[ Security ] Ch01. Introduction to the Concepts of Security

38A·2024년 11월 13일

컴퓨터 보안

목록 보기
1/11
post-thumbnail

The Need for Security

Definition of Computer Security

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)


Principles of Security

Data Transmission on the Internet

  • Data travels in clear text
  • Personal or confidential information is not secure
  • Example: Transmission of credit card details

Confidentiality

  • Also called as privacy
  • Refers to the secrecy of information
  • Only the sender and the receiver should have an access to the information
  • Interception causes loss of message confidentiality

Authentication

  • Identifies the sender/receiver of a message
  • Required so that the communicating parties trust each other
  • Answers who is who
  • Fabrication is possible in absence of proper authentication mechanismsFabrication : 위조 ( A인것처럼 )

Integrity

  • Ensures that any changes to a message are detected
  • The message from the sender to the receiver must travel without any alterations
  • Changes need to be prevented, or at least, detected
  • Modification causes loss of message integrity

Availability

  • Resources/applications must be available to authentic users all the time
  • Attackers can deny the availability
  • Denial Of Service (DOS) is an example of an attack on availability
  • Interruption puts the availability of resources in danger

Non-repudiation & Access Control

  • Non-repudiation(거절방지) does not allow the sender of a message to refute the claim of not sending that message
  • Access control specifies and controls who can access what

Security Objectives

Security is PAIN;
P(Privacy, Confidentiality) A(Availability) I(Integrity) N(Non-repudiation)


Types of Attacks

  • Two types of security attacks in technical view
    • Passive attacks: Observing the information from the system without affecting system resources
    • Active attacks: Try to alter system resources or affect their operation

Passive Attacks

  • Release of message contents
  • Traffic analysis
  • Difficult to detect (after they occurred)
    → because they do not involve any change of the data
  • Thus, they should be prevented rather than be detected

Active Attacks

  • Creating illegitimate messages
    • Masquerade (who) → 위장, 가장
      • One entity pretends to be a different entity
    • Replay (when)
      • A message is captured and retransmitted later
    • Alteration(Modification) of messages (what)
      • A message is captured, modified, and transmitted
  • Making system facilities unavailable
    • Denial of service
  • Denying legitimate messages
    • Repudiation
  • Difficult to prevent
    → because of new vulnerabilities
  • So, the goal is to detect active attacks and to recover as soon as possible.

Virus

  • Program that causes damage to other programs/applications/data
  • Contains malicious code
  • Propagates as it damages

Worm

  • Propagates as it damages
  • Does not damage a program/data
  • Consumes resources(traffic), and brings system to a halt

Trojan Horse

  • Silently observes user actions and captures confidential information
  • Uses captured information for its use
  • Example: Capturing user id and password

HGU 전산전자공학부 고윤민 교수님의 24-2 컴퓨터 보안 수업을 듣고 작성한 포스트이며, 첨부한 모든 사진은 교수님 수업 PPT의 사진 원본에 필기를 한 수정본입니다.

profile
HGU - 개인 공부 기록용 블로그

0개의 댓글