DOC PREVIEW
CSUN COMP 424 - Attacks, Goals and Vulnerabilities

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

COMP 424Computer System SecurityLecture 01Attacks, Goals and VulnerabilitiesWhat do we mean by “secure”?●At one time Bank robbery was common. Now its very rare. What has changed or been implemented to provide this security?–Sophisticated alarms–Criminal investigation techniques (DNA testing)–Change in “assets” (cash was/is inherently insecure)–Improvements in communication and transportation●Risk becomes so high that it is no longer beneficial.Security is all about protecting valuables●In our case the “valuables” are computer related assets instead of money–Though these days money is so electronic that one can argue that the protection of money is a subset of computer asset security●Information seems to be the currency of the 21st century.Money vs. Information●Size and portability–Banks are large and unportable.–Storage of information can be very small and extremely portable. (So small that an entire corporations intellectual property can be stored on something the size of a postage stamp.)●Ability to avoid physical contact–Banks: physical interaction with the bank and the loot is unavoidable or impossible to circumvent–Computers: require no physical contact to either gain access to, copy or remove data.●Value of assets:–Bank: generally very high (or why would somebody bother to put it in a bank?)–Computers: Variable, from very low (useless) to very high.Side bar 1-1●Some people (or even groups of people) are just plain idiots... [paraphrasing here ;-) ]–“[The software is too complicated to be understood by a hacker.] And even if they could [understand it], they wouldn't want to.”●Compare that to the next quote:–“As a software designer, I assume that all digital technologies are fair game for being played with... it takes a special kind of personality to look at a software-enabled device and see the potential for manipulation and change – a hacker personality”–(Or an inquisitive 2-year old)Security is not always about locks, firewalls and hardware●Public Image often gets in the way of defeats security.–Would you deposit your money in a bank that just revealed that it lost fifteen million dollars due to a computer security oversight?–Things like this probably happen a lot more often than we care to have nightmares about.So what does computer security concern itself with?●The entire system:–Hardware–Software–Storage media–Data–Memory–People–Organizations–CommunicationsPrinciple of Easiest Penetration●An intruder must be expected to use any available means of penetration. The penetration may not necessarily be by the most obvious means, nor is it necessarily the one against which the most solid defense has been installed.Attacks●Vulnerability: A weakness in the security system.●Threat: a set of circumstances that has the potential to cause loss or harm.●Attack: A human expoitation of a vulnerability.●Control: A protective measure. An action, device or measure taken that removes, reduces or neutralizes a vulnerability.Types of threats●Interception–A perpetrator hijacks or takes control●Interruption–A perpetrator prevents the normal operation.●Modification–Alteration of data or assets to something else ●Fabrication–Insertion of network data or transactions.Method, Opportunity and Motive●Method: The skills knowledge and tools that enable the attack●Oppotunity: The time, access and circumstances that allow for the attack●Motive: The reason why the perpetrator wants to commit the attackComputer Security●When we discuss computer security we are talking about three aspects:●Confidentiality: Ensuring that computer-related assets are only accessible by authorized parties.–“Access” means the ability to read, view, print an asset or simply know that the asset exists (steganography)●Integrity: Assets can only be modified by authorized parties and/or in authorized manners.–This ensures that the asset remain valid–“Modified” includes writing, changing, changing status, deleting and creating●Availability: assets are available to authorized parties only at appropriate


View Full Document

CSUN COMP 424 - Attacks, Goals and Vulnerabilities

Download Attacks, Goals and Vulnerabilities
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Attacks, Goals and Vulnerabilities and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Attacks, Goals and Vulnerabilities 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?