Chapter 1 Computer Security
Chapter 1 Computer Security
Asset is
Threat is the possible danger that may exploit the vulnerability of the
system or asset. A threat can be prevented by controlling the vulnerabilities.
Types of Attacks
Passive attack are difficult to detect as they donot involve any alteration of
the data. The message traffic is sent and received in an apparently normal
fashion and neither the sender nor receiver is aware that a third party has
read the messages or observed the traffic pattern. To prevent such attack
encryption technique can be used.
Active Attacks. Active attacks involves some modification of the data stream
or creation of a false data. Attackers launch attacks on the target system or
network by sending traffic actively that can be detected. Types of active
attacks:
a. Masquerade. It takes place when one entity pretends to be a different
entity. It refers to a scenario. Where an Entity (Say ‘A’) pretends to be
another entity (Say ‘B’) and sends a message to entity (Say ‘C’). This is
possible if ‘A’ is able to capture the authentication sequences of entity
‘B’ and replay it for sending an unauthorized message to entity ‘C’. The
recipient C will tend to believe that the message has been sent by ‘B’.
Security Services
2. Access Control
Requirement: The system shall enforce access controls that restrict
access to data and resources based on user roles and permissions.
Details: Role-based access control (RBAC), mandatory access control
(MAC), or discretionary access control (DAC).
3. Data Confidentiality
4. Data Integrity
6. Non-repudiation
7. Availability
Requirement: The system shall ensure that critical resources and data
are available to authorized users when needed.
Details: Redundancy, failover mechanisms, backup and recovery plans.
8. Security Management
9. Privacy
1. Identify Threats and Risks: Understand the potential threats and risks
that the system faces. This could be done through threat modeling and
risk assessments.
4. Review and Validate: Ensure that the requirements are reviewed and
validated by stakeholders, including security experts, to ensure they are
comprehensive and achievable.
Attack Surfaces
An attack surface is the total number of all possible entry points for unauthorized access into any
system. Attack surfaces include all vulnerabilities and endpoints that can be exploited to carry out a
security attack. The attack surface is also the entire area of an organization or system that's
susceptible to hacking.
Physical attack surfaces comprise all endpoint devices, such as desktop systems, laptops,
mobile devices, hard drives and USB ports. This type of attack surface includes all the devices
that an attacker can physically access. Likewise, this also includes improperly discarded
hardware that contains user data and login credentials, passwords on paper or physical break-
ins.
Digital attack surfaces encompass applications, code, ports, servers and websites, as well as
unauthorized system access points. A digital attack surface is all the hardware and software that
connect to an organization's network. Vulnerabilities caused by poor coding, weak passwords,
default operating system settings, exposed APIs, outdated software or misconfigurations are all
part of the digital attack surface.
Social engineering attack surfaces surround the topic of human vulnerabilities as opposed to
hardware or software vulnerabilities. Social engineering is the concept of manipulating a person
with the goal of getting them to share and compromise personal or company data. Therefore, an
organization's social engineering attack surface is the number of authorized users who are
susceptible to social engineering attacks. Phishing attacks are a well-known example of social
engineering attacks.
Attack Tree
Attack trees are hierarchical, graphical diagrams that show how low level
hostile activities interact and combine to achieve an adversary's objectives
- usually with negative consequences for the victim of the attack.
Similar to many other types of trees (e.g., decision trees), the diagrams are
usually drawn inverted, with the root node at the top of the tree and
branches descending from the root. The top or root node represents the
attacker's overall goal. The nodes at the lowest levels of the tree (leaf
nodes) represent the activities performed by the attacker. Nodes between
the leaf nodes and the root node depict intermediate states or attacker sub-
goals. Although the attacker may gain benefits (and the victim suffer
impacts) at any level of the tree, the impacts usually increase at higher
levels of the tree.
│ │ ├── Pickpocket
├── Interception
└── Modification