Professional Documents
Culture Documents
Definition of Security/Privacy
EJ Jung
ejung@cs.usfca.edu
9/13/2010 CS 686
9/13/2010 Henric
CSJohnson
686 2
Passive attack (1) - Eavesdrop
! Code talkers
9/13/2010 CS 686
9/13/2010 CS 686
Active attack (1) - impersonation
! Impostors on Facebook
9/13/2010 CS 686
9/13/2010 CS 686
Active (3) intercept&modify
9/13/2010 CS 686
9/13/2010 CS 686
Summary of attacks
9/13/2010 Henric
CSJohnson
686 9
Security Services
! Confidentiality (privacy)
! Authentication (who created or sent the data)
! Integrity (has not been altered)
! Non-repudiation (the order is final)
! Access control (prevent misuse of resources)
! Availability (permanence, non-erasure)
Denial of Service Attacks
Virus that deletes files
9/13/2010 Henric
CSJohnson
686 10
Attack on Authenticity
! Authenticity is identification and assurance of
origin of information
Unauthorized assumption of
anothers identity
network
9/13/2010 CS 686
Attack on Confidentiality
! Confidentiality is concealment of information
Eavesdropping,
packet sniffing,
illegal copying
network
9/13/2010 CS 686
Attack on Integrity
! Integrity is prevention of unauthorized changes
Intercept messages,
tamper, release again
network
9/13/2010 CS 686
Attack on Availability
! Availability is ability to use information or
resources desired
Overwhelm or crash servers,
disrupt infrastructure
network
9/13/2010 CS 686
Famous words
! Encrypt and decrypt
! Plaintext and ciphertext
encrypt plaintext -> ciphertext
decrypt ciphertext -> plaintext
easy example: XOR
! Digital signature
as you sign on paper
for non-repudiation and accountability
! Session
one conversation/communication unit
9/13/2010 CS 686
9/13/2010 CS 686
Access Control Model
9/13/2010 CS 686