{ "course": "Information_System_Sercurity", "course_id": "CO3033", "schema_version": "material.v1", "slides": [ { "page_index": 0, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_001.png", "page_index": 0, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:02:52+07:00" }, "raw_text": "WELCOME TO NFORMATION SYSTEMS SECURITY Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 1, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_002.png", "page_index": 1, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:02:55+07:00" }, "raw_text": "Course information Course code: CO3033 Credits: 3 Course site: Bke Lecturer: Le Thi Bao Thu. Email: thule@hcmut.edu.vn" }, { "page_index": 2, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_003.png", "page_index": 2, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:02:59+07:00" }, "raw_text": "Course Outline Week Lectures 1 Information systems security: basic concepts 2,3 Basic cryptography & key exchange protocols 4 Identification & Authentication 5,6 Discretionary Access Controls 7,8 Mandatory Access Controls 9 Auditing & Accountability 10, 11 Presentations 12 Revision 3 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 3, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_004.png", "page_index": 3, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:04+07:00" }, "raw_text": "References D. Bourgeois, Information Systems for Business and Beyond, 2019. M. Gertz, S. Jajodia, Handbook of Database Security: Applications and Trends, Springer Verlag, 2010. T.R. Peltier, J. Peltier, J. Blackley, Information Security Fundamentals. Auerbach Publications, lSBN 0-8493-1957-9, 2005 D.C. Knox, Effective Oracle Database 10g Security by Design, Oracle Press, ISBN 0-07-223130-0, 2004 W. Mao, Modern Cryptography: : Theory and Practice, 3rd Ed., Prentice Hall. lSBN 0-13-066943-1. 2003 Faculty of Computer Science and Engineering, HCMUT @ 2023 4" }, { "page_index": 4, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_005.png", "page_index": 4, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:07+07:00" }, "raw_text": "Assessments No midterm exam Assignment (Lab): 30% Presentation: 20% Final exam: 50% Open test Multiple-choice & Essay 5 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 5, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_006.png", "page_index": 5, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:11+07:00" }, "raw_text": "Presentation Group of 4-5 students Presentation topics Papers Future trends 1. Location privacy 1. Deepfake 2. Biometric template security 2. Supply chain security 3. Multi-model biometric 3. Automation security 4. Digital watermarking 4.I0T security Faculty of Computer Science and Engineering, HCMUT @ 2023 6" }, { "page_index": 6, "chapter_num": 0, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_0/slide_007.png", "page_index": 6, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:13+07:00" }, "raw_text": "7 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 7, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_001.png", "page_index": 7, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:17+07:00" }, "raw_text": "CHAPTER 1: INTRODUCTION TO NFORMATION SYSTEMS SECURITY Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 8, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_002.png", "page_index": 8, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:20+07:00" }, "raw_text": "Outline 1 Basic Concepts 2 Information System Components 3 Framework for DB & Applications Security 2 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 9, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_003.png", "page_index": 9, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:23+07:00" }, "raw_text": "Basic Concepts Data and Information Information System Information Security Information System Security Requirements Countermeasures Basic Steps in Information Security Process 3 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 10, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_004.png", "page_index": 10, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:27+07:00" }, "raw_text": "Data and Information Data are plain facts. When data are processed, organized, structured or presented in a given context so as to make them useful, they are called Information Data -> Information -> Knowledge. Faculty of Computer Science and Engineering, HCMUT @ 2023 4" }, { "page_index": 11, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_005.png", "page_index": 11, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:31+07:00" }, "raw_text": "Information Systems Information System refers to a system of people, data records and activities that process the data and information in an organization. Data Process 5 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 12, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_006.png", "page_index": 12, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:35+07:00" }, "raw_text": "Information Systems Security Information Security means protecting information and information systems from unauthorized disclosure access use, disruption, modification or destruction. Faculty of Computer Science and Engineering, HCMUT 2023 6" }, { "page_index": 13, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_007.png", "page_index": 13, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:39+07:00" }, "raw_text": "Purposes of Information System Security Prevention Prevent attackers from violating security policies STOP Detection Detect attackers' violation of security policy Recovery Stop attack, assess and repair damage Continue to function correctly even if attack succeeds 7 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 14, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_008.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_008.png", "page_index": 14, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:42+07:00" }, "raw_text": "Information System Security Requirements Confidentiality Integrity Non-repudiation Availability 9 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 15, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_009.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_009.png", "page_index": 15, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:47+07:00" }, "raw_text": "Information System Security Requirements Confidentiality: Protection of data from unauthorized disclosure Example: In a bank system, preventing a client from finding out the information of another client, such as balance Integrity: Only authorized users should be allowed to modify data. Example: In a bank system, preventing a client from changing his or her balance. Availability: Making data available to the authorized users and application programs Example: In a bank system, ensuring that the invoices are printed on time as required by law. Non-repudiation: The ability to prevent the effective denial of an act. Example: In a bank system, providing proof of the origin and delivery of transactions from a client. 10 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 16, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_010.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_010.png", "page_index": 16, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:51+07:00" }, "raw_text": "Countermeasures Countermeasures these security requirements for information ensures Access control Inference control Flow control Encryption 11 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 17, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_011.png", "page_index": 17, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:55+07:00" }, "raw_text": "Basic Steps in Information Systems Security Define a security Choose security Identify threats policy mechanism Identify threats What could break your database system? Define a security policy What the security system is expected to do? Choose security mechanism How the security system should achieve the security goal? 12 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 18, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_012.png", "page_index": 18, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:03:59+07:00" }, "raw_text": "Identify Threats Identify Define a Choose security threats security policy mechanism Security threats: Events that bring violations to system are called threats Grouped into categories: Improper release of information -> Confidentiality Improper modification of data -> Integrity Denial of service -> Availability Denial of action -> Non-repudiation 13 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 19, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_013.png", "page_index": 19, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:02+07:00" }, "raw_text": "Some Common Threats Errors and Omissions Fraud and Theft Malicious Hackers Malicious Code Denial-of-Service Attacks Social Engineering 14 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 20, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_014.png", "page_index": 20, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:06+07:00" }, "raw_text": "Errors and Omissions It is difficult to protect the system from the users who need to use it every day to destroy data accidentally Errors and omissions attack the integrity of the system. The number-one threat to the system. Solutions: Training Security concept \"least privilege Adequate and frequent backups of the information on the systems 15 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 21, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_015.png", "page_index": 21, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:10+07:00" }, "raw_text": "Fraud and Theft The accidentally destroying data but maliciously users are not are destroying the information. The internal attacks is very dangerous. Solutions Well-defined policies -> gather evidence to find attackers (server log files...) 16 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 22, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_016.png", "page_index": 22, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:15+07:00" }, "raw_text": "Malicious Hackers There Internet out there that t will of attack are several groups users information systems Three primary groups: Hackers: who penetrates a system just to look around and see what is possible. Crackers: who damage or destroy data if they are able to penetrate a system. Phreaks: who breaks into an organization's phone system. The ways hackers attack: 5 steps Reconnaissance : Collecting as much information as possible about the target network Scanning: Looking for known vulnerabilities to compromise to gain access to the network Gaining access Maintaining access: Uploading a backdoor application Cover his track: Modifying log files 17 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 23, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_017.png", "page_index": 23, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:19+07:00" }, "raw_text": "Malicious Code Malicious code (malware) is a set of instructions that cause security policies to be violated. Some common malicious code Virus Worm Trojan horse 18 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 24, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_018.png", "page_index": 24, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:22+07:00" }, "raw_text": "Denial-of-Service Attacks A type of attack prevents anyone from accessing to the network To overload the system about resources or network's telecommunication lines DoS: a system attacks a targets system, \"one-to-one\" attack DDoS (distributed denial of service): \"many-to-one\" attack 19 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 25, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_019.png", "page_index": 25, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:26+07:00" }, "raw_text": "Social Engineering The goal of social engineering is to trick someone into providing valuable information or access to that information or resource. The social engineer exploits weakness of human nature: The desire to be helpful A tendency to trust people The fear of getting into trouble The willingness to cut corners Common types of Social Engineering Human-based social engineering Computer-based social engineering 20 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 26, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_020.png", "page_index": 26, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:29+07:00" }, "raw_text": "Human-based Social Engineering Dumpster Diving & Shoulder Surfing Impersonation Posing as Important User Third-person Authorization Technical Support 21 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 27, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_021.png", "page_index": 27, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:33+07:00" }, "raw_text": "Computer-based Social Engineering Phising Vishing Pop-up Windows Mail attachments Fake websites Interesting software 22 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 28, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_022.png", "page_index": 28, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:37+07:00" }, "raw_text": "Define a Security Policy Identify Define a security Choose security threats policy mechanism Policy says what is, and is not, allowed. Security begins with a clear and comprehensive security policy Different policies for different needs. Composition of conflict t policies may cause vulnerabilities. 23 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 29, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_023.png", "page_index": 29, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:40+07:00" }, "raw_text": "Define a Security Policy A security policy should balance among three factors: Usability Security Performance 24 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 30, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_024.png", "page_index": 30, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:45+07:00" }, "raw_text": "Choose Security Mechanism Identify Define a security Choose security threats policy mechanism Mechanisms enforce policies. Security mechanisms may be: Technical, in which controls in the computer enforce the policy; for example, the requirement that a user supply a password to authenticate herself before using the computer. Procedural, in which controls outside the system enforce the policy; for example, firing someone for ringing in a disk containing a program obtained from an untrusted source. 25 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 31, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_025.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_025.png", "page_index": 31, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:48+07:00" }, "raw_text": "Database Security Mechanism Access control Inference control Flow control Encryption Computer Science and Engineering" }, { "page_index": 32, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_026.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_026.png", "page_index": 32, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:52+07:00" }, "raw_text": "Access Control Access Control: The security mechanism for r restricting to the access database as a whole Handled by creating user accounts and passwords to control login process by the Database Management System (DBMS) Two types of access control system Closed system Open system Computer Science and Engineering" }, { "page_index": 33, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_027.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_027.png", "page_index": 33, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:56+07:00" }, "raw_text": "s Control - Closed System Access Closed system Access request Is there a rule Rules: authorizing the authorized access? accesses es Access permitted Access denied 28 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 34, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_028.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_028.png", "page_index": 34, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:04:59+07:00" }, "raw_text": "s Control - Opened System Access Opened system Access request Is there a rule Rules: denying the denied access? accesses es Access permitted Access denied 29 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 35, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_029.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_029.png", "page_index": 35, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:03+07:00" }, "raw_text": "Access Control - Basic steps Basic Steps in Access control Process: Identification A user presents an identity to the database Authentication: The user proves that the identity is valid Authorization: What privileges and authorizations the user has 30 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 36, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_030.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_030.png", "page_index": 36, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:07+07:00" }, "raw_text": "Inference control Inference control: The security problem associated with databases is that of controlling the access to a statistical database, which is used to provide statistical information or summaries of values based on various criteria. The countermeasures to statistical database security problem is called inference control measures. 31 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 37, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_031.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_031.png", "page_index": 37, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:11+07:00" }, "raw_text": "Inference attack Sensitive Non-sensitive database database Infer X Access control Access permitted Access denied Meta data 32 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 38, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_032.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_032.png", "page_index": 38, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:14+07:00" }, "raw_text": "Inference control Sensitive INFERENCE Non-sensitive database database CONTROL X Access control Access permitted Access denied Meta data 33 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 39, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_033.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_033.png", "page_index": 39, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:19+07:00" }, "raw_text": "Flow control I A flow between object X and object Y occurs when a program reads values from X and writes values into Y. Flow control prevents information from flowing from some objects into less protected objects so that it can reach unauthorized users. A flow policy specifies the channels which information is allowed to move. Specifies just two classes of information: confidential (C) and non-confidential (N) and allows all flows except those from class C to class N. Channels that are pathways for information to flow implicitly in ways that violate the security policy of an organization are called Covert Channels. Storage channel Timing channel 34 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 40, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_034.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_034.png", "page_index": 40, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:23+07:00" }, "raw_text": "Convert chanel - Timing Chanel In Python. def validate password(actual pw, typed pw) : if len(actual pw) len(typed pw) : return for : i in len(actual pw) : if actual pw[i] typed pw[i]: return return 35 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 41, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_035.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_035.png", "page_index": 41, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:29+07:00" }, "raw_text": "Encryption Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties. Only the user having a correct key can decrypt the cyphertext, transforming it to the original plaintext version. Data is used d to protect sensitive data encryption 0 (such as credit card numbers). 36 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 42, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_036.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_036.png", "page_index": 42, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:32+07:00" }, "raw_text": "Outline 1 Basic Concepts 2 Information System Components 3 Framework for DB & Applications Security 37 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 43, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_037.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_037.png", "page_index": 43, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:40+07:00" }, "raw_text": "Hardware Fire/flood/bombs Data corruption due to power loss or surge Failure of security mechanisms giving greater access Theft of equipment DBMS and Application Software Information System Physical damage to eguipment Failure of security mechanism Electronic interference and radiation giving greater access Program alteration Components Theft of programs Communication networks Database Wire tapping Unauthorized amendment or Breaking or disconnection of cables copying of data Electronic interference and radiation Theft of data Data corruption due to power loss or surge Users Programers/Operators Data/Database Administrator Using another person's means of Creating trapdoors Inadeguate security policies access Program alteration (such as creating and procedures Viewing and disclosing software that is insecure) unauthorized data Inadeguate staff training Inadequate Staff training Inadeguate security policies and lllegal entry by hacker procedures Blackmail Staff shortages or strikes Introduction of viruses 38 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 44, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_038.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_038.png", "page_index": 44, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:47+07:00" }, "raw_text": "Information System Components Hardware Encryption oower hanisms boftof ot DBMS and Application Software uipment Failure of security mechanism Identify &Authenticate and radiation giving greater access Program alteration Theft of programs Access control Communication networks Database Unauthorized amendment or of cables copying of data Auditing & Accountability Theft of data Data corruption due to power loss or surge Design Users Programers/Operators Data/Database Administrator Using another person's means of Creating trapdoors Inadeguate security policies access such as creating and procedures Viewing and dis cure) unauthorized da ining Security in ODBS Inadeguate Staf policies and lllegal entry by l Blackmail trikes Introduction of viruses 39 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 45, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_039.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_039.png", "page_index": 45, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:05:56+07:00" }, "raw_text": "Information System Components Hardware Fire/flood/bombs Data corruption due to pow loss or surge Encryption Failure of securitynecnanis giving greater access Theft of equipment DBBIVIS ana software Physical damage to eguipment Failure of security mechanism Electronic interference and radiatior aivinaareater access Key exchange protocols Communication networks Database Wire tapping Unauthorized amendment or Breaking or disconnection of cables copying of data Electronic interference and radiation Theft of data Data corruption due to power loss or surge Physical security Users Programers/Operators ator Using another person's means of Creating trapdoors es access Program alteration (such as creating anaproceaures Viewing and disclosing software that is insecure) unauthorized data Inadeguate staff training Inadeguate Staff training Inadeguate security policies and lllegal entry by hacker procedures Blackmail Staff shortages or strikes Introduction of viruses 40 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 46, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_040.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_040.png", "page_index": 46, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:04+07:00" }, "raw_text": "Information System Components Hardware Fire/flood/bombs Data corruption due to power loss or surge Failure of security mechanisms giving greater access Theft of equipment DBMS and Application Software Physical damage to equipment Failure of security mechanism Electronic interference and radiation giving greater access Program alteration Theft of programs Communication networks Database Wire tapping Unauthorized amendment or Breaking or disconnection of cables copying of data Electronic interferenc& and radiation Theft of data Datacorruntiondue tonowe Physical security Users Programers/Operators Data/Database Administrator Using another person's means of Creating trapdoors Inadequate security policies access Program alteration (such as creating and procedures Viewing and disclosing software that is insecure unauthorized data Inadeguate staff training Inadequate Staff training Inadequate security policies and lllegal entry by hacker procedures Blackmail Staff shortages or strikes Introduction of viruses 41 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 47, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_041.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_041.png", "page_index": 47, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:13+07:00" }, "raw_text": "Information System Components Hardware Fire/flood/bombs Data corruption due to power loss or surge Failure of security mechanisms giving greater access Theft of equipment DBMS and Application Software Physical damage to equipment Failure of security mechanism Electronic interference and radiation giving greater access Program alteration Theft of programs Training Comn ase Wire ta Auditing & Accountability horized amendment or ng of data #lectrc of data Data corruption due to power loss or surge Users Programers/Operators Data/Database Administrator Using another person's means of Creating trapdoors Inadeguate security policies access Program alteration (such as creating and procedures Viewing and disclosing software that is insecure) unauthorized data Inadeguate staff training Inadequate Staff training Inadequate security policies and lllegal entry by hacker procedures Blackmail Staff shortages or strikes Introduction of viruses 42 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 48, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_042.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_042.png", "page_index": 48, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:17+07:00" }, "raw_text": "Outline 1 Basic Concepts 2 Information System Components 3 Framework for DB & Applications Security 43 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 49, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_043.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_043.png", "page_index": 49, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:23+07:00" }, "raw_text": "Framework for DB & Applications Security Privacy, Dependable Information Management, Secure Applications Information Management Technologies, Data Mining and Security Security, Digital Forensics, Secure Knowledge Management Technologies Technologies, Secure Semantic Web, Biometrics Database Relational DB Security, Distributed/Federated DB Security, Web Security DB Security, Object/Multimedia DB Security, Data Warehouse Technologies Security, Inference Problem, Sensor DB and Stream Data Processing Security Supporting Database Systems, Information Retrieval, Knowledge Technologies Management, Information Management, Information & Computer for DB & Security Applications Security 44 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 50, "chapter_num": 1, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_044.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_1/slide_044.png", "page_index": 50, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:26+07:00" }, "raw_text": "45 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 51, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_001.png", "page_index": 51, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:29+07:00" }, "raw_text": "CHAPTER 2: BASIC CRYPTOGRAPHY & KEY EXCHANGE PROTOCOLS Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 52, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_002.png", "page_index": 52, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:33+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Encryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 2 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 53, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_003.png", "page_index": 53, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:36+07:00" }, "raw_text": "Cryptography Overview Cryptography Overview Terminology Classification Cryptosystems Kerckhoffs Principle Brute-force Attack Definition of Secure 3 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 54, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_004.png", "page_index": 54, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:41+07:00" }, "raw_text": "Terminology (1) Cryptology is the art and science of making and breaking \"secret codes\". Cryptography is the study of the making of \"secret codes\". Cryptanalysis is the study of how to crack encryption algorithms or their 6 implementations. Cryptography and cryptology are usually used interchangeably to refer to the combined study of cryptography and cryptanalysis Faculty of Computer Science and Engineering, HCMUT @ 2023 4" }, { "page_index": 55, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_005.png", "page_index": 55, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:46+07:00" }, "raw_text": "Terminology (2) Encryption: the process of the making of \"secret codes\". Decryption: the process of the breaking of \"secret codes\". Cipher: an algorithm for performing encryption or decryption. Plaintext: input to an algorithm and needing : a message encryption protecting. It may or may not be intelligible. Ciphertext: the result t of :1 1 encryption performed on plaintext using an algorithm. Ciphertext is not intelligible. Cryptosystem = encryption + decryption algorithms. Encryption and decryption processes need keys 5 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 56, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_006.png", "page_index": 56, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:49+07:00" }, "raw_text": "Classification Symmetric cryptosystems use the same key for (en/de)cryption algorithms Symmetric key = Shared-secret-key Asymmetric cryptosystems (Public-key cryptosystems) use tWO c different keys for (en/de)cryption algorithms. Public key & Private key. Faculty of Computer Science and Engineering, HCMUT @ 2023 6" }, { "page_index": 57, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_007.png", "page_index": 57, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:06:54+07:00" }, "raw_text": "Cryptosystems Symmetric cryptosystems: Ke =Kp Asymmetric cryptosystems: KeKD KE Plaintext Ciphertext Hello, Ac% Both factors are necessary 10 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 61, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_011.png", "page_index": 61, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:10+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Encryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 11 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 62, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_012.png", "page_index": 62, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:13+07:00" }, "raw_text": "Classic Cryptography Classic Cryptography Simple Substitution Cipher Transposition Ciphe One-time Pad Codebook Cipher 12 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 63, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_013.png", "page_index": 63, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:20+07:00" }, "raw_text": "Simple Substitution Cipher The message is encrypted by substituting the letter of the alphabet n places ahead of the current letter. E.g.: n = 3 (Caesar's cipher)) a C e k 1 m n 0 p r S t u v W x y z D E F G H I J K L M N 0 P 0 R S T U V W x Y Z A B C The possible keys are n e {0 , 1, 2 ,...,25} -> the worst: 26 tries; the average: 13 tries. 13 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 64, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_014.png", "page_index": 64, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:23+07:00" }, "raw_text": "Transposition Cipher The positions of the characters in the plaintext are changed The ciphertext is a permutation of the plaintext. Scytale, used by the ancient Greeks 14 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 65, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_015.png", "page_index": 65, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:30+07:00" }, "raw_text": "Double Transposition Cipher Write the plaintext into an array of a given size. Permute the rows and columns according to specified permutations. E.g.: 3x 4 array Rows:(1,2,3) ->(3,2,1) Columns:(1,2,3,4)->(4,2,1,3) t t a a a a a TAT a TAT k a t c k a t t k c a a a TAT a t t a a t a t 15 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 66, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_016.png", "page_index": 66, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:38+07:00" }, "raw_text": "One-time Pad (1) Also the Vernam cipher. Encryption Convert the letters to the bit string -> the plaintext Create a key consisting of a randomly selected string of bits that is the same length as the message. The key is XORed with the plaintext -> the ciphertext Convert the ciphertext bits back into letters. h 1 h i t 1 e e plaintext: 001 000 010 100 001 010 111 100 000 101 key: 111 101 110 101 111 100 000 101 110 000 ciphertext: 110 101 100 001 110 110 111 001 110 101 I 1 h n t h r 16 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 67, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_017.png", "page_index": 67, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:46+07:00" }, "raw_text": "One-time Pad (2) Decryption Convert the letters to the bit string -> the ciphertext. The ciphertext is XORed with the same key -> the plaintext (x D y y = x) Convert the plaintext bits back into letters. 1 s r h s s t h s r ciphertext: 110 101 100 001 110 110 111 001 110 101 key: 111 101 110 101 111 100 000 101 110 000 plaintext: 001 000 010 100 001 010 111 100 000 101 h i 1 h i t 1 e e r 17 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 68, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_018.png", "page_index": 68, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:51+07:00" }, "raw_text": "Codebook Cipher (1) A classic codebook cipher is, literally, a dictionary-like book containing words and their corresponding codewords. E.g.: Encrypt the entire German word Februar by replacing it with the 5-digit \"codeword' 13605. TABLE 2.3. Excerpt from a German codebook. The codebook in Table 2.3 was used for Plaintext Ciphertext encryption while a corresponding Februar 13605 codebook, arranged l with the 5-digit fest 13732 codewords in numerical order, was used finanzielle 13850 for decryption folgender 13918 Fricden 17142 Fricdenschluss 17149 18 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 69, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_019.png", "page_index": 69, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:55+07:00" }, "raw_text": "Codebook Cipher (2) In a codebook, substitutions are for entire words, or even phrases > It is a complex substitution cipher. Modern block ciphers use complex algorithms to generate ciphertext from plaintext (and vice versa) but at a higher level, a block cipher can be viewed as a codebook, where each key determines a distinct codebook 19 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 70, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_020.png", "page_index": 70, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:07:59+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Enryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 20 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 71, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_021.png", "page_index": 71, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:02+07:00" }, "raw_text": "Modern Cryptography Modern Cryptography Symmetric cryptosystems: Stream ciphers: A5/1, RC4 Block ciphers: DES,Triple DES,AES Asymmetric cryptosystems: RSA Secret Key Establishment Digital Signatures Digital Certificate 21 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 72, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_022.png", "page_index": 72, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:07+07:00" }, "raw_text": "Symmetric Cryptosystems - Stream Ciphers (1) Take a key K of n bits in length and stretches it into a long keystream S: StreamCipher(K) = S. P = Po P1 P2...Pn; S= So S1 S2...Sn; C= Co C1 C2...Cn Encryption: use the keystream to encrypt as the use of the key in a one-time pad cipher. Co = Po D So,C1= P1 O S1,C2= Pz O S2 Decryption: the keystream is and XORed with the same generated ciphertext. Po= Co D So;P1= C1 O S1P2= C2 S2 22 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 73, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_023.png", "page_index": 73, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:12+07:00" }, "raw_text": "Symmetric Cryptosystems - Stream Ciphers (2 A5/1 Employ 3 linear feedback shift registers (LFSRs) Be representative of a large class of stream ciphers that are based on shift registers and implemented in hardware Can generate bits at a rate proportional to the clock speed Be used by GSM cell phones for confidentiality. RC4 Be efficiently implemented in software -> RC4 is almost unique among stream ciphers Be used in many places, including in the Secure Socket Layer, or SSL protocol. Be fairly old and not optimized for 32-bit processors (it's optimized for ancient 8-bit processors 23 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 74, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_024.png", "page_index": 74, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:16+07:00" }, "raw_text": "Symmetric Cryptosystems - Block Ciphers An iterated block < cipher splits the plaintext into fixed sized bocks and generates fixed sized blocks of ciphertext. The ciphertext is obtained from the plaintext by iterating a function F over some number of rounds. The function F, which depends on the output of the previous round and the key K , is known as a round function. The design goals for block ciphers are security and efficiency Most popular algorithms: DES, Triple DES, AES. 24 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 75, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_025.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_025.png", "page_index": 75, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:20+07:00" }, "raw_text": "Block Ciphers - DES DES: Data Encryption Standard. Be published in 1977 by the USA's National Bureau of Standards (NBS) - now known as National Institute of Standards and Technology (NiST): Be used as the encryption standard for unclassified data (information not concerned with national security). Messages are divided into 64-bit blocks. Key length: 56 bits Today, it's too small -> Brute-torce attack (some hours) 25 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 76, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_026.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_026.png", "page_index": 76, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:25+07:00" }, "raw_text": "Block Ciphers - Triple DES Improve the key length -> Run the DES algorithm a multiple number of times using different keys. 1999, Triple DES was encouraged to replace DES Why not \"Double DES\"???? Triple DES: m: plaintext: c: ciphertext £k1: encryption by key k1; Dk1: decryption by key k1 Encryption: c < Ek1(Dk2(Ek1(m))) Decryption: m < Dk1(Ek2(Dk1(c))) Be compatible with DES when k1 = k2; The triple DES can also use three different keys 26 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 77, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_027.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_027.png", "page_index": 77, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:29+07:00" }, "raw_text": "Block Ciphers -AES (1) AES: Advanced Encryption Standard (also known as Rijndael) Jan 1997: NiST announced the initiation of a new symmetric-key block cipher algorithm AES, as the new encryption standard to replace the DES. Oct 2000: Rijndael designed by 2 Belgium cryptographers (Daemen and Rijmen was selected. Be an iterated block cipher with a variable block size and variable key size. The key size and the block size can be independently specified to 128, 192 or 256 bIts 27 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 78, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_028.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_028.png", "page_index": 78, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:33+07:00" }, "raw_text": "Block Ciphers - AES (2 Be secure and can be implemented efficiently The enlarged and variable key and data-block sizes can accommodate a wide spectrum of security strengths for various application needs. Replace for multiple 1 (as Triple DES)-> reduce the encryption cost of managing keys -> simplify the design of security protocols and systems. 28 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 79, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_029.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_029.png", "page_index": 79, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:39+07:00" }, "raw_text": "Asymmetric Cryptosystems - Overview (1) In Asymmetric cryptosystems (Public-key cryptosystems): public key for C encryption, private key for decryption. public key private key HE Merro Verne BEONPCP Ceebtarta Certeerta SANORTDON U+/8 Re VBeOTFg Thsqaarere aTPcB+M earrlgPav eorriogohave mdar.dDes paicenen erd ENOPOP ra encryption decryption plaintext ciphertext plaintext 29 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 80, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_030.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_030.png", "page_index": 80, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:43+07:00" }, "raw_text": "Asymmetric Cryptosystems - Overview (2) They are based on very special mathematical transformations termed trap door one-way functions A trap door one-way function is easy to compute in one direction and hard to compute in other direction E.g.: Generate 2 prime numbers p and q, compute N = pq: Easy. With given N, find its factors p and q: Difficult Well-known asymmetric cryptosystems: RsA, DsA, ElGamal, Rabin. 30 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 81, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_031.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_031.png", "page_index": 81, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:48+07:00" }, "raw_text": "Asymmetric Cryptosystems - RSA Rivest, Shamir and Adleman. Basic steps. Key generation: Choose 2 large prime numbers randomly and independently: p & q, p + q. Compute: n = pq ; Euler's phi function: (n) = (p - 1)(q - 1). Choose public (or encryption) exponent e: e e N,1 < e < (n), e and (n) are coprime Find private (or decryption) exponent d: ed = 1 (mod $(n)): The public key (for encryption): (n, e) The private key (for decryption): (n, d) Encryption: c = me mod n. Decryption: m = cd mod n. 31 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 82, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_032.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_032.png", "page_index": 82, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:53+07:00" }, "raw_text": "Asymmetric Cryptosystems - Secret Key Establishment Symmetric cryptosystems: faster, more efficient. Asymmetric cryptosystems: more secure, no shared key in advance. Application: establish secret keys over public communication channels. Hybrid scheme: Asymmetric technique: establish a symmetric key Symmetric technique: encrypt data by that symmetric key {K}Bob E{Bob's data,K E{Alice's data,K] Alice Bob 32 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 83, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_033.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_033.png", "page_index": 83, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:08:57+07:00" }, "raw_text": "Asymmetric Cryptosystem - Digital Signatures 11) Digital signature: a message signed with a user's private key and can be verified by anyone who has access to the user's public key. Thus: Authentication: Anyone with the user's public key can verify his digital signature -> Easy to verify who is the owner of the message. Data integrity: The message cannot be modified without being detected during decryption time -> Verify whether the message is modified or not. Non-repudiation: Only the holder of the private key can digitally sign -> it prevents the sender from claiming that he did not actually send the information. 33 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 84, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_034.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_034.png", "page_index": 84, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:03+07:00" }, "raw_text": "Asymmetric Cryptosystem - Digital Signatures (2) private key public key Simple Digital Signatures CE Merno Memo Memo Conlidental Confdentia Confidemia Re Re Re Fiscal Ravice Frscal Revew FiscReview Thisquarter's Thequartere This quarters earmigs have eernings ha earrings have just come in just come just come in and and and. signing original text signed text verified text verifying 34 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 85, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_035.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_035.png", "page_index": 85, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:08+07:00" }, "raw_text": "Asymmetric Cryptosystem - Digital Signatures (3) Secure Digital Merc Comfidenal Signatures RE hash fynction thsquawre eanwngshve t come in and ono1oc1oo01 plaintext digest signed with private key Coneasrta Fe 210n010010001 message digest 1 plaintext signature private key used for signing 35 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 86, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_036.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_036.png", "page_index": 86, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:12+07:00" }, "raw_text": "Asymmetric Cryptosystem - Digital Certificate (1)) A public key infrastructure, or PKl, is the sum total of everything required to securely use public key crypto. A digital certificate (or identity certificate, or public key certificate) is an electronic document which uses a digital signature to bind a public key with an identity The certificate can be used to verify that a public key belongs to an individual. In most situations the certificate must be signed by a Certificate Authority or CA, which acts as a trusted third party! 36 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 87, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_037.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_037.png", "page_index": 87, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:17+07:00" }, "raw_text": "Asymmetric Cryptosystem - Digital Certificate (2 Each digital certificate contains basic information: Name and URL of the CA The user's public key. The user's identity: information such as the name of a person or an organization, their address or their server address, and so forth Valid time CA 37 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 88, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_038.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_038.png", "page_index": 88, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:20+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Encryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 38 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 89, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_039.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_039.png", "page_index": 89, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:24+07:00" }, "raw_text": "Key Channel (1) Alice and Bob want to make conversation in a secure by using manner symmetric encryption. Alice and Bob have not agreed about a secrect key A communication channel over which a key is correctly established is called a key channel. A key channel is a separate channel from a message channel. Alice Bob 39 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 90, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_040.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_040.png", "page_index": 90, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:29+07:00" }, "raw_text": "Key Channel (2) Conventional techniques Relying on an online authentication service (through a Trusted Third Party)) This disadvantage limits the scalability of the technique for any open systems applications. Public-key techniques (with the hybrid scheme) Asymmetric technique: for the key encryption. Symmetric technique: for data encryption. The Quantum Key Distribution Technique: [4] 4.4.5 40 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 91, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_041.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_041.png", "page_index": 91, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:33+07:00" }, "raw_text": "Key Channel (3 Security properties for authenticated key establishment: Only Alice and Bob (or perhaps a principal who is trusted by them) should know K Alice and Bob should know that the other principal knows K. Alice and Bob should know that K is newly generate 41 Faculty of Computer Science and Engineering, HCMUT 2023" }, { "page_index": 92, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_042.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_042.png", "page_index": 92, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:36+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Encryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 42 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 93, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_043.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_043.png", "page_index": 93, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:41+07:00" }, "raw_text": "Perfect Encryption (1) Notation: M': Ciphertext M : Plaintext A': Decryption algorithm A: Encryption algorithm K': Decryption key K: Encryption key The relationship of M and M': M'=A(K,M)={M}k M =A'(K',M')=A'(K',A(K,M) Property 1: Without the key K (in the case of a symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem), the ciphertext {M}k for finding does not t provide any cryptanalytic the plaintext 7 means message M. 43 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 94, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_044.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_044.png", "page_index": 94, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:45+07:00" }, "raw_text": "Property 2: The ciphertext {M} and maybe together with some known information about the plaintext M do not provide any cryptanalytic means for finding the key K (in the case of a symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem) Property 3: (for message authentication service) Without the key K, even with the knowledge of the plaintext M, it should be impossible for someone to alter {M} without being detected by the recipient during the time of decryption. 44 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 95, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_045.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_045.png", "page_index": 95, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:49+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Encryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 45 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 96, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_046.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_046.png", "page_index": 96, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:53+07:00" }, "raw_text": "Dolev-Yao Threat Model (1) Dolev and Yao proposed a threat model which has been widely accepted as the standard threat model for cryptographic protocols. Characters of the model: Alice & Bob: normal users (or principal, entity, agent) who wish to communicate with each other in a secure manner. Trent: a trusted third party Malice: a bad guy (or attacker, adversary, enemy, intruder, eavesdropper, impostor, etc.) 46 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 97, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_047.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_047.png", "page_index": 97, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:09:57+07:00" }, "raw_text": "Dolev-Yao Threat Model (2) Trent Bob Alice Malice 47 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 98, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_048.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_048.png", "page_index": 98, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:00+07:00" }, "raw_text": "Dolev-Yao Threat Model (3) Malice can: Obtain any message passing through the network. Initiate a conversation with any other user (because He is a legitimate e user of the network). Become a receiver to any principal. Send messages to any principal by impersonating any other principal. 48 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 99, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_049.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_049.png", "page_index": 99, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:05+07:00" }, "raw_text": "Dolev-Yao Threat Model (4) Malice cannot. Guess a random number chosen from a sufficiently large space. Retrieve plaintext from given ciphertext and create valid ciphertext from given plaintext without the e correct secret (or private) key (with respect to the perfect t encryption algorithm) Find the private key matching a given public key. Be in control of many private areas of the computing environment, such as accessing the memory of a principal's offline computing device 49 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 100, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_050.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_050.png", "page_index": 100, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:09+07:00" }, "raw_text": "Dolev-Yao Threat Model (5) Suppose that two principals Alice and Bob wish to communicate with each other in a secure manner. Suppose that Alice and Bob have never met before. > They do not already: Share a secret key between them. Know for sure the other party's public key. How they communicate securely completely can over insecure networks? 50 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 101, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_051.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_051.png", "page_index": 101, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:13+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Encryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 51 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 102, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_052.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_052.png", "page_index": 102, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:17+07:00" }, "raw_text": "Key Exchange Protocols Key Exchange Protocols Protocol \"From Alice to Bob' Protocol \"Session Key from Trent' Protocol \"Message Authentication Protocol \"Challenge-response Protocol using Public-key Cryptosystems 52 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 103, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_053.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_053.png", "page_index": 103, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:21+07:00" }, "raw_text": "Convention Premise Alice and Trent shared key KaT : Bob and Trent shared key K BT : KaT, KsT are long-term keys. Goal Alice and Bob want to establish a new and shared secret key K (new session key) for communication. Notes Alice is an initiator. Bob is a responder. Alice and Bob know Trent and share respective long-term keys with Trent; so it is possible for Trent to securely pass messages between them. 53 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 104, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_054.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_054.png", "page_index": 104, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:25+07:00" }, "raw_text": "Protocol\"From Alice to Bob aille qog 1 2 3 1. Alice generates a session key K at random; creates Alice,Bob,{K}KAT 2. Alice,Bob,{K}KBT 3. 54 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 105, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_055.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_055.png", "page_index": 105, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:29+07:00" }, "raw_text": "Protocol \"From Alice to Bob\" - Problem Problem: K created by Alice is not strong enough (not sufficiently random or easily memorable) > Bob's security can be compromised since the key is a shared one. 7 Bob does not trust Alice and should not feel comfortable accepting a session key generated by her and sharing with her. New protocol: Session Key from Trent 55 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 106, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_056.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_056.png", "page_index": 106, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:33+07:00" }, "raw_text": "Key Exchange Protocols Key Exchange Protocols Protocol\"From Alice to Bob Protocol \"Session Key from Trent' Protocol \"Message Authentication Protocol \"Challenge-response Protocol using Public-key Cryptosystems 56 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 107, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_057.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_057.png", "page_index": 107, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:37+07:00" }, "raw_text": "Protocol \"Session Key from Trent' qog 1 the new 2 session key is 3 created by Trent. 4 1. Alice sends to Trent: Alice,Bob 2. 3. 4. 57 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 108, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_058.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_058.png", "page_index": 108, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:42+07:00" }, "raw_text": "Protocol \"Session Key from Trent\" - Attack 1 (1) Miliie Aiile qog Kmr : shared key of Malice and Trent. 1 1' 2 1. Alice sends to Malice(\"Trent\"): Alice, Bob 1'. Malice(\"Alice\") sends to Trent: Alice, Malice 3 2. Trent finds KaT, Kmr; generates Kam at random and sends to Alice:{KAM}KAT,{KAM}KMT 4 3. Alice decrypts Malice(\"Bob\") Trent,Alice,{KAM}KMT 58 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 109, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_059.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_059.png", "page_index": 109, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:46+07:00" }, "raw_text": "Protocol \"Session Key from Trent\" - Attack 1 (2) Result. Alice will believe that the protocol has been successfully completed with Bob. Malice masguerade as Bob and learn all the information that Alice intends to send to Bob Bob will not know that he is requested to run the protocol. What is the problem from this attack? Malice must be a legitimate user known to Trent. Inside attackers are often more of a threat than outsiders 59 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 110, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_060.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_060.png", "page_index": 110, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:49+07:00" }, "raw_text": "Protocol \"Session Key from Trent\" - Fix 1 (1) Realize: The above attack works as a result of Malice's alteration of Bob's identity Bob's identity is sent in cleartext. > hide Bob's identity Modify the protocol at the step 1: Bob's identity is encrypted under the key shared between Alice and Trent. Why is Alice's identity not encrypted? 60 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 111, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_061.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_061.png", "page_index": 111, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:53+07:00" }, "raw_text": "Protocol \"Session key from Trent\" - Fix 1 (2) Alile qog 1 2 But... 3 4 1. 2. 3. Bob decrypts{K}KBT to reveal K; forms and sends to Alice: {Hello Alice,I'm Bob!} k 4. 61 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 112, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_062.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_062.png", "page_index": 112, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:10:58+07:00" }, "raw_text": "Protocol \"Session key from Trent\" - Attack 2 Attack: shared key; Trent finds Kmr ; generates K at random and sends 1 to Alice:{KAM}KAT{KAM}KMT 4. Malice(\"Bob\") decrypts {KAM}KMT to reveal Kam; forms and sends to Alice: Result: Malice can still successfully masquerade as Bob. Why does Malice know who is the person Alice wants to make conversation? 62 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 113, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_063.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_063.png", "page_index": 113, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:02+07:00" }, "raw_text": "Protocol \"Session key from Trent\" - Attack 3 Attack: In a previous protocol run (a correct run) between Alice and Malice, Malice has recorded Malice can alter the message from Trent to Alice: 1. 2. 2'. Result: Malice can still successfully masquerade as Bob by using the old session key K' 63 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 114, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_064.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_064.png", "page_index": 114, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:06+07:00" }, "raw_text": "Protocol \"Session key from Trent\" - Problem Problem: Malice is able to alter some protocol messages without being detected. Thus the protocol needs a security service which can guard against tampering of messages New protocol: Message Authentication 64 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 115, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_065.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_065.png", "page_index": 115, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:09+07:00" }, "raw_text": "Key Exchange Protocols Key Exchange Protocols Protocol\"From Alice to Bob Protocol \"Session Key from Trent' Protocol \"Message Authentication' Protocol \"Challenge-response Protocol using Public-key Cryptosystems 65 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 116, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_066.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_066.png", "page_index": 116, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:15+07:00" }, "raw_text": "Protocol \"Message Authenticationj (1) Aitie qog 1 2 1. Alice sends to Trent: Alice,Bob 3 Trent finds KaT, KBr; generates K at random 2. 4 3. Alice decrypts {Bob,K}KAT'C checks Bob's Bob decrypts {Alice,K}KBT 4. checks Alice's identity and sends to Alice: {Hello Alice,I'm Bob!} K 66 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 117, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_067.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_067.png", "page_index": 117, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:19+07:00" }, "raw_text": "Protocol \"Message Authentication (2)) Based on the Property 3 of Perfect Encryption: Without the key K, even with the knowledge of the plaintext M, it should be impossible for someone to alter {M}r without being detected by the recipient during the time of decryption. without being detected. 67 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 118, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_068.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_068.png", "page_index": 118, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:23+07:00" }, "raw_text": "Protocol \"Message Authentication\" - Attack Attack: Message replay attack Malice intercepts Alice's request: 1. Alice sends to Trent: Alice,Bob Trent finds KaT , KBT ; generates 2. K a at random and sends to Malice(\"Alice\"): {Bob,K}KAT{Alice,K}KBT Result: Alice and Bob will reuse the old session key K'. Malice can still successfully masquerade as Bob by using the old session key K' 68 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 119, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_069.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_069.png", "page_index": 119, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:27+07:00" }, "raw_text": "Protocol \"Message Authentication\"- Problem Problem 2 ciphertext blocks containing K' are a replay of old messages which Malice has recorded from a previous run of the protocol (a normal run between Alice and Bob)) Since K' is old, it may be possible for Malice to have discovered its value (HOW ???) > How can users check that a message in a protocol is not a replay of an old message? New protocol: Challenge-response 69 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 120, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_070.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_070.png", "page_index": 120, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:30+07:00" }, "raw_text": "Key Exchange Protocols Key Exchange Protocols Protocol\"From Alice to Bob Protocol \"Session Key from Trent' Protocol \"Message Authentication Protocol \"Challenge-response\" Protocol using Public-key Cryptosystems 70 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 121, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_071.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_071.png", "page_index": 121, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:34+07:00" }, "raw_text": "Protocol \"Challenge-response (1) 1978, Needham and Schroeder published Needham-Schroeder Symmetric key Authentication Protocol. Utilize the challenge-response mechanism (also called handshake) for Alice to check the freshness of the session key. Nonce: a number used once 71 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 122, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_072.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_072.png", "page_index": 122, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:39+07:00" }, "raw_text": "Protocol \"Challenge-response (2) Aille qog 1. Alice creates N, at random, sends to Trent: Alice,Bob,N 1 2. Trent generates K at random, sends to Alice: {NA,K,Bob,{K,Alice}KBT}KAT 2 3. Alice decrypts, checks her NA, checks Bob's 3 4 4. Bob decrypts, checks Alice's ID, creates random NB , sends to Alice: {I'm Bob! NB}k 5 5. Alice sends to Bob: {I'm Alice! NB - 1}k Na/Np: s6 Nonce tao boi Alice/Bob 72 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 123, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_073.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_073.png", "page_index": 123, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:44+07:00" }, "raw_text": "Protocol \"Challenge-response' \" - Attack (1) 22 qog 1. Alice creates N, at random, sends to Trent: Alice, Bob, N 2. Trent generates K at random, sends to Alice: 1 {NA,K,Bob,{K,Alice}KBT}KAT 2 3. Alice decrypts, checks her NA, checks Bob's ID, sends to Malice(\"Bob\"): Trent,{K,Alice}KBT 3'. Malice(\"Alice\") sends to Bob: Trent,{K',Alice}BT 3 3' 4. Bob decrypts, checks Alice's ID, creates random NB, sends to Malice(\"Alice\"): 4 {I'm Bob!NB}K 5. Malice(\"Alice\") sends to Bob: 5 {I'm Alice!NB -1}k 73 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 124, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_074.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_074.png", "page_index": 124, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:48+07:00" }, "raw_text": "Result: Bob thinks he is sharing a new session key with Alice while actually the key is an old one and may be known to Malice. The communication Alice wanted to set up fails. Malice can successfully masquerade as Alice by using the old session key K' Solutions. More message flows (between Bob & Trent) Use timestamps. 74 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 125, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_075.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_075.png", "page_index": 125, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:52+07:00" }, "raw_text": "Protocol \"Challenge-response \" - Timestamps Steps 1. Alice sends to Trent: Alice, Bob 4. Condition Clock- T1 < t1 + t2 Clock: the recipient's local time T: timestamp at Trent. At : an interval representing the normal discrepancy between Trent's clock and the local clock. At,: an interval representing the expected network delay time Problems of Timestamps? 75 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 126, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_076.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_076.png", "page_index": 126, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:56+07:00" }, "raw_text": "Key Exchange Protocols Key Exchange Protocols Protocol\"From Alice to Bobj Protocol \"Session Key from Trent' Protocol \"Message Authentication Protocol \"Challenge-response Protocol using Public-key Cryptosystems 76 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 127, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_077.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_077.png", "page_index": 127, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:11:59+07:00" }, "raw_text": "Protocol using Public-key Cryptosystems (1 Needham-Schroeder Public-key Authentication Protocol. Ka, K-1a: public & private keys of Alice M 77 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 128, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_078.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_078.png", "page_index": 128, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:05+07:00" }, "raw_text": "Protocol using Public-key Cryptosystems (2) Aille qog 1. Alice sends to Trent: Alice,Bob 1 3. Alice verifies Trent's signature on {Kp,Bob}\" 2 3 4. Bob decrypts, checks Alice's ID, sends to Trent: Bob,Alice 4 5 6. Bob verifies Trent's signature e on {KA,Alice} 6 7 Na,No are used to initialized a shared secret key 78 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 129, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_079.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_079.png", "page_index": 129, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:09+07:00" }, "raw_text": "Protocol using Public-key Cryptosystems - Attack (1) Aille qog (3):{NA,Alice}Km (3):{NA,Alice}KB (6):{NA,NB}K (6):{NA,NB}K (7):{NB}Km (7):{NB}K Protocol between Protocol between Alice & Malice Malice(Alice\") & Bob 79 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 130, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_080.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_080.png", "page_index": 130, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:13+07:00" }, "raw_text": "Protocol using Public-key Cryptosystems - Attack (2) Found after 17 years Attack: Malice makes use of Alice as she is trying to establish a connection with him (Alice provides an oracle service). Result. Bob thinks he is sharing secrets Ne, Ng with Alice while actually sharing them with Malice. Malice may ask for a session key and Bob may believe that this request is from Alice. Example: If Bob is a bank, Malice(\"Alice\") sends to Bob the following command: 80 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 131, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_081.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_081.png", "page_index": 131, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:18+07:00" }, "raw_text": "Protocol using Public-key Cryptosystems - Attack (3) Solution: sign digitally on Na, NB . The Needham-Schroeder Public-key Authentication Protocol in Refinea Specification: Ka: a pair of public and private key of Alice. {M}k: encrypt M by using K. M]x : sign digitally on M using K. 2.Bob sends to Alice :{NA,[NB]K}kA 3.Alice sends to Bob :{[NB]kA}KB 81 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 132, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_082.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_082.png", "page_index": 132, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:22+07:00" }, "raw_text": "Outline 1 Cryptography Overview 2 Classic Cryptography 3 Modern Cryptography 4 Key Channel 5 Perfect Enryption 6 Dolev-Yao Threat Model 7 Key Exchange Protocols 82 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 133, "chapter_num": 2, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_083.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_2/slide_083.png", "page_index": 133, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:25+07:00" }, "raw_text": "83 Faculty of Computer Science and Engineering, HCMUT @ 2023" }, { "page_index": 134, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_001.png", "page_index": 134, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:28+07:00" }, "raw_text": "CHAPTER 3: DENTIEICATION AND AUTHENTICATION Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 135, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_002.png", "page_index": 135, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:31+07:00" }, "raw_text": "Outline 1 Introduction 2 Methods for ldentification 3 Methods for Authentication 4 Protocols for Authentication 2 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 136, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_003.png", "page_index": 136, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:34+07:00" }, "raw_text": "Introduction - Steps in Access Control Identification User provides his/her identity Authentication: The user proves that the identity is valid Authorization: What privileges and authorizations the user has 3 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 137, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_004.png", "page_index": 137, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:37+07:00" }, "raw_text": "Introduction - Identification The user provides his/her identity for the system. Purposes: to find out whether the user exists and what privileges the user has. an 2 4 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 138, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_005.png", "page_index": 138, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:41+07:00" }, "raw_text": "Introduction - Authentication The user provides evidence to prove that the identity is right and suitable for user. Purposes To prove the identity is valid and appropriate for the user. To decide whether the user is allowed to access the resources of the system or not. Authenticate Installer requires that you type your password Name: Password: Details ? Cancel OK 5 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 139, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_006.png", "page_index": 139, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:44+07:00" }, "raw_text": "Outline 1 Introduction 2 Methods for ldentification 3 Methods for Authentication 4 Protocols for Authentication 6 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 140, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_007.png", "page_index": 140, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:47+07:00" }, "raw_text": "Methods for ldentification There are 2 methods for identification: The user input his/her identity by himself/herself. Use digitizing identities. biometric identity computer identity digital identity 7 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 141, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_008.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_008.png", "page_index": 141, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:50+07:00" }, "raw_text": "Methods for ldentification - Method 1 Method 1: The user input his/her identity by himself/herself. The most popular method nowadays E.g.: username, account number,... The first step when a hacker wants to intrude into a system is collecting the list of valid users of this system. 8 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 142, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_009.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_009.png", "page_index": 142, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:54+07:00" }, "raw_text": "Methods for ldentification - Method 2 Method 2: Use digitizing identities Biometric identity Facial recognition Iris scanners Hand geometry Fingerprint 9 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 143, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_010.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_010.png", "page_index": 143, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:12:58+07:00" }, "raw_text": "Methods for ldentification - Method 2 Method 2: Use digitizing identities Computer identity Computer name MAC address IP address 10 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 144, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_011.png", "page_index": 144, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:01+07:00" }, "raw_text": "Methods for ldentification - Method 2 Method 2: Use digitizing identities Digital identity Digital certificate Smart card MOTOROLA SMARTCARD 11 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 145, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_012.png", "page_index": 145, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:04+07:00" }, "raw_text": "Outline 1 Introduction 2 Methods for ldentification 3 Methods for Authentication 4 Protocols for Authentication 12 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 146, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_013.png", "page_index": 146, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:08+07:00" }, "raw_text": "Methods for Authentication Based on any combination of the following Something you know Something you have Something you are A good authentication method should not be guessed easily or faked 13 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 147, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_014.png", "page_index": 147, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:12+07:00" }, "raw_text": "Something you know E.g.: Password PIN (Personal Identification Number) Advantage: Low cost Disadvantage : The security degree 14 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 148, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_015.png", "page_index": 148, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:17+07:00" }, "raw_text": "Something you know Password Issues: STRONG PASSWORD Password strength is not strong enough Checklist > Password policy Easy for user to remember but difficult for V Make it long (15+ characters) others to guess V Mix it up (letters - capital & lowercase numbers, and symbols) Avoid Common Keyboard Paths (don't use Social engineering V 1234 or asdfg) Keystroke logging software and similar Avoid Simple Substitutions (don't use Spyware SL33P) Password cracking tools Don't Use Dictionary Words (don't use words like cat or tinycat) @lightboxsystems 15 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 149, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_016.png", "page_index": 149, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:21+07:00" }, "raw_text": "Something you have Smart card (or other hardware tokens): smartcard is a credit card sized device includes a small amount of memory and computing resources store cryptographic keys or other secrets perhaps even do some computations on the card atheha srnart 16 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 150, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_017.png", "page_index": 150, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:26+07:00" }, "raw_text": "Something you are Biometrics: \"you are your key' Facial recognition Iris scanners Hand geometry Fingerprint An ideal biometric: Universal Distinguishing Permanent Collectable Reliable, robust, and user-friendly 17 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 151, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_018.png", "page_index": 151, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:29+07:00" }, "raw_text": "Something you are Two phases in a biometric system: Enrollment phase: subjects have their biometric information gathered and entered into a database Recognition phase: the biometric detection system is used in practice to determine whether (for the authentication problem) to authenticate the user or not. 18 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 152, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_019.png", "page_index": 152, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:33+07:00" }, "raw_text": "Something you are Types of Errors: False accept rate (FAR) Alice Bob 19 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 153, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_020.png", "page_index": 153, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:36+07:00" }, "raw_text": "Something you are Types of Errors: False Reject Rate (FRR Not Alice C Alice 20 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 154, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_021.png", "page_index": 154, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:44+07:00" }, "raw_text": "Something you are Isolated schemes Types of Errors: EER (%) Equal Error Rate: FAR = FRR Geometry 0.20 PalmPrint 0.29 FingerPrint 0.17 Advantage: Vein 1.79 Difficult, although not impossible, to Score Fusion Level EER (%) forge Geometry+Palm 0.09 Disadvantage: Geometry+Palm+Finger 0.04 Cost: biometric devices Geometry+Palm+Finger+Vein <0.01 software Decision Fusion Level programmers, server and other relative FAR (%) FRR (%) equipment Geometry+Palm 0.20 <0.01 Geometry+Palm+Finger <0.01 <0.01 Geometry+Palm+Finger+Vein <0.01 <0.01 Ferrer, Miguel A., et al. \"Combining hand biometric traits for personal identification.\" 43rd Annual 2009 International Carnahan Conference on Security Techno/ogy.lEEE,2009. 21 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 155, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_022.png", "page_index": 155, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:47+07:00" }, "raw_text": "Methods for Authentication Balancing Security and Cost In security: Biometrics > Smartcard > Password In cost: Password < Smartcard < Biometrics Multi-Factor Authentication: homework 22 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 156, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_023.png", "page_index": 156, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:50+07:00" }, "raw_text": "Outline 1 Introduction 2 Methods for ldentification 3 Methods for Authentication 4 Protocols for Authentication 23 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 157, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_024.png", "page_index": 157, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:53+07:00" }, "raw_text": "Protocols for Authentication Simple security authentication protocol Challenge-response authentication protocol Symmetric keys authentication protocol Public keys authentication protocol Kerberos authentication protocol 24 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 158, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_025.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_025.png", "page_index": 158, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:13:57+07:00" }, "raw_text": "Simple security authentication protocol - introduction Alice must prove to Bob that she's Alice. Alice and Bob are communicating over a network Bob must also prove his identity to Alice. Malice: a bad guy (or attacker, adversary, etc) I'm Alice Prove it Bob Alice Malice 25 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 159, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_026.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_026.png", "page_index": 159, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:01+07:00" }, "raw_text": "Simple security authentication protocol Ce qog T l: \"1'm Alice 2: \"Prove it 3: \"My password is frank 26 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 160, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_027.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_027.png", "page_index": 160, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:04+07:00" }, "raw_text": "Simple security authentication protocol Alice's password is sent in the clear. Milie qog l: \"I'm Alice 2: \"Prove it\" 3: \"My password is frank 27 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 161, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_028.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_028.png", "page_index": 161, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:07+07:00" }, "raw_text": "Simple security authentication protocol with hashing Pa: Alice's password hO: hash function Aille qog l: I'm Alice 2: \"Prove it\" 3: h(Pp) 28 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 162, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_029.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_029.png", "page_index": 162, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:10+07:00" }, "raw_text": "Simple security authentication protocol with hashing It's subject to a replay attack Milie qog l: \"I'm Alice 2: \"Prove it\" 3: h(P) 29 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 163, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_030.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_030.png", "page_index": 163, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:14+07:00" }, "raw_text": "Protocols for Authentication Simple security authentication protocols Challenge-response authentication protocol Symmetric keys authentication protocol Public keys authentication protocol Kerberos authentication protocol 30 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 164, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_031.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_031.png", "page_index": 164, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:17+07:00" }, "raw_text": "Challenge-response authentication protocol N: nonce (number used once Ailie qog l: 1'm Alice 2:N 3: h(Pa,N) Problem: Bob must know Alice's password. 31 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 165, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_032.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_032.png", "page_index": 165, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:20+07:00" }, "raw_text": "Protocols for Authentication Simple security authentication protocols Challenge-response authentication protocol Symmetric keys authentication protocol Public keys authentication protocol Kerberos authentication protocol 32 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 166, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_033.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_033.png", "page_index": 166, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:23+07:00" }, "raw_text": "Symmetric keys authentication protocol C: ciphertext M: plaintext Ka: key of Alice C ={M}k 33 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 167, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_034.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_034.png", "page_index": 167, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:27+07:00" }, "raw_text": "Symmetric keys authentication protocol Aille qog l: \"1'm Alice 2:N 3:{N} KAB Problem: Only Bob can authenticate Alice 34 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 168, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_035.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_035.png", "page_index": 168, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:31+07:00" }, "raw_text": "Symmetric keys authentication protocol Mutual authentication using symmetric keys qog l: 1'm Alice 2:{N}KAB 3:{N} KAB Problem: The third message in this protocol is simply a replay of the second and consequently it proves nothing about the sender, be it Alice or Malice 35 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 169, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_036.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_036.png", "page_index": 169, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:34+07:00" }, "raw_text": "Symmetric keys authentication protocol Mutual authentication using symmetric keys - fix 1 Aile qog 1: \"I'm Alice\", N 2:NB,{NA}KAB 3:{Np}KAB 36 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 170, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_037.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_037.png", "page_index": 170, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:38+07:00" }, "raw_text": "Symmetric keys authentication protocol Mutual authentication using symmetric keys - fix 1 - Attack qog l.1:\"I'm Alice\",N 1.2: NB,{N}KAB 2.1: \"I'm Alice\", N 2.2: Nc,{Np}KAB 1.3:{Np}KAB 37 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 171, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_038.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_038.png", "page_index": 171, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:41+07:00" }, "raw_text": "Symmetric keys authentication protocol Mutual authentication using symmetric keys - Fix 2 qog l:\"I'm Alice\"N 2: NB,{Bob,NA}KAB 3:{Alice,Np}KAB 38 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 172, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_039.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_039.png", "page_index": 172, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:44+07:00" }, "raw_text": "Protocols for Authentication Simple security authentication protocols Challenge-response authentication protocol Symmetric keys authentication protocol Public keys authentication protocol Kerberos authentication protocol 39 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 173, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_040.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_040.png", "page_index": 173, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:47+07:00" }, "raw_text": "Public Keys authentication protocol C: ciphertext M: plaintext Ka: public & private keys of Alice C ={M}ka: Encrypting a message M with Alice's public key M = [C]ka: decrypt C with Alice's private key S = [M]ka: sign digitally on M Alice's private key [{M}ka]ka= M {[M]ka}kA= M 40 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 174, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_041.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_041.png", "page_index": 174, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:51+07:00" }, "raw_text": "Public Keys authentication protocol Authentication with Public Key Encryption Aille qog l: \"I'm Alice 2:{NA}KA 3: NA 41 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 175, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_042.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_042.png", "page_index": 175, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:54+07:00" }, "raw_text": "Public Keys authentication protocol Authentication via Digital Signature qog l: \"I'm Alice 2: NA 3: [NA]KA 42 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 176, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_043.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_043.png", "page_index": 176, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:14:57+07:00" }, "raw_text": "Protocols for Authentication Simple security authentication protocols Challenge-response authentication protocol Symmetric keys authentication protocol Public keys authentication protocol Kerberos authentication protocol 43 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 177, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_044.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_044.png", "page_index": 177, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:01+07:00" }, "raw_text": "Kerberos authentication protocol Real-world security protocols KERBEROS Using symmetric key cryptography is designed for a smaller scale, such as on a local area network (LAN) or within a corporation Trusted third party: Key Distribution Center - KDC System with N users: Public key: 2N keys Symmetric key: N2 keys Kerberos: N keys 44 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 178, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_045.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_045.png", "page_index": 178, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:06+07:00" }, "raw_text": "Kerberos authentication protocol Key Distribution Center KDC KDC has a master key Kkoc, known only to the KDC KDC issuesTicket-Granting Ticket (TGT) TGT contains a session key, the user ID of the user to whom the TGT is issued, and an expiration time TGT can only be read by the KDC KDC K KDO Alice Malice Bob KA KM KB 45 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 179, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_046.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_046.png", "page_index": 179, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:09+07:00" }, "raw_text": "Kerberos authentication protocol Login Alice wants TGT Passwora {SA, TGTA}KA Alice KDC Ka: shared key of Alice and KDC,KA = h(password) Sa: Session key TGTA ={Alice,SA}KKDc 46 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 180, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_047.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_047.png", "page_index": 180, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:14+07:00" }, "raw_text": "Kerberos authentication protocol {timestamp}sa 2. KDC sends to Alice:{Bob,KAB t ticket-to- Aille qog Bob} sA ticket-to-Bob: {Alice, Ka}kB 1 3. Alice sends Bob: ticket-to-Bob 2 {timestamp}kAB 3 4. Bob sends Alice: {timestamp + 1}kaB 4 47 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 181, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_048.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_048.png", "page_index": 181, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:17+07:00" }, "raw_text": "Kerberos authentication protocol Minor flaw in Kerberos: KDC sends Alice:{SA, TGTA}kA where TGTA ={Alice, SA}kkDc > KDC sends to Alice:{SA}kA, TGTA > KDC does not need to know who is making the REQUEST 48 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 182, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_049.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_049.png", "page_index": 182, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:21+07:00" }, "raw_text": "Homework Secure Shell - SSH Secure Socket Layer - SSL IPSec Wired Equivalent Privacy - WEP 49 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 183, "chapter_num": 3, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_050.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_3/slide_050.png", "page_index": 183, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:23+07:00" }, "raw_text": "50 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 184, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_001.png", "page_index": 184, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:26+07:00" }, "raw_text": "CHAPTER 4: DISCRETIONARY ACCESS CONTROLS Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 185, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_002.png", "page_index": 185, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:30+07:00" }, "raw_text": "Outline 1 Introduction to DAC 2 Security Models 3 Proposed Models for DAC 4 SQL for Data Control 5 Advantages & Disadvantages 2 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 186, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_003.png", "page_index": 186, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:33+07:00" }, "raw_text": "Introduction to DAC (1) DAC: Discretionary Access Control. User can protect what they own. The owner is given all privileges on their own data. The owner can define the type of access (read/write/execute/...) and grant access to others The typical method of enforcing DAC in a database system is based on granting and revoking privileges. 3 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 187, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_004.png", "page_index": 187, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:37+07:00" }, "raw_text": "Introduction to DAC (2) Types of Discretionary Privileges The account/system level: privileges are independent of the objects in the database system, granted to users by administrators. CREATE/ALTER/DROP TABLE, CREATE/ALTER/DROP VIEW CREATE /ALTER/DROP USER CREATE SCHEMA. CREATE TRIGGER MODIFY,SELECT The object level: privileges are used to control access to each individual object in the database system. Objects: relations, views, functions/procedures,... Types of aCCeSS: SELECT, INSERT, UPDATE, DELETE, REFERENCE,. : Faculty of Computer Science and Engineering, HCMUT - 2023 4" }, { "page_index": 188, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_005.png", "page_index": 188, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:41+07:00" }, "raw_text": "Outline 1 Introduction to DAC 2 Security Models 3 Proposed Models for DAC 4 SQL for Data Control 5 Advantages & Disadvantages 5 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 189, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_006.png", "page_index": 189, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:46+07:00" }, "raw_text": "Security Models Provide a semantically rich representation allowing functional and structural properties of the security system to be described. Give a high-level definition l of the protection requirements and system policies. Be a software-independent, concept model. Enable to demonstrate that a security system satisfies some properties by proving that the abstract model satisfies those properties. Types of Security Models: Discretionary Models. Non-discretionary Models (or Mandatory Models) Faculty of Computer Science and Engineering, HCMUT - 2023 6" }, { "page_index": 190, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_007.png", "page_index": 190, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:49+07:00" }, "raw_text": "Outline 1 Introduction to DAC 2 Security Models 3 Proposed Models for DAC 4 SQL for Data Control 5 Advantages & Disadvantages 7 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 191, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_008.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_008.png", "page_index": 191, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:52+07:00" }, "raw_text": "Discretionary Security Models Govern the access of a user to the information on the basic of: The user's identity Rules that specify the types of access the user is allowed for each object. Authorization module: check the request of a user to access an object Models for DAC: Access Matrix mode Take-Grant model Action-Entity mode Wood et al. model 8 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 192, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_009.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_009.png", "page_index": 192, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:15:56+07:00" }, "raw_text": "Access Matrix Model (1) Be used for both operating system level and database level. Be originally formulated by Lampson (1971) and extended by Graham and Denning (1972) 1976, Harrison and his colleagues Access Matrix Model presented systematically 9 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 193, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_010.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_010.png", "page_index": 193, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:00+07:00" }, "raw_text": "Access Matrix Model (2) Authorization state: Q (S,0,A) S (Subjects): the set of subjects are active entities using system resources. E.g.: users, user groups, processes,... O (Objects): the set of objects are entities needing to be protected. They include passive entities (system resources) and active entities. E.g. (at Os level): files, memories, segments, processes,... E.g. (at DB level): databases, relations, attributes, records, fields,... A (Access matrix): each entry A[s,o] contains the access modes for which subject s is authorized on object o. 10 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 194, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_011.png", "page_index": 194, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:07+07:00" }, "raw_text": "Access Matrix Model (3) Possible conditions For DBs: A[s,o] includes conditions that must be satisfied in order r for s to Data-dependent: constraints on the value of exercise the access modes. the accessed data. E.g.: read only employees whose salary is < 1000. 01 0i Time-dependent: constraints on the time an access can take place S1A[s1,0[] A[s,0;] A[s1,0m] E.g: can only read between 8:00am and 5:00pm. Context-dependent: constraints on combinations of accessed data. E.g.: cannot access 2 fields \"name\" & \"salary\" together. SjA[s,0[] A[s,0;] A[s;,0m] History-dependent: constraints dependent on previously performed accesses. E.g.: A subject may read \"salary\" only if he has not previously read \"name\". Sp A[sn,01] A[sn,0;] A[sn,0m] 11 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 195, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_012.png", "page_index": 195, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:11+07:00" }, "raw_text": "Access Matrix Model (4 Asset 1 Asset 2 File Device read, write Role 1 read write execute execute, own read, write Role 2 read execute, own 12 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 196, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_013.png", "page_index": 196, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:14+07:00" }, "raw_text": "Access Matrix Model (5) Model implementation S ->{(0,A)}: Capability List (CL Alice >{(file X, {read, delete}), (file Y, {update})} 0 -> {(S,A)}: Access Control List (ACL) -> Each entry in the list specifies a subject and operation(s): File X {(Alice,{read, delete}), (Bob, {read})} Comparison CL: compute a set of subjects granted access on a given object -> all lists must be gone through. ACL: find all objects a subject can access. 13 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 197, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_014.png", "page_index": 197, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:23+07:00" }, "raw_text": "Access Matrix Model (6) F1 Own,R,W a) s O A[s,o] (b) F2 E,R+ P1 F1 Own,R.W Mi R,W.E P1 F2 E,R+ P2 Ctrl P1 Mi R,W,E P1 P1 P2 Ctrl P2 F1 R,W P2 F1 R,W P3 Mi W P2 M1 W P3 F1 R.W.E Ps F2 F1 Own,E R,W.E+ M2 F2 P3 W.E Own,E (a) M2 W.E P1 Own,R,W (b) CL P2 R,W P3 R,W,E (c) F1 F2 P1 E, R+ P2 M1 Own,E M2 P1 R,W,E P1 P2 W P2 P3 P3 W.E (c) ACL P1 Ctrl Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 198, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_015.png", "page_index": 198, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:27+07:00" }, "raw_text": "Take-Grant Model (1) Proposed by Jones et al. in 1976. Use a graph structure to represent the authorizations between: Subject and object. Subject and subject. Object and object. Can be represented by its adjacency matrix. Be used to protect OS and database environments. 15 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 199, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_016.png", "page_index": 199, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:31+07:00" }, "raw_text": "Take-Grant Model (2) Authorization state: G = (S, 0,E) V = S u 0:the setofvertexes,S n 0 = Q E: the set of labelled arcs Subjects (active objects): users, processes, and programs acting on behalf of users. Objects (passive objects): Os resources (files, memory segments,...) and database resources (databases, relationships, records, fields) Symbols Filled-in circle: subject White circle: object. Barred circle: generic node (either a subject or an object) 16 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 200, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_017.png", "page_index": 200, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:36+07:00" }, "raw_text": "Take-Grant Model - Access Modes Read (x -> y): Subject (or object) x can read the information contained in the object y. W Write (x -> y): Subject (or object) x can write into the object y. t Take (x -> y): Subject x is enabled to take any rights held by y on other objects or subjects in the system. g Grant (x - y): Subject x can grant to y any of the rights held by x on other objects or subjects in the system. 17 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 201, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_018.png", "page_index": 201, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:39+07:00" }, "raw_text": "Take-Grant Model - Operations (1) take(d,s,x,y): the subject s takes the right d on the object/subject y from the object/subject x Conditions ??? + S S X X take(d,s,x,y) d d d 18 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 202, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_019.png", "page_index": 202, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:43+07:00" }, "raw_text": "Take-Grant Model - Operations (2) grant(d,s,x,y): the subject s grants the right d on the object/subject y to the object/subject x Conditions ??? g g S S x X grant(d,s,x,y) d d d 19 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 203, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_020.png", "page_index": 203, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:48+07:00" }, "raw_text": "Take-Grant Model - Operations (3)) {subjectp, object,} (s,x): the subject s creates subject/object x and is create granted the set of rights p on x. create subjectp (s,x p S S X create object, (s,x) p S S x 20 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 204, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_021.png", "page_index": 204, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:51+07:00" }, "raw_text": "Take-Grant Model - Operations (4) removep (s,x): the subject s is revoked the p rights it has been granted on subject/object x e removep (s,x) e-p S x S x 21 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 205, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_022.png", "page_index": 205, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:16:55+07:00" }, "raw_text": "Take-Grant Model - Types of Rights Inert rights : (read, write) do not modify the system authorization/protection state. Transport rights (take, grant) modify the system authorization/protection state Disadvantages? 22 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 206, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_023.png", "page_index": 206, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:01+07:00" }, "raw_text": "Take-Grant Model - Disadvantages Non-selectivity of administrative rights All authorizations of S owning a 'GRANT' authorization can be transferred. All authorizations of O/S on which a 'TAKE' right is held can be taken. No control on propagation of authorizations: A subject S may lose control on the subsequent transfers of the rights it has granted to an object/subject. Non-locality: S owning the grant privilege on O can give any of its privileges to O, thus augmenting the domain of O (the set of authorizations associated to O). Reversibility of the privileges flow: if the transport rights can be transferred (directly or indirectly) from x to y, a possible opposite flow from y to x cannot be prevented. 23 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 207, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_024.png", "page_index": 207, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:06+07:00" }, "raw_text": "Take-Grant Model - Example (1) A B S T t g t D g M C g g N g g g g g g g E g 0 24 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 208, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_025.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_025.png", "page_index": 208, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:09+07:00" }, "raw_text": "Take-Grant Model - Example (2) Can C, D, E read A? Can M, N, O read A? Can C, D, E read B? Can S read B? Can T read A? 25 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 209, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_026.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_026.png", "page_index": 209, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:12+07:00" }, "raw_text": "Other Models Acten (Action-Entity) model Wood et al.model Read Database Security, S. Castano, M. F Fugini, G. Martella, and P. Samarati (1995), ACM Press & Addison-Wesley, ISBN 0-201-59375-0. 26 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 210, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_027.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_027.png", "page_index": 210, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:16+07:00" }, "raw_text": "Outline 1 Introduction to DAC 2 Security Models 3 Proposed Models for DAC 4 SQL for Data Control 5 Advantages & Disadvantages 27 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 211, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_028.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_028.png", "page_index": 211, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:19+07:00" }, "raw_text": "SQL for Data Control (1) Commands: GRANT. REVOKE Based on. Users. Database objects. Privileges on a relation R: SELECT: read data from R Modify (INSERT, UPDATE, DELETE): modify data of R. INSERT and UPDATE can be granted on some attributes of R (instead of an entire row) REFERENCE: reference to R (foreign key). REFERENCE : can also be granted on some attributes of R 28 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 212, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_029.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_029.png", "page_index": 212, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:24+07:00" }, "raw_text": "SQL for Data Control (2) GRANT: pass privileges on database objects to other users. GRANT ON TO REVOKE: take back r (cancel) privileges on database objects from other users. REVOKE ON FROM 29 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 213, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_030.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_030.png", "page_index": 213, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:27+07:00" }, "raw_text": "SQL for Data Control (3 Propagation of privileges using the GRANT OPTION Whenever the owner A of a relation R grants a privilege on R to another account B, this privilege can be given to B with or without the GRANT OPTION. If the GRANT OPTION is given, this means that B can also grant that privilege on R to other accounts with or without GRANT OPTION. The owner A does not know about the propagation of that privilege on R to other users. 30 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 214, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_031.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_031.png", "page_index": 214, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:31+07:00" }, "raw_text": "SQL for Data Control (4) (a) D (b) 31 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 215, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_032.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_032.png", "page_index": 215, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:35+07:00" }, "raw_text": "SQL for Data Control (5) A1 Limit Grant with horizontal horizontal propagation i=2 propagation A2 Grant Grant A3 A4 i=2 32 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 216, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_033.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_033.png", "page_index": 216, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:40+07:00" }, "raw_text": "SQL for Data Control (6) A1 Limit vertical Grant with vertical propagation propagation j=2 A2 1 I Grant Grant with j=1 withj=0 A3 A4 Grant Grant with j=0 withj=0 A5 A6 j=2 33 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 217, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_034.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_034.png", "page_index": 217, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:44+07:00" }, "raw_text": "SQL for Data Control (7) DAC with views (virtual relations) If the owner A of a relation R wants another account B to be able to retrieve only fields of R, then A can create a view V of R that includes only those some attributes and then grant SELECT on V to B. The same applies to limit B to retrieve only certain tuples of R: a view V' can be created by defining a query that selects only those tuples from R and then grant SELECT on V\"to B. 34 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 218, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_035.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_035.png", "page_index": 218, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:48+07:00" }, "raw_text": "SQL for Data Control - An Example (1) Suppose that the DBA creates 4 accounts: A1, A2, A3, A4. For only A1 to be able to create base relations, DBA must issue the following GRANT command in SQL: GRANT TO A1; CREATETAB DBA creates schema EXAMPLE and grants privileges on it to A1: AUTHORIZATION A1; CREATE SCHEMA FXAMPUE 35 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 219, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_036.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_036.png", "page_index": 219, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:52+07:00" }, "raw_text": "A1 can create tables under the schema EXAMPLE A1 creates the 2 relations EMPLOYEE and DEPARTMENT so that A1 is the owner of these relations and hence have all the relation privileges on each of them. EMPLOYEE Name Ssn Bdate Address Sex Salary Dno DEPARTMENT Dnumber Dname Mgr_ssn 36 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 220, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_037.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_037.png", "page_index": 220, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:17:58+07:00" }, "raw_text": "SQL for Data Control - An Example (3) A1 wants to grant A2 the privileges to insert and delete tuples in both of these relations but does not t A2 to be able to propagate Want these privileges to other accounts: GRANT INSERT, DELETE ON EMPLOYEE, TO A2 ; DE'PAR'TMEN'I A1 wants to allow A3 to retrieve information from either of the two tables and also to be able to propagate the SELECT privilege to other accounts. GRANT SELECT ON EMPLOYEE, DEPAR'TMENI TO A3 WITH GRANT OPTION: 37 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 221, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_038.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_038.png", "page_index": 221, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:02+07:00" }, "raw_text": "SQL for Data Control - An Example (4) A3 can grant the SELECT privilege on the EMPLOYEE relation to A4: ON TO A4 ; GRANT SELECT EMPLOYEE Notice that A4 cannnot propagate the SELECT privilege because GRANT OPTION was not given to A4. 38 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 222, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_039.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_039.png", "page_index": 222, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:06+07:00" }, "raw_text": "SQL for Data Control - An Example (5) A1 decides to revoke the SELECT privilege on EMPLOYEE from A3: REVOKE SELECT ON EMPLQYEE FROM A3 i The DBMS must automatically revoke the SELECT privilege now on EMPLOYEE from A4, because A3 granted that privilege to A4 and A3 does not have the privilege any more. 39 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 223, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_040.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_040.png", "page_index": 223, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:12+07:00" }, "raw_text": "SQL for Data Control - An Example (6) A1 wants to give back A3 a limited capability tO SELECT from the EMPLOYEE relation and allow A3 to be able to propagate the privilege. The limitation is to retrieve only the NAME, BDATE, and ADDRESS attributes and only for the tuples with DNO=5 A1 then creates the view: CREATE VIEW A3 EMPLOYEE AS SELECT NAME. BDATE. ADDRESS DNO 5 i FROM EMPLOYEE WHERE to A3 as follows: GRANT SELECT ON A3 EMPLOYEE TO A3 WITH GRANT OPTION: 40 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 224, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_041.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_041.png", "page_index": 224, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:16+07:00" }, "raw_text": "SQL for Data Control - An Example (7) A1 wants to allow A4 to update only the SALARY attribute of EMPLOYEE GRANT UPDATE ON EMPLOYEE (SALARY) TO A4; The UPDATE and INSERT r privileges can specify particular attributes that may be updated or inserted in a relation. Other privileges (SELECT,DELETE) are not attribute specific 41 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 225, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_042.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_042.png", "page_index": 225, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:19+07:00" }, "raw_text": "Outline 1 Introduction to DAC 2 Security Models 3 Proposed Models for DAC 4 SQL for Data Control 5 Advantages & Disadvantages 42 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 226, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_043.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_043.png", "page_index": 226, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:24+07:00" }, "raw_text": "Advantages & Disadvantages Advantages Govern the access to the information on the basic of discretionary protection policies -> flexible. Suitable for various types of systems and applications. Be widely used in a variety of implementations, especially in the commercial and industrial environments. Disadvantages Allow information from an object which can be read by a subject to be written to any other objects. E.g.: Bob is denied access to file A, so he asks cohort Alice to copy A to B that he can access. Suppose the users are trusted not to do this deliberately, it is still possible for Trojan Horses to copy information from one object to another. 43 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 227, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_044.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_044.png", "page_index": 227, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:28+07:00" }, "raw_text": "e Example (1) Trojan Horse r: Alice; w:Alice File A User Alice r: Bob; w:Bob User Bob File B User Bob cannot read the file A! 44 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 228, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_045.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_045.png", "page_index": 228, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:31+07:00" }, "raw_text": "Trojan Horse Example (2) r: Alice; w:Alice File A User Alice Pgm X r: Bob; w:Bob,Alice TH User Bob File B 45 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 229, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_046.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_046.png", "page_index": 229, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:36+07:00" }, "raw_text": "Trojan Horse Example (3) r: Alice; w:Alice File A User Alice Read Pgm X r: Bob; w:Bob,Alice TH User Bob File B Write User Bob can read contents of file A copied to file B 46 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 230, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_047.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_047.png", "page_index": 230, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:39+07:00" }, "raw_text": "Outline 1 Introduction to DAC 2 Security Models 3 Proposed Models for DAC 4 SQL for Data Control 5 Advantages & Disadvantages 47 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 231, "chapter_num": 4, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_048.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_4/slide_048.png", "page_index": 231, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:42+07:00" }, "raw_text": "48 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 232, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_001.png", "page_index": 232, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:44+07:00" }, "raw_text": "CHAPTER 5: MANDATORY ACCESS CONTROLS Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 233, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_002.png", "page_index": 233, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:47+07:00" }, "raw_text": "Outline 1 Introduction to MAC 2 Proposed Models for MAC 3 Case study: Oracle Label Security (OLS) 2 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 234, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_003.png", "page_index": 234, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:51+07:00" }, "raw_text": "Introduction to MAC MAC: Mandatory Access Control MAC is applied to large amounts of information requiring strong protect in environments where both the system data and users can be classified clearly MAC is a mechanism for enforcing multiple level of security. 3 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 235, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_004.png", "page_index": 235, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:54+07:00" }, "raw_text": "Introduction to MAC Introduction to MAC Security Classes MAC Properties Multilevel Relation Pros and Cons of MAO 4 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 236, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_005.png", "page_index": 236, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:18:58+07:00" }, "raw_text": "Security Classes Each subject/object is assigned a security class corresponding to its role in the system. Security class comprise : A classification level A set of categories A subject classification reflects its degree of trust and the application area where it operates. A object classification reflects the sensitivity of the information and the application area to which the information refers. 5 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 237, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_006.png", "page_index": 237, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:01+07:00" }, "raw_text": "Security Classes - Classification Levels Typical classification levels are: Top secret (TS) Secret (S) Confidential (C) Unclassified (U) Where TS is the highest level and U is the lowest: TS > S Z C > U Faculty of Computer Science and Engineering, HCMUT - 2023 6" }, { "page_index": 238, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_007.png", "page_index": 238, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:06+07:00" }, "raw_text": "Security Classes - Categories Categories (application tend to reflect the areas) system areas or departments of the organization. Examples: Military environments: Nuclear - NATO - Intelligence Industrial environments: Production - Personnel - Engineering - Administration. Production - Sales - Delivery 7 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 239, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_008.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_008.png", "page_index": 239, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:09+07:00" }, "raw_text": "Security Classes - Partial Order A security class is defined as follow: SC = (A,C) A: classification leve C: category A relation of partial order on the security classes: SC < SC' No read-up Star property (or property): A subject S is not allowed to write an object O unless class(S) class(O) > No write-down These restrictions together that there is no direct flow of ensure 1 information from high secure objects to low ones!!! 10 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 242, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_011.png", "page_index": 242, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:21+07:00" }, "raw_text": "MAC Properties - Why Star Property? (1) r: Alice; w:Alice File A User Alice Pgm X r: Bob; w:Bob,Alice TH User Bob File B 11 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 243, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_012.png", "page_index": 243, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:24+07:00" }, "raw_text": "MAC Properties - Why Star Property? (2) r: Alice; w:Alice File A User Alice Read Pgm X r: Bob; w:Bob, Alice TH User Bob File B Write User Bob can read contents of file A copied to file B 12 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 244, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_013.png", "page_index": 244, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:28+07:00" }, "raw_text": "MAC Properties - Why Star Property? (3) r:Alice:w:Alice File A (Secret) User Alice rBobw:Bob.Alice Pgm X File B THI * (Unclass) Level(A)=Secret Level (B) = Unclass Star propeity 13 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 245, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_014.png", "page_index": 245, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:33+07:00" }, "raw_text": "MAC Properties - Star Property Problem Problem: Star property prevents a subject at high secure class from sending a valid message to a subject at low secure class. Solutions. Downgrade temporarily the security class of the subject when sending the valid messages Place trusted subjects in the subject list which is not enforced by Star Property 14 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 246, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_015.png", "page_index": 246, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:36+07:00" }, "raw_text": "Introduction to MAC Introduction to MAC Security Classes MAC Properties Multilevel Relation Pros and Cons of MAO 15 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 247, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_016.png", "page_index": 247, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:41+07:00" }, "raw_text": "Multilevel Relation Multilevel relation: MAC + relational database model. > Deal with multilevel data. Data objects: attributes, tuples. A multilevel relation is represented by a schema: R(A1,C1,Az,C2;.,An,Cn,TC Each data attribute A: is associated with a classification attribute C: - Each tuple is associated with a tuple classification attribute TC > TC is equal to the highest of all attribute classification values. The apparent key of a multilevel relation is the set of attributes that would have formed the primary key in a regular (single-level) relation. 16 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 248, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_017.png", "page_index": 248, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:46+07:00" }, "raw_text": "Multilevel Relation - Example (1 Subjects with different classes may retrieve data from a multilevel relation but will see different versions that data. EMPLOYEE S > C > U Name Salary JobPerformance TC Smith U 40000 C Fair S S Brown C 80000 S Good C S 17 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 249, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_018.png", "page_index": 249, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:52+07:00" }, "raw_text": "Multilevel Relation - Example (2) SELECT * FROM EMPLOYEE; EMPLOYEE Name Salary JobPerformance TC Smith U 40000 C Fair S S Brown C 80000 s Good C S A user with security level S: Smith U 40000 C Fair S S Brown C 80000 S Good C S 18 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 250, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_019.png", "page_index": 250, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:19:58+07:00" }, "raw_text": "Multilevel Relation - Example (3) SELECT * FROM EMPLOYEE; EMPLOYEE Name Salary JobPerformance TC Smith U 40000 C Fair s S Brown C 80000 S Good C S A user with security level C: Smith U 40000 C Null C C Brown C Null C Good C C 19 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 251, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_020.png", "page_index": 251, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:06+07:00" }, "raw_text": "Multilevel Relation - Example (4) SELECT * FROM EMPLOYEE: EMPLOYEE Name Salary JobPerformance TC Smith U 40000 C Fair S s Brown C 80000 S Good C S A user with security level U: Smith U Null U Null U U 20 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 252, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_021.png", "page_index": 252, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:09+07:00" }, "raw_text": "Multilevel Relation - Properties (1) Read and write operations Entity integrity Polyinstantiation. 21 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 253, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_022.png", "page_index": 253, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:12+07:00" }, "raw_text": "Read and write operations No Read-Up No Write-Down. > Basic properties of MAC 22 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 254, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_023.png", "page_index": 254, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:16+07:00" }, "raw_text": "Entity integrity: All attributes that are members of the apparent key must not be null and must have the same security classification within each individual tuple All the other attribute values in the tuple must have a security classification greater than or equal to that of the apparent key. > This constraint ensures that a user can see the key if the user is permitted to see any part of the tuple at all. 23 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 255, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_024.png", "page_index": 255, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:19+07:00" }, "raw_text": "Multilevel Relation - Properties (4) Other integrity rules: null integrity and interinstance integrity 24 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 256, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_025.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_025.png", "page_index": 256, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:23+07:00" }, "raw_text": "Polyinstantiation: where several tuples can have the same apparent key value but have different attribute values for users at different classification levels. Entity Polyinstantiation arises whenever a subject inserts a new tuple that has the apparent key as of an existing but invisible tuple. Attribute Polyinstantiation arises whenever a subject updates what appears to be a null element in a tuple, but which actually hides data with a higher (or incomparable) access class. 25 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 257, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_026.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_026.png", "page_index": 257, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:30+07:00" }, "raw_text": "Name Salary JobPerformance TC Smith U 40000 C Fair S s Brown C 80000 S Good C s A user with security level C Smith U 40000 C Null C C Brown C Null C Good C C with security level C tries to update the value user JobPerformance of Smith to `Excellent': UPDATE EMPLOYEE SET JobPerformance = `Excellent Errors? WHERE Name = 'Smith'; 26 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 258, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_027.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_027.png", "page_index": 258, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:34+07:00" }, "raw_text": "Multilevel Relation - Properties (6) Name Salary JobPerformance TC Smith U 40000 C Fair s s Smith U 40000 C Excellent C C Brown C 80000 s Good C s 27 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 259, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_028.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_028.png", "page_index": 259, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:37+07:00" }, "raw_text": "Introduction to MAC Introduction to MAC Security Classes MAC Properties Multilevel Relation Pros and Cons of MAC 28 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 260, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_029.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_029.png", "page_index": 260, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:41+07:00" }, "raw_text": "Pros and Cons of MAC Pros Provide a high degree of protection - in a way of preventing any illegal flows of information. Suitable for military types of applications. Cons Not easy to apply: require a strict classification of subjects and objects into security levels. Applicable for very few environments. 29 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 261, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_030.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_030.png", "page_index": 261, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:44+07:00" }, "raw_text": "Outline 1 Introduction to MAC 2 Proposed Models for MAC 3 Case study: Oracle Label Security (OLS) 30 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 262, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_031.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_031.png", "page_index": 262, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:48+07:00" }, "raw_text": "Bell-LaPadula Model Developed by David Elliot Bell and Leonard J. La Padula in 1973. To standardize rules of multilevel security system i (MLS) of United States Department of Defense. Used for enforcing access control in government and military applications. An extension of the Access Matrix Model. Oriented to protection in OS environments. 31 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 263, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_032.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_032.png", "page_index": 263, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:51+07:00" }, "raw_text": "Bell-LaPadula Model - Access Modes Access modes executable by subjects on objects Read-only (generally referred to as 'read'). Append: to append information to an object without seeing its contents (writing without reading). Execute: to execute an object (program) Read-write: to write into an object; allow the subject to see the contents of the object (generally referred to as 'write'). 32 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 264, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_033.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_033.png", "page_index": 264, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:20:56+07:00" }, "raw_text": "Bell-LaPadula Model - System State The state of the system is described by the 3-tuple: (b,M,f) V = 1 b: the current access set > b = = : subject s has current access to object o in m mode. M[s, o]: the access matrix describes the access modes each subject can execute on each object. f: a level function associates each subject/object with its security level. f:0 Us->L f.(o): the security level of object o fs(s): the clearance of subject s fc(s): the current level of subject s fc(s) < fs(s) 33 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 265, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_034.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_034.png", "page_index": 265, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:00+07:00" }, "raw_text": "Bell-LaPadula Model - Simple Security Property Simple Security Property (No read up) A subject may have read or write access to an object only if the clearance of the subject dominates the security level of the object. A system state v = (b,M,f) satisfies the ss-property if, and only if: For each Ms,o {read} or{write} e M[s,o]= f,(o) fs(s 34 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 266, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_035.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_035.png", "page_index": 266, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:06+07:00" }, "raw_text": "Bell-LaPadula Model - Star Property Star Property (No read up and No write down) An untrusted subject may have append access to an object if the security level of the obiect dominates the security level of the subiect. An untrusted subject may have write access to an object only if the security level of the object is equal to the current security level of the subject. An untrusted subject may have read access to an object only if the security level of the object is dominated the current security level of the subject. A system state v = (b,M,f) s satisfies the *-property if, and only if: append e M[s,o]= fc(s) fo(o write E M[s,o]= fc(s) = fo(o) read E M[s,o]=fc(s) Z fo(o) 35 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 267, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_036.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_036.png", "page_index": 267, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:09+07:00" }, "raw_text": "Bell-LaPadula Model - Disadvantages Only enforces the confidentiality property, not the integrity property. No flexibility in changing access levels. Not prevent convert channel No support for polyinstantiation. Biba model: No read down, No write up 36 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 268, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_037.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_037.png", "page_index": 268, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:13+07:00" }, "raw_text": "Biba Model Proposed by Biba in 1977. Focus on protection of information integrity level. Each subject and each object is assigned a classification named integrity level. Typical integrity levels Crucial (C) Very Important (VI) Important (l) c > VI > 1 37 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 269, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_038.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_038.png", "page_index": 269, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:17+07:00" }, "raw_text": "Biba Model - Access Modes Modify: to write information in an object. Invoke: is right between 2 subjects allowing a these subjects to communicate Observe: to read information in an object. Execute: to execute an object (program) 38 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 270, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_039.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_039.png", "page_index": 270, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:21+07:00" }, "raw_text": "Biba Model - Integrity Policies (1) i(s) : integrity level of subject s i(o) : integrity level of object o Simple Integrity Property: a subject s can hold \"observe\" on an object o if and only if: i(s) i(o) > No read down Integrity Star Property: a subject s can hold \"modify\" an on object o if and only if: i(o) i(s) > No write up 39 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 271, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_040.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_040.png", "page_index": 271, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:24+07:00" }, "raw_text": "Biba Model - Integrity Policies (2)) Invocation Property: a subject can hold \"invoke\" to another subject if and only if: i(sz) < i(s1) 40 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 272, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_041.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_041.png", "page_index": 272, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:28+07:00" }, "raw_text": "Biba Model Biba model provides integrity but does not protection provide secrecy protection > It needs to be combined with other models. Lipner model is a combination of Bell-LaPadula model and Biba model. 41 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 273, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_042.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_042.png", "page_index": 273, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:31+07:00" }, "raw_text": "Outline 1 Introduction to MAC 2 Proposed Models for MAC 3 Case study: Oracle Label Security (OLS) 42 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 274, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_043.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_043.png", "page_index": 274, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:34+07:00" }, "raw_text": "OLS - Introduction (1) Simulates multilevel DB (MAC) Adds a field for each row to store the row's sensitive label. Access (or denied) IS comparing user's identity and security granted clearance label with row's sensitive label. 43 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 275, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_044.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_044.png", "page_index": 275, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:39+07:00" }, "raw_text": "SELECT * FROM order; Table ORDER Order Number Order Location Row Label 1 City Unclassified 2 VIP Secret User User session labe 3 City Unclassified 'Unclassified' 4 VIP Top Secret 4 VIP Top Secret 44 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 276, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_045.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_045.png", "page_index": 276, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:42+07:00" }, "raw_text": "OLS - Introduction (3) Four aspects of label-based access control: A user's label. A row's label. A user's policy privileges A table's policy enforcement options 45 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 277, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_046.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_046.png", "page_index": 277, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:44+07:00" }, "raw_text": "Label Components A label contains three components: A single level (sensitivity) ranking. Zero or more horizontal compartments. Zero or more hierarchical groups. 46 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 278, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_047.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_047.png", "page_index": 278, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:49+07:00" }, "raw_text": "Leve Levels represent a hierarchy of data sensitivity. The primary mechanism to exclude users who are not authorized to see or alter certain data. Example: Employee (1) Manager (2) Executive (3) Executive (3) Manager (2) Employee (1) 47 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 279, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_048.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_048.png", "page_index": 279, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:52+07:00" }, "raw_text": "Compartment The compartment component is not hierarchical. Compartments identify areas that describe the sensitivity of the labeled data, providing a finer level of granularity within a level. Example: FOOD, CLOTHS, ELECTRICAL GOODS 48 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 280, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_049.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_049.png", "page_index": 280, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:55+07:00" }, "raw_text": "Group The group component is hierarchical and is used to identify organizations owning or accessing the data. Country North Middle South 49 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 281, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_050.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_050.png", "page_index": 281, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:21:59+07:00" }, "raw_text": "Label Components (1) Group Group2 Group 3 Level3 Level2 Level1 50 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 282, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_051.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_051.png", "page_index": 282, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:03+07:00" }, "raw_text": "Label Components (2) Label syntax Example: Level: MGR:CS:NA MGR: Manager EXEC: Executive EXEC:CS.ES.FS:NA Compartment CS: Cloths ES: Electrical Goods FS: Food Group: NA: North 51 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 283, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_052.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_052.png", "page_index": 283, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:06+07:00" }, "raw_text": "User Access A user can only access data within the range of his or her own label authorizations : A user has. maximum and minimum levels a set of authorized compartments. a set of authorized groups. a specification of read-only access or read/write access for each compartment and group How to map user label and data label? 52 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 284, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_053.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_053.png", "page_index": 284, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:13+07:00" }, "raw_text": "Read Access Data User level=usermin group with Write User has all User label: EMP:FS:NA N N level? level? access? compartments? User label: EMP: : NA N N N N Data Data has groups? has compartments? No Access 54 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 286, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_055.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_055.png", "page_index": 286, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:25+07:00" }, "raw_text": "Project \"Order Management' (1) n 1 Position Branch located Region 1 1 has work at n n 1 n 1 manage Employee belong to Compartment n 1 1 Customer order Product n n n Orders include 55 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 287, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_056.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_056.png", "page_index": 287, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:29+07:00" }, "raw_text": "Project \"Order Management' (2) Country Group North Middle South Compartment Employee Food Cloths Electrical goods Food Cloths Electrical goods Manager Level All Executive 56 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 288, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_057.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_057.png", "page_index": 288, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:36+07:00" }, "raw_text": "Project \"Order Management' (3) Director Executives Executives Executives North Branches) (Middle Branches) South Branches Managers Managers Managers Managers Managers Managers Managers Managers Managers (Eletrical (Eletrical (Eletrical (Cosmetics) (Cloths) (Cosmetics) (Cloths) (Cosmetics) (Cloths) goods) goods) goods) Employees Employees Employees Employees Employees Employees Employees Employees Employees (Electrical (Electrical (Electrical (Cosmetics) (Cloths) (Cosmetics) (Cloths) (Cosmetics) (Cloths) goods) goods) goods) Protected ORDERS and PERSONAL INFORMATlON Data 57 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 289, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_058.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_058.png", "page_index": 289, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:39+07:00" }, "raw_text": "Outline 1 Introduction to MAC 2 Proposed Models for MAC 3 Case study: Oracle Label Security (OLS) 58 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 290, "chapter_num": 5, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_059.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_5/slide_059.png", "page_index": 290, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:41+07:00" }, "raw_text": "59 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 291, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_001.png", "page_index": 291, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:44+07:00" }, "raw_text": "CHAPTER 6: DATABASE AUDIT Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn" }, { "page_index": 292, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_002.png", "page_index": 292, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:47+07:00" }, "raw_text": "Outline 1 Introduction to database audit 2 Database audit methods 2 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 293, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_003.png", "page_index": 293, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:50+07:00" }, "raw_text": "Auditing g overview Audit: examines the documentation that reflects the actions, practices, and conduct of a business or individual Audit measures: compliance to policies Procedures Processes,and law 3 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 294, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_004.png", "page_index": 294, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:22:56+07:00" }, "raw_text": "Audit term Audit/auditing: of examining and validating documents, c data, process processes, procedures, systems Audit log: document that contains all activities that are being audited ordered in a chronological manner Audit objectives: set t of business rules, system controls, government regulations, or security policies Auditor: a person authorized to audit Faculty of Computer Science and Engineering, HCMUT - 2023 4" }, { "page_index": 295, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_005.png", "page_index": 295, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:00+07:00" }, "raw_text": "Audit term Audit procedure: set of instructions for the auditing process Audit report: a document that contains the audit findings Audit trail: chronological record of document changes, data changes, system activities, or operational events audit: chronological stored in log_file or Data record of c data c changes database table object Database auditing: chronological record of database activities. 5 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 296, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_006.png", "page_index": 296, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:04+07:00" }, "raw_text": "Database audit Database auditing is the monitoring and recording of selected user database actions It can be based on: individual actions, such as the type of SQL statement executed combinations of factors that can include user name, application, time.. Audit = Who did what to which data when and how Faculty of Computer Science and Engineering, HCMUT - 2023 6" }, { "page_index": 297, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_007.png", "page_index": 297, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:09+07:00" }, "raw_text": "Why is database audit important? Enable future accountability for current actions taken in a particular schema, table, or row, or affecting specific content Investigate suspicious activity For example, if some user is deleting data from tables, the security administrator might decide to audit all connections to the database and all successful and unsuccessful deletions of rows from all tables in the database. Notify an auditor that an unauthorized user is manipulating or deleting data and that the user has more privileges s than expected, which can lead to reassessing user authorizations. Monitor and gather data about specific database activities. Detect problems with an authorization or access control implementation 7 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 298, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_008.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_008.png", "page_index": 298, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:13+07:00" }, "raw_text": "Audit classifications Internal audit External audit Conducted by a staff member of Conducted by a party outside the the company being audited company that is being audited Purpose: Purpose: - Verify that all auditing objectives are met - Investigate the financial or operational state of the company Investigate a situation prompted by an internal event or incident Verify that all auditing objectives are met Investigate a situation prompted by an external request Faculty of Computer Science and Engineering, HCMUT - 2023 8" }, { "page_index": 299, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_009.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_009.png", "page_index": 299, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:17+07:00" }, "raw_text": "Audit classifications Automatic audit: Prompted and performed automatically (without human intervention) Used mainly for systems and database systems Administrators read and interpret reports; inference engine or artificial intelligence Manual audit: performed completely by humans Hybrid audit 9 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 300, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_010.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_010.png", "page_index": 300, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:23+07:00" }, "raw_text": "Audit types Financial audit: ensures that all financial transactions are accounted for and comply with the law Security audit: evaluates if the system is secure Compliance audit: : system complies with industry standards, government regulations, or partner and client policies Operational audit: Verifies if an operation is working according to the policies of the company Investigative audit: performed in response to an event, request, threat, or incident to verify the integrity of the system Product audit: performed to ensure that the product complies with industry standards. Preventive audit: Performed to identify problems before they occur 10 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 301, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_011.png", "page_index": 301, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:28+07:00" }, "raw_text": "Compliances audit A compliance audit is a comprehensive of review an organization's adherence to regulatory guidelines. Well-known compliance audits include: HiPAA (Health Insurance Portability and Accountability Act SOX (Sarbanes-Oxley Act) GLBA (Gramm-Leach-Bliley Act) PCI DSS (Payment Card Industry Data Security Standard SOC 2: developed by the American Institute of CPAs (AICPA) 11 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 302, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_012.png", "page_index": 302, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:32+07:00" }, "raw_text": "Audit activities Some auditing activities relating to Section 404 of the Sarbanes-Oxley: Privileged user activity Logins and logouts Application and data trigger modifications Changes to user definitions and privileges Data structure changes Read and write access to sensitive data Errors and exceptions Sources of data access activity-host names, user IDs, IP addresses, and port numbers Time, program name, accessed data size, data access command, and other parameters for each data access transaction 12 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 303, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_013.png", "page_index": 303, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:36+07:00" }, "raw_text": "Audit process SOC 2 Step 7: Receive report Step 6: Begin formal audit Step 5: Select an auditor Step 4: Complete readiness assessment Step 3: Conduct gap analysis Step 2: Define audit scope Step 1: Select report type 13 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 304, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_014.png", "page_index": 304, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:42+07:00" }, "raw_text": "Audit environment Objectives Objectives People Me et m do leetsystem andauditors cume People and auditors nt accuracy, goals Staff. Database administrators, of Auditing Audited entities auditing environment systems, environment Audited entities Employe es, and Databaseactivities.data and laws activitie changes,dataaccuracy.data Instructions, files,and operating system Database 14 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 305, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_015.png", "page_index": 305, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:45+07:00" }, "raw_text": "Side Effects of Audit Performance problems Too many reports and documents Disruption to the operations of the audited entity Consumption of resources, and added costs from downtime Friction between operators and auditor 15 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 306, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_016.png", "page_index": 306, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:49+07:00" }, "raw_text": "Outline 1 Introduction to database audit 2 Database audit methods 16 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 307, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_017.png", "page_index": 307, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:53+07:00" }, "raw_text": "Database audit requirements The ability to independently monitor and audit all database activity, including administrator. The ability to store this activity securely outside the database. DBMSS. The ability to enforce separation of duties on database administrators Auditing must include monitoring of DBA activity, and should prevent DBA manipulation or tampering with logs or recorded activity The ability to generate alerts on policy violations. 17 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 308, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_018.png", "page_index": 308, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:23:55+07:00" }, "raw_text": "Database audit techniques Application server logs Application audit Trigger auditing Command auditing 18 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 309, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_019.png", "page_index": 309, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:01+07:00" }, "raw_text": "Auditing categories Audit logon/logoff into the database At least: login name, timestamp Additional information: TCP/IP address of the client initiating the connection, program used to initiate the connection All failed login attempts The username The client IP from which connections are failing Source program Time of day Audit sources of database usage: network node is connected to the database (e.g., using an IP address or a host name) application is being used to access the database 20 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 310, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_020.png", "page_index": 310, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:05+07:00" }, "raw_text": "Auditing categories Audit database usage outside normal operating hours. Audit Data Definition Language - DDL activity One of the most implemented audit trails DDL commands are potentially the most damaging commands that exist and can certainly be used by an attacker to compromise any system. There are three main methods. Use database audit features Use an external auditing system Compare schema snapshots 21 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 311, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_021.png", "page_index": 311, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:10+07:00" }, "raw_text": "Auditing categories Audit database errors Failed logins SQL injection Failed attempt to elevate privileges Audit changes to sources of stored procedures and triggers Audit changes to privileges, user/login definitions, and other security attributes Must-have for database auditing Addition and deletion of users, logins, and roles Changes to the mappings between logins and users/roles Privilege changes-whether by user or role Password change Changes to security attributes at a server, database, statement, or obiect leve 22 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 312, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_022.png", "page_index": 312, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:13+07:00" }, "raw_text": "Auditing categories Audit creations, changes, and usage of database links and of replication. Audit changes to sensitive data .Data change audit trails are common in almost all major auditing initiatives should selectively choose which objects and which commands to audit. Audit any changes made to the definition of what to audit 23 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 313, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_023.png", "page_index": 313, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:16+07:00" }, "raw_text": "Outline 1 Introduction to database audit 2 Database audit methods 24 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 314, "chapter_num": 6, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_6/slide_024.png", "page_index": 314, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:19+07:00" }, "raw_text": "25 Faculty of Computer Science and Engineering, HCMUT - 2023" }, { "page_index": 315, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_001.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_001.png", "page_index": 315, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:22+07:00" }, "raw_text": "CHAPTER 7: SOFTWARE SECURITY Le Thi Bao Thu Faculty of Computer Science & Engineering HCMC University of Technology thule@hcmut.edu.vn Adapted from the slides ofInformation Security: Principles and Practice, 3rd edition, Mark Stamp, 2021)" }, { "page_index": 316, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_002.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_002.png", "page_index": 316, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:26+07:00" }, "raw_text": "Content Software Security Introduction Program Flaws Malware Miscellaneous Software-Based Attacks Software Engineering (SRE) Reverse Digital Rights Management Secure Software Development Faculty of Computer Science and Engineering, HCMUT - 2023 2" }, { "page_index": 317, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_003.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_003.png", "page_index": 317, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:28+07:00" }, "raw_text": "SOFTWARE SECURITY INTRODUCTION" }, { "page_index": 318, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_004.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_004.png", "page_index": 318, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:32+07:00" }, "raw_text": "Why Software? Why is software as important to security as crypto, access control, protocols? Virtually all information security features implemented are l in software If your software is subject to attack, your security can be broken Regardless of strength of crypto, access control, or protocols Software is a poor foundation for security Faculty of Computer Science and Engineering, HCMUT - 2023 4" }, { "page_index": 319, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_005.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_005.png", "page_index": 319, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:35+07:00" }, "raw_text": "Secure Software In software engineering, try to ensure that a program does what is intended Secure software engineering requires that software does what is intended.. ...and nothing more Faculty of Computer Science and Engineering, HCMUT - 2023 5" }, { "page_index": 320, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_006.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_006.png", "page_index": 320, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:40+07:00" }, "raw_text": "Complexity \"Complexity is the enemy of security\", Paul Kocher, Cryptography Research, Inc. System Lines of Code (LOC Netscape 17 million Space Shuttle 10 million Linux kernel 2.6.0 5 million Windows XP 40 million Mac OS X 10.4 86 million Boeing 777 7 million Faculty of Computer Science and Engineering, HCMUT - 2023 6" }, { "page_index": 321, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_007.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_007.png", "page_index": 321, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:43+07:00" }, "raw_text": "Lines of Code and Bugs Conservative estimate: 5 bugs/10,000 LOC Do the math Typical computer: 3k exe's of 100k LOC each Conservative estimate: 50 bugs/exe Implies about 150k bugs per computer So, 30,000-node network has 4.5 billion bugs Maybe only 10% of bugs security-critical and only 10% of those remotely exploitable Then \"only\" 45 million critical security flaws! Faculty of Computer Science and Engineering, HCMUT - 2023 7" }, { "page_index": 322, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_008.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_008.png", "page_index": 322, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:47+07:00" }, "raw_text": "Software Security Topics Program flaws (unintentional) Buffer overflow Race conditions Malicious software (intentional) Viruses Worms Other breeds of malware Faculty of Computer Science and Engineering, HCMUT - 2023 8" }, { "page_index": 323, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_009.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_009.png", "page_index": 323, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:49+07:00" }, "raw_text": "PROGRAM FLAWS" }, { "page_index": 324, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_010.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_010.png", "page_index": 324, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:53+07:00" }, "raw_text": "Buffer overflow - Attack Scenario Users enter data into a Web form Web form is sent to server Server writes data to array called buffer, without checking length of input data Data \"overflows\" buffer Such overflow might enable an attack If so, attack could be carried out by anyone with Internet access Faculty of Computer Science and Engineering, HCMUT - 2023 10" }, { "page_index": 325, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_011.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_011.png", "page_index": 325, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:24:56+07:00" }, "raw_text": "Buffer Overflow int main0{ int bufferl0]; buffer[20] = 37;} Q: What happens when code is executed? A: Depending on what resides in memory at location \"buffer[20]' Might overwrite user data or code Might overwrite system data or code Or program could work just fine Faculty of Computer Science and Engineering, HCMUT - 2023 11" }, { "page_index": 326, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_012.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_012.png", "page_index": 326, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:00+07:00" }, "raw_text": "Simple Buffer Overflow Consider boolean flag for authentication Buffer overflow could flag allowing overwrite to anyone authenticate Boolean flag buffer F 0 U R S C Faculty of Computer Science and Engineering, HCMUT - 2023 12" }, { "page_index": 327, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_013.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_013.png", "page_index": 327, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:06+07:00" }, "raw_text": "Race conditions Also knowns as Time-Of-Check To Time-Of-Use (TOCTTOU) To win the race Privileged program (set-uid root) Attacker program condition (TOCTTOU /tmp/X points to window), we need two an attacker-owned file processes : access) Context switch Make/tmp/X Runvulnerable point to TOCTTOU program in a loop window /etc/passwd open() Run the attack program Write to/etc/passwd Faculty of Computer Science and Engineering, HCMUT - 2023 13" }, { "page_index": 328, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_014.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_014.png", "page_index": 328, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:08+07:00" }, "raw_text": "MALWARE" }, { "page_index": 329, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_015.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_015.png", "page_index": 329, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:12+07:00" }, "raw_text": "Malicious Software Types of malware (no standard definition) Virus -- passive propagation Worm - active propagation Trojan horse -- unexpected functionality Trapdoor/backdoor -- unauthorized access Rabbit - exhaust system resources Spyware - steals info, such as passwords Botnets -- malware for hire Ransomware - Malware encrypts user data Faculty of Computer Science and Engineering, HCMUT - 2023 15" }, { "page_index": 330, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_016.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_016.png", "page_index": 330, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:16+07:00" }, "raw_text": "Malicious Software Types of malware (no standard definition) : Virus: passive propagation Worm: active propagation Trojan horse: unexpected functionality Trapdoor/backdoor: unauthorized access Rabbit: exhaust system resources Spyware: steals info, such as passwords Botnets: malware for hire Ransomware: Malware encrypts user data Faculty of Computer Science and Engineering, HCMUT - 2023 16" }, { "page_index": 331, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_017.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_017.png", "page_index": 331, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:20+07:00" }, "raw_text": "Trojan Horse Example Trojan: unexpected functionality Prototype trojan for the Mac File icon for freeMusic.mp3: MP3 For a real mp3, double click on icon freeMusic.mp3 iTunes opens 0 Music in mp3 file plays 0 But for freeMusic.mp3, unexpected results... Faculty of Computer Science and Engineering, HCMUT - 2023 17" }, { "page_index": 332, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_018.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_018.png", "page_index": 332, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:23+07:00" }, "raw_text": "Mac Trojan Doube click on freeMusic.mp3 iTunes opens (expected) \"Wild Laugh\" (not expected) Message box (not expected) Yep,this is an application. (So what is your iTunes playing right now?) MP3 OK Faculty of Computer Science and Engineering, HCMUT - 2023 18" }, { "page_index": 333, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_019.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_019.png", "page_index": 333, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:30+07:00" }, "raw_text": "Trojan Example How does freeMusic.mp3 trojan work? This \"mp3\" is an application, not data 000 trojan 88 # Q-local disks Mark's Com. Name A Date Modified Size Kind read me Apr 9,2004,7:36PM 8 KB Text document Network freeMusic.mp3 Mar21.2004.1:49AM 88 KB Application Macintosh HD query Apr 9.2004.7:26PM 12 KB Text document Desktop response Apr 9,2004.7:25PM 8KB Text document mark 4 items.62.14 CBavailable This trojan is harmless, but... ...could have done anything user could do Delete files, download files, launch apps, etc. 0 Faculty of Computer Science and Engineering, HCMUT - 2023 19" }, { "page_index": 334, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_020.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_020.png", "page_index": 334, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:34+07:00" }, "raw_text": "Botnet Botnet: a \"network\" of infected machines Infected machines are \"bots Victim is unaware of infection (stealthy) Botmaster controls botnet Botnets used for.. Spam, DoS attacks, keylogging, ID theft, etc Faculty of Computer Science and Engineering, HCMUT - 2023 20" }, { "page_index": 335, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_021.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_021.png", "page_index": 335, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:38+07:00" }, "raw_text": "Botnet Examples Mariposa Used to steal credit card info Creator arrested in July 2010 Conficker Estimated 10M infected hosts (2009) Kraken Largest as of 2008 (400,000 infections) D Srizbi For spam, one of largest as of 2008 Faculty of Computer Science and Engineering, HCMUT - 2023 21" }, { "page_index": 336, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_022.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_022.png", "page_index": 336, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:41+07:00" }, "raw_text": "Ransomware Recently, ransomware very popular Ransomware encrypts important info Key may be provided if ransom paid Sometimes key works, sometimes not.. To pay or not to pay? Recent case, reportedly paid $5M In 2020 total ransom estimated $350M Payments usually in cryptocurrency Faculty of Computer Science and Engineering, HCMUT - 2023 22" }, { "page_index": 337, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_023.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_023.png", "page_index": 337, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:45+07:00" }, "raw_text": "CryptoLocker (2013, Russian origin) Email with attached \"pdf\" (actually an exe When \"pdf\" launched.. 2048-bit RSA key pair generated Public key on victim machine, private key with the attacker, data encrypted Private key needed to decrypt data Payment of $400 to decrypt data Could be paid using Bitcoin Faculty of Computer Science and Engineering, HCMUT - 2023 23" }, { "page_index": 338, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_024.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_024.png", "page_index": 338, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:49+07:00" }, "raw_text": "CryptoLocker In 2014, \"Operation Tovar\" Server used by CryptoLocker taken down Private keys recovered How many people paid? Estimates ranged from 0.3% to 41% Appears that actual number was about 1.3% Estimated that bad guys made $3M Faculty of Computer Science and Engineering, HCMUT - 2023 24" }, { "page_index": 339, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_025.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_025.png", "page_index": 339, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:53+07:00" }, "raw_text": "Locky of Ransomware Locky (2016, Russian origin) Email with MS Word document Word doc contained malicious macros User had to enable macros Doc filled with gibberish, \"Enable macro if data encoding is incorrect' 2048-bit RSA and 128-bit AES 1 Bitcoin ($10k at the time) Faculty of Computer Science and Engineering, HCMUT - 2023 25" }, { "page_index": 340, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_026.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_026.png", "page_index": 340, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:25:56+07:00" }, "raw_text": "WannaCry Ransomware WannaCry (2017, North Korean) Worm based on \"EternalBlue\" exploit EternalBlue supposedly developed by NSA, not revealed to MS for 5 years Asked for $300 to $600 No data recovered after paying Yet, payments of more than $130k Faculty of Computer Science and Engineering, HCMUT - 2023 26" }, { "page_index": 341, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_027.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_027.png", "page_index": 341, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:00+07:00" }, "raw_text": "WannaCry lnfected 200k in 150 computers countries Countries most affected Russia, Ukraine, India, Taiwan Long list of significant organizations affected Faculty of Computer Science and Engineering, HCMUT - 2023 27" }, { "page_index": 342, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_028.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_028.png", "page_index": 342, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:04+07:00" }, "raw_text": "Petya Ransomware Petya (2017, origin uncertain) NotPetya (2017, Russian) More advanced variant of Petya using EternalBlue Targeted at Ukraine, but went worldwide Blamed on Russian military Not possible to recover from, even if ransom ($3oo) was paid Disruptions caused $10B in losses Faculty of Computer Science and Engineering, HCMUT - 2023 28" }, { "page_index": 343, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_029.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_029.png", "page_index": 343, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:07+07:00" }, "raw_text": "Malware Detection Three common detection methods Signature detection Change detection Anomaly detection Faculty of Computer Science and Engineering, HCMUT - 2023 29" }, { "page_index": 344, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_030.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_030.png", "page_index": 344, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:12+07:00" }, "raw_text": "Signature e Detection A signature may be a string of bits in exe Might also use wildcards, hash values, etc. Advantages Effective on \"ordinary\" malware Minimal burden for users/administrators Disadvantages Signature file can be large (10s of thousands) making scanning slow Signature files must be kept up to date Cannot detect unknown viruses Cannot detect some advanced types of malware The most popular detection method Faculty of Computer Science and Engineering, HCMUT - 2023 30" }, { "page_index": 345, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_031.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_031.png", "page_index": 345, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:15+07:00" }, "raw_text": "Change Detection Viruses must live somewhere If you detect a file has changed, it might have been infected How to detect changes? Hash files and (securely) store hash values Periodically re-compute hashes and compare If hash changes, file might be infected Faculty of Computer Science and Engineering, HCMUT - 2023 31" }, { "page_index": 346, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_032.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_032.png", "page_index": 346, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:19+07:00" }, "raw_text": "Change Detection Advantages Virtually no false negatives Can even detect previously unknown malware Disadvantages Many files change -- and often Many false alarms (false positives) Heavy burden on users/administrators If suspicious change detected, then what? Might fall back on signature detection Faculty of Computer Science and Engineering, HCMUT - 2023 32" }, { "page_index": 347, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_033.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_033.png", "page_index": 347, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:23+07:00" }, "raw_text": "Anomaly Detection Monitor system for anything \"unusual\" or \"virus-like\" or \"potentially malicious\" . . Examples of anomalous things: Files change in some unexpected way Unexpected network activity Unexpected file access But, we must first define e \"normal And normal can (and must) change over time Faculty of Computer Science and Engineering, HCMUT - 2023 33" }, { "page_index": 348, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_034.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_034.png", "page_index": 348, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:27+07:00" }, "raw_text": "Anomaly Detection Advantages Chance of detecting unknown malware Disadvantages No proven track record Attacker can make abnormal look normal (go slow) Must be combined with another method (e.g., signature detection) Also popular in intrusion detection (IDs) Difficult unsolved (unsolvable?) problem Faculty of Computer Science and Engineering, HCMUT - 2023 34" }, { "page_index": 349, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_035.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_035.png", "page_index": 349, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:30+07:00" }, "raw_text": "Machine Learning Based Malware Detection Essentially, higher-level \"signature Enables detection of many variants (entire \"family\") with one model Many different features considered Many different machine learning and deep learning techniques used Faculty of Computer Science and Engineering, HCMUT - 2023 35" }, { "page_index": 350, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_036.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_036.png", "page_index": 350, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:34+07:00" }, "raw_text": "Future of Malware Trends Encrypted, polymorphic, metamorphic Recently, botnets and ransomware The future is bright for malware! Future of malware detection ML/DL based techniques Faculty of Computer Science and Engineering, HCMUT - 2023 36" }, { "page_index": 351, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_037.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_037.png", "page_index": 351, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:37+07:00" }, "raw_text": "MISCELLANEOUS SOFTWARE-BASED ATTACKS" }, { "page_index": 352, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_038.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_038.png", "page_index": 352, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:40+07:00" }, "raw_text": "Miscellaneous Attacks Numerous attacks involve software We'll discuss a few issues that do not fit into previous categories Salami attack Linearization attack Faculty of Computer Science and Engineering, HCMUT - 2023 38" }, { "page_index": 353, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_039.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_039.png", "page_index": 353, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:44+07:00" }, "raw_text": "Salami Attack What is Salami attack? Programmer \"slices off\" small amounts of money Slices are hard for victim to detect Example Bank calculates interest on accounts Programmer \"slices off\" any fraction of a cent and puts it in his own account No customer notices missing partial cent Bank may not notice any problem Over time, programmer makes lots of money! Faculty of Computer Science and Engineering, HCMUT - 2023 39" }, { "page_index": 354, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_040.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_040.png", "page_index": 354, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:48+07:00" }, "raw_text": "Salami Attack In LA, four men installed computer chip that overstated amount of gas pumped Customers complained when they had to pay for more gas than tank could hold Hard to detect since chip programmed to give correct amount when 5 or 10 gallons purchased Faculty of Computer Science and Engineering, HCMUT - 2023 40" }, { "page_index": 355, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_041.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_041.png", "page_index": 355, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:53+07:00" }, "raw_text": "Linearization Attack Program checks for serial #include stdio.h number S123N456 int main(int argc, const char *argv[] D For efficiency, check made + int i; one character at a time char serial[9]=\"S123N456n\" Can attacker take advantage for(i = 0; i < 8; ++i) if(argv[1][i] != serial[i]) break; of this? } if(i == 8) printf(\"nSerial number is correct!nn\"); } Faculty of Computer Science and Engineering, HCMUT - 2023 41" }, { "page_index": 356, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_042.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_042.png", "page_index": 356, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:26:57+07:00" }, "raw_text": "Linearization Attack Correct number takes longer than incorrect Attacker tries all 1st characters Find that s takes longest Finds S1 takes longest And so on... Attacker can recover one character at a time! Same principle as used in lock picking Faculty of Computer Science and Engineering, HCMUT - 2023 42" }, { "page_index": 357, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_043.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_043.png", "page_index": 357, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:00+07:00" }, "raw_text": "SOFTWARE REVERSE ENGINEERING (SRE)" }, { "page_index": 358, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_044.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_044.png", "page_index": 358, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:04+07:00" }, "raw_text": "SRE Engineering Software Reverse Also known as Reverse Code Engineering (RCE) Or simply \"reversing Can be used for good.. Understand malware Understand legacy code ...or not-so-good Remove usage restrictions from software Find and exploit flaws in software Cheat at games, etc. Faculty of Computer Science and Engineering, HCMUT - 2023 46" }, { "page_index": 359, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_045.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_045.png", "page_index": 359, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:07+07:00" }, "raw_text": "SRE We assume.. . Reverse engineer is an attacker Attacker only has exe (no source code) No bytecode (i.e., not Java, .Net, etc.) Attacker might want to Understand the software Modify (\"patch\") the software SRE usually focused on Windows So we focus on Windows Faculty of Computer Science and Engineering, HCMUT - 2023 47" }, { "page_index": 360, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_046.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_046.png", "page_index": 360, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:12+07:00" }, "raw_text": "SRE Tools Disassembler Converts exe to assembly (as best it can) Cannot always disassemble 100% correctly In general, not possible to re-assemble disassembly into working executable Debugger Must step thru code to completely understand it Labor intensive - lack of useful tools Hex Editor To patch (modify) exe file Process Monitor, VMware, etc Faculty of Computer Science and Engineering, HCMUT - 2023 48" }, { "page_index": 361, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_047.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_047.png", "page_index": 361, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:16+07:00" }, "raw_text": "Specific Tools IDA Pro - good disassembler/debugger Costs a few hundred dollars (free version exists) Converts binary to assembly (as best it can) ollyDbg - high-quality shareware debugger Includes a good disassembler Hex editor - to view/modify bits of exe UltraEdit is good - freeware HIEW - useful for patching exe Process Monitor - freeware Faculty of Computer Science and Engineering, HCMUT - 2023 49" }, { "page_index": 362, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_048.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_048.png", "page_index": 362, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:20+07:00" }, "raw_text": "Why is Debugger Needed? Disassembly gives static results Good overview of program logic User must \"mentally execute\" program Difficult to jump to specific place in the code Debugging is dynamic Can set break points Can treat complex code as \"black box' And code not always disassembled correctly Disassembly and debugging both required for any serious SRE task Faculty of Computer Science and Engineering, HCMUT - 2023 50" }, { "page_index": 363, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_049.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_049.png", "page_index": 363, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:24+07:00" }, "raw_text": "SRE Necessary Skills Working knowledge of target assembly code Experience with the tools IDA Pro - sophisticated and complex OllyDbg -good choice for this class Knowledge of Windows Portable Executable (PE) file format Boundless patience and optimism SRE is a tedious and labor-intensive process Often, like finding a needle in a haystack Faculty of Computer Science and Engineering, HCMUT - 2023 51" }, { "page_index": 364, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_050.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_050.png", "page_index": 364, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:26+07:00" }, "raw_text": "DIGITAL RIGHTS MANAGEMENT" }, { "page_index": 365, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_051.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_051.png", "page_index": 365, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:29+07:00" }, "raw_text": "Digital Rights Management DRM is a good example of limitations of doing security in software We'll discuss What is DRM? A PDF document protection system DRM for streaming media DRM in P2P application DRM within an enterprise Faculty of Computer Science and Engineering, HCMUT - 2023 53" }, { "page_index": 366, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_052.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_052.png", "page_index": 366, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:33+07:00" }, "raw_text": "What is DRM? \"Remote control\" problem Distribute digital content Retain some control on its use, after delivery Digital book example Digital book sold online could have huge market But might only sell 1 copy! Trivial to make perfect digital copies A fundamental change from pre-digital era Similar comments for digital music, video, etc. Faculty of Computer Science and Engineering, HCMUT - 2023 54" }, { "page_index": 367, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_053.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_053.png", "page_index": 367, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:37+07:00" }, "raw_text": "Persistent Protection \"Persistent protection\" is the fundamental problem in DRM How to enforce restrictions on use of content after delivery? Examples of such restrictions No copying Limited number of reads/plays Time limits No forwarding, etc Faculty of Computer Science and Engineering, HCMUT - 2023 55" }, { "page_index": 368, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_054.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_054.png", "page_index": 368, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:41+07:00" }, "raw_text": "What Can be Done? The honor system? Example: Stephen King's, The Plant Give up? Internet sales? Regulatory compliance? etc. Lame software-based DRM? The standard DRM system today Better software-based DRM? MediaSnap's goal Tamper-resistant hardware? Closed systems: Game Cube, etc. Open systems: TCG/NGSCB for PCs Faculty of Computer Science and Engineering, HCMUT - 2023 56" }, { "page_index": 369, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_055.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_055.png", "page_index": 369, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:46+07:00" }, "raw_text": "Is Crypto the Answer? key key iVVVVvq decrypt plaintext encrypt plaintext ciphertext 1 Attacker's goal is to recover the key In standard crypto scenario, attacker has Ciphertext, some plaintext, side-channel info, etc. In DRM scenario, attacker has Everything in the box (at least) Crypto was not designed for this problem! Faculty of Computer Science and Engineering, HCMUT - 2023 57" }, { "page_index": 370, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_056.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_056.png", "page_index": 370, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:49+07:00" }, "raw_text": "Is Crypto the Answer? But crypto is necessary To securely deliver the bits To prevent trivial attacks Then attacker will not try to directly attack crypto Attacker will try to find keys in software DRM is \"hide and seek\" with keys in software! Faculty of Computer Science and Engineering, HCMUT - 2023 58" }, { "page_index": 371, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_057.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_057.png", "page_index": 371, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:52+07:00" }, "raw_text": "Current State of DRM At best, security by obscurity A derogatory term in security Secret designs In violation of Kerckhoffs Principle Over-reliance on crypto \"Whoever thinks his problem can be solved using cryptography, doesn't understand his problem and doesn't understand cryptography. Attributed by Roger Needham and Butler Lampson to each other Faculty of Computer Science and Engineering, HCMUT - 2023 59" }, { "page_index": 372, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_058.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_058.png", "page_index": 372, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:56+07:00" }, "raw_text": "DRM Limitations The analog hole When content is rendered, it can be captured in analog form DRM cannot prevent such an attack Human nature matters Absolute DRM security is impossible Want something that \"works\" in practice What works depends on context DRM is not strictly a technical problem! Faculty of Computer Science and Engineering, HCMUT - 2023 60" }, { "page_index": 373, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_059.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_059.png", "page_index": 373, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:27:58+07:00" }, "raw_text": "SECURE SOFTWARE DEVELOPMENT" }, { "page_index": 374, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_060.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_060.png", "page_index": 374, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:01+07:00" }, "raw_text": "Penetrate and Patch Usual approach to software development Develop product as quickly as possible Release it without adequate testing Patch the code as flaws are discovered In security, this is \"penetrate and patch A bad approach to software development Faculty of Computer Science and Engineering, HCMUT - 2023 62" }, { "page_index": 375, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_061.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_061.png", "page_index": 375, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:06+07:00" }, "raw_text": "Why Penetrate and Patch? First to market advantage First to market likely to become market leader Market leader has huge advantage in software Users find it safer to \"follow the leader\" Boss won't complain if your system has a flaw, as long as everybody else has same flaw... User can ask more people for support, etc Sometimes called \"network economics Faculty of Computer Science and Engineering, HCMUT - 2023 63" }, { "page_index": 376, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_062.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_062.png", "page_index": 376, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:10+07:00" }, "raw_text": "Why Penetrate and Patch? Secure software development is hard Costly and time consuming development Costly and time consuming testing Cheaper to let customers do the work! No serious economic disincentive Even if software flaw causes major losses, the software vendor is not liable Is any other product sold this way? Would it matter if vendors were legally liable? Faculty of Computer Science and Engineering, HCMUT - 2023 64" }, { "page_index": 377, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_063.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_063.png", "page_index": 377, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:14+07:00" }, "raw_text": "Penetrate and Patch Fallacy Fallacy: If you keep patching software, eventually it will be secure Why is this a fallacy? Empirical evidence to the contrary Patches often add new flaws is a moving : new versions, features, changing Software target: environment, new uses,... Faculty of Computer Science and Engineering, HCMUT - 2023 65" }, { "page_index": 378, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_064.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_064.png", "page_index": 378, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:18+07:00" }, "raw_text": "Open vs Closed Source Open source software The source code is available to user For example, Linux Closed source The source code is not available to user For example, Windows What are the security implications? Faculty of Computer Science and Engineering, HCMUT - 2023 66" }, { "page_index": 379, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_065.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_065.png", "page_index": 379, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:22+07:00" }, "raw_text": "Open Source Security Claimed advantages of open source is More eyeballs: more people looking at the code should imply fewer flaws A variant on Kerchoffs Principle Is this valid? How many \"eyeballs\" looking for security flaws? How many \"eyeballs\" focused on boring parts? How many \"eyeballs\" belong to security experts? Attackers can also look for flaws! Evil coder might be able to insert a flaw Faculty of Computer Science and Engineering, HCMUT - 2023 67" }, { "page_index": 380, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_066.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_066.png", "page_index": 380, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:26+07:00" }, "raw_text": "Open Source Security Open source example: wu-ftp About 8,000 lines of code A security-critical application Was deployed and widely used After 10 years, serious security flaws discovered! More generally, open source has done little to reduce software security flaws D Why? Open source follows penetrate and patch model! Faculty of Computer Science and Engineering, HCMUT - 2023 68" }, { "page_index": 381, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_067.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_067.png", "page_index": 381, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:30+07:00" }, "raw_text": "Closed Source Security Claimed advantage of closed source Security flaws not as visible to attacker This is a form of \"security by obscurity Is this valid? Many exploits do not require source code Possible to analyze closed source code though it is a lot of work! Is \"security by obscurity\" real security? Faculty of Computer Science and Engineering, HCMUT - 2023 69" }, { "page_index": 382, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_068.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_068.png", "page_index": 382, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:34+07:00" }, "raw_text": "Open vs Closed Source Advocates of open source often cite the Microsoft fallacy which states Microsoft makes bad software 1. Microsoft software is closed source 2. 3. Therefore all closed source software is bad Why is this a fallacy? Not logically correct More relevant is the fact that Microsoft follows the penetrate and patch model Faculty of Computer Science and Engineering, HCMUT - 2023 70" }, { "page_index": 383, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_069.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_069.png", "page_index": 383, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:38+07:00" }, "raw_text": "Open vs Closed Source No obvious security advantage to either open or closed source More significant than VS closed open source is software development practices Both open and closed source follow the \"penetrate and patch\" model Faculty of Computer Science and Engineering, HCMUT - 2023 71" }, { "page_index": 384, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_070.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_070.png", "page_index": 384, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:43+07:00" }, "raw_text": "Open vs Closed Source there security difference, why is O If IS Microsoft no software attacked so often? Microsoft is a big target! Attacker wants most \"bang for the buck' Few exploits against Mac OS X Not because OS X is inherently more secure An OS X attack would do less damage Would bring less \"glory\" to attacker Next, we consider the theoretical differences Faculty of Computer Science and Engineering, HCMUT - 2023 72" }, { "page_index": 385, "chapter_num": 7, "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_071.png", "metadata": { "doc_type": "slide", "course_id": "CO3033", "source_file": "/workspace/data/converted/CO3033_Information_System_Sercurity/Chapter_7/slide_071.png", "page_index": 385, "language": "en", "ocr_engine": "PaddleOCR 3.2", "extractor_version": "1.0.0", "timestamp": "2025-10-31T18:28:45+07:00" }, "raw_text": "" } ] }