Sie sind auf Seite 1von 6

Chapter 0 – Reader’s Guide

Cryptography and
Network Security The art of war teaches us to rely not on the
Overview & Chapter 1 likelihood of the enemy's not coming, but
on our own readiness to receive him; not
on the chance of his not attacking, but
Fifth Edition rather on the fact that we have made our
by William Stallings position unassailable.
—The Art of War, Sun Tzu
Lecture slides by Lawrie Brown

Roadmap Standards Organizations


¾ Cryptographic algorithms ¾ National Institute of Standards &
z symmetric ciphers Technology (NIST)
z asymmetric encryption ¾ Internet Society (ISOC)
z hash functions ¾ International Telecommunication Union
¾ Mutual Trust Telecommunication Standardization
¾ Network Security Sector (ITU-
(ITU-T)
¾ Computer Security ¾ International Organization for
Standardization (ISO)
Chapter 1 – Introduction Computer Security
¾ the protection afforded to an automated
¾ The combination of space, time, and information system in order to attain the
strength that must be considered as the applicable objectives of preserving the
basic elements of this theory of defense integrity, availability and confidentiality of
makes this a fairly complicated matter. information system resources (includes
Consequently, it is not easy to find a fixed hardware, software, firmware,
point of departure..
departure.. information/data, and telecommunications)
— On War, Carl Von Clausewitz

Key Security Concepts Levels of Impact


¾ can define 3 levels of impact from a
security breach
z Low
z Moderate
z High
Examples of Security
Computer Security Challenges
Requirements
1. not simple
¾ confidentiality – student grades
2. must consider potential attacks
¾ integrity – patient information 3. procedures used counter-
counter-intuitive
¾ availability – authentication service 4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived on benefit until fails
8. requires regular monitoring
9. too often an after-
after-thought
10. regarded as impediment to using system

OSI Security Architecture Aspects of Security


¾ ITU-
ITU-T X.800 “Security Architecture for OSI”
OSI” ¾ consider 3 aspects of information security:
¾ defines a systematic way of defining and z security attack
providing security requirements z security mechanism
¾ for us it provides a useful, if abstract, z security service
overview of concepts we will study ¾ note terms
z threat – a potential for violation of security
z attack – an assault on system security, a
deliberate attempt to evade security services
Passive Attacks Active Attacks

Security Service Security Services


z enhance security of data processing systems ¾ X.800:
and information transfers of an organization “a service provided by a protocol layer of
z intended to counter security attacks communicating open systems, which ensures
adequate security of the systems or of data
z using one or more security mechanisms
transfers”
transfers”
z often replicates functions normally associated
with physical documents
¾ RFC 2828:
• which, for example, have signatures, dates; need
protection from disclosure, tampering, or “a processing or communication service
destruction; be notarized or witnessed; be provided by a system to give a specific kind of
recorded or licensed protection to system resources”
resources”
Security Services (X.800) Security Mechanism
¾ Authentication - assurance that communicating
entity is the one claimed ¾ feature designed to detect, prevent, or
z have both peer-
peer-entity & data origin authentication recover from a security attack
¾ Access Control - prevention of the ¾ no single mechanism that will support all
unauthorized use of a resource services required
¾ Data Confidentiality –protection of data from
¾ however one particular element underlies
unauthorized disclosure
many of the security mechanisms in use:
¾ Data Integrity - assurance that data received is
as sent by an authorized entity z cryptographic techniques
¾ Non-
Non-Repudiation - protection against denial by ¾ hence our focus on this topic
one of the parties in a communication
¾ Availability – resource accessible/usable

Security Mechanisms (X.800) Model for Network Security


¾ specific security mechanisms:
z encipherment, digital signatures, access

controls, data integrity, authentication


exchange, traffic padding, routing control,
notarization
¾ pervasive security mechanisms:
z trusted functionality, security labels, event

detection, security audit trails, security


recovery
Model for Network Access
Model for Network Security
Security
¾ using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service

Model for Network Access


Summary
Security
¾ using this model requires us to: ¾ topic roadmap & standards organizations
1. select appropriate gatekeeper functions to ¾ security concepts:
identify users
z confidentiality, integrity, availability
2. implement security controls to ensure only
authorised users access designated ¾ X.800 security architecture
information or resources
¾ security attacks, services, mechanisms
¾ models for network (access) security

Das könnte Ihnen auch gefallen