CH01-Overview - 2
CH01-Overview - 2
© 2016 Pearson
Education, Inc.,
Hoboken, NJ. All
rights reserved.
Key Security Concepts
Confidentiality Integrity Availability
Non-
Availability Integrity Authenticity
repudiation
Confidentiality Accountability
• The property • The property • The property • Assurance that • The property • The property
of a system or that data has of being the sender of that data is not of a system or
a system not been genuine and information is disclosed to system
resource being changed, being able to provided with system entities resource
accessible or destroyed, or verify that proof of unless they ensuring that
usable or lost in an users are who delivery and have been the actions of a
operational unauthorized they say they the recipient is authorized to system entity
upon demand, or accidental are and that provided with know the data may be traced
by an manner each input proof of the uniquely to
authorized arriving at the sender’s that entity,
system entity, system came identity, so which can
according to from a trusted neither can then be held
performance source later deny responsible for
specifications having its actions
for the system processed the
information
Levels of Impact
Low Moderate High
The loss could be
The loss could be The loss could be
expected to have a
expected to have a expected to have a
severe or
limited adverse serious adverse
catastrophic
effect on effect on
adverse effect on
organizational organizational
organizational
operations, operations,
operations,
organizational organizational
organizational
assets, or assets, or
assets, or
individuals individuals
individuals
Software
Data
• Threats
• Capable of exploiting vulnerabilities
• Represent potential security harm to an asset
Residual
vulnerabilities
may remain
Goal is to
May itself
minimize residual
introduce new
level of risk to the
vulnerabilities
assets
© 2016 Pearson Education, Inc., Hoboken,
NJ. All rights reserved.
• Protect
• Limit employee access to data and
information
• Install surge protectors and
• Identity uninterruptible power supplies (UPSs)
• Identify and control who has • Patch your operating systems and
access to your business applications
information • Install and activate software and
hardware firewalls on all your business
• Conduct background checks networks
• Require individual user • Secure your wireless access point and
accounts for each employee networks
• Set up web and email filters
• Create policies and
• Use encryption for sensitive business
procedures for information information
security • Dispose of old computers and media
safely
• Detect
• Train your employees
• Install and update antivirus,
• Recover
anti-spyware, and other
• Make full backups of important
anti-malware programs business data/information
• Maintain and monitor logs • Make incremental backups of important
business data/information
• Respond • Consider cyber insurance
• Develop a plan for disasters • Make improvements to
Security
Functional
Requirements
(page 1 of 2)
(page 2 of 2)
Henric Johnson 29
Security Attacks
• Interruption: This is an attack on
availability
• Interception: This is an attack on
confidentiality
• Modification: This is an attack on
integrity
• Fabrication: This is an attack on
authenticity
Henric Johnson 30
RISK ASSESTMENT
1.4 - Fundamental Security
Design Principles
Economy of Fail-safe Complete
Open design
mechanism defaults mediation
Least
astonishment
Fundamental Security Design Principles
• With a complex design, there are • Most file access systems and
many more opportunities for an virtually all protected services on
adversary to discover subtle client/server use fail-safe defaults
weaknesses to exploit that may
be difficult to spot ahead of time
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Fundamental Security Design Principles
Least privilege
Separation of privilege
• Defined as a practice in which • Means that every process and
multiple privilege attributes every user of the system should
operate using the least set of
are required to achieve access
privileges necessary to perform
to a restricted resource the task
Isolation Encapsulation
Modularity Layering
Least astonishment
• Means that a program or user interface should
always respond in the way that is least likely to
astonish the user
Examples:
Vulnerabilities created by
personnel or outsiders, such as
social engineering, human error,
and trusted insiders
Included in this category are
network protocol vulnerabilities,
such as those used for a denial-of- Particular focus is Web server
service attack, disruption of software
communications links, and various
forms of intruder attacks
© 2016 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
© 2016 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
1.6 - Computer Security Strategy
Security Policy Security
• Formal statement of rules Implementation
and practices that specify • Involves four
or regulate how a system or complementary courses of
organization provides action:
security services to protect • Prevention
sensitive and critical system • Detection
resources
• Response
• Recovery
Assurance Evaluation
• The degree of confidence • Process of examining a
one has that the security computer product or
measures, both technical system with respect to
and operational, work as certain criteria
intended to protect the
system and the information
it processes
1.7 - Standards
• Standards have been developed to cover management practices
and the overall architecture of security mechanisms and
services
• The most important of these organizations are:
o National Institute of Standards and Technology (NIST)
• NIST is a U.S. federal agency that deals with measurement science, standards,
and technology related to U.S. government use and to the promotion of U.S.
private sector innovation
o Internet Society (ISOC)
• ISOC is a professional membership society that provides leadership in
addressing issues that confront the future of the Internet, and is the organization
home for the groups responsible for Internet infrastructure standards
o International Telecommunication Union (ITU-T)
• ITU is a United Nations agency in which governments and the private sector
coordinate global telecom networks and services
o International Organization for Standardization (ISO)
• ISO is a nongovernmental organization whose work results in international
agreements that are published as International Standards
© 2016 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Summary
• Computer security concepts • Fundamental security
o Definition design principles
o Challenges
o Model • Attack surfaces and
• Threats, attacks, and attack trees
o Attack surfaces
assets o Attack trees
o Threats and attacks
o Threats and assets • Computer security
• Security functional strategy
o Security policy
requirements o Security implementation
o Assurance and evaluation