Lec 1-4-1
Lec 1-4-1
PRINCIPLES AND
PRACTICE
Chapter 1: Overview
Information Security
Dr. Khalid Hamid
More than 60 Research Publications
Ex. IT Incharge CTPL
Computer Security Concepts
Threats, Attacks, and Assets
Security Functional Requirements
Fundamental Security Design Principles
Attack Surfaces and Attack Trees
Computer Security Strategy
CHAPTER 1 OVERVIEW
Describe the key security requirements of
confidentiality, integrity and availability
Discuss the types security threats and attacks that
must be dealt with
Summarize the functional requirements for
computer security
Explain the fundamental security design principles
Discuss the use of attack surfaces and attack trees
Understand the principle aspects of a
comprehensive security strategy
LEARNING OBJECTIVES
Virus
Phishing
Worms
Zero Day Attacks Trojen Horse
DOS SQL Injection
Exploit
DDOS
Logic Bomb
MIMA Malware
Ransomeware KeyLoggers (HW SW Theft
Pattern)
DNS Tunneling
Internal Threats (Through
Bots Privialges)
Adware (Web browser history)
Spyware (Secret Bank info)
BACKGROUND KNOWLEDGE
Computer security: The protection afforded
to an automated information system in order
to attain the applicable objectives of
preserving the integrity, availability and
confidentiality of information system resources
(includes hardware, software, firmware,
information/data, and telecommunications)
NIST 1995
A DEFINITION OF COMPUTER
SECURITY
Confidentiality
Data confidentiality: Assures that confidential
information is not disclosed to unauthorized individuals
Privacy: Assures that individual control or influence what
information may be collected and stored
Integrity
Data integrity: assures that information and programs
are changed only in a specified and authorized manner
System integrity: Assures that a system performs its
operations in unimpaired manner
Availability: assure that systems works promptly and
service is not denied to authorized users
OTHER CONCEPTS TO A
COMPLETE SECURITY PICTURE
Low: the loss will have a limited impact, e.g., a
degradation in mission or minor damage or
minor financial loss or minor harm
Moderate: the loss has a serious effect, e.g.,
significance degradation on mission or
significant harm to individuals but no loss of
life or threatening injuries
High: the loss has severe or catastrophic
adverse effect on operations, organizational
assets or on individuals (e.g., loss of life)
EXAMPLES OF SECURITY
REQUIREMENTS:
CONFIDENTIALITY
A hospital patient’s allergy information (high integrity
data): a doctor should be able to trust that the info is
correct and current
If a nurse deliberately falsifies the data, the database
should be restored to a trusted basis and the falsified
information traced back to the person who did it
An online newsgroup registration data: moderate level
of integrity
An example of low integrity requirement: anonymous
online poll (inaccuracy is well understood)
EXAMPLES OF SECURITY
REQUIREMENTS: INTEGRITY
A system that provides authentication: high
availability requirement
If customers cannot access resources, the loss of services
could result in financial loss
A public website for a university: a moderate availably
requirement; not critical but causes embarrassment
An online telephone directory lookup: a low availability
requirement because unavailability is mostly
annoyance (there are alternative sources)
EXAMPLES OF SECURITY
REQUIREMENTS: AVAILABILITY
CHALLENGES OF COMPUTER SECURITY
1. Computer security is not simple
2. One must consider potential (unexpected) attacks
3. Procedures used are often counter-intuitive
4. Must decide where to deploy mechanisms
5. Involve algorithms and secret info (keys)
6. A battle of wits between attacker / admin
7. It is not perceived on benefit until fails
8. Requires constant monitoring
9. Too often an after-thought (not integral)
10. Regarded as impediment to using system
Table 1.1 and Figure 1.1 show the relationship
Systems resources
Hardware, software (OS, apps), data (users,
system, database), communication facilities and
network (LAN, bridges, routers, …)
Our concern: vulnerability of these resources
(corrupted, unavailable, leaky)
Threats exploit vulnerabilities
Attack is a threat that is accrued out
Active or passive; from inside or from outside
Countermeasures: actions taken to prevent,
detect, recover and minimize risks
.
THE SCOPE OF COMPUTER
SECURITY
EXAMPLES OF THREATS
SECURITY FUNCTIONAL REQUIREMENTS
(FIPS 200)
Technical measures
Access control; identification & authentication; system &
communication protection; system & information integrity
FUNDAMENTAL SECURITY
DESIGN PRINCIPLES [1/4]
Economy of mechanism: the design of security measures
should be as simple as possible
Simpler to implement and to verify
Fewer vulnerabilities
Fail-safe default: access decisions should be based on
permissions; i.e., the default is lack of access
Complete mediation: every access should checked
against an access control system
Open design: the design should be open rather than secret
(e.g., encryption algorithms)
FUNDAMENTAL SECURITY
DESIGN PRINCIPLES [2/4]
Isolation
Public access should be isolated from critical resources (no
connection between public and critical information)
Users files should be isolated from one another (except when
desired)
Security mechanism should be isolated (i.e., preventing access
to those mechanisms)
Encapsulation: similar to object concepts (hide internal
structures)
Modularity: modular structure
FUNDAMENTAL SECURITY
DESIGN PRINCIPLES [3/4]
Layering (defense in depth): use of multiple, overlapping
protection approaches
Least astonishment: a program or interface should always
respond in a way that is least likely to astonish a user
FUNDAMENTAL SECURITY
DESIGN PRINCIPLES [4/4]
Separation of privilege: multiple privileges should be
needed to do achieve access (or complete a task)
Least privilege: every user (process) should have the least
privilege to perform a task
Least common mechanism: a design should minimize the
function shared by different users (providing mutual
security; reduce deadlock)
Psychological acceptability: security mechanisms should
not interfere unduly with the work of users
FUNDAMENTAL SECURITY
DESIGN PRINCIPLES
Attack surface: the reachable and exploitable vulnerabilities in
a system
Open ports
Services outside a firewall
An employee with access to sensitive info
…
Three categories
Network attack surface (i.e., network vulnerability)
Software attack surface (i.e., software vulnerabilities)
Human attack surface (e.g., social engineering)
ATTACK SURFACES
Attack analysis: assessing the scale and severity of threats
A branching, hierarchical data structure that
represents a set of potential vulnerabilities
Objective: to effectively exploit the info
available on attack patterns
published on CERT or similar forums
Security analysts can use the tree to guide
design and strengthen coiuntermeasures
ATTACK TREES
.
AN ATTACK TREE
An overall strategy for providing security
Policy (specs): what security schemes are supposed to do
Assets and their values
Potential threats
Ease of use vs security
Cost of security vs cost of failure/recovery
Implementation/mechanism: how to enforce
Prevention
Detection
COMPUTER
Response SECURITY
STRATEGY
Recovery
Correctness/assurance: does it really work
(validation/review)
SECURITY TAXONOMY
SECURITY TRENDS
COMPUTER SECURITY LOSSES
SECURITY TECHNOLOGIES USED
Security concepts
Terminology
Functional requirements
Security design principles
Security strategy
SUMMARY