0% found this document useful (0 votes)
20 views70 pages

298 Amalgamation

The document outlines various scenarios of potential social engineering attacks, including phishing emails, vishing phone calls, and baiting with USB drives, highlighting tactics and indicators of malicious intent. It emphasizes the importance of cybersecurity culture, training, and incident response strategies to combat these threats. Additionally, it discusses the significance of continuous monitoring, patch management, and security assessments in maintaining a robust cybersecurity posture.

Uploaded by

damonionkatsby
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views70 pages

298 Amalgamation

The document outlines various scenarios of potential social engineering attacks, including phishing emails, vishing phone calls, and baiting with USB drives, highlighting tactics and indicators of malicious intent. It emphasizes the importance of cybersecurity culture, training, and incident response strategies to combat these threats. Additionally, it discusses the significance of continuous monitoring, patch management, and security assessments in maintaining a robust cybersecurity posture.

Uploaded by

damonionkatsby
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

Scenario 1: Email from “IT Support”

● Email Content:
Subject: Urgent: Account Security Notice
From: [email protected]
Dear User,
Due to recent suspicious activity detected on your university account, immediate
password verification is required.
[Click Here to Verify Your Account]
Failure to act within 24 hours will result in account suspension.
Thank you,
IT Security Team
● Comment on tactic and indicators of malicious intent 1
Scenario 2: Phone Call Scenario (Transcript)
● Caller:

"Hi, this is Margaret from Microsoft Technical Support. We’ve noticed your
computer is reporting several critical security errors. I can assist you right
now to fix it. Could you please provide remote access so we can resolve
this before your computer is accessed by a threat actor?"

● Comment on tactic and indicators of malicious intent

2
Scenario 3: USB Stick Found in a Campus Parking Lot
● Situation:

You find a USB labeled "Confidential Staff Salaries 2025.xlsx" lying near
your car in the campus parking lot.

● Comment on tactic and indicators of malicious intent

3
CSE298 Cybersecurity - Lecture 21
Combating Social Engineering and
Building Cybersecurity Culture
Spring 2025
Mark Erle
Questions Based on Last Lecture
● Common tactics covered: phishing, pretexting, baiting, tailgating, quid pro
quo, vishing, smishing
● Why do attackers often find social engineering attacks more effective than
purely technical exploits?
● Consider the Twitter Bitcoin scam from 2020 discussed in the last lecture.
What specific human traits or behaviors were targeted, and how could
employees have responded differently?
● Suppose you find an unlabeled USB stick near a campus computer lab. What
should your response be, and why?

5
Prevention and Mitigation Strategies
● Technical Controls
○ Email filtering and detection tools
○ Multi-factor authentication (MFA)
● Policies & Procedures
○ Verification and authorization requirements
○ Clear reporting mechanisms
● Continuous Monitoring
○ Real-time detection systems (EDR, SIEM integration)
○ Incident response readiness

6
Security Awareness Training
● Goals
○ Reduce human vulnerability through education
○ Foster proactive security behaviors
● Components of Effective Training
○ Interactive content and engagement
○ Simulated campaigns
○ Regular training refreshers
○ Role-based training tailored to job functions
● Evaluating Effectiveness
○ Metrics: reduced incidents, improved reporting rates, participation levels
● What are two key reasons why organizations need both technical and
human-focused strategies to combat social engineering attacks?

7
Building a Culture of Cybersecurity Vigilance
● Importance of Culture
○ Human element as first and last line of defense
○ Long-term behavior change reduces risk
● Leadership’s Role
○ Demonstrating commitment to security
○ Empowering employees to act securely
● Encouraging Reporting
○ Non-punitive reporting culture
○ Recognition for proactive behavior

8
Follow-up on Building a Culture of Cybersecurity Vigilance
● How does a positive cybersecurity culture impact employee behavior in the
context of security?
● Give an example of how security awareness training can be evaluated
effectively.

9
Social Engineering Training Exercise (slide 1 of 2)
1. Planning and Conception
● Define clear objectives (e.g., assess vulnerability to phishing)
● Identify target audience (departments, roles, etc.)
● Select relevant tactics to simulate (phishing, vishing, pretexting)
2. Exercise Design
● Develop realistic scenarios (email campaigns, phone scripts)
● Create believable content reflecting common attacks
● Set technical infrastructure (e.g., simulated phishing platforms)
3. Pre-Exercise Communication
● Notify leadership and IT/security stakeholders
● Decide if employees receive advance notice or remain unaware
● Establish clear guidelines and policies to handle sensitive outcomes 10
Social Engineering Training Exercise (slide 2 of 2)
4. Execution
● Conduct the simulated attack campaign over a defined period
● Monitor employee interactions in real-time
● Record response metrics (click rates, credential submissions, reporting)
5. Data Collection and Analysis
● Compile and analyze collected data against objectives
● Identify patterns, weaknesses, and strengths
● Evaluate overall effectiveness of existing security measures
6. Feedback and Reporting
● Share anonymized findings transparently with staff
● Provide targeted education based on identified weaknesses
● Recommend and implement improvements for future exercises 11
CSE298 Cybersecurity - Lecture 22
Incident Response & Monitoring
Spring 2025
Mark Erle
Security Failings in the UK Government’s One Login
Digital ID System
● Recent investigation revealed serious cybersecurity and data protection shortcomings in UK Government’s flagship digital
identity system, One Login - used to access various government services.
● According to whistleblower reports and subsequent correspondence from the National Cyber Security Centre (NCSC), the
system suffered from:
○ Insufficient security personnel and governance: The digital identity team lacked enough qualified staff to provide
effective cybersecurity oversight.
○ Lack of risk assessment and documentation: No comprehensive risk or threat assessments were conducted, and
there was no evidence that security requirements had been properly identified or managed.
○ Inadequate security monitoring: There were gaps in monitoring for indicators of compromise and privileged access,
increasing the risk of undetected breaches.
○ Non-compliant system administration: Administrators accessed the live production environment using non-compliant
devices, raising the risk of malware or phishing attacks.
○ High volume of unresolved vulnerabilities: Over half a million vulnerabilities were identified in the live system,
including more than 10,000 critical and 7,000 high-severity issues.
○ Concerns over personnel security clearance: Nearly 40% of production administrators lacked the appropriate security
clearance, despite handling sensitive citizen data.
○ Potential conflicts of interest in assurance processes: The same consultancy involved in developing the system was
also responsible for its security assurance, raising questions about the independence of risk assessments.
● The NCSC concluded the system had “severe shortcomings” and “top-level risks,” including the potential for bulk personal
data breaches and mass fraud through impersonation.
13
Accenture and Google Launch AI-Powered Security
Operations for Government
● On April 8, 2025, Accenture Federal Services announced a new partnership with Google
Public Sector to launch a Managed Extended Detection and Response (MxDR) solution
specifically for government agencies
● This new offering integrates Google’s Security Operations (SecOps) platform with
Accenture’s federal cybersecurity expertise and leverages security-specific generative AI
technology to enhance threat detection and response capabilities.
● Key features of the solution include:
○ Real-time, intelligence-based threat detection using advanced AI and machine
learning.
○ Automated response playbooks to streamline and modernize incident response.
○ Customizable dashboards tailored for federal use cases.
○ 24/7 support and compliance with federal cybersecurity controls.
● The collaboration aims to help federal agencies improve their cybersecurity resilience,
streamline security operations, and reduce costs.
14
Introduction to Security Operations
● Functions:
○ Developing operational policies and enforcing them (governance)
○ Preparing for, detecting, responding to, and recovering from
cybersecurity incidents
● Importance:
○ Real-time threat detection
○ Minimizing damage from incidents
○ Ensuring regulatory compliance
● Why is timely incident response critical for organizations?

15
Incident Response Lifecycle
1. Preparation – Building a capable response team and clear policies
2. Identification – Detecting and confirming incidents
3. Containment – Limiting damage and isolating the threat
4. Eradication – Removing threats and restoring affected systems
5. Recovery – Returning to normal operations securely
6. Lessons Learned – Reviewing and improving incident response strategies

Which phase do you think is most challenging for organizations, and why?

16
Incident Response Team
● Roles and Responsibilities:
○ Team Leader
○ Incident Analysts
○ IT Support
○ Public Relations
○ Legal Advisors
● Why is cross-departmental coordination essential in incident response?

17
Security Monitoring and Logging
● Importance of logs:
○ Provide audit trails
○ Enable incident detection
○ Support regulatory compliance
● Types of logs:
○ Event logs
○ Access logs
○ Application logs
● How can logging facilitate incident response?

18
Security Information and Event Management (SIEM)
● Definition: Integrated tool for collecting, analyzing, and managing security data
● Core functionalities:
○ Real-time monitoring
○ Threat detection and correlation
○ Incident response support
○ Reporting and compliance
● What advantages does a SIEM provide compared to manual log analysis?

19
Example SIEM Tools
● Splunk
● QRadar
● LogRhythm
● Wazuh (open source!)
● What factors should an organization consider when selecting a SIEM tool?

20
“The Case of the Stolen Intellectual Property”
● Scenario: A tech startup, InnoSoft, suspects an employee leaked proprietary
AI algorithms to a competitor. The incident was flagged when a rival company
filed a patent suspiciously similar to InnoSoft’s unpublished work.
● Questions
○ What evidence might you be searching for?
○ How open or covert should your investigation be?
○ What tools could you use? What if exfiltrated data were encrypted?
○ What care needs to be taken with regard to evidence?
○ If you identify a suspect, what steps should you take and when?
○ What should you communicate to stakeholders and when?

21
CSE298 Cybersecurity - Lecture 23
Forensics, Investigation, and
Continuous Monitoring
Spring 2025
Mark Erle
CyberSentinel: AI-Driven Threat Detection

● The emergence of AI in cybersecurity has led to the development of systems


like CyberSentinel, which utilizes machine learning for real-time threat
detection.
● By analyzing SSH logs and assessing phishing threats, CyberSentinel
represents a shift towards proactive and adaptive security measures,
highlighting the integration of AI in continuous monitoring strategies.

23
UK's Cyber Security and Resilience Bill

● The UK government has proposed the Cyber Security and Resilience Bill to
strengthen national cyber defenses.
● The legislation aims to enhance incident reporting requirements, enforce
stringent cybersecurity measures across various sectors, and improve
oversight of critical infrastructure.
● This move reflects the global trend towards regulatory frameworks that
prioritize continuous monitoring and rapid incident response.

24
Digital Forensics Overview
● What is Digital Forensics?
○ Process of collecting, analyzing, preserving, and presenting digital
evidence
○ Critical in understanding incidents, prosecuting cybercrimes, and
informing security improvements
● Importance in Security Operations
○ Incident validation and reconstruction
○ Support legal and compliance requirements
○ Provide insights for future threat prevention
● Why is maintaining the integrity of digital evidence crucial?

25
Forensic Investigation Process
● Steps of Digital Forensics
○ Identification: Determining potential evidence sources
○ Preservation: Ensuring evidence integrity
○ Collection: Systematic extraction of evidence
○ Examination: Inspecting collected data
○ Analysis: Deriving insights and conclusions
○ Reporting: Documenting and presenting findings
● Which forensic step might introduce the most significant risks if mishandled,
and why?

26
Chain of Custody
● Definition and Purpose
○ Documentation trail that records handling of evidence
○ Ensures authenticity, credibility, and admissibility in court
● Chain of Custody Essentials
○ Who handled the evidence
○ Date and time of handling
○ Actions performed on evidence
○ Secure storage conditions
● What consequences could result from a compromised chain of custody?

27
Common Forensic Tools
● Disk Imaging & Analysis: EnCase, FTK Imager, Autopsy
● Network Analysis: Wireshark, tcpdump, Zeek
● Memory Forensics: Volatility Framework
● Log Analysis: Splunk, ELK stack
● How do forensic analysts decide which tool to use?

28
Continuous Monitoring
● Definition and Purpose
○ Real-time tracking of security posture
○ Identifies threats promptly, reducing response time and impact
● Components of Effective Monitoring
○ Endpoint detection and response (EDR)
○ Network intrusion detection systems (IDS)
○ Log aggregation and SIEM integration
● How does continuous monitoring enhance the effectiveness of incident
response teams?

29
Patch Management: Overview
● Definition and purpose
○ Systematic approach to managing software updates and vulnerability
remediation
○ Critical for reducing exposure to known threats
● Patch Management Goals
○ Minimize vulnerability exposure
○ Maintain system and data integrity
○ Ensure compliance and operational continuity
● Why is proactive patch management crucial for cybersecurity?

30
Sources of Patch Information
● Common Sources:
○ Vendor advisories and security bulletins (e.g., Microsoft Security Bulletins,
Adobe Security Updates)
○ Vulnerability databases (e.g., National Vulnerability Database - NVD, CVE
databases)
○ CERT Coordination Center (US-CERT), industry-specific threat intelligence
feeds
● Where should organizations primarily obtain timely and credible patch
information?

31
Patch Testing and Validation
● Testing Considerations
○ Compatibility with existing software and infrastructure
○ Functionality impact and regression issues
○ Stability under production-like conditions
● Validation Steps
○ Create a controlled testing environment
○ Deploy patches to representative systems first
○ Monitor closely for unexpected behavior or conflicts
● Why is thorough patch testing critical before enterprise-wide deployment?

32
Communication and Coordination
● Requirements for Success
○ Clearly defined roles and responsibilities for patch management team
○ Effective notification channels (emails, intranet updates, meetings)
○ Coordination with departments to minimize disruptions during deployment
● Best Practices
○ Schedule patches during maintenance windows
○ Communicate clearly about timing, expected downtime, and potential
impacts
● How does clear communication improve the effectiveness of patch
management?

33
Tracking and Reporting Patch Status
● Tracking Techniques
○ Automated patch management solutions (e.g., SCCM, WSUS, Ivanti,
ManageEngine)
○ Dashboards and centralized reporting tools
● Reporting Essentials
○ Compliance rates
○ Systems pending patch application
○ Documenting exceptions or failures
● What benefits does centralized patch tracking provide to security management?

34
CSE298 Cybersecurity - Lecture 24
Security Assessment and Testing
Penetration Testing & Discovery

Spring 2025
Alex Clevenger
Security assessment as a principle
● What is security assessment?
● Why does it matter?
● Is there a difference between the following terms:
○ Assessment, Testing, and Continuous verification
● Assessment: evaluate the overall posture of a system, process, or
organization.
● Testing: To validate specific behaviors or outputs against expected results
● Cont. Verification: To automatically and repeatedly confirm that systems
behave securely and correctly over time.
36
How security professionals assess
● Credentialed vs. non-credentialed scans
● Common tools used:
○ Nessus
○ OpenVas
○ Tool + tuning for false positives

Question: Are these tools knowledge-based or behavior-based?

● CVSS scoring basics

37
CVSS ext.

38
Phases
● Recon → Exploit → Post‑exploit → Cleanup
● Two types of reconnaissance:
○ Passive reconnaissance: Collect information without directly targeting
the endpoint
○ Active reconnaissance: Collect information by directly targeting the
endpoint
● Exploit
○ Establish C2C channel (resource considerations)
○ Data infiltration
○ In-memory execution

39
Phases cont.
● Post-exploit
○ Credential dumping or corruption
■ Depending on the goal
○ Data exfiltration
○ Lateral movement
○ Persistence
● Cleanup
○ Log clearing
○ Remove any writes to disk in general
○ Remove persistence
○ Terminate and close C2C channel

40
PTES/OWASP Testing Guide
● Penetration Testing Execution Standard (PTES):
○ A structured, methodology-driven framework
○ Well defined phases for pentesting professionals to follow
● Open Worldwide Application Security Project (OWASP) testing guide:
○ Web application-specific framework for pen-testing
● Why do pentesters use guides like PTES and OWASP?

41
Ethics, scoping & rules of engagement
● Critically important to define scope ahead of time
○ Legal protection
● Informed consent is non-negotiable
● Company does not wanting 3rd party snooping where they shouldn’t be
● Possible to break mission critical systems
○ Hospital
● Report responsibly

42
Mitre Att&ck
● Mitre is non-profit organization that provides sophisticated frameworks for
security assessment
● Categories list of common tactics, techniques, and procedures
● Uses historical data to define attack vectors and nefarious behavior
● Not just a list of CVEs
○ A curated list of HOW previous hackers have exploited systems
● Mitre Defense is the blue-team counterpart

Where does this fit into the context of security assessment?

43
SAST, DAST, and IAST
● SAST (static): Static Application Security Testing
○ Analyze source code or bytecode without executing
● DAST (dynamic): Dynamic Application Security Testing
○ Running the application as a black-box
● IAST: Interactive Application Security Testing
○ Combines elements of both

What are some of the tradeoffs between these different approaches?

44
OWASP Top 10 overview
● A standard awareness document for developers and security professionals
● Sets standard for top 10 most critical security risks for web-apps specifically
● Updated periodically by the OWASP Foundation
● Not simply a list of bugs
○ Architectural flaws and common insecure practices
● Vast majority of CVE’s fall into these categories
○ Discovery mechanisms use this to identify patterns

45
Dependency scanning
● Looking at the dependencies in your application
○ ‘-H’ compiler flag
● Scanning specifically for known CVE’s in your third party code
● Open source tools
○ Npm, maven, pip
● System libraries
○ OpenSSL, Glib, libc

Common tools: Snyk, Dependabot

46
CSE298 Cybersecurity - Lecture 25
Security Assessment and Testing
Analyzing, Reporting, Automating

Spring 2025
Alex Clevenger
Network mapping (Nmap, masscan)
● Goal: discover and interpret the layout of a given system
● Use the right tool: breadth vs depth
● Know how to interpret the output meaningfully
● Use built-in output formats (-oX, -oG, -oN) to save and document scan results
● Automate scanning and analysis workflow
○ Cron
○ Pipelines
● Address the drawbacks of your workflow

48
Firewall rule testing & bypass techniques
● Firewall overview
○ Stateful vs. Stateless
○ Rule-based “gatekeepers”
○ Top-down evaluation and chaining
○ Default-deny and default-allow strategies
● Testing
○ Simulate various traffic types
○ hping3, nmap, curl, telnet, netcat
○ Look for holes

49
Firewall Bypass Techniques
● Tunneling: wrap the traffic inside protocols that the firewall allows
● Port knocking: Use a specific sequence of connections to try to trigger rule
changes in the firewall
● Source spoofing: test how the firewall responds to spoofed traffic
● Payload obfuscation: determine whether the firewall is inspecting the packet
payloads or just the headers
● Document findings
○ E.g. “Firewall allows telnet from X.X.X.X/y”
● Automate bypassing strategies

50
Wireless basics
● Wifi security protocols
○ WPA2 or WPA3 (Both enterprise & personal)
● WPA2
○ 4-way handshake, AES-CCMP encryption
● WPA3
○ SAE (Dragonfly), AES-CCMP encryption
● Wireless enumeration (airmon-ng, airodump-ng, kismet, or Wireshark)
○ Discover nearby SSIDs
○ Capture handshakes for WPA cracking
○ Monitor channel usage
● Rogue APs and Evil Twin
51
Wifi sniffing
● Switched vs. Non-switched traffic
○ Non-switched (e.g Hub)
■ All frames are sent to every port
○ Switched (e.g. Switch)
■ Learns MAC address per port and only forwards frames to that dest
● Promiscuous mode
○ NIC processes ALL ethernet frames it sees, not just those addressed to
its MAC address
○ Newer encryption standards enforce client isolation
● Monitor mode
○ NIC captures all raw 802.11 frames on a given channel
■ Beacons, probe requests, handshakes, etc

52
Wireless Segmentation
● VLAN: Virtual Local Area Network
○ VLAN tagging with VLAN ID
○ Switches use this tag to determine where the packet belongs
● Each VLAN is treated like its own network
○ Broadcasts, multicasts, unicast traffic stay isolated
● VLAN and RBAC
● Test and automate segmentation effectiveness

Question: Why does segmentation matter? Why go to the effort?

53
Frameworks
● MITRE ATT&CK for technique mapping
● NIST CSF: broad risk management lifecycle
○ Identify, Protext, Detect, Respond, Recover
● Kill chain (Lockheed Martin)
○ Sequence of attacker actions from recon to exfiltration
● Interpret and use threat intelligence
○ Key indicators: IPs, hashes, domains, file names, behavioral patterns
○ Learn how to correlate intel with observed behavior

54
Threat Intelligence
● Strategic Intel: high-level trends
● Tactical Intel: IOCs, attacker tools
● Operational Intel: active campaigns
● Technical Intel: raw data like exploit code

● Structured threat reporting


● Automation of intel ingestion and detection
● Adversarial modeling

55
Structuring executive vs. technical reports
● Executive reporting
○ High-level
○ Non-technical crowd
○ Risk-focused summaries and business impact
● Technical reporting
○ Precise language
■ Tools versions, commands
○ Steps to reproduce
■ Logs, payloads, screenshots
○ Severity (CVSS)
○ Remediation instructions

56
Ticketing systems (Jira/ServiceNow)
● What is the purpose of ticketing systems?
○ Centralize issue tracking: incidents, bugs, vulnerabilities
● Basic fields
○ Summary, Description, Severity/Priority, Labels, Status, Assignee, Due
Date
● Lifecycle
○ Open → In Progress → Resolved → Closed
● Automation
○ Tickets can be auto-generated from scans

57
Retest planning
● Once a ticket has been “resolved” → Verify, Validate, Document
● Not simply a “re-running a scan”
○ Verifying the effectiveness of the fix
● Ensures vulnerabilities are not reintroduced or misconfigured after patching
● Prepare a clear-cut retest strategy
○ Who executes it? What will it affect? How will it happen?
● Document the outcome
● Automate where appropriate
○ CI/CD pipeline

58
DevSecOps
● What is it?
○ Embedding security into EVERY phase of SDLC
● Philosophy
○ Security is everyone’s responsibility
○ Security flaws should be addressed earlier rather than later in the
SDLC
○ Combine different roles for collaborative risk management
● Tools and testing types
○ SAST, DAST, IAST

59
Continuous Testing
● Fundamentally integrate security into CI/CD pipelines
○ Github Actions, Gitlab CI, CircleCI, etc
● Set clear thresholds for failure
○ Under what conditions should the build or push fail?
● Security testing should be automated at:
○ Code commit
○ Build
○ Pre-deployment
○ Post-deployment

60
Continuous Testing cont.
● Automated findings should be pushed to appropriate location
○ Dashboards, ticketing systems
● Measure and improve
○ Track security metrics over time w.r.t. the CI/CD pipeline
● Automate remediation when appropriate
○ Under certain circumstances, tools can be used to “auto-patch”
○ Pre-configure secure templates

Question: Are there dangers with automating remediation?

61
CSE298 Cybersecurity - Lecture 26
Security Architecture and Engineering
- Design Principles and Models
Spring 2025
Mark Erle
Security Architecture and Engineering
● What is it?
○ Designing, building, and maintaining secure systems by applying structured
principles, models, and technologies to minimize risk and resist attacks
● Key Components
○ Architecture - High-level system design that defines trust boundaries, data
flows, access controls, and component interactions
○ Engineering - Implementation and integration of technologies (hardware,
software, cryptography) that enforce security requirements at every level
● Focus areas include:
○ Secure design principles
○ Security models
○ Integration of cryptographic mechanisms
○ Hardware and software protections
63
Importance of Security Architecture and Engineering
● Why it matters
○ Security architecture connects principles, models, and technologies into
cohesive system designs
○ Poor architecture decisions can undermine even the strongest
cryptography or policies
○ This domain addresses how we engineer secure systems that resist
real-world threats
○ It represents the capstone of what we've studied: applying layered
security thinking to complete system design
● Think about a system you trust/use (e.g., phone, cloud storage, banking app).
○ What architectural decisions might make you trust—or distrust—it?

64
Secure System Design Principles - 1 of 2
● Defense in Depth
○ Layered security mechanisms: physical, technical, administrative
○ Redundancy across security controls to reduce single points of failure
○ Examples: firewall + endpoint security + user training
● Least Privilege
○ Each process/user should operate using the minimal level of access
○ Reduces impact of exploitation or error
○ Supports containment and forensic traceability
● How do these principles relate to software you've used or built?

65
Secure System Design Principles - 2 of 2
● Separation of Duties
○ Avoids concentration of power or control in a single entity
○ Enforces accountability through task distribution
● Fail-Safe Defaults
○ Deny access by default; require explicit permission
○ Ensures predictable behavior under failure
● Economy of Mechanism
○ Simpler systems are easier to verify and secure
○ Minimal complexity reduces attack surface
● How do these principles relate to software you've used or built?

66
Bell-LaPadula (BLP) Model – Confidentiality-Focused
● Goal: To prevent unauthorized disclosure of information in systems that manage data at
different sensitivity levels (e.g., Top Secret, Secret, Confidential, Unclassified).
● Rules:
1. Simple Security Property ("No Read Up")
A subject (e.g., a user or process) cannot read data at a higher classification than their
own.
→ Prevents access to more sensitive information.
2. Star Property ("No Write Down")
A subject cannot write data to a lower classification level.
→ Prevents leaking sensitive data to less secure areas.
● Example Use: A military document system
○ A user cleared for Secret can:
■ Read Secret and Confidential files
■ Cannot read Top Secret files (No Read Up)
■ Cannot write to Confidential or Unclassified (No Write Down)
● Use in Architecture:
○ Implemented in access control policies for classified systems
○ Applies to file permissions, databases, and cloud tiering 67
Biba Model – Integrity-Focused
● Goal: To prevent unauthorized modification of data. Used when data accuracy and
trustworthiness are paramount (e.g., medical records, financial systems).
● Rules:
1. Simple Integrity Property ("No Read Down")
A subject cannot read data at a lower integrity level.
→ Avoids contamination by untrusted sources.
2. Star Property ("No Write Up")
A subject cannot write to a higher integrity level.
→ Prevents less trusted entities from corrupting more trusted data.
● Example Use: A financial system
○ A junior employee (low integrity level) can:
■ Read their own input data
■ Can read audited, high-integrity data (Reading Up allowed)
■ Cannot overwrite trusted financial reports (No Write Up)
● Use in Architecture:
○ Controls what apps or users can modify sensitive databases or logs
○ Often combined with audit trails and trusted paths 68
Clark-Wilson Model – Transaction Integrity
● Goal: To prevent unauthorized modification of data; used when data accuracy and
trustworthiness are paramount (e.g., medical records, financial systems).
● Key Concepts
○ Well-formed transactions: All data changes must occur through controlled, logged
processes
○ Separation of duties: Different roles are required to initiate, approve, and verify actions
● Example Use: In accounting
○ One user inputs an expense (can’t approve it)
○ Another user reviews and approves (can’t alter it)
○ System logs every action through controlled interfaces
● Use in Architecture:
○ Role-based access controls
○ Enforced workflows (e.g., ERP or banking systems)

69
How Are These Models Used in Practice?
● You don't directly code "Bell-LaPadula rules", but you apply the logic through:
○ Access control mechanisms (ACLs, RBAC)
○ Labeling systems (e.g., SELinux, MAC policies)
○ Security policy engines (like AppArmor or security middleware)
● In secure system architecture:
○ BLP protects secrecy
○ Biba protects data integrity
○ Clark-Wilson ensures business logic and oversight
● They inform policy decisions… Who should be allowed to access what and
under what conditions?

70

You might also like