/2010 CS 686 Henric Johnson 2 Attacks, Services and Attacks, Services and Mechanisms Mechanisms ! Security Attack: Any action that compromises the security of information. ! Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. ! Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

Definition of Security/Privacy - USF Computer Scienceejung/courses/686/lectures/02def.pdfSecurity Attack: Any action that compromises the security of information.!Security Mechanism:

Embed Size (px)

Citation preview

9/13/2010 CS 686

Definition of Security/Privacy

EJ [email protected]

CS 686 Special Topics in CSPrivacy and Security

9/13/2010 CS 686Henric Johnson 2

Attacks, Services andAttacks, Services andMechanismsMechanisms

! Security Attack: Any action that compromises thesecurity of information.

! Security Mechanism: A mechanism that is designed todetect, prevent, or recover from a security attack.

! Security Service: A service that enhances thesecurity of data processing systems and informationtransfers. A security service makes use of one ormore security mechanisms.

9/13/2010 CS 686

Passive attack (1) - Eavesdrop

!Code talkers

9/13/2010 CS 686

Passive attack (2) - Analysis

!Alexa

9/13/2010 CS 686

Active attack (1) - impersonation

! Impostors on Facebook

9/13/2010 CS 686

Active (2) - replay

9/13/2010 CS 686

Active (3) – intercept&modify

9/13/2010 CS 686

Active (4) - DoS

!Distributed DoS

9/13/2010 CS 686

Summary of attacks

Henric Johnson 9

9/13/2010 CS 686Henric Johnson 10

Security ServicesSecurity Services! Confidentiality (privacy)

! Authentication (who created or sent the data)

! Integrity (has not been altered)

! Non-repudiation (the order is final)

! Access control (prevent misuse of resources)

! Availability (permanence, non-erasure)

• Denial of Service Attacks

• Virus that deletes files

9/13/2010 CS 686

network

Attack on Authenticity

!Authenticity is identification and assurance oforigin of information

Unauthorized assumption ofanother’s identity

9/13/2010 CS 686

network

Attack on Confidentiality

!Confidentiality is concealment of information

Eavesdropping,packet sniffing,illegal copying

9/13/2010 CS 686

network

Attack on Integrity

! Integrity is prevention of unauthorized changes

Intercept messages,tamper, release again

9/13/2010 CS 686

network

Attack on Availability

!Availability is ability to use information orresources desired

Overwhelm or crash servers,disrupt infrastructure

9/13/2010 CS 686

Famous words

! Encrypt and decrypt! Plaintext and ciphertext

• encrypt plaintext -> ciphertext• decrypt ciphertext -> plaintext• easy example: XOR

!Digital signature• as you sign on paper• for non-repudiation and accountability

! Session• one conversation/communication unit

9/13/2010 CS 686

Model for Network Security

9/13/2010 CS 686

Access Control Model