您好,欢迎访问三七文档
当前位置:首页 > 电子/通信 > 综合/其它 > Chapt 1 Security Introduction
NetworkSecurityandPrivacyChapter1:SecurityIntroduction西电电子对抗所Security:IntheBeginning……Intheearlydaysofdataprocessing,thesecurityofinformationwasprovidedprimarilybyphysicalandadministrativemeans.Computerbuildings,floors,roomswereguardedandalarmedtopreventoutsidesfromintrudinganddisruptingoperations.Thefocuswasonphysicalbreak-ins,thetheftofcomputerequipment,andthephysicaltheftordestructionofdiskpacks,tapereels,punchcards,orothermedia.Insiderswerekeptatbyandaccesswaslimitedtoasmallsetofcomputerprofessionals.西电电子对抗所InformationSecurityTherequirementsofinformationsecuritywithinorganizationshaveundergonetwomajorchanges:Theintroductionofsharedsystemssuchastime-sharedand/orsystemsthatcanbeaccessedoverthepublictelephoneordatanetworks.Theintroductionofdistributedsystemsandtheuseofnetworksandcommunicationsfacilitiesforcarryingdatabetweenterminaluserandcomputerandbetweencomputerandcomputer.西电电子对抗所SecurityIntroductionComputervs.NetworkSecurityComputersecurityisthegenerictermforacollectionoftoolsdesignedtoprotectdataandtothwarthackers.Networksecurityisthesecuritymeasuresthatareneededtoprotectduringtheirtransmission.Inmostsystems,theboundariesbetweencomputersecurityandnetworksecurityareblurredsincemost,ifnotall,oftoday’ssystemsaredistributedinnature.Networkingisacorepartoftoday’senvironment.西电电子对抗所ThedegreeofSecurityCurtainLockDemi-wolfSecurityalarmingsystemFencing,guard西电电子对抗所SecurityGoalsIntegrityConfidentialityAvailability西电电子对抗所SecurityIntroductionSecurityServicesConfidentialityistheprotectionoftransmitteddatafrompassiveattacks.Authenticationisconcernedwithassuringthatacommunicationisauthentic.Integrityassuresthatmessagesarereceivedassent.Aconnection-orientedintegrityserviceshouldassurethattherearenoduplicates,insertions,deletions,modifications,reordering,orreplays.Aconnectionlessintegrityservicesdealsonlywithanindividualmessage.西电电子对抗所SecurityIntroductionSecurityServicesNon-repudiationpreventseitherthesenderorreceiverfromdenyingatransmittedmessage.AccessControlistheabilitytolimitandcontroltheaccesshostsystemsandapplicationsviacommunicationslinks.Availabilityistheabilitytopreventthelossorareductioninavailabilityofelementsofadistributedsystem.西电电子对抗所NetworkTopology西电电子对抗所HierarchyofNetworkSecurityPhysicalSecuritySecurityControlSecurityServicePhysicalmediumOS,NICInternetworkingDeviceSecurityMechanismSecurityconnectionSecurityprotocolSecuritypolicy西电电子对抗所SecurityRisksExploitationofvulnerabilityUnauthorizedAccessInformationdisclosureInformationexhaustInformationtheft西电电子对抗所TypesofRisksSniffer窃听Impersonate假冒Replay重放Trafficanalysis通信量分析Loseofintegrity破坏完整性Denialofservice拒绝服务UnauthorizedAccess非授权访问Trapdoor/TrojanHorse/Virii恶意代码西电电子对抗所MotivesIndustryespionageFinancialgainsRevenge/publicityInnocence西电电子对抗所NetworkAttacksSecurityAttack:Anyactionthatcompromisesthesecurityofinformationownedbyanorganization.SecurityMechanism:Amechanismthatisdesignedtodetect,prevent,orrecoverfromasecurityattack.SecurityService:Aservicethatenhancesthesecurityofdataprocessingsystemsandinformationtransfers.Asecurityservicemakesuseofoneormoresecuritymechanisms.Designedtocountersecurityattacks西电电子对抗所StepsofNetworkAttacksInformationgatheringScanningvulnerabilitiesAttacking…西电电子对抗所16TheStagesofaNetworkIntrusion1.Scanthenetworkto:•locatewhichIPaddressesareinuse,•whatoperatingsystemisinuse,•whatTCPorUDPportsare“open”.2.Run“Exploit”scriptsagainstopenports3.GetaccesstoShellprogramwhichis“suid”(has“root”privileges).4.DownloadfromHackerWebsitespecialversionsofsystemsfilesthatwillletCrackerhavefreeaccessinthefuturewithouthiscputimeordiskstoragespacebeingnoticedbyauditingprograms.5.UseIRC(InternetRelayChat)toinvitefriendstothefeast.西电电子对抗所AttackingMethodsSystembugs/BackdoorsSecurityAwarenessFirewallInternalusersLackofMeanstoSecurityAuditingPasswordDenialofServiceWeb/CGI西电电子对抗所FourSecurityAttackCategoriesInterruptionAttackonavailabilityInterceptionAttackonconfidentialityModificationAttackonintegrityFabricationAttackonauthenticity西电电子对抗所NormalFlowNormalFlowistheflowofinformationfromaninformationsource,suchasafile,oraregionofmainmemory,toadestination,suchasanotherfileoruser.西电电子对抗所InterruptionAnassetofthesystemisdestroyedorbecomesunavailableorunusable.Thisisanattackonavailability.Examples:Thedestructionofhardware,thecuttingofacommunicationline,orthedisablingofthefilemanagementsystem.西电电子对抗所InterceptionAnunauthorizedpartygainsaccesstoanasset.Thisisanattackonconfidentiality.Theunauthorizedpartycouldbeaperson,aprogram,oracomputer.Examples:Wiretappingtocapturedatainanetworkandtheunauthorizedcopyingoffilesorprograms.西电电子对抗所ModificationAnauthorizedpartynotonlygainsaccesstobuttamperswithanasset.Thisisanattackonintegrity.Examples:Changingvaluesinadatafile,alteringaprogramsothatitperformsdifferently,ormodifyingthecontentofmessagesbeingtransmittedinanetwork.西电电子对抗所FabricationAnauthorizedpartyinsertscounterfeitobjectsintothesystem.Thisanattackonauthenticity.Examples:theinsertionofspuriousmessagesina
本文标题:Chapt 1 Security Introduction
链接地址:https://www.777doc.com/doc-3974778 .html