190 likes | 321 Vues
This document outlines the essential security requirements needed to protect data integrity, confidentiality, and availability. It covers critical concepts such as user authentication, access control, non-repudiation, and mechanisms like encryption and digital signatures. The text also discusses various types of security threats and attack methods, including passive and active attacks. Additionally, it highlights the importance of robust security services and protocols in safeguarding information across different communication channels, ensuring both the identity assurance and data protection in digital environments.
E N D
Security Risanuri Hidayat security
Security Requirements • Confidentiality • Protection from disclosure to unauthorised persons • Integrity • Maintaining data consistency • Authentication • Assurance of identity of person or originator of data • Non-repudiation • Originator of communications can’t deny it later • Availability • Legitimate users have access when they need it • Access control • Unauthorised users are kept out security
Security Requirements • These are often combined • User authentication used for access control purposes • Non-repudiation combined with authentication security
Security Threats • Information disclosure/information leakage • Integrity violation • Masquerading • Denial of service • Illegitimate use • Generic threat: Backdoors, trojan horses, insider attacks • Most Internet security problems are access control orauthentication ones • Denial of service is also popular, but mostly an annoyance security
pasive active Attack Types • Passive attack can only observe communications or data • Active attack can actively modify communications or data • Often difficult to perform, but very powerful • Mail forgery/modification • TCP/IP spoofing/session hijacking security
Security Services • From the OSI definition: • Access control: Protects against unauthorised use • Authentication: Provides assurance of someone's identity • Confidentiality: Protects against disclosure to unauthorisedidentities • Integrity: Protects from unauthorised data alteration • Non-repudiation: Protects against originator ofcommunications later denying it security
Security Mechanisms • Three basic building blocks are used: • Encryption is used to provide confidentiality, can provideauthentication and integrity protection • Digital signatures are used to provide authentication, integrityprotection, and non-repudiation • Checksums/hash algorithms are used to provide integrityprotection, can provide authentication • One or more security mechanisms are combined to providea security service security
Services, Mechanisms, Algorithms • A typical security protocol provides one or more services • Services are built from mechanisms • Mechanisms are implemented using algorithms security
Insecure channel Hallo Sayang Hallo Sayang Hallo Sayang Hallo Sayang Secure channel Conventional Encryption • Uses a shared key • Problem of communicating a large message in secretreduced to communicating a small key in secret security
Hallo Sayang Hallo Sayang Public key Private key Hallo Sayang Hallo Sayang Public-key Encryption • Uses matched public/private key pairs • Anyone can encrypt with the public key, only one personcan decrypt with the private key security
Insecure channel Hallo Sayang Hallo Sayang Hallo Sayang Hallo Sayang Key Agreement Key Agreement • Allows two parties to agree on a shared key • Provides part of the required secure channel for exchanginga conventional encryption key security
Hallo Sayang Hash Hash Functions • Creates a unique “fingerprint” for a message • Anyone can alter the data and calculate a new hash value • Hash has to be protected in some way security
Hash MAC’s Hallo Sayang • Message Authentication Code, adds a password/key to ahash • Only the password holder(s) can generate the MAC + Password/key security
Hash Hallo Sayang Hallo Sayang private Digital Signatures • Combines a hash with a digital signature algorithm security
Hash Hallo Sayang = ? public Digital Signatures • Signature checking: security
Hallo Sayang Hallo Sayang Hallo Sayang session public Encrypted session key MessageEncryption • Combines conventional and public-key encryption security
Hallo Sayang Hallo Sayang Hallo Sayang session Encrypted session key private MessageEncryption • Public-key encryption provides a secure channel toexchange conventional encryption keys security
E-commerce protocols Applications Applications S/MIME, PGP Email Email Higher level protocol Higher level protocol SSL,TLS, SSH Kerberos IPSEC TCP/IP TCP/IP Hardware link encryption Data-link Data-link Physical Physical Internet Security Protocol Layers • The further down you go, the more transparent it is • The further up you go, the easier it is to deploy security