LectureNote1-BasicSecurityConcepts

LectureNote1-BasicSecurityConcepts - CS 556 - Computer...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 1 / 38 CS 556 - Computer Security Dr. Indrajit Ray Email: indrajit@cs.colostate.edu Department of Computer Science Colorado State University Fort Collins, CO 80523, USA B ASIC S ECURITY C ONCEPTS B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 2 / 38 Why Security? B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 3 / 38 Not a major issue for non-networked centralized systems Single administrative control Policies can be well defined and enforced System can be physically secured Access can be easily monitored and restricted Network Connectivity Changes Everything B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 4 / 38 Internet Perspective B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 5 / 38 Spans 176 countries Legal system varies No central administration means practically impossible to enforce any policy Users - Universities, government agencies, research organizations, corporations, etc. Scope of Internet Security Problems B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 6 / 38 Public, private and government networks have been penetrated by unauthorized users and rogue programs Increased volume of security breaches being reported regularly Many go unreported for fear of loosing face National Cyber Incident Statistics B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 7 / 38 Internet Security Concerns B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 8 / 38 Attack Trends 2000 2007 B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 9 / 38 2007 Dollar Amount Losses (Total = $66,930,950) B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 10 / 38 Contributing Factors B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 11 / 38 Lack of awareness of Internet threats and risks Security measures are often not considered until an enterprise has been attacked Wide open network policies Many sites allow very liberal and open access Vast majority of Internet traffic is unencrypted and can be captured and/or monitored Contributing Factors (contd) B ASIC S ECURITY C ONCEPTS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 12 / 38 Lack of security in the TCP/IP protocol suite Complexity of security management and administration Gloated and buggy software Improved hacking / cracking skills Security Objectives...
View Full Document

This note was uploaded on 05/29/2010 for the course CS 556 taught by Professor Staff during the Spring '08 term at Colorado State.

Page1 / 38

LectureNote1-BasicSecurityConcepts - CS 556 - Computer...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online