Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
4
Copyright Pearson Prentice-Hall 2010
Wireless transmission has brought new
mobility but has also allowed attackers to
enter corporations stealthily…
◦ Bypassing firewalls designed to keep intruders from
coming in through the Internet
5
Copyright Pearson Prentice-Hall 2010
If companies are to be able to defend
themselves, they need an understanding of
the “threat environment”
“Understanding the threat environment” is a
fancy way of saying “know your enemy.”
Unless you understand the threats you face,
you cannot prepare for defense
6
Copyright Pearson Prentice-Hall 2010
Intentional Threats: Computer crimes are the
best examples of intentional threats, or when
someone purposely damages property or
information. Computer crimes include
espionage, identity theft, child pornography,
and credit card crime.
Unintentional Threats: These threats basically
include the unauthorized or accidental
modification of software. i.e accidentally
deleted an important file, or tripped over a
power cord.
7
Copyright Pearson Prentice-Hall 2010
The Threat Environment
The threat environment consists of
the types of attackers and attacks
that companies face
9
Copyright Pearson Prentice-Hall 2010
Security Goals
◦ Confidentiality
Confidentiality means that people cannot read
sensitive information, either while it is on a
computer or while it is traveling across a network.
10
Copyright Pearson Prentice-Hall 2010
Security Goals
◦ Integrity
Integrity means that attackers cannot change or
destroy information, either while it is on a
computer or while it is traveling across a network.
Or, at least, if information is changed or
destroyed, then the receiver can detect the
change or restore destroyed data.
11
Copyright Pearson Prentice-Hall 2010
Security Goals
◦ Availability
Availability means that people who are authorized
to use information are not prevented from doing
so
12
Copyright Pearson Prentice-Hall 2010
Compromises
◦ Successful attacks
◦ Also called incidents
◦ Also called breaches (not breeches)
13
Copyright Pearson Prentice-Hall 2010
Basic Security Terminology
15
Copyright Pearson Prentice-Hall 2010
Countermeasures
◦ Tools used to thwart attacks
◦ Also called safeguards, protections, and controls
◦ Countermeasures can be technical, human, or a
mixture of the two
16
Copyright Pearson Prentice-Hall 2010
Three Types Of Countermeasures
◦ Preventative: keep attacks from succeeding. Most
controls are preventative
◦ Detective: identify when a threat is attacking, and
especially when it is succeeding. Fast detection can
minimize damage
◦ Corrective: get the business process back on track
after a compromise.
17
Copyright Pearson Prentice-Hall 2010
The faster the business process can
get back on track, the more likely the
business process will be to meet its
goals.
Cryptography: process of making and using
codes to secure transmission of information
• Encryption: converting original message into a
form unreadable by unauthorized individuals
• Cryptanalysis: process of obtaining original
message from encrypted message without
knowing algorithms
• Cryptology: science of encryption; combines
cryptography and cryptanalysis
• With emergence of technology, need for
encryption in information technology
environment greatly increased
• All popular Web browsers use built-in
encryption features for secure e-commerce
applications
plaintext – information that can be directly read by
humans or a machine (this article is an example of
plaintext). It is associated with many formats
including music, movies and computer programs
ciphertext –information that is in Unreadable
format (encrypted data)
Cipher – the mathematics (or algorithm) responsible for
turning plaintext into ciphertext and reverting ciphertext to
plaintext (you might also see the word ‘code’ used – there is
a technical difference between the two but it need not
concern us now)
Encryption – the process of converting plaintext to
ciphertext (occasionally you may see it called ‘encipherment’)
Decryption – the process of reverting ciphertext to
plaintext (occasionally ‘decipherment’).
Plaintext can be encrypted through bit stream or
block cipher method
Bit stream: each plaintext bit transformed into
cipher bit one bit at a time
Block cipher: message divided into blocks (e.g.,
sets of 8- or 16-bit blocks) and each is
transformed into encrypted block of cipher bits
using algorithm and key