Module3 - Security Engineering
Module3 - Security Engineering
CISSP – SECURITY
ENGINEERING
Security Models
Evaluation Methods, Certification and Accreditation
3
SECURITY ARCHITECTURE & DESIGN
OBJECTIVES
SECURITY MODELS
PRINCIPLES OF SECURE DESIGN
5
PRINCIPLES OF SECURE DESIGN
6
SECURITY MODELS
7
CONTROLS
Discretionary access control (DAC)
Defined in the Trusted Computer System Evaluation Criteria (TCSEC); Orange Book
Means of restricting access to objects based on the identity of subjects and/or groups to which they belong
A subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any
other subject
Mandatory access control (MAC)
Type of access control where the operating system constrains the ability of a subject to access or perform some
sort of operation on an object
Authorization rule enforced by the operating system kernel
Security policy is centrally controlled by a security policy administrator
Rule-based access control (RBAC)
Access is allowed or denied to objects based on a set of rules defined by a system administrator
Access properties are stored in Access Control Lists (ACL) associated with each object
Role-based access control (also RBAC)
Also known as Non-discretionary Access Control
Assigns permissions to particular roles in an organization
8
SECURITY MODELS
9
STATE MACHINE MODELS
12
INTEGRITY MODELS - CLARK-WILSON MODEL
13
BREWER AND NASH MODEL (AKA CHINESE WALL)
Designed to avoid conflicts of interest by prohibiting one person, such as a
consultant, from accessing multiple conflict of interest categories (CoIs)
Provides access controls that can change dynamically depending upon a
user’s previous actions
Model states that a subject can write to an object if, and only if, the subject can
not read another object that is in a different data set
Initially designed to address the risks inherent with employing consultants
working within banking and financial institutions
14
INFORMATION FLOW MODEL
In this model, data is thought of as being held in individual discrete
compartments
Information is compartmentalized based on two factors: classification
and need to know
Subject clearance has to dominate the object classification and the
subject security profile must contain the one of the categories listed in
the object label, which enforces need to know
15
LATTICE MODEL
Model consists of a set of objects constrained between the least upper
bound and the greatest lower bound values.
The least upper bound is the value that defines the least level of object access
rights granted to a subject.
The greatest lower bound is value that defines the maximum level of object
access rights granted to a subject
The goal of this model is to protect the confidentiality of an object and only
allow access by an authorized subject.
16
NON-INTERFERENCE MODEL
17
ACCESS CONTROL MATRIX
18
SECURITY ARCHITECTURE & DESIGN OBJECTIVES
EVALUATION METHODS,
CERTIFICATION AND
ACCREDITATION
EVALUATION CRITERIA
Why Evaluate?
To carefully examine the security-related
components of a system
Trust vs. Assurance
20
TRUSTED COMPUTER SECURITY
EVALUATION CRITERIA (TCSEC)
Developed by the National Computer Security Center (NCSC)
Also known as the Orange Book
Defines Trust and Assurance, but does not allow for them to be
evaluated independently
21
TCSEC RATINGS:
A1 – Verified Protection
B1, B2, B3 – Mandatory Protection
D – Minimal Security
22
INFORMATION TECH SECURITY EVALUATION CRITERIA (ITSEC)
E0 to E6 for assurance
23
COMMON CRITERIA (CC) ISO 15408
Protection Profile
Target of evaluation
Security target
Evaluation packages
24
CC RATINGS - EVALUATION
ASSURANCE LEVEL
EAL 1 – Functionally tested
EAL 2 – Structurally tested
25
CERTIFICATION & ACCREDITATION
Certification:
A process that ensures systems and major applications adhere to formal
and established security requirements that are well documented and
authorized.
It is usually performed by a vendor.
Accreditation:
A formal declaration by a Designated Accrediting Authority (DAA) that
information systems are approved to operate at an acceptable level of
risk based on the implementation of an approved set of technical,
managerial, and procedural safeguards.
26
SECURITY ARCHITECTURE & DESIGN OBJECTIVES
28
LAYERING
Operating system
Applications
29
ABSTRACTION
32
SECURITY ARCHITECTURE & DESIGN OBJECTIVES
SECURE HARDWARE
ARCHITECTURE
OPEN AND CLOSED SYSTEMS
Firmware
35
COMPUTER BUS
Primary communication channel on a
computer system
Communication between the CPU, memory,
and input/output devices such as keyboard,
mouse, display, etc., occur via the bus
Bridges:
Northbridge – also called the Memory
Controller Hub (MCH), connects the CPU to
RAM and video memory; directly connected to
CPU, so it’s faster
Southbridge - also called the I/O Controller
Hub (ICH), connects input/output (I/O) devices,
such as disk, keyboard, mouse, CD drive, USB
ports, etc.
36
THE CENTRAL PROCESSING UNIT
(CPU)
The “brains” - capable of controlling and
performing mathematical calculations
Everything a computer does is
mathematical
Rated by the number of clock cycles per
second; a 2.4 GHz
Pentium 4 CPU has 2.4 billion clock
cycles per second.
CPU Units:
Arithmetic Logic Unit (ALU) - performs
mathematical calculations
Control Unit (CU) – controls and send
instructions to the ALU
37
THE CENTRAL PROCESSING UNIT
(CPU)
Fetch & Execute
A process actually takes four
steps (one CPU or clock
cycle):
Fetch Instruction 1
Decode Instruction 1
Execute Instruction 1
Write (save) result 1
38
THE CENTRAL PROCESSING UNIT
(CPU)
Pipelining
Combines multiple steps into
one combined process
Simultaneous fetch
Decode
Execute
Write steps
Each part is called a pipeline
stage
39
THE CENTRAL PROCESSING UNIT
(CPU)
Interrupts
Interrupts cause the CPU to stop processing its current task, save the state,
and process a new request. Once the interrupt task is complete, the
CPU will start where it left off.
Interrupts are typically hardware related.
40
THE CENTRAL PROCESSING UNIT
Process
(CPU)
An executable program and its data loaded and running in memory
Thread
Also called a lightweight process or “LWP” – a child process; where one
process has “spawned” another process. A heavy-weight process (or
“HWP”) is called a task; one big advantage for threads is that they can
share memory.
Process states:
New: a process being created
Ready: process waiting to be executed by the CPU
Running: process being executed by the CPU
Blocked: waiting for I/O
Terminate: a completed process
41
THE CENTRAL PROCESSING UNIT
(CPU)
Multitasking - allows multiple tasks (heavy weight processes) to run
simultaneously on one CPU
Multiprocessing - multiple processes running on multiple CPUs
Symmetric Multiprocessing (SMP) - one operating system to manage all CPUs
Asymmetric Multiprocessing (AMP) - one operating system image per CPU
Multiprogramming - multiple programs running simultaneously on one
CPU
Multithreading - multiple threads (light weight processes) running
simultaneously on one CPU
42
THE CENTRAL PROCESSING UNIT
(CPU)
Watchdog Timers are designed to recover a system by rebooting after
critical processes hang or crash
CPU Types
Complex Instruction Set Computer (CISC) - Intel or AMD
43
MEMORY PROTECTION
44
MEMORY PROTECTION
Methods:
Process Isolation
Logical control that attempts to prevent one process from interfering with another
Object encapsulation - treats a process as a “black box”
Time multiplexing - multiplexes system resources between multiple processes, each with a
dedicated slice of time
Hardware Segmentation
Completely separate hardware
Virtual Memory
Virtual address mapping between applications and hardware memory
Swapping and Paging
Uses virtual memory to copy contents in primary memory (RAM) to or from secondary
memory (not directly addressable by the CPU, on disk)
Kernel accessing memory in swap space results in a page fault
45
BIOS
Basic Input Output System contains code in firmware that is executed when a
PC is powered on
The boot process:
1st thing PC does is run the Power On Self-Test (POST)
POST finds the boot sector that contains machine code for the OS kernel
Kernel loads and executes into the OS
In general, the MBR consists of 512 or more bytes located in the first sector of
the drive.
46
WORM STORAGE
47
SECURITY ARCHITECTURE & DESIGN OBJECTIVES
SECURE OPERATING
SYSTEM AND SOFTWARE
ARCHITECTURE
TRUSTED COMPUTER BASE (TCB)
Reference monitor
Core function of the
kernel
Mediates all access
between subjects
and objects
Always enabled and
cannot be bypassed
52
USERS AND FILE PERMISSIONS
Execute (“x”)
53
USERS AND FILE PERMISSIONS
Modify
54
SECURITY ARCHITECTURE & DESIGN OBJECTIVES
VIRTUALIZATION AND
DISTRIBUTED COMPUTING
VIRTUALIZATION
56
HYPERVISOR
57
VIRTUALIZATION
Benefits
Lower hardware cost
Lower power cost
Smaller footprint
Security Issues
More complex
Easy to bring up new systems (without proper checks/balances)
Tip: Don’t host systems with varying security sensitivities on the same hardware
58
CLOUD COMPUTING
Cloud Computing: Leverage economies of scale
Cloud services:
Infrastructure as a Service (IaaS) – customer configures operating
system and all else (Linux server hosting)
Platform as a Service (PaaS) – pre-configured operating system,
customer installs & configures everything else (Web service hosting)
Software as a Service (SaaS) – everything is configured, customer
just uses (Web mail)
Types:
Private cloud – cloud is dedicated to one single customer
Public cloud – cloud is shared amongst multiple organizations
Security Issues
Need strict SLAs
Limited visibility
Shared infrastructure and shared target
Right to audit, right to assess (vulnerabilities), and right to test
(pentest)
Physical boundaries (geographically)
59
GRID COMPUTING
60
PEER TO PEER (P2P)
61
THIN CLIENT
Thin Clients
Rely on central servers – central servers run applications,
store data, and simplified security
Cheaper than full PCs
Diskless Workstations
Contains CPU, memory, and firmware (no disk drive)
Kernel and operating system loaded via network
BIOS => POST => TCP/IP => BOOTP (typically *nix) or
DHCP (more robust)
Thin Client Applications
Browser-based access to centralized applications and data
Runs on a full PC
Citrix ICA, OpenThinClient, etc.
62
THE INTERNET OF THINGS (IOT)
SYSTEM VULNERABILITIES,
THREATS AND
COUNTERMEASURES
EMANATIONS
66
BACKDOOR
Backdoors
System shortcut to bypass security checks
Bypass login, sometimes planted as part of a
larger attack
Maintenance Hooks
Shortcuts installed on purpose by system
designers or programmers
Should never be left in a production system
67
MALWARE (MALICIOUS SOFTWARE/CODE)
68
MALWARE
Worms
Self-propagate
Damages include:
Malicious code itself
Wasted resources (usually network-related)
Famous worms include Morris Worm, ILOVEYOU, Nimda, Code Red,
and Melissa
Trojans
One function is benign (maybe a game)
A second function is malicious (could be anything)
Packers
Provides runtime compression of executables (or binaries); can be used
to evade signature-based detection
Small executable decompresser is prepended to the .exe file
Logic Bombs
Triggered when a logical condition is met (transaction number,
countdown, time, etc.)
Worms often contain logic bombs
70
ANTIVIRUS SOFTWARE
AV Types:
Signature-based (static signatures)
Heuristic-based (anomaly and behavior)
71
ATTACK TYPES
72
WEB ARCHITECTURE AND ATTACKS
https://www.owasp.org/
73
APPLETS
Polyinstantiation
Two different objects (instances) with the same name
Depending on the security level established, one record contains
sensitive information, and the other one does not, that is, a user will see
the record's information depending on his/her level of confidentiality
dictated by the policy
76
DATABASE SECURITY
Inference
Requires deduction using clues
Controls might be polyinstantiation or diffusion
Aggregation
Mathematical process that asks every question
No deduction
77
PART II: CRYPTOGRAPHY
Symmetric Cryptography
Asymmetric Cryptography
Hybrid Cryptography
Attacks on Cryptography
79
CRYPTOGRAPHY IN HISTORY
Caesar Cipher
Scytale
Vignere
Vernam
80
CAESAR CIPHER
Simple Substitution
Shift Characters 3 spaces
81
SCYTALE
82
VIGENERE
First letter of the key is matched up against first letter of the message,
and so on
83
CRYPTOGRAPHY IN WARFARE
84
ALAN TURING
85
VERNAM CIPHER
One Time Pad
Only mathematically unbreakable form of cryptography
Key must be used only once
Pad must be at least as long as the message
86
SECURITY SERVICES PROVIDED
BY CRYPTOGRAPHY
Privacy: Prevents unauthorized disclosure of information
Authenticity: Verifies the claimed identity
87
DEFINITIONS AND CONCEPTS
88
INITIALIZATION VECTOR
89
ALGORITHM
90
ELEMENTS OF CRYPTOGRAPHY
Avalanche
Permutations
Open—Kerckhoff’s Principle
Random
Secret
91
S-BOX
Substitution-box: a best example of confusion and diffusion
Example (DES): Given a 6-bit input, the 4-bit output is found by selecting the row using
the outer two bits (the first and last bits), and the column using the inner four bits.
Input "011011" => Output "1001”
92
P-BOX
Permutation Box
Swap the position
Reversible
93
AVALANCHE EFFECT
94
DEFINITIONS AND CONCEPTS
95
CRYPTOGRAPHY
96
SYMMETRIC CRYPTOGRAPHY
Symmetric = Same
In symmetric cryptography the same key is used to both encrypt and
decrypt
Very fast means of encrypting/decrypting with good strength for
privacy
Preferred means of protecting privacy data
97
STREAM VS. BLOCK
Stream Ciphers encrypt one bit (up to one byte) of data at a time.
Transposition, Substitution, XOR
Very fast and efficient
Not as Secure
Block Ciphers chunk data into blocks. Each chunk goes through a
series of math functions called S-boxes
98
STREAM CIPHERS XOR
If Values are:
Alike: 0
Different: 1
99
BLOCK CIPHERS
100
DRAWBACKS TO SYMMETRIC
CRYPTOGRAPHY
101
ASYMMETRIC CRYPTOGRAPHY
102
ASYMMETRIC CRYPTOGRAPHY
AND HASHING SERVICES
P.A.I.N
Privacy: Receiver’s Public Key
Authenticity: Sender’s Private Key
103
SSL/TLS - HYBRID CRYPTOGRAPHY
104
SUMMARY OF SYMMETRIC VS.
ASYMMETRIC
105
COMMON SYMMETRIC ALGORITHM
DES
3DES
AES
RC-4
RC-5
Two Fish
Blowfish
IDEA
CAST
MARS
Skipjack
106
COMMON ASYMMETRIC ALGORITHMS
DSA
RSA
El Gamal
Diffie Hellman
Knapsack
107
THE BUDDY SYSTEM FOR ASYMMETRIC ALGORITHMS
108
RSA
Uses the idea that there is no efficient way to factor the product of
large prime numbers
The math used for RSA is sometimes referred to as a trap-door
function
****Factorization****
109
DIFFIE-HELLMAN
110
DIFFIE HELLMAN KEY AGREEMENT
111
ECC (ELLIPTICAL CURVE CRYPTOGRAPHY)
112
REVIEW SYMMETRIC VS.
ASYMMETRIC
Symmetric
Fast
Out of band key exchange
Not Scalable
Asymmetric
Slow
Scales to large organizations well
Provides non-repudiation
113
HYBRID CRYPTOGRAPHY IN SSL/TLS
114
INTEGRITY
115
HASHING
116
HASHING
117
HASHING ALGORITHMS
118
HASHING
119
DIGITAL SIGNATURE
120
MESSAGE AUTHENTICATION
CODE - MAC
Message + Symmetric Number +Hashing algorithm
= HMAC
Integrity and (reasonable) authenticity
121
DIGITAL SIGNATURE
Message is hashed.
Hash is encrypted by Sender’s Private Key.
122
PKI PUBLIC KEY INFRASTRUCTURES
What’s wrong with this picture?
123
WHAT PREVENTS MITM ATTACKS
Authentication
Remember Encryption can NOT thwart a MITM attack
124
HOW DO WE PROVE OUR
IDENTITY?
Name?
Expiration Date
Class?
Serial Number?
Is it issued by a
trusted authority?
Is it standardized?
125
CERTIFICATES
126
PKI (PUBLIC KEY INFRASTRUCTURE)
Certificate Repository
127
CERTIFICATE CONTENTS
128
CERTIFICATE REVOCATION
129
TRUSTED CERTIFICATE
AUTHORITIES
130
ENCRYPTING DATA IN TRANSIT
131
ENCRYPTING DATA IN TRANSIT: SSL/TLS
132
IPSEC
133
IPSEC SUB-PROTOCOLS
AH (Authentication Header) Provides integrity, authenticity, and non-
repudiation through the use of an ICV (Integrity Check Value). The ICV is
run on the entire packet (header, data, trailer) except for particular fields in
the header that are dynamic (like TTL, etc..). NO CONFIDENTIALITY
ESP (Encapsulating Security Payload) Provides authenticity and integrity
through a MAC (no non-repudiation since a MAC is symmetric). The main
service provided is ENCRYPTION. ICV is run on payload only.
IKE: Internet Key Exchange---No Security Services. Just management of
secure connection
Oakley: Uses Diffie Hellman to agree upon a key
ISAKMP (Internet Security Association and Key Management Protocol)
Manages Keys, Security Associations (SAs) and Security Parameters
Index (SPI)
134
SECURITY ASSOCIATIONS AND SPIS
135
SSH (SECURE SHELL)
136
IMPLEMENTATION OF CRYPTOGRAPHY: DIGITAL ENVELOPES IN S/MIME
137
CRYPTOGRAPHY: PGP (PRETTY GOOD PRIVACY)
138
PROTECTING CONFIDENTIALITY OF DATA REST
Directory Services
139
ATTACKS ON CRYPTOGRAPHY
140
PART III: PHYSICAL SECURITY
Perimeter Defenses
Site selection, design, and configuration
Environmental Controls
142
PHYSICAL SECURITY
143
PERIMETER DEFENSES
Perimeter Defenses
Help prevent, detect, and correct unauthorized physical access
Should employ defense-in-depth
Fences
May range from deterrents (such as 3-foot/1 meter-tall fencing) to
preventive devices (8-foot/2.4 meter)
Should be designed to steer ingress and egress to controlled points,
such as exterior doors and gates
144
PERIMETER DEFENSES
Gates
Range in strength from ornamental (a class I gate designed to
deter access) to a class IV gate designed to prevent a car from
crashing through (such as gates at airports and prisons)
ASTM International's “ASTM F2200” Standard Specification for
Automated Vehicular Gate Construction at
http://www.astm.org/Standards/F2200.htm
Types of Vehicle Gates:
Class I Residential (home use)
Class II Commercial/General Access (parking garage)
Class III Industrial/Limited Access (loading dock for 18-wheeler
trucks)
Class IV Restricted Access (airport or prison)
Gates should be placed at controlled points at the perimeter -
Secure sites
Use fences and topography to steer traffic to these points.
145
PERIMETER DEFENSES
Bollards
A traffic bollard is a strong post designed to
stop a car Term derives from the short/strong
posts (called mooring bollards) used to tie
ships to piers when docked
Often installed in front of convenience stores,
to prevent a confused driver who mixes up the
accelerator and brake from driving into the
store.
Used in secure facilities to prevent cars from
entering (whether intentionally or not)
Can use large concrete planters for the same
effect
Usually placed in front of physically weak
areas of a building, such as entryways 146
PERIMETER DEFENSES
Lights
Can act as both a detective and deterrent control
Criminals will usually favor a poorly lighted target
over a more visible one
Should be bright enough to illuminate the desired
field of vision (the area being protected)
Fresnel (pronounced fray-NELL) lights - Same
type originally used in lighthouses, use Fresnel
lenses to aim light in a specific direction
Light measurement:
Lumen, the amount of light one candle creates
Footcandles; one footcandle is one lumen per
square foot
Lux, based on the metric system, more commonly
used now: one lux is one lumen per square meter.
147
PERIMETER DEFENSES
CCTV
Closed Circuit Television (CCTV)
150
LOCKS
Master Key
Opens any lock for a given security zone in a
building
Access to the master key should be tightly
controlled
Core Key
Core keys are used to remove the lock core in
interchangeable core locks (where the lock core
may be easily removed and replaced with another
core)
Once the lock core is removed, the door may often
be opened with a screwdriver
Button or keypad locks are also vulnerable because prolonged use can
cause wear on the most used buttons or keys
Combinations may be discovered via a brute-force attack, where every
possible combination is attempted
Locks may also be compromised via shoulder surfing
155
MANTRAPS AND TURNSTILES
Mantraps are a preventive physical control with two doors
The first door must close and lock before the second
door may be opened
Each door typically requires a separate form of
authentication to open
The intruder is trapped between the doors after
entering the mantrap
Turnstiles are designed to prevent tailgating by enforcing
a “one person per authentication” rule
Secure data centers may use floor-to-ceiling turnstiles
with interlocking blades to prevent an attacker from
going over or under the turnstile
Both mantraps and turnstiles must be designed to
allow safe egress in case of emergency
No system should require authentication for egress
during emergencies
156
CONTRABAND CHECKS
Seek to identify objects that are prohibited to enter a secure perimeter (such as an
airplane)
Secure buildings such as government or military buildings may employ contraband
checks
Often used to detect metals, weapons, or explosives
May also be used to detect controlled substances such as illegal drugs, portable
cameras or storage media
157
MOTION DETECTORS AND OTHER PERIMETER ALARMS
159
DOORS AND WINDOWS
Attackers will often target the “weakest link in the chain”
Examples of “weakest link” design include a concrete wall with a hollowcore door, or a
gypsum wall with a steel door.
Door hinges should face inward, or be otherwise protected
Doors with internal motion sensors should never include mail slots
Externally-facing emergency doors should be marked for emergency use only and
equipped with panic bars. The use of a panic bar should trigger an alarm.
Glass windows are structurally weak and can be dangerous when shattered. Bullet-proof
or explosive-resistant glass can be used for secured areas. Wire mesh or security film
can lower the danger of shattered glass and provide additional strength. Use of simple
glass windows in a secure perimeter requires a compensating control such as window
burglar alarms.
Alternatives to glass windows include polycarbonate such as Lexan and acrylic such as
Plexiglass. Lexan is used in race cars and airplanes for is strength and shatter
resistance.
160
WALLS, FLOORS, AND CEILINGS
Walls around any internal secure perimeter such as a data center should be “slab to slab”
Raised floors and drop ceilings can obscure where the walls truly start and stop
Any wall protecting a secure perimeter (whether internal or external) should be strong enough to
resist cutting
Simple gypsum “sheetrock” walls can be cut open with a sharp tool such as a carpet knife, and
should not be used for secure perimeters
Walls should have an appropriate fire rating (the amount of time required to fail due to a fire)
The National Fire Protection Agency (NFPA) 75: Standard for the Protection of Information
Technology
Equipment states “The computer room shall be separated from other occupancies within the building
by fire-resistant rated walls, floor, and ceiling constructed of noncombustible or limited combustible
materials.
The fire resistant rating shall be commensurate with the exposure, but not less than one hour.”
161
GUARDS
A dynamic control
May aid in inspection of access credentials, monitor CCTVs, monitor
environmental controls, respond to incidents, act as a deterrent (all things
being equal, criminals are more likely to target an unguarded building over a
guarded building), and more
Professional guards have attended advanced training and/or schooling;
amateur guards (sometimes derogatively called “Mall Cops”) have not
Term “pseudo guard” means an unarmed security guard
Guard's orders should be complete and clear
Guards are often attacked via social engineering, so this threat should be
directly addressed via security awareness and training.
162
DOGS
163
SITE SELECTION, DESIGN, AND CONFIGURATION
164
SITE SELECTION, DESIGN, AND CONFIGURATION
Topography
The physical shape of the land: hills, valleys, trees, etc.
Utility Reliability
Electrical outages are among the most common of all failures and disasters
165
SITE SELECTION, DESIGN, AND CONFIGURATION
Site Marking
Data centers are not externally marked
The Netflix DVD service avoids site marking of its service centers, which look
like nondescript warehouses in regular office parks. There are no Netflix signs
or corporate logos to be seen.
Assuming a low profile avoids drawing unwanted attention to the warehouses,
which adds defense-in-depth protection to the valuable contents inside. As an
additional bonus, this encourages subscribers to return DVDs via postal mail
(as opposed to attempting to return DVDs by dropping them off in person).
166
SITE SELECTION, DESIGN, AND CONFIGURATION
167
SITE SELECTION, DESIGN, AND CONFIGURATION
Shared Demarc
Demarc (the demarcation point, where the ISP's (Internet Service Provider) responsibility
ends and the customer's begins)
Most buildings have one demarc area, where all external circuits enter the building
Should employ strong physical access control, including identifying, authenticating, and
authorizing all access
For very secure sites, construction of multiple segregated demarcs is recommended.
168
PHYSICAL SYSTEM DEFENSES
System Defenses
One of the last lines of defense in a defense-in-depth strategy
Assume an attacker has physical access to a device or media containing sensitive information
Asset Tracking
You cannot protect your data unless you know where (and what) it is
Data such as serial numbers and model numbers are useful in cases of loss due to theft or
disaster.
Port Controls
Computers may contain multiple “ports” which may allow copying data to or from a system
USB drives can be small (some are smaller than a piece of chewing gum) and inexpensive and
may hold dozens of gigabytes or more
Small enough to evade perimeter contraband checks
169
PHYSICAL SYSTEM DEFENSES
170
PHYSICAL SYSTEM DEFENSES
171
PHYSICAL SYSTEM DEFENSES
172
PHYSICAL SECURITY
ENVIRONMENTAL
CONTROLS
• Electricity
• HVAC
• Fire safety
ELECTRICITY
174
TYPES OF ELECTRICAL FAULTS
175
SURGE PROTECTORS, UPSS, AND GENERATORS
Surge Protectors
Protect equipment from damage due to electrical surges
Contain a circuit or fuse which is tripped during a power spike or surge, shorting the power or regulating it
down to acceptable levels
Uninterruptible Power Supplies
Provide temporary backup power in the event of a power outage
May also “clean” the power, protecting against surges, spikes, and other forms of electrical faults
Backup power is provided via batteries or fuel cells
Provide power for a limited period of time, and can be used as a bridge to generator power; generators
typically take a short period of time to start up and begin providing power
Generators
Designed to provide power for longer periods of times than UPSs
Will run as long as fuel is available
Sufficient fuel should be stored onsite for the period the generator is expected to provide power
Refueling strategies should consider a disaster's effect on fuel supply and delivery
Generators should not be placed in areas which may flood or otherwise be impacted by weather events
Should be tested and serviced regularly.
http://www.cumminspower.com/www/literature/technicalpapers/PT-7006-Standby-Katrina-en.pdf
176
EMI
Network cables that are poorly shielded or run too closely together
may suffer crosstalk, where magnetism from one cable “crosses” over
to another nearby cable
Crosstalk can be mitigated via proper network cable management
177
HVAC
HVAC
Keep the air at a reasonable temperature and humidity
Note - Many sources cite 68-72 °F (20-22 °C) as the optimum data center temperature
range; in 2004, the American Society of Heating, Refrigerating and Air-Conditioning
Engineers (ASHRAE) recommended up to 77 °F/25 °C.
As a result, the 2008 ASHRAE recommendations allow a much wider range: temperature
of 18 °C (64.4 °F) to 27 °C (80.6 °F) and humidity from 25% to 60%, depending on the dew
point. Higher set points require adequate airflow. Details may be found at
http://tc99.ashraetcs.org
179
STATIC AND CORROSION
Sudden static discharge can cause damage from system reboots to chip or
disk damage
Static is mitigated by maintaining proper humidity, proper grounding all circuits
in a proper manner, and using antistatic sprays, wrist straps, and work
surfaces
Personnel working with sensitive computer equipment such as boards,
modules, or memory chips should ground themselves before performing any
work.
High humidity levels can allow the water in the air to condense onto (and into)
equipment, which may lead to corrosion.
Both static and corrosion are mitigated by maintaining proper humidity levels.
180
AIRBORNE CONTAMINANTS
CPU fans can be impeded by dust buildup, which can lead to CPU
failure due to overheating
Other contaminants can cause corrosion or damaging chemical
reactions.
181
HEAT, FLAME, AND SMOKE DETECTORS
184
SAFETY TRAINING AND AWARENESS
185
FIRES AND SUPPRESSION
ABCD Fires and Suppression
Fire suppression systems are
used to extinguish fires
Different types of fires require
different suppressive agents
Class K fires are kitchen fires,
such as burning oil or grease.
Wet chemicals are used to
extinguish class K fires
186
TYPES OF FIRE SUPPRESSION
AGENTS
Always consult local fire code before implementing a fire suppression
system
All fire suppression agents work via four methods (sometimes in
combination):
reducing the temperature of the fire,
reducing the supply of oxygen,
187
TYPES OF FIRE SUPPRESSION
AGENTS
Water
Suppresses fire by lowering the temperature below the kindling point
(also called the ignition point)
Safest of all suppressive agents, and recommended for extinguishing
common combustible fires such as burning paper or wood
It is important to cut electrical power when extinguishing a fire with water
to reduce the risk of electrocution
188
TYPES OF FIRE SUPPRESSION
AGENTS
Soda Acid
Old giant brass fire extinguishers
Suppress fire by lowering temperature, soda acid also has additional
suppressive properties beyond plain water: it creates foam which can
float on the surface of some liquid fires, starving the oxygen supply
189
TYPES OF FIRE SUPPRESSION
AGENTS
Dry Powder
Dry powder (such as sodium chloride) works by lowering temperature
and mothering the fire, starving it of oxygen.
Dry powder is primarily used to extinguish metal fires (flammable metals
include sodium, magnesium, and many others)
190
TYPES OF FIRE SUPPRESSION
AGENTS
Wet Chemical
Primarily used to extinguish kitchen fires (type K fires in the U.S.; type F
in Europe)
May also be used on common combustible fires (type A)
The chemical is usually potassium acetate mixed with water. This covers
a grease or oil fire in a soapy film which lowers the temperature.
191
TYPES OF FIRE SUPPRESSION
AGENTS
CO2
Fires may be smothered by removing the oxygen: this is how CO2 fire
suppression works.
A risk associated with CO2 is it is odorless and colorless, and our bodies
will breathe it as air. By the time we begin suffocating due to lack of
oxygen, it is often too late.
CO2 is dangerous suppressive agent, which is only recommended in
unstaffed areas such as electrical substations
Any personnel entering a CO2-protected area should be trained for CO2
safety; additional safety controls (such as oxygen tanks) are usually
recommended
192
TYPES OF FIRE SUPPRESSION
AGENTS
Halon and Halon Substitutes
Extinguishes fire via a chemical reaction that consumes energy and lowers the temperature of
the fire
Halon is being phased out, and a number of replacements with similar properties are now
used
Montreal Accord
Halon has ozone-depleting properties
The 1989 Montreal Protocol (formally called the “Montreal Protocol on Substances That
Deplete the Ozone Layer”) banned production and consumption of new halon in developed
countries by January 1, 1994.
Existing halon systems may be used. While new halon is not being produced, recycled halon
may be used
There are exceptions for certain critical uses, such as airplanes and submarines.
FE-13 is the newest of these agents, and comparatively safe. It may be breathed in
concentrations of up to 30%. Other halon replacements are typically only safe up to 10-15%
concentration.
194
COUNT-DOWN TIMERS
Sprinkler Systems
All sprinkler systems should be combined with a fire alarm that alerts
people to evacuate
Safe evacuation is the primary goal of fire safety.
Wet Pipe
Wet pipes have water right up to the sprinkler heads: the pipes are “wet.”
The sprinkler head contains a metal (common in older sprinklers) or
small glass bulb designed to melt or break at a specific temperature
The sprinkler head opens and water flows
Wet Pipe
Bulbs come in different colors, which indicate the ceiling temperature
which will trigger the bulb to burst and open the sprinkler head
The colors used are
orange (135 °F/57 °C),
red (155 °F/68 °C),
yellow (175 °F/79 °C),
green (200 °F/93 °C),
blue (286 °F/141 °C)
NFPA 13: Standard for the Installation of Sprinkler Systems describes the
color conventions used for these sprinkler heads. See:
http://www.nfpa.org/aboutthecodes/AboutTheCodes.asp?DocNum=13
197
SPRINKLER SYSTEMS
Dry Pipe
Also have closed sprinkler heads: the difference is the pipes are filled with
compressed air
Water is held back by a valve that remains closed as long as sufficient air pressure
remains in the pipes
As the dry pipe sprinkler heads open, the air pressure drops in each pipe, allowing the
valve to open and send water to that head
Dry pipes are often used in areas where water may freeze, such as parking garages.
Deluge
Similar to dry pipes, except the sprinkler heads are open and larger than dry pipe
heads
The pipes are empty at normal air pressure; the water is held back by a deluge valve
The valve is opened when a fire alarm (which may monitor smoke or flame sensors)
triggers.
198
SPRINKLER SYSTEMS
Pre-Action
Combination of wet, dry, or deluge systems, and require two separate
triggers to release water
Single interlock systems release water into the pipes when a fire alarm triggers
The water releases once the head opens
Double interlock systems use compressed air (same as dry pipes): the water
will not fill the pipes until both the fire alarm triggers and the sprinkler head
opens
Preaction systems are used in areas such as museums, where accidental
discharge would be expensive.
Double-interlock systems are used in cold areas such as freezers to avoid
frozen pipes
199
PORTABLE FIRE EXTINGUISHERS
Should be marked with the type of fire they are designed to extinguish
Should be small enough to be operated by any personnel who may
need to use one
Use the “PASS” method to extinguish a fire with a portable fire
extinguisher:
Pull the pin
Aim low
200
MODULE REVIEW
CHAPTER 3 SECURITY ENGINEERING REVIEW
Part I Security Architecture and Design: Symmetric Cryptography
Trusted Computer Base Elements Asymmetric Cryptography
Security Perimeter Hybrid Cryptography
Reference Monitor Integrity through Hashing, MACs and
Security Kernel Digital Signatures
Security Models Public Key Infrastructure
Computer/Security Architecture IPSec
Security Models Attacks on Cryptography
Security Evaluation Criteria
Part III Physical Security:
Part II Cryptography: Perimeter Defenses
cryptography
Definitions and terms
202
MODULE SELF CHECK
MODULE SELF CHECK
A. ISO 15408
B. ISO 27001
C. ISO 9001
D. ISO 9146
204
MODULE SELF CHECK
A. Multilevel lattice
B. State machine
C. Non-interference
D. Matrix-based
205
MODULE SELF CHECK
A. Biba-Integrity
B. Clark–Wilson
C. Brewer–Nash
D. Bell–LaPadula
206
MODULE SELF CHECK
A. Brewer–Nash
B. Clark–Wilson
C. Bell–LaPadula
D. Lipner
207
MODULE SELF CHECK
A. 15408
B. 27000
C. 9100
D. 27002
208
MODULE SELF CHECK
A. EAL 1
B. EAL 3
C. EAL 5
D. EAL 7
209
MODULE SELF CHECK
210
MODULE SELF CHECK
A. Diffie–Hellman
B. Rijndael
C. Blowfish
D. SHA-256
211
MODULE SELF CHECK
212
MODULE SELF CHECK
A. AES
B. DES
C. One-time pad
D. Triple DES
213
MODULE SELF CHECK
The doors of a data center spring open in the event of a fire. This
is an example of
A. Fail-safe
B. Fail-secure
C. Fail-proof
D. Fail-closed
214
MODULE SELF CHECK
A. Lighting
B. Security guard
C. Key locks
D. Fences
215
MODULE SELF CHECK
A. 20–40 percent
B. 40–60 percent
C. 60–75 percent
D. 80–95 percent
216
MODULE SELF CHECK
A. Water
B. CO2
D. Soda acid
217
MODULE SELF CHECK
C. Preaction system
D. Deluge system
218