CS2005 – Networks and Operating Systems: Security
Session Objectives
- Discuss security threats and attacks
- Understand the fundamentals of encryption
Key Points
- Types of security violations: accidental and malicious
- Levels of security measures: Physical, Human, Operating System, Network
- Types of program and network threats
- Importance of cryptography
- Distinction between symmetric and asymmetric encryption
- Examples of encryption algorithms
Security Problem
- A secure system: resources accessed as intended
- Total security is unattainable, breaches can occur
- Violations classified as intentional or accidental
- Attacks are attempts to breach security, while threats are potential violations
Types of Security Violations
- Breach of Confidentiality: Unauthorized data access (e.g., credit card theft)
- Breach of Integrity: Unauthorized data modification (e.g., website tampering)
- Breach of Availability: Unauthorized data destruction (e.g., service denial)
- Theft of Service: Unauthorized resource use (e.g., installed daemons)
Security Violation Methods
- Masquerading: Pretending to be someone else
- Replay Attack: Repeating valid transmissions
- Man-in-the-Middle Attack: Intercepting communications
- Session Hijacking: Taking control of an active session
Security Measure Levels
- Security should occur at four levels for effectiveness
- The weakest link can compromise overall security
Program Threats
- Trojan Horse: Disguises as legitimate software
- Logic Bomb: Activates under specific conditions
- Viruses: Self-replicating code that spreads
System and Network Threats
- Abuse of services and connections rather than direct program attacks
- Examples: Worms, Denial of Service attacks
Cryptography
- Defined as secret writing techniques
- Encryption: Encoding messages to protect data
- Decryption: Using a key to decode messages
- Key Types: Symmetric (same key for encryption/decryption) and Asymmetric (different keys)
Examples of Encryption Algorithms
- Symmetric: DES, AES
- Asymmetric: RSA
RSA Algorithm
- Based on the difficulty of factoring large prime products
- Generates a public/private key pair for secure communication
Encryption Process
- Involves key sets and encrypting/decrypting functions
- Encryption should be unfeasible to reverse without keys
Importance of Cryptography
- Essential for secure communication over potentially untrustworthy networks
- Cryptography eliminates trust issues by securing messages even against eavesdropping.