Is Unit-1
Is Unit-1
Information is a valuable asset like any other asset. So, information needs to be
secured from attacks. Now the question is what is security?
Security is
• Protect vital information while still allowing access to those who need it. Eg.
Medical records, Trade secrets etc
• Provide authentication and access control for resources
• Guarantee availability of resources
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service
With the invention of computers, information storage become electronic, means it was
stored in computers. The three security requirements, however, did not change. The
files stored in computers also require confidentiality, integrity and availability (CIA).
The implementation of these requirements, however is different and more challenging
During the last two decades, computer networks created a revolution in the use of
information. Information is now distributed. Authorized people can send and retrieve
information from a distance using computer networks. Although the three above
mentioned requirements confidentiality, integrity and availability have not changed,
they now have some new dimensions.
The term 'information security' means protecting information and information systems
from unauthorized access, use, disclosure, disruption, modification, or destruction in
order to provide integrity, confidentiality, and availability.
PRINCIPLES OF SECURITY
Now we classify the principles related to security, which help us understand the
attacks better and also help us to tackle the attacks. By taking one example will
understand these concepts.
Let us assume that a person A wants to send a check worth 10000 Rs. to another
person B. So, A will write the check for 10000 Rs, put it inside an envelope and send
it to B.
● A will like to ensure that no one except B gets the envelope and even if
someone else gets it, she does not come to know about the details of the check.
This is the principle of confidentiality
● A and B will further like to make sure that no one can tamper with the
contents of the check (such as its amount, date, signature, name of the payee,
etc.). This is the principle of integrity
● B would like to be assured that the check has indeed come from A and not
from someone else posing as A (as it could be a fake check in that case). This
is the principle of authentication.
• What will happen tomorrow if B deposits the check in his account, the money
is transferred from A’s account to B's account and then A refuses having
written/sent the check? The court of law will use A's signature to disallow A to
refuse this claim and settle the dispute. This is the principle of non-
repudiation.
These are the four chief principles of security. There are two more, access control and
availability, which are not related to a particular message, but are linked to the overall
system as a whole.
• Access control: Access control specifies and control who can access what.
• Availability:
It means that assets are accessible to authorized parties at appropriate times.
ATTACKS
Interruption
Fig. Interruption
Interception
Modification
This is an attack on integrity. An unauthorized party not only gains access but tampers
with an asset. Ex: changing values in data file, altering a program, modifying the
contents of messages being transmitted in a network.
Fig. Modification
Fabrication:
1. Passive attacks
2. Passive attacks
a. Passive attacks
A passive attack attempts to learn or make use of information from the system but
does not affect system resources. In a passive attack, the attacker’s goal is just to
obtain information. The attack does not modify data or harm the system, and the
system continues with its normal operation. Example of attack threatening to
confidentiality is Release of message contents and traffic analysis
Passive attacks are very difficult to detect because they do not involve any alteration
of data. However, it is feasible to prevent the success of these attacks.
b. Active attacks
An active attack attempts to alter system resources or affect their operation. An active
attack may change the data or harm the system. Example of attack threatening to
integrity is masquerading, replaying, modification and Repudiation. Example of attack
threatening to availability is Denial of Service (DoS).
1. Masquerade: It takes place when one entity claims to be a different entity. One of
the other forms of active attack is a masquerade attack. Figure depicts masquerade
attack where Darth sends message to Alice pretending to be Bob and Alice thinks that
message is from Bob. Alice is unaware that message is actually send by Darth.
Fig masquerade
For example consider Figure with scenario that Bob sends message to Alice to add
amount of Rs. 500/- to Darth’s account. Darth captures the message and replays after
few days. Alice assumes that this is new message from Bob and he adds amount to
Darth’s account.
Fig replay
4. Repudiation
Sender or receiver performs this attack. The sender or recipient might subsequently
deny sending or receiving a communication. The client, for instance, asks his bank
"To transfer the sum to someone" and, subsequently, refuses the sender (customer) to
make the request. This is disapproval. Figure represents Repudiation where Darth
denies previously sent message to Alice
Fig repudiation
Denial of service (DoS): Fabrication causes denial of service attacks. Another form of
service denial is the disruption of an entire network, either by disabling the network or
by overloading it with messages so as to degrade performance.
Functional requirements define the basic system behavior. Essentially, they are what
the system does or must not do, and can be thought of in terms of how the system
responds to inputs. Functional requirements usually define if/then behaviors and
include calculations, data input, and business processes.
Functional requirements are features that allow the system to function as it was
intended. Put another way, if the functional requirements are not met, the system will
not work. Functional requirements are product features and focus on user
requirements.
The functional requirements of security should be:
Attack Surface:
The attack surface is the number of all possible points, or attack vectors, where an
unauthorized user can access a system and extract data. The smaller the attack surface,
the easier it is to protect.
Examples are
The digital attack surface area encompasses all the hardware and software that
connect to an organization’s network. These include applications, code, ports, servers,
and websites, as well as shadow it, which sees users bypass IT to use unauthorized
applications or devices.
The physical attack surface comprises all endpoint devices that an attacker can gain
physical access to, such as desktop computers, hard drives, laptops, mobile phones,
and Universal Serial Bus (USB) drives. The physical attack threat surface includes
carelessly discarded hardware that contains user data and login credentials, users
writing passwords on paper, and physical break-ins.
Organizations can protect the physical attack surface through access control and
surveillance around their physical locations. They also must implement and test
disaster recovery procedures and policies.
attack tree:
A branching, hierarchical data structure that represents a set of potential approaches to
achieving an event in which system security is penetrated or compromised in a
specified way.
Attack trees provide a formal, methodical way of describing the security of systems,
based on varying attacks.
Attack trees aim to build a structured and logical image of the cyber security risk to a
system from the perspective of possible successful attacks.
Eg:
Visualising cyber security risk in this way gives a clear understanding of where the
risk comes from, allowing you to identify security weaknesses and develop
mitigations for them.
Attack trees can also be used effectively in agile environments, where the tree can be
built alongside iterative development. Taking this approach means that cyber security
risks are considered as they are discovered and appropriate countermeasures can be
introduced.
Strategy:
Principle: 5 principle
1. Zero Trust Networks:
2. Zero Trust Workloads:
3. Zero Trust Data:
4. Zero Trust People:
5. Zero Trust Devices:
Assignment-1