Cissp Notes
Cissp Notes
CIA Triad
Confidentiality
o Resources should be protected from unauthorized access
o Prioritized by governments
o Concepts
Sensitivity
How harmful is disclosure
Discretion
Controlled disclosure to prevent damage
Criticality
How essential the information is to the organisation
Concealment
Hiding information (e.g. obfuscation)
Secrecy
Keeping something a secret
Privacy
Keeping personal information secret
Seclusion
Storing data in out-of-the-way locations
Isolation
Keeping data separate
Integrity
o Resources should be protected from unauthorized modification
o Resources should maintain semantic consistency
Availability
o Resource should be accessible to authorized parties
o Prioritized by businesses
AAA
Required to hold a subject accountable for actions
Identification
o Subject identifies themselves
Authentication
o Subject proves their identity
Authorization
o Subject is allowed/disallowed to perform an action
o What can the subject do and not do?
Auditing
o Subject's actions are logged
Accounting
o Subject's logs are reviewed for violations
o Subject is held accountable for their actions
o Legally Defensible Security
Required to hold subjects accountable
You need to prove:
Efforts were made to prevent the crime
Log files are accurate
All laws and regulations were followed
Warning and notifications were posted
Electronic evidence is decisive
o Non-repudiation
Subjects cannot deny performing an action
Protection Mechanism
Layering/Defense-in-Depth
o Use of multiple controls in a series
o Uses series vs. parallel
Series
Useful for security
Data passes through multiple filters
Airport with multiple gates
Parallel
Useful for performance
Data can pass any filter
Mall with multiple entrances
Abstraction
o Generalizes a group of objects and subject
o Defines object and subject templates
o E.g. "Employee" can be used to describe "Linda", "Mark", etc.
Data Hiding
o Places data in location not seen by subject
o Prevents data from being accessed by unauthorized subjects
Encryption
o Hides intent of data rather than hiding the data itself
o Makes data unreadable to unauthorized subjects
Security Governance
Administration of an organization's security program
Business Case
o Justifies starting a new project
Approaches
o Top-down
Upper management makes security policies
Lower professionals flesh out security policies
o Bottom-up
IT staff makes security decisions
Problematic
Autonomous InfoSec Team
o Led by the CSO
o Reports directly to senior management
Security Policy
o Requires support of senior management to succeed
o Evidence of due care and due diligence
Change Management
Changes can lead to security issues
Purpose
o Prevents compromise after change
Goals
o Monitor change
o Test change
o Allow rollback of change
o Inform users of change
o Analyze effects of change
o Minimize negative impact of change
o Allow review of change by Change Approval Board (CAB)
Data Classification
Identify which data need to be prioritized for protection
Identify which controls is needed for which data
Benefits
o Demonstrates commitment to protection of data
o Identifies critical assets
o Justifies selection of controls
o Required for regulations
o Defines proper access, declassification, and destruction method
o Helps with data life-cycle management
Classification Criterias
o Usefulness
o Timeliness
o Value
o Age
o Lifetime
o Relationship with subjects
o Sensitivity
o Criticality
o National Security Implications
o Storage method
o Ownership
Implementing Classification
o Identify custodian
o Determine evaluation criteria
o Classify resources
o Determine exceptions
o Determine security controls
o Determine declassification procedure
o Staff awareness/training
Classification Schemes
o Government/Military
Classified
Top Secret
Secret
Confidential
Unclassified
Sensitive
Unclassified
o Private/Business
Confidential/Private
Confidential/Proprietary: Related to business
Private: Related to personnel
Sensitive
Public
Control Frameworks
For planning IT security of an organization
Control Objectives for Information and Related Technology (COBIT)
o By ISACA
o Principles
Meeting Stakeholder Needs
Covering the Enterprise End-to-End
Applying a Single Integrated Framework
Enabling a Holistic Approach
Separating Governance from Management
Threat Modeling
Approaches
o Proactive
Performed before and while the system is being implemented
Predicting threats and designing defenses in advance
More cost effective and more successful
Security Development Lifecycle
Reduce number of coding defects
Reduce severity of remaining defects
o Reactive
Performed after the system has been implemented
Less effective but more cost effective than redesign
E.g. penetration testing, source code review, fuzz testing
Fuzz Testing
Random invalid input is fed to a program
Attempts to find previously undetected flaws
Steps
o Threat Identification
Approaches
Focused on Assets
Protect valuable assets
Focused on Attackers
Protect the things that attackers want to attack
Focused on Software
Protect the software
Individual Threats
Be cautious of
Contractors
Trusted Partners
o Threat Categorization
STRIDE
Spoofing
Falsifying information to gain access
Tampering
Making unauthorized changes
Repudiation
Denying having done an action
Information Disclosure
Revelation of controlled information
Denial-of-Service
Prevents the use of an asset
Escalation of Privilege
Elevates capability of under privileged account
o Determining Potential Attacks
Data Flow Diagrams
Entities
Technologies
Transactions
Attacks vs each element
o Reduction Analysis
Decomposing system/process/environment
Modules
Functions
Protocols
etc.
Identify the Following
Trust Boundaries
Data Flow Paths
Input Points
Privileged Operations
Security Approach
o Prioritization and Response
Probability x Damage Potential
High/Medium/Low
DREAD
Discoverability
Reproducibility
Exploitability
Affected Users
Damage Potential
Acquisition Security
Select software with integrated security
Evaluate 3rd party service provider
o On-Site Assessment
Observe their operating habits
o Document Exchange and Review
Investigate data exchange process
o Process/Policy Review
Review their security poilicy
Review Service Level Agreements
Personnel Security
People
o Weakest link in security chain
Hiring Process
o Job Description
Concepts
Separation of Duties
Least Privilege
Job Responsibilities
Job Rotation
Cross-training
Maintain throughout organization lifecycle
o Job Classification
o Employee Screening
Background checks, etc.
o Hiring and Training
Non-disclosure Agreement
Non-compete Agreement
o Termination
Notify employee
Request return of company equipment
Disable electronic access
Exit interview and NDA review
Escort off premises
Separation of Duties
o Work tasks divided among administrators
o Applies to administrators instead of users
o Prevents collusion
Least Privilege
o Users should only have privileges that they require
o Applies to users instead of admins
Job Responsibilities
o Work tasks that an employee is required to perform
o Defines required objects, resources, and services
Job Rotation
o Provides knowledge redundancy
o Less downtime
o Reduces risk of fraud via peer auditing
o Protects against collusion
Cross-training
o Alternative to job rotation
o Employees are trained for other jobs
o Workers are not rotated through different job
Collusion
o When peole work together to commit a crime
Non-disclosure Agreement (NDA)
o Protects confidential information within an organization
Non-compete Agreement (NCA)
o Prevents employees from jumping to a competitor
o Has time limit
o Allows company to keep competitive edge
o Difficult to enforce
o Deters violation of NDA
Mandatory Vacations
o Used to audit employees
Termination Best Practices
o Have one witness
o Escort off premises
o Escort required when in work area
o Return employee identification and equipment
o Disable network user account at same time of termination
o Notify HR to issue final paychecks
o Inform security personnel of termination
o Terminate at end of shift in middle of week
o Perform exit interview
Exit Interview
o Review liabilities and restrictions
o Review NDA and other agreements
Third-party Controls
o Service Level Agreements
Defines expected level of service from third-party
Put in place for network connections and services
Includes remedies if not met
Common SLA Issues
System uptime
Maximum consecutive downtime
Peak load
Average load
Responsibility for diagnostics
Failover time
Compliance
o Adherance to regulations
o Employees need to follow polcies, etc.
Privacy
o Secrecy of personal information
o Prevention of unauthorized access to PII
o Freedom from being monitored without knownledge
o For employees, site visitors, customers, suppliers, and contractors
Personally Identifiable Information
o Information that can be traced back to a person
o Includes
Phone
Email
Address
SSN
Name
o Excludes
MAC Address
IP Address
OS Type
Security Governance
Directing the security efforts of an organization
Third-party Governance
o Employment of external auditors
External auditors review your security
o Compliance of external providers
Providers must comply with your security policies
Documentation Review
On-site assessments
Documentation review
o Exchanging materials
o Reading and verifying them against expectations
o Required before preforming on-site assessments
On-site assessments
o First hand exposure to security mechanisms
o Auditors should follow COBIT
Authorization to Operate (ATO)
o For government contractos
o Required when complying with government security policies
Risk Management
Risk
o Possibility that assets could be damaged or disclosed
Risk Management
o Actions to reduce risk to an acceptable level
o Steps
Risk Analysis
Identify
Evaluate
Countermeasures
Risk Responses
Mitigate
Using countermeasures to reduce risk
Transfer
Transferring risk to another organization
Purchashing insurance
Outsourcing business processes
Accept
When countermeasure costs more than risk cost
Organization absorbs risk cost
Signed off by management
Reject
Ignoring the existence of the risk
Not prudent due-care responses to risk
Countermeasure Selection and Implementation
Rules
Countermeasure Cost < Asset Value
Countermeasure Cost < Countermeasure Benefit
Benefit of Attack < Cost of Attack
Secure by design
Benefit should be testable and verifiable
Monitoring and Measurement
Continuous Improvement
Risk Analysis
o Process of achieving risk management goals
o Steps
Identifying risk
Evaluating risk
Likelihood
Damage Potential
Risk Rating
Determining countermeasures
Cost/benefit analysis
o Types
Quantitative
Qualitative
Hybrid
o Quantitaive Risk Analysis
Assigning dollar value to risks
Steps
Identify assets and value (AV)
Identify threats against assets and exposure factor (EF)
Determine single loss expectancy (SLE)
Identify annual rate of occurence (ARO)
Determine annual loss expectancy (ALE)
Identify countermeasures and changes to ARO and ALE if
applied
Determine countermeasure cost and benefit (Raw ALE -
Controlled ALE - Annual Control Cost)
Values
Asset Value (AV)
The value of an asset
Exposure Factor (EF)
Percentage of loss to an asset if a risk to it is realized
Single Loss Expectancy (SLE)
Cost if a risk is realized
SLE = AV * EF
Annualized Rate of Occurence (ARO)
Number of times a risk is realized per year
Historical records, statistical analysis, guesswork
Determined through Probability Determination
ARO = Threat Sources * Single Likelihood
Annualized Loss Expectancy (ALE)
Expected yearly cost of a risk
ALE = ARO * SLE
Annualized Loss Expectancy with Safeguard (ALE)
When safeguard is applied, ARO and EF changes
Recalculate ALE with modified ARO
ALE = ARO * SLE
Annualized Cost of Safeguard (ACS)
Yearly cost to implement safeguard
Safeguard cost should be less than asset value
If asset value is less than safeguard, just accept the risk
Safeguard Benefit
The amount of money saved by implementing the
safeguard
Benefit = ALE w/o safeguard - ALE w/ safeguard -
ACS
o Qualitative Risk Analysis
Scenario-based
Uses threat-ranking
Techniques
Delphi Technique
Brainstorming
Surveys
etc.
Scenarios
One page description of a threat
Contains
Threat Vectors
Impact
Safeguards
Threat Level
Delphi Technique
Anonymous feedback-response process
For reaching a consensus
For honest feedback from participants
Risk Terminology
o Asset
Items that have value to the organization
Items that will damage of organization of disclosed
Any item that needs to be protected
o Asset Valuation
Monetary or intangible value of asset
Can be based on cost to develop or replace, market value, etc.
o Threats
Undesirable occurences that can damage assets
o Threat Agents
Sources of threats
o Exposure
Possibility of threat realization
Exposure is equivalent to risk
o Risk
Possibility of threat realization
risk = threat * vulnerability
o Safeguards / Countermeasure
Things or acts that reduce a threat or vulnerability
Safeguard
Pro-active controls
Countermeasure
Reactive controls
o Attack
Exploitation of vulnerability by threat agent
Intentional attempt to exploit
o Breach
Occurence of security mechanism bypass
o Penetration
State where threat agent has access to organization's infrastructure
o Total Risk
Risk that organization faces without safeguards
Total Risk = Threat * Vulnerabilities
o Residual Risk
Risk that remains after countermeasures are implemented
Risk that management has chosen to accept
Residual Risk = Total Risk - Control Gap
Control Gap: Amount of risk reduced by controls
Risk Elements
o Threat exploits...
o Vulnerability, resulting in...
o Exposure, which is...
o Risk, which is mitigated by...
o Safeguards which protected...
o Assets which are endagered by...
Identifying Threats
o Listing down all threat agents and events
o Should involve various departments
o Employment of external consultants
Countermeasure Selection and Implementation
o Categories
Technical
Hardware or software mechanisms
Firewalls, IDSs, etc.
Administratives
Policies and procedures
Management controls
Physical
Physically tangible
Guards, fences, CCTV, etc.
o Types
Deterrent
Discourages violation of security policy
Fences, trainings, guards, etc.
Preventive
Stops violations of security policies
Firewalls, IPS, mantraps, etc.
Detective
Discovers violations of security policies
CCTV, audit trails, motion detectors, etc.
Compensating
Added in addition to other security controls
Encryption of PII at rest and in transit
Corrective
Return system to secure state after violation of policy
Terminating malicious activity, patching software, etc.
Recovery
Extension of corrective controls, but more advanced
Backups, fault tolerance, shadowing, clustering, etc.
Directive
Directs the actions of subjects
Notifications, escape route signs, procedures, etc.
Asset Valuation
o Assigning dollar value to assets
o Factors
Acquisition/Development Cost
Management Cost
Maintenance Cost
Cost to Protect
Value to Owners and Users
Value to Competitors
Intellectual Property
Market Value
Replacement Cost
Productivity Enhancement
Operational Cost
Liability of Asset Loss
Usefulness
Risk Management Framework (NIST 800-37)
o Categorize
Categorize information system elements
Based on impact analysis
o Select
Select initial security controls
o Implement
Implement selected security controls
o Asses
Check if controls are appropriate
Check if controls are implemented correctly
o Authorize
Authorize operation of information system
Acceptance of risks
o Monitor
Monitor effectiveness of controls
Asset Classification
Sensitive Data
o Personally Identifiable Information
Can be used to distinguish an individual's identity
Information linkable to an individual
o Personal Health Information
Processed by health organizations, schools, employer
Relates to past, present, or future health condition of individual
Relates to past, present, or future payment for healthcare
o Proprietary Data
Helps maintain competitive edge of organization
Sensitive Data Management
o Marking
Applying classification labels
Digital Labels
Headers and Footers
Watermarks
Metadata
Background Colors
Physical Labels
Hardware Color
Text Label
Label unclassified assets as well
Prevents omission
Identify downgrade procedures
Purging, etc.
Usually prohibited
Destruction and repurchasing is safer
o Handling
Secure use and transport of data based on classification
Backup should be as protected as production data
Log, monitor, and audit to ensure compliance and accountability
o Storage
Apply appropriate controls based on classification
Encryption
AES256
Physical Security
Safes
Secure Rooms
Cabinets
HVAC
Data is more valuable than the media
Buy high quality media
Buy media with built-in security
o Destruction
Data disposal requirements based on classification
Prevents unauthorized disclosure
Data Remanance
Magnetic Media
Residual magnetic footprint of data on hard drive
Can be recovered even if data was overwritten
Use a degausser to remove it
Solid State Drives
No reliable way to destroy data
Has built-in erase commands, but innefective
Physical destruction is best solution
Terms
Erasing
Normal delete operation
Frees file space but doesn't remove data
Data might be overwritten eventually
Clearing
Overwriting, essentially
Write a single character, its complement, and
then random data
Bad and spare sectors are not overwritten
Might still be recoverable
Purging
Prepares media for less secure environments
Involves both clearing and degaussing
Declassification
Involves purging and changing media classification
Not recommended; destruction is better
Organization risks an undiscovered recovery technique
Sanitation
Umbrella term referring to removal of sensitive data
from media
Can involve purging, or destruction, etc.
Degaussing
Using strong magnets to erase data on media
Destroys media electronics sometimes
Does not affect CDs, DVDs, or SSDs
Destruction
Physical destruction, basically
Crushing, shredding, incineration, chemicals, etc,
Most secure data destruction method
o Retention
Data retention requirements based on classification
Can reduce liabilities
Record Retention
Retaining important information as needed
Timeframe identified by regulation or organization policy
Media/Hardware Retention
Retaining hardware until it has to be replaced
Personnel Retention
Retaining personnel knowledge
Ensuring personnel don't violate NDA
Data Classifications
o Allows appropriate controls to be implemented for assets
o Government
Focuses on value to national security
Classified
Top Secret (Class 3)
Disclosure = exceptionally grave damage
Secret (Class 2)
Disclosure = serious damage
Confidential (Class 1)
Disclosure = damage
Unclassified
Sensitive
Unclassified (Class 0)
Disclosure = no damage
Available via FOI request
o Private
Focuses on value to organization
Proprietary (Class 3)
Disclosure = exceptionally grave damage
Keeps the organization competitive
Business depends on secrecy of this data
E.g. unreleased Sony movies, trade secrets, etc.
Private (Class 2)
Disclosure = serious damage
Personal information of staff, customers, and contractors
E.g. salary information
Sensitive (Class 1)
Disclosure = damage
Sensitive information that is not proprietary or private
E.g. company records, emails, etc.
Public (Class 0)
Disclosure = no damage
Meant for public consumption
Only integrity and availability is protected
E.g. brochures, websites, etc.
Data States
o Data at Rest
Stored on media
E.g. data stored in hard drive
Controls
Symmetic Encryption
AES
Triple DES
Blowfish (basis for bcrypt)
o Data in Motion
Moving across a network
E.g. data moving across wired or wireless connection
Controls
Transport Encryption
HTTPS
Encrypts HTTP Data
TLS/SSL
SSL - Vulnerable to POODLE (do not use)
Encrypts data between sockets
IPSec
Encrypts data between two networks
Allows VPN solutions
Modes
Authentication Header
Provides Integrity
Encapsulating Security Payload
Provides Confidentiality
SSH/SCP/SFTP
Encypted terminal sessions with file transfers
o Data In Use
Data in temporary storage buffer while being used
E.g. data in RAM, registers, etc.
Controls
Purging after use
Data Roles
o Data Owner
Ultimately responsible for the data
Liable for negligence
Identifies data classification
Roles
Determine acceptable use policy
Determine security controls policy
Determine access and privilege policy
e.g. President, CEO, etc.
o System Owner
Owns the system that processes data
Roles
Craft system security plan w/ data owner
Manage system security plan
Train users and personnel on acceptable use policy
Implement system security plan
e.g. IT department
o Business/Mission Owner
Owns a business process that leverages systems
Leverages on systems to provide value to organization
Goals may sometimes conflict with system owners
e.g. Sales department
o Data Processor
Processes data for a data controller (business/mission owner?)
Must not use data for anything else aside from intended purpose
e.g. 3rd party payroll processor
o Administrator
Grants access to personnel
Follows principle of least privilege
Uses role-based access control model
Adds and removes users from roles
o Data Custodian
Implements data security controls
Implements safe backup and storage of data based on policy
e.g. IT department
o User
Accesses data to accomplish work tasks
e.g. employees, end users
Protecting Privacy
o Security Baselines
List of security controls
Image of a secure system
o Scoping and Tailoring
Revising a standard/baseline to meet your requirements
e.g. removing WAF when you have no web application
e.g. not complying with safe harbor if you don't do business in EU
o Selecting Standards
Determine which regulations apply to your service
e.g. PCI DSS, HIPAA, Safe Harbor
Cryptography
History
o Caesar Cipher
Used by Julius Caesar
ROT 3
Defeated by frequency analysis
o Engigma
Used by Germans
Defeated by project Ultra
o Purple Machine
Used by Japanese
Goals
o Confidentiality
Date at Rest
Data in Motion
o Integrity
o Authentication
o Non-repudiation
Concepts
o Kerchoff Principle
Cryptosystem must be secure even if mechanism disclosed
Key is the only thing that needs to be a secret
Security by design instead of obscurity
o Cryptography
Methods to keep information secret
o Cryptanalysis
Art of defeating cryptography
o Cryptology
Cryptography + Cryptanalysis
o Codes
Representation of words or messages
e.g. 10-4 = "Acknowledged"
Not always meant to provide confidentiality
o Ciphers
Hides true meaning of messages
Always meant to provide confidentiality
o Confusion
Disassociation of relationship between plain text and key
o Diffusion
Slight change in plain text changes the whole cipher text
o Frequency Analysis
Examination of recurring data
E.g. some letters of the alphabet occur more than the others
o Period Analysis
Frequency examiniation based on repeated use of key
o Block Ciphers
Encryption occurs per chunk
o Stream Ciphers
Encryption occurs per bit or byte
Mathematics
o Boolean Mathematics
AND
OR
NOT
XOR
o One-way Functions
Producing output is easy
Deriving input is hard
E.g. factoring very large numbers
o Nonce
Initialization Vector
Adds randomness to encryption process
o Zero Knowledge Proof
Proving knowledge of fact without revealing fact itself
E.g. providing password hash instead of password
E.g. answering to an authentication challenge
o Split Knowledge
Key Escrow
Parts of key sent to different escrow providers
M of N Control
M of N individuals must be present to perform high security
task
o Work Function
Amount of work to brute force an encryption system
Key length is primary factor to determining work function
Ciphers
o Transposition Ciphers
Rearrangement of data/characters
Example: Columnar Transposition
Message is split into len(key) blocks/rows
Each letter of the key is associated with a column
Columns are arranged based on the value of the key letter
associated with them
Columns are converted into strings and concatenated
o Substitution Ciphers
Replacement of data/characters (ROT3)
Example: Vignere Cipher
Have a matrix of the alphabet where the letters of each row is
increment by 1
Have columns and rows in total
Ci = Matrix[Ki][Pi]
o One-Time Pads
Key as large as message itself
Each message letter is padded by each key letter
Unbreakable encryption scheme
Requirements
Key must be random
Protection of key from disclosure
Keys must only be used once
Key must be as long as message
o Running Key Ciphers
AKA book cipher
One-time pad, except you get the key from a book
E.g. using a specific chapter and paragraph of Moby Dick
Modern Cryptography
Symmetric Key Algorithms
o Single shared key is used to encrypt and decrypt
o AKA private key cryptography
o Provides
Confidentiality
o Advantages
Very fast
1000 times faster than asymmetric cryptography
o Disadvantages
Key distribution is hard
A secure channel must be established first before key is
communicated
No non-repudiation mechanism
No way to prove an encrypted message came from someone
since many people know the key
Not scalable
Each two-party communication in a large group requires a
unique key
Frequent key regeneration
When someone leaves the group, key needs to be regenerated
Asymmetric Key Algorithms
o Private and public key decrypt message encrypted with the other
o AKA public key algorithms
o Private key must be kept private by a user
o Public key must be known by everyone
o Provides
Confidentiality
Integrity
Authentication
Non-repudiation
o Advantages
Key distribution is simple
No secure channel required to start communication
Supports Non-repudiation mechanism
Since only the person knows their private key
Allows digital signatures to be generated
Hash of a message encrypted with a private key
Verification involves decryption using public key and
cross-checking hashes
Scalable
No new key needs to be generated for each pair of
communicating parties
New users only require generation one key pair
Infrequent key regeneration
Required only if private key is compromised
Key can easily be invalidated when user leaves system
o Disadvantages
Very slow
1000 times slower than symmetric cryptography
Hashing
o Production of message digest
o One-way function
o Summary of message's content
Symmetric Cryptography
Key Management
o Creation and Distribution
Offline Distribution
Sheet of paper or storage media is physically transported
Interception might occur via mail
Telephones can be wiretapped
Papers might get thrown in the trash
Public Key Cryptography
Requires public key infrastructre
Diffie-Hellman
No public key infrastructure is required
Steps
Parties agree on two large prime numbers
p and g
1<g<p
Each party chooses a random integer and performs
gi mod p
Results are sent to each other
Each party multiplies their origin random integer with
received number
They end up with same value
o Storage and Destruction of Symmetric Keys
Don't store key and data in same system
Provide two different individuals half the key (split knwoledge)
Key must be regenerated when someone who knows the key leaves the
organization
o Key Escrow and Recovery
Allows government to get copy of key upon court order
Fair Cryptosystems
Key is divided and sent to multiple third parties
Court provides evidence of court order to third parties in order
to retrieve key
Escrowed Encryption Standard
Provides government with technological means to decrypt
ciphertext
Uses skipjack algorithm
Cryptographic Life Cycle
o Computers get faster all the time
o Encryption algorithms will eventually get obsoleted
o Appropriate algorithm must be used depending on how long data needs to be
retained
o Algorithm Governance Controls
Specifying acceptable cryptographic algorithms
Identifying acceptable key lengths
Enumerating transport potocols that may be used
Algorithms
o Data Encryption Standard (DES)
Old standard required for government communications
Insecure and deprecated; replaced by AES
Key size: 56 bits (technically 64, but 8 bits is used for parity)
Modes
ECB (Electronic Code Book)
Each block is encrypted separately
Generates the same ciphertext for the same plaintext
Vulnerable to cryptanalysis
CBC (Cipher Block Chaining)
Plaintext block is XORed with previous ciphertext
Difference from CFB: Splits messages into block before
encrypting
Requires an Initialization Vector
Destroys patterns
Allows errors to propagate
CFB (Cipher Feedback Mode)
Streaming version of CBC
Difference from CBC: Encrypts once a buffer is filled
Requires an Initialization Vector
Destroys patterns
Allows errors to propagate
OFB (Output Feedback Mode)
Plaintext is XORed with DES-encrypted seed value
Seed value is re-encrypted for every block
Requires an Intialization Vector
Destroys patterns
Errors do not propagate
CTR (Counter Mode)
Like OFB but incrementing counter is used rather than
DES of previous seed value
Requires an Initialization Vector
Destroys patterns
Errors do not propagate
o Triple DES (3DES)
Three passes of DES algorithm
Produces a more secure encryption
Uses 3 or 2 keys depending on the mode
Variants
EEE3 (three keys)
E(K1,E(K2,E(K3,P)))
Total key length: 168
EDE3
E(K1,D(K2,E(K3,P)))
Total key length: 168
EEE2
E(K1,E(K2,E(K1,P)))
Total key length: 112
EDE2
E(K1,D(K2,E(K1,P)))
Total key length: 112
o International Data Encryption Algorithm (IDEA)
Patended by Swiss developers
Used in PGP
Block size: 64
Key size: 128 (divided into 52 16-bit keys)
Has same modes as DES
o Blowfish
Basis of bcrypt
Used in SSH
No license required
Faster than DES an IDEA
Block size: 64
Key size: 32-448
o Skipjack
Escrowed Encryption Standard (EES)
Supports escrow of encryption keys
Not adopted by the public
Block size: 64
Key size: 80
o Rivest Cipher 5 (RC5)
By Rivest, Shamir, and Adleman
Block size: 32, 64, 128
Key Sizes: 0-2048
o Two-Fish
AES finalist
Includes pre-whitening and post-whitening
Prewhitening
Before first round of encryption
XORing plaintext with separate subkey
Postwhitening
After 16th round of encryption
XORing plaintext with separate subkey
Block size: 128
Key size: 256
o Rijndael
Block sizes: 128, 192, 256
Key sizes: 128, 192, 256
Chosen as AES
o Advanced Encryption Standard (AES)
Meant to replace DES
Rijndael with 128 block size
Key sizes: 128, 192, 256
Asymmetric Cryptography
Private and Public Keys
o Decrypts each other
o Private Key
Kept private
Used to generate digital signatures
Used to decrypt confidential messages
o Public Key
Published
Used to verify digital signatures
Used to encrypt confidentail messages
Algorithms
o Rivest Shamir Adlement (RSA)
Key Length: 1024
n=p*q
select random e where e < n and e and (p-1)(q-1) is relatively prime
Find d such that (ed-1)mod(p-1)(q-1) = 1
e and n are public keys
d is private key
Encryption: C = Pe mod n
Decryption: P = Cd mod n
o Merkle-Hellman Knapsack
Like RSA but relies on super-increasing sets
Provden ineffective in 1984
o El Gamal
Based on Diffie-Hellman
Not patented
Doubles length of data it encrypts
o Elliptic Curve
Key Length: 160
Uses elliptic curve mathematics
Elliptic curve definition:
y2 = x3 + ax + b
Elliptic Curve Group
Points that lie on the elliptic curve
O = located at infinity
Two points can be added: P + Q
Can be multipled: Q = xP (Q is multiple of P)
It's extremely difficult to find X
160-bit key is just as strong as 1024 RSA ket
Key Management
o Use publicly-vetted encryption system
o Select appropriate length keys
o Ensure that private key is secret
o Retire keys after they're no longer useful
o Keep backups of your key
Hash Functions
Facts
o Converts messages into fixed length outputs
o Generated value is called a Message Digest
o Used to ensure message integrity
o Used as a component of Digital Signatures
Requirements (According to RSA)
o Input can be any length
o Output has fixed length
o Easy to compute for any input
o Is one-way
o Collision-free
Algorithms
o SHA
Facts
Stands for Secure Hash Algorithm
Developed by NIST
Part of Secure Hash Standard
Algorithms
SHA-1
Block Size: 512
Output Size: 160
SHA-2
SHA-256
Block Size: 512
Output Size: 256
SHA-192
Block Size: 512
Output Size: 192
Truncated SHA-256
SHA-512
Block Size: 1024
Output Size: 512
SHA-384
Block Size: 1024
Output Size: 384
Truncated SHA-512
SHA-3
Keccak Algorithm
Not yet published
o MD Series
Facts
Developed by Ronald Rivest
Algorithms
MD2
Block Size: 16
Output Size: 128
Facts
Proved to be reversible
MD4
Block Size: 512
Output Size: 128
Facts
Uses 3 rounds
Block data must be 64 bits less than 512
MD5
Block Size: 512
Output Size: 128
Facts
Uses 4 rounds
Block data must be 64 bits less than 512
Subject to collisions
HAVAL
Hash of variable length
MD5 variant
Digital Signatures
Facts
o Ensures non-repudiation
o Message digest encrypted with a private key
o Verified using the public key
o Does not provide ny privacy
Achieves
o Non-repudiation
o Authentication
o Integrity
Generation
o Message is hashed
o Hash is encrypted with sender private key
o Encrypted hash is attached to the message
o Message with signature is sent
Verification
o Signature is decrypted with sender public key
o Message is hashed
o Decrypted hash is compared to hash of message
o If same, signature is valid
Hashed Message Authentication Code (HMAC)
o Facts
Just like Digital Signatures, but uses a symmetric algorithm
Provides no non-repudiation
Operates more efficiently
Digital Signature Standard
o Acceptable Digital Signature Algorithms
Digitial Signature Algorithm (DSA)
Rivest, Shamir, Adleman (RSA)
Elliptic Curve DSA (ECDSA)
o Acceptable Hashing Algorithms
SHA-2
Applied Cryptography
Portable Devices
o Disk/Volume Encryption
o Trusted Platform Modules
Email
o Pretty Good Privacy
By Phil Zimmerman
Uses web of trust
Decide which users to trust
Transitive trust takes effect
Commercial Version
Key Exchange: RSA
Encryption: IDEA
Message Digest: MD5
Freeware Version
Key Exchange: Diffie-Hellman
Encryption: CAST
Message Digest: SHA-1
o S/MIME
De facto standard for encrypted email
Key Exchange: X.509 Certificates
Public Key Protocol: RSA
Symmetric Encryption: AES and 3DES
Supported by desktop mail clients
Not supported by web clients
Web Applications
o SSL/TLS/HTTPS
Originally by Netscape, adopted by Microsoft
Steps
Browser retrieves website certificate
Browser extracts public key from certificate
Browser generates random symmetric key
Public key is used to encrypt random symmetric key
Encrypted key is sent to webserver
Server decrypts symmetric key using its private key
All future messages are encrypted using the symmetric key
POODLE Attack
Makes TLS fallback to SSL 3.0
Organizations now just drop suppport for SSL
Steganography and Watermarking
o Embedding secret messages within other files
o May be used to add digital watermarks to assets
o Can be used to protect intellectual property
o Watermark can be traced back to original copy
Digital Rights Management
o Music
o Movie
Content Scrambling System
Enforces playback and region restrictions on DVDs
Broken with release of DeCSS tool
Advanced Access Content System (AACS)
Protects content stored on Blu-Ray and HD DVD
AACS encryption keys have been retrieved and posted online
o E-Book
Most successful type of DRM
Adobe Digital Experience Protecttion
DRM for e-books
Encrypted with AES
RSA to protect AES key
Used by a variety of e-readers
o Video Game
Make video games dependent on internet to verify the game license
o Document
Prevents actions from being performed on a document
Examples
Reading a fle
Modifying a file
Removing watermarks
Downloading/saving
Printing
Taking screenshots
Networking
o Circuit Encryption
Link Encryption
Encrypts communication between two network locations
Entire packets are encrypted
Slower but less succeptible to sniffing
Done beneath transport layer
E.g. two office networks
End-to-end Encryption
Encrypts communication between two hosts
Only data is encrypted
Faster but more succeptible to sniffing
Done in transport layer or above
E.g client and webserver
o IPSec
IETF standard for setting up secure comms channel
Parties can be two gateways, two systems, etc.
Uses publci key cryptography
Modes
Transport Mode
Between two gateways
Uses L2TP (layer 2 tunneling protocol)
Tunnel Mode
Between two hosts (peer-to-peer)
Components
Authentication Header
Uses public keys(?)
Authentication
Access Control
Integrity
Non-repudiation
Prevents replay attacks
Encapsulating Security Payload
Uses symmetric keys(?)
Encryption
Some authentication
Prevents replay attacks
Sometimes used without AH
Security Association
Represents communication session
Records configuration ststus about connection
Represents a one-way connection
Additional SA must be setup per direction and IPSec
component
Internet Security Association Key Management Protocol (ISAKMP)
Establishes, modifies, and deletes Security Associations
Requirements for ISAKMP
Authenticate communicating peers
Create and management security associations
Provide key generation mechanisms
Protect against threats (DOS, replay attacks, etc.)
o Wireless Networking
Wired Equivalent Privacy
Not secure - do not use
64 and 128-bit encryption
WiFi Protected Access
WPA
Adds TKIP to the mix
Temporal Key Integrity Protocol
Secure IV generation
WPA2
Uses CCMP instead of TKIP
Uses AES instead of RC4
802.1X
For network authentication
Clients that connect to a network are authenticated
Client runs a supplicant application
Supplicant communicates with Authentication Server
Cryptographic Attacks
Analytic Attack
o Reduces complexity of the algorithm
Implementation Attack
o Attacks specific implementations
Statistical Attack
o Exploits statistical weaknesses
Inability to produce random numbers
Floating-point errors
Brute Force
o Trying every possible key
o Time to break depends on length of key
o Approaches
Rainbow table
Table of hashes and corresponding values
Makes brute force attacks faster
Prevented by salting passwords
Adding a random nonce before hashing a password
Salt is stored alongside password hash
Salt is added to any new string that needs to be
compared w/ password
This increases the difficulty of brute force attacks
Specialized computing hardware
Ciphertext Only / Frequency Analysis
o Only ciphertext is available to cryptanalyst
o One can perform a frequency analysis attack
E T O A I are the most frequent letters of the alphabet
If these letters are also the most common, expect a
transposition cipher
If other letters are more common, expect a substitution cipher
Known Plaintext
o Attacker knows plaintext and corresponding ciphertext
Chosen Plaintext Attack
o Attack can encrypt any plaintext of his choosing
Chosen Ciphertext
o Attacker has ability to decrypt certain portions of ciphertext
Meet in the Middle
o Defeats algorithms that use two rounds of encryption
o This is what broke 2DES
o Process
Have specific plaintext
Encrypt it with every possible key
Each ciphertext is decrypted with all possible keys
When match is found, the pair of keys represent both portions of
double encryption
o Key strength is only 2^n rather than 2^n * 2^n
o Only adds minimal amount of protection
Man in the Middle
o Interception of communications
o Key is intercepted and replaced
o A different secure session is started by MitM between the 2 hosts
o 2 hosts don't know they're not communicating with each other
Birthday Attack
o AKA collision attack / reverse hash matching
o Attacker replaces signed communication with another message w/c has the
same hash
Replay Attack
o Used against algorithms w/c do not use temporal protections
o E.g. algorithms without initialization vectors, etc.
o Captured messages can simply be resent in order to trigger some action
Security Models
Concepts
o Security Model
Maps abstract statements into a security policy
Used to measure system support of security policy
o Tokens, Capabilities, and Labels
Tokens
Separate object associated with a resource
Describes resource's security attributes
Capabilities
A list of capabilities for each object
Not very flexible but faster
Labels
Attached to a resource and is a part of it
Cannot be altered
Models
o Trusted Computing Base
Set of computing components which enforces security policy
Foundation of most security models
Restrict activities of components outside the TCB
Concepts
Security Perimeter
Bounds between TCB and rest of system
Prevents insecure communications between TCB and
rest of system
Trusted Path
Used by TCB to communicate with rest of
system
Adheres to strict standards to prevent
compromise of TCB
Reference Monitor
Validates access to every resource
Grants access to resources
Stands between subject and object
Just a theory, not an actual thing
Security Kernel
TCB components that implement the reference monitor
Launches components that enforce reference monitor
Uses trusted paths to communicate with subjects
Mediates all resource access
o State Machine Model
Describes a system that is always secure
All valid states are secure
All valid state transitions are secure
Also called Secure State Machine
Basis for other security models
Based on Finite State Machine
o Information Flow Model
Only valid information flows may be allowed
Prevents insecure information flows
Addresses covert channels
Focuses on flow of information
Composition Theories
Describes information flow between systems
Theories
Cascading
Input of one system comes from output of
another
Example: Web server with database backend
A -> B -> C : Chaining
Feedback
System receives input and responds with output
Example: HTTP Request and Response
A -> B : Request
A <- B : Response
Hookup
System sends input to one system and sends
copy to another
Example: CC and BCC in email
A -> B : To Destination
A -> C : To Hookup
Based on State Machine Model
o Noninterference Model
High privileged actions should not affect lower priviliged subjects
Unauthorized parties should not be affected by information flows
Prevents inference attacks and covert channels
Based on the Information Flow Model
o Take-Grant Model
Describes how rights can be passed/taken from subject to
subject/objects
Allows you to track where rights can change
Allows you to track where leakage can occur
Rules
Take Rule
Allows subjects to take rights over an object
Grant Rule
Allows a subject to grant rights over an object
Create Rule
Allows a subject to create new rights
Remove Rule
Allows a subject to remove rights it has
o Access Control Matrix
A matrix of subjects an objects
Indicates the rights each subject has over each object
Parts
Row
Subjects
Capabilities List
Each row shows capability of each subject
List of rights a subject has for every object
Columns
Objects
Access Control Lists
Each column shows subjects that have rights to
object
List of subject that has rights to an object
Cells
Access Rights
Access rights of a subject to an object
o Lattice-Based Access Control
Subject are assigned position in a lattice
Positions fall between security labels
Subjects only access objects that are within "range"
Example
A subject between Private and Sensitive
Can only access an object within those two labels
o Bell-LaPadula Model
Prevents information flow to lower sensitivity levels
Protects Confidentiality
Does not address integrity or availability
Used by military organizations
Properties
Simple Security Property
No Read Up
Subjects can't read objects with higher sensitivity labels
(*) Security Property
No Write Down
Subjects can't write to objects with lower sensitivity
labels
Unless performing declassification, which is a valid
operation
Discretionary Security Property
An access matrix is used to enforce discretionary access
control
Trusted Subject
Exception to * Security Property
Can declassify objects
Based on State Machine and Information Flow Model
o Biba Model
Prevents information flow to higher integrity levels
Protects Integrity
Prevent unauthorized modification of objects
Protects object consistency
Does not address confidentiality or availability
Used by commercial organizations
Properties
Simple Integrity Property
No Read Down
Subjects can't read objects at lower integrity levels
(*) Integrity Property
No Write Up
Subjects can't write objects at higher integrity levels
Based on Bell-LaPadula Model
Based on State Machine and Information Flow Model
o Clark-Wilson Model
Access to subject must be mediated through a program
Program enforces well-formed transactions
Protects
Confidentiality
Integrity
Constrained Interface
Enforces well-formed transactions
Enforces separation of duties
Authorizes transactions
Access Control Triple
Subject
Object
Program/Transaction/Interface
Constrained Data Item
Data items protected by the model
Can only be modified by transformation procedures
Unconstrained Data Item
Data not controlled by the model
Input and output data
Integrity Verification Procedure
Determines integrity of data items
Transformation Procedures
Used to modify a constrained data item
The only thing that can
Essentially the backbone of the model
Example: Store Procedure in Database
Restricted Interface Model
Provides subjects authorized information and functions
Subjects at different levels see different set of data
Like a webapp that shows you only the info and features you
can access
Enforces separation of duties in effect
o Brewer and Nash Model / Chinese Wall
Focused on confidentiality
Uses security domains / conflict classes
Prevents conflict of interests
Based on a user's previous actions
Security domains are not predetermined
Examples
Separate conflict classes for accessing data of two competing
companies
Preventing access to data irrelevtant to a current operation
o Goguen-Meseguer Model
Focused on integrity
Basis for non-interference model
Security domains are predetermined
List of objects a subject can access is predetermined
List of operations a subject can perform is predetermined as
well
o Sutherland Model
Focused on integrity
A non-interference model
A state machine model
Defines a set of system states, and transitions
Integrity is maintained if the defined states and transitions are used
o Grahan-Denning Model
Focused on secure creation and deletion of objects
Specifies how to securely:
Create
Object
Subject
Delete
Object
Subject
Provide Right
Read
Grant
Delete
Transfer
Security Vulnerabilities
Hardware
o Processor
Execution Types
Multitasking
Single processor, multiple tasks
Multiprocessing
Multiple processors, multiple tasks
Types
SMP - Symmetric Multiprocessing
Single OS distributes task to processors
Multiple processors treated equally
Good for simple operations
MMP - Massive Multiprocessing
Multiple OS environment
Tasks assigned to coordinating
processors
Coordinating processors assign tasks to
other processors
Good for complex operations
Multiprogramming
Singl processor, one task at a time
Switch to different task when one waits
Needs to be specially written
Multithreading
Multiple tasks in a single process
Processing Types
Single State
Processors handle only one security level
The system only handles one security level
Access is controlled via policy
Cheaper
Multistate
Processors handle multiple security levels
The system handles multiple security levels
Access is controlled via technical protection
mechanisms
More expensive
Protection Mechanisms
Protection Rings
Lower rings, higher privilege
Multics has six rings, modern OSes has 4 rings
Rings
Ring 0 - Kernel
Ring 1 - OS Components
Ring 2 - Drivers
Ring 3 - User Programs
Mediated Access Model
Process communicate to lower ring via
interfaces
System Call
Request to resources on lower level ring
Usually a programming interface
Lower ring must authorize requester
Process States / Operational States
Ready
Process is ready to be given a time slice
Initial state of a process
Transitions to Running State
Waiting / Blocking
Process is waiting on a resource
Transitions to Running State
Running
Process is currently in execution
Ends upon termination or end of time slice
Also called Problem State as errors can occur
Transitions to Ready, Waiting, or Stopped State
Supervisory
Process is performing privileged operation
States other than this is user mode
Stopped
Process is finished or must be terminated
Security Modes
Requirements
MAC Environment
Physicial control of system and room
Modes
Dedicated Mode
Right to know everything in system
Permission to access everything in the
system
Need to know everything in system
System High Mode
Right to know everything in system
Permission to access everything in the
system
Need to know some things in the system
Compartmented Mode
Right to know everything in the system
Permission to access some things in the
system
Need to know things to be accessed in
the system
Multilevel Mode
Right to know some things in the system
Permission to access some things in the
system
Need to know things to be accessed in
the system
Operating (System) Modes
User Mode / Problem State
Ring 3
When user applications are being executed
Prevents accidental damage to system
User programs are executed in a sandbox
Also called a Virtual Machine
Kernel Mode / Privileged Mode / System Mode
Ring 0 to 2
Allows OS to perform full range of CPU instructions
o Memory
ROM - Read Only Memory
Types
ROM - Read Only Memory
Contents are written at factory
Can't be modified
PROM - Programmable Read Only Memory
Unwritten ROM
Users can write once
Example: CDs
EPROM - Erasable Programmable Read Only Memory
Can be erased using chemicals or UV light
EEPROM - Electronically Erasable Programmable
Read-Only Memory
Can be erased electronically
All contents must be erased
Flash Memory
Can be erased electronically
Allows erasure of individual blocks
Example: NAND Flash, SSDs, Flash Drives
Issues
Data retention
RAM - Random Access Memory
Types
Real Memory
Main memory
Made up of Dynamic RAM
Cache RAM
Attached to a processor
Contains RAM data that is accessed frequently
Levels
Level 1 Cache
Attached to processor chip
Level 2 Cache
On a separate chip
Peripherals also have RAM caches
Printers have RAM caches which can load an
entire job
Dynamic RAM
Loses charge over time even if power is
supplied
Must be refreshed by CPU
Made up of capacitors
Cheaper but slower than static RAM
Static RAM
Does not lose charge over time if power is
supplied
Does not need to be refreshed by CPU
Made up of flip flops
More expensive but faster than dyanmic RAM
Issues
Pilferable
Data retention
Cold boot attack
Registers
Limited amount of onboard CPU memory
ALU - Arithmetic Logic Unit
Perform arithmetic operations
Can directly access registers
Values to process must be loaded to registers first
Addressing
Register Addressing
Value to process is in a register
Register address is provided by instruction
Immediate Addressing
Value to process is in the instruction
Provided value is used in operation
Direct Addressing
Value to process is in memory
Memory address of value is provided by instruction
Indirect Addressing
Address of value to process is in memory
Memory address of value's address is provided by
instruction
Base + Offset Addressing
Address of value to process is in a register
Register address and offset is provided by instruction
Secondary memory
Storage devices; non-volatile
Example: optical disk, hard drive, etc.
Cheaper but slower than primary memory
Virtual Memory / Paging
Used to extend main memory
Stores overflowing contents onto secondary memory
Pages from main memory are "swapped" into secondary
memory
Non-used parts of main memory are stored in pagefile
They are restored into main memoery when they need to be
used
Storage
Primary and Secondary
Primary
RAM
Data is readily available to CPU
Secondary
SSDs, CDs, hard drives
Data not readily available to CPU
Volatile and Non-volatile
Volatile
Not designed to retain data
Non-volatile
Designed to retain data
Random and Sequential
Random
Any memory location can be accessed
immediately
Faster but more expensive; for shorter term
storage
Examples: Hard Drives, RAM, CDs, DVDs
Sequential
Data prior to desired location must be read
Slower but cheaper; for long term storage
Examples: Magnetic Tape
Issues
Data Remanence
Files can be recovered after deletion
SSD blocks may retain information even after
wiping
Some blocks might hold a copy of data
when copied to lower leveled blocks
Theft
May disclose confidential information
Removable media are pilferable
o IO Devices
Types
Monitors
Van Eck radiation
Electronic emanations coming from monitors
Can be read via TEMPEST program
Also called Van Eck phreaking
CRT are more vulnerable than LCDs
Printers
Print outs can be taken if not secured
Printers store data locally
Keyboards/Mice
Vulnerable to TEMPEST attacks
Keyboards are vulnerable to keyloggers
Signal interception if wireless
Modems
Uncontrolled entry points into the network
Can establish external connections by themselves
Needs a telephone line
Structures
Memory-Mapped IO
Memory space is reserved for input and output
communication with device
CPU reads from those memory locations to read input
from device
CPU writes to those memory locations to write output
to device
CPU facilitates transfer of data to and from device
(synchronously)
IRQ - Interrupt Request
Specific signal lines are used for CPU and device
communication
Signal lines are identified via IRQ number
IRQ numbers range from 8 to 16
OS assigns IRQ to devices
Interrupt conflict happens when two devices share the
same IRQ
DMA - Direct Memory Access
Like memory-mapped IO but data transfer is done
asynchronously
CPU not needed to facilitate data transfer between
memory and device
Steps
DMQ - DMA Request
Device requests to access memory
location
CPU locks target memory for device
Device access the memory location
CPU continues with other tasks
DACK - DMA Acknowledgement
Device finishes accessing memory
location
Device tells CPU that it can now access
the memory location
CPU accesses data on shared memory
location
o Firmware
Hard-coded software
Software stored on a ROM chip
Not changed frequently
Types
BIOS
Starts up the operating system from the disk
Stored on an EEPROM chip
Phlashing: Malicious BIOS is flashed onto the ROM
Device Firmware
Mini operating systems onboard devices
Stored on EEPROM chip
Client-Based Systems
o Applets
Client executes code sent by the server
Self contained mini programs
Processing burden is shifted to client
Privacy advantage as data is never sent to server
Applets can be trojans though
Examples
Java Applets
By Sun Microsystems
Sandboxed Java programs; requires JVM
Can run on different operating systems
Widely exploited
ActiveX Controls
By Microsoft
Non-sandboxed VB, C, C++, and Java programs
Has full access to Windows operating system
Can run on Microsoft browsers only
Widely exploited; usually prohibited altogether
o Local Caches
ARP Cache (Poisoning)
Spoofed ARP replies
Spoofed ARP reply is used to populate ARP table
ARP: translates IP to MAC address
Spoofing: Wrong machine associated with an IP address
Allows man in the middle attack
ARP Poisoning: Static ARP Entries
Malicious ARP entries manually configured in the
operating system
Must be modified locally on the machine
Attack Vector: Using a trojan or social engineering
attack
Allows man in the middle attack
DNS Cache (Poisoning)
HOSTS File Poisoning
Malicious entries added to hostsfile
HOSTS File: local configuration file used to translate
names to IPs
Attack Vector: Using trojan or social engineering attack
Allows impersonation of intended server with malicious
dummy
Authorized DNS Server Attacks
Atacking DNS records stored on authoritative DNS
servers
Affects the entire internet and gets noticed pretty
quickly
Allows impersonation of intended server with malicious
dummy
Caching DNS Server Attacks
Attacking DNS records on cache servers
These are provided by ISP and companies
Watched by less people and can occur without notice
for some time
Allows impersonation of intended server with malicious
dummy
DNS Lookup Address Changing
Changing the DNS server used by a system to a
malicious one
Attack Vectors: intercepting DHCP responses or local
system attacks vis trojans
Allows impersonation of intended server with malicious
dummy
DNS Query Spoofing
Intercepting DNS responses and changes substitutes it
with false information
Allows impersonation of intended server with malicious
dummy
Temporary Internet Files
Contains cached website content
Can be posioned to contain malicious content (client sid scripts,
etc.)
Malicious content is invoked when cached items are accessed
o Other Considerations
Emails, Phishing, and Trojans
Upload and Downloads
System Access Control
User Interfaces
System Encryption
Process Isolation
Protection Domains
Data and Media Labels
Data Backups
Awareness Trainings
Physical Protections
Disaster Recovery Procedures
Secure Coding, Configuration, and Updates
Server-Based Systems
o Database
Aggregation
Combining multiple instances of data
Produces useful information that may be classified
Examples: Sum, Average, Max, Min, etc.
Individual records might not be classified
Sum/Average/Max/Min of data might be classified
Example: record for 1 soldier and total number of troops
Inference
Deducing classified information from available information
Example
Clerk knows total salary expenses of entire company
A new person gets hired
Total salaries increase
The increase in salary expenses is the salary of new
person
Data Warehousing
Stores large amounts of information
For use with specialized analysis techniques
Data Dictionary
Stores usage and access rights of data
Data Mining
Process of analyzing data warehouses
Search for patterns in large data sets
Produces metadata
Metadata
Data about data
Can be representation of data
Can be aggregation(?)
Something that describes the bulk of data in the warehouse
Examples:
Security incident report
Sales trends report
May be more valuable than the bulk data
Data Analytics
Examination of bulk data to extract useful information
Large-Scale Parallel Data Systems
Performs simultaneous calculations / Multiprocessing
Breaking down tasks into subtasks and distributing the load
o Distributed Systems
Cloud Computing
Computing is outsourced to a service provider
Service is accessdible via the internet
Types
SaaS - Software-as-a-Service
Provider manages:
Networking
Storage
Virtualization
Operating System
Middleware
Applications
Customer uses the application
Examples
GMail
Google Docs
PaaS - Platform-as-a-Service
Provider manages:
Networking
Storage
Virtualization
Operating System
Middleware
Customer manages:
Applications
Examples:
Heroku
IaaS - Infrastructure-as-a-Service
Provider manages:
Networking
Storage
Virtualization
Customer manages:
Operating System
Middleware
Applications
Examples:
Amazon Web Services EC2
Grid Computing
Computing tasks are distributed to clients
Clients return result to central server
Similar to asymmetric multiprocessing
Clients are able to view the data that they are handling
Clients are not guranteed to return results
Returned results need to be validated to ensure integrity
Peer-to-Peer
No central server
Clients connect directly to each other
Examples
VoIP
Skype
BitTorrent
Same security concerns as grid computing
Industrial Control Systems
o DCS - Distributed Control Systems
Each piece of equipment have their own control system
Remotely accessed and managed from a central location
Keyword: Central Management
o PLC - Programmable Logic Controllers
Single-purpose computers
E.g. displaying signs, marquees, etc.
Keyword: Single-purpose
o SCADA - Supervisory Control and Data Acquisition
Stand alone device networked with each other
Keyword: Stand-alone; Peer-to-Peer
Web-Based Systems
o Security Association Markup Language
Used to provide web-based SSO
o Open Web Application Security Project
Mobile Systems
o Operating Systems
Android
Based on Linux
Open Source Apache Lincense
Made by Google
App Store: Google Play
Can be rooted
iOS
Made by Apple
Closed Source
App Store: Apple App Store
Can be jailbroken
o Issues
Easy to hide
Can be used to steal data
Contains sensitive info
Eavesdropping
o Device Security
Full Device Encryption
Storage and voice encryption
Prevents reading of data
Remote Wiping
Delete entire phone data remotely
Can be blocked
Deleted data may still be recovered
Lockout
Disable access if unlock attempts fail
Requires a pre configured screen lock
Gets longer with every failure
Screen Locks
Prevents access to unauthorized users
Doesn't prevent access via network or USB
Triggered if phone is left idle
Examples: PIN, patterns, biometrics, etc.
GPS
Receives GPS signals
Apps can record GPS locations
Allows tracking of movement
Application Control
Limits installable aplications
Enforces application settings
Storage Segmentation
Compartmentalizes various data in storage
Used to separate device apps from user apps
Can separate company data from user data
Asset Tracking
Checks in at office
Location tracking
Verifies if device is still with user
Inventory Control
Using mobile device to track hardware
Devices can read RFID, bar codes, etc.
Mobile Device Management
Controls and monitors a device remotely
Device Access Control
Lock screens, etc.
Device should be unlocked to access USB / bluetooth
Removable Storage
Devices support microSD cards
Can also support external storage
Sometimes bluetooth and WiFi based sotrage too
Disabling Unused Features
Lessens the chance of exploitation
o Application Security
Key Management
Key generation
Mobile devices have poor RNGs
Key storage
Use Trusted Platform Module
Use Removable Hardware
Credential Management
Password managers with multifactor authentication
Authentication
Methods
Patterns
PINs
Biometrics
RFID
Encryption when locked
Geotagging
Embedding of location and data time on photos
Can dislose your location when photo is uploaded
Encryption
Prevents access to data in storage or transit
Natively available on devices
Can also be implemented via apps
Application Whitelisting
Allows only a specific list of apps to be installed
Implicit deny
BYOD Concerns
Devices can access the company network
They need to comply with security policies
Data Ownership
Personal and cmpany data might be mixed in the device
They should be segmented
Policy should define who owns what data
Support Ownership
Responsibility for repair and maintenance
Patch Management
Responsibility for installing updates
How are updates to be installed
How frequent are updates to be installed
Antivirus Management
What antivirus solution to use
Should an antivirus be used
Forensics
Involvement of a device in investigations
Privacy
Workers might be tracked when they are out of work
Contents of device may be monitored by the company
On-boarding/Off-boarding
On-boarding
Installing security/management apps
Secure configuration
Off-boarding
Wiping business data
Full reset?
Adherence to Corporate Policies
Personal mobile devices still need to comply with BYOD
policies
User Acceptance
BYOD policy details should be explained well to user
User must accept BYOD policy so they can be held
accountable
Architecture/Infrastructure Considerations
Allowing BYOD devices might cause more network load
Might require more IP addresses
Might require new hardware to be installed (access points)
Legal Concerns
BYOD increases burden of liability
Acceptable Use Policy
BYOD opens up inappropriate use of mobile devices
Risk of information disclosure is also increased
On-board Camera/Video
Allows employees to take picture of company premises
Pictures of confidential information may be taken
Cyber-Physical Systems
o Limited functionality
o May be part of a larger system/product
o Examples
Static Systems
Does not change
Can't install new apps on it
Can't be configured
Network Enabled Devices
Devices that can communicate via networks
WiFi, Ethernet, Bluetooth
Cyber Physical Systems
Can control physical components programatically
Robots, doors, HVACs, self-driving cars, IoT, etc.
Mainframes
Usually designed around a single task
Might be considered static systems
Able to operate for decades
Game Consoles
OS is fixed and changed only when vendor releases a system
upgrade
Focused on playing games and media
o Methods of Securing
Network Segmentation
Isolate Cyber-Physical Systems in a separate VLAN
Prevents remote exploits
Security Layers
Isolating high security systems from lower security ones
Implementations
Physical Isolation
Network Isolation
etc.
Application Firewalls
Prevents application specific attacks
A server-side firewall
Use a network firewall as well
Manual Updates and Firmware Version Control
Ensures that updates are tested
Automatic updates allow for untested versions
This might lead to reduction in security
Wrappers
Encapsulates a solution or environment
Restricts and controls changes to an environment
Ensures that only valid and secure updates are applied
Control Redundancy and Diversity
Use multiple and redundant security controls
Fulfills defense in depth