CN Notes
CN Notes
Pervasive Security Mechanisms," it means security measures that are built into multiple
areas of a system to provide overall protection.
1. Policies
2. Mechanisms
1. Secure Mechanism
● The secure state (green) completely covers the reachable state (yellow).
● All reachable states are secure, meaning no system state leads to
insecurity.
● Highly restrictive, may limit functionality.
2. Precise Mechanism
● The reachable states (yellow) perfectly match the secure states (green).
● Ideal case where all accessible states are secure without over-restriction.
● Ensures security without unnecessary limitations.
3. Broad Mechanism
Breakdown of Assurance:
✅
Even if we trust the system’s policies and mechanisms, security can still fail if:
✅
Requirements are unclear (bad specification)
✅
Design doesn't fully meet the requirements
Implementation introduces bugs (e.g., coding flaws)
✅
○ Helps determine:
✅
Should we protect something? (Is it at risk?)
How much should we invest in protection? (Is it worth it?)
○ Example: A bank will invest heavily in security, but a small blog
website might not need the same level of protection.
3. Laws and Customs
○ Ensures that security measures comply with laws and fit user
expectations.
○ Example: Surveillance cameras can improve security but may
violate privacy laws or user trust.
An attack surface is all the ways a hacker can try to break into a system. It
includes weaknesses that are reachable and exploitable by attackers.
1. Listing all ways data enters or leaves the system (like APIs, forms, network
connections).
2. Checking how risky each entry point is.
This attack tree represents different ways a bank account compromise can
occur. Let's break it down:
CHALLENGES IN CNS
1. Balancing Complexity, Usability, and Threat Mitigation
7. Battle of Wits
9. Continuous Monitoring
Security Standards
To ensure consistency and best practices, various organizations define security
standards:
Final Thoughts
Definition:
Security misconfiguration occurs when an application, server, or database is not
securely set up, leading to vulnerabilities that attackers can exploit. This can
result from default settings, unnecessary features, or improper permissions.
Risks:
Impact:
✅
Mitigation:
✅
Regularly update and patch all software and dependencies.
✅
Disable unnecessary features, services, and accounts.
✅
Use least privilege principles (restrict user access).
✅
Harden configurations (e.g., strong passwords, HTTPS, secure API keys).
Perform regular security audits and automated scans.
Definition:
This occurs when an application uses outdated software, libraries, frameworks,
or plugins with known vulnerabilities. Attackers can exploit these weaknesses to
compromise systems.
Risks:
Impact:
✅
Mitigation:
✅
Regularly update software, libraries, and dependencies.
✅
Monitor for vulnerabilities (e.g., use CVE databases, security advisories).
✅
Remove unused or unsupported components from the system.
Use dependency management tools (e.g., OWASP Dependency-Check,
Snyk).
Example: