1 / 12

Computer System Security CSE 5339/7339

Computer System Security CSE 5339/7339. August 19 2004. Contents. Class Organization Introduction to Security Review of main concepts Algorithms Operating systems …. Trustworthy Systems. Trustworthiness = Reliability + Security + Privacy + Usability.

verdad
Download Presentation

Computer System Security CSE 5339/7339

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer System SecurityCSE 5339/7339 August 19 2004

  2. Contents • Class Organization • Introduction to Security • Review of main concepts • Algorithms • Operating systems • ….

  3. Trustworthy Systems Trustworthiness = Reliability + Security + Privacy + Usability

  4. The Role of Security Security is like adding brakes to cars. The purpose of brakes is not to stop you; it is to enable you to go faster. Brakes help avoid accidents caused by mechanical failures in other cars, rude drivers, and road hazards. Better security is an enabler for greater freedom and confidence in the Cyber world.

  5. Four Grand Challenges (November 2003) • Eliminate epidemic-style Attacks with 10 years • Viruses and worms • SPAM • Denial of Service Attacks (DOS) • Develop tools and principles that allow the construction of large-scale systems for important societal applications that are highly trustworthy despite being attractive targets • Within 10 years, quantitative information-systems risk management is at least as good as quantitative financial risk management • For the dynamic, pervasive computing environments of the future, give end-users security they can understand and privacy they can control.

  6. Computer-Based System • Hardware • Software • Data • Vulnerability • Weakness (to be exploited) • Threat • Circumstances (Potential to cause harm) • Attack • Exploits vulnerabilities (Threat is blocked by control of a vulnerability)

  7. Control – Protective measure • Action, device, procedure, or technique that removes or reduces a vulnerability • Threats • Interception • Unauthorized party has gained access to an asset • Interruption • An asset becomes lost, unavailable, or unusable • Modification • Unauthorized party tampers with an asset • Fabrication • Unauthorized party may create objects

  8. Assets are accessed only by authorized people Security Goals Confidentiality Availability Integrity Assets can be modified only by authorized people Assets are accessible to authorized people

  9. Main Components in Sending Messages sender Medium receiver Block it Intercept it Modify it Fabricate an authentic looking message Intruder

  10. Cryptography • Secret writing • Disguised data cannot be read, modified, or fabricated easily • Encryption : encoding (encipher) • plaintext  cipher text P = <p1, p2, p3, .., pn>  C = <c1, c2, c3, .., cm> C = E(c) (E = encryption rule) • Decryption : decoding (decipher) • Cipher text  plaintext C = <c1, c2, c3, .., cm>  P = <p1, p2, p3, .., pn> P = D(c) (D = decryption rule)

  11. Original plaintext Encryption keyless plaintext ciphertext Encryption Decryption Symmetric key Original plaintext plaintext ciphertext Encryption Decryption Asymmetric key Original plaintext plaintext ciphertext Encryption Decryption

  12. Review of Main Concepts • Algorithms • Operating Systems • …. Students Participation

More Related