CH01 CompSec2e
CH01 CompSec2e
Overview
Integrity
- data integrity - system integrity
Availability
Integrity
guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity
Availability
ensuring timely and reliable access to and use of information
simple as it might first appear to the novice potential attacks on the security features must be considered procedures used to provide particular services are often counterintuitive physical and logical placement needs to be determined additional algorithms or protocols may be involved
single weakness, the developer needs to find all weaknesses users and system managers tend to not see the benefits of security until a failure occurs security requires regular and constant monitoring is often an afterthought to be incorporated into a system after the design is complete thought of as an impediment to efficient and user-friendly operation
Table 1.1
Computer Security Terminology
RFC 2828, Internet Security Glossary, May 2000
threats
capable of exploiting vulnerabilities represent potential security harm to an asset
Countermeasures
means used to deal with security attacks may introduce new vulnerabilities residual vulnerabilities may remain
prevent detect recover
Table 1.2
Threat Consequences
Active attacks involve modification of the data stream goal is to detect them and then recover four categories:
S e c t u y r i
R e q u i r
e m e n t s
OSI
systematic way of defining the requirements for security and
characterizing the approaches to satisfying them was developed as an international standard focuses on:
security attacks action that compromises the security of
information owned by an organization security mechanism designed to detect, prevent, or recover from a security attack security service intended to counter security attacks
Security Services
X.800
defines a security service
RFC 2828
defines a security service
as a service that is provided by a protocol layer of communicating open systems and ensures adequate security of the systems or of data transfers
as a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented by security mechanisms
Authentication Service
Data Origin Authentication provides for the corroboration of the source of a data unit does not provide protection against the duplication or modification of data units this type of service supports applications like email where there are no prior interactions between the communicating entities
Peer Entity Authentication provides for the corroboration of the identity of a peer entity in an association provided for use at the establishment of, or at times during the data transfer phase of, a connection attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection
is not interfered with by a third party masquerading as one of the two legitimate parties
Nonrepudiation Service
must first be identified, or authenticated, so that access rights can be tailored to the individual
analysis
this requires that an attacker not be
able to observe the source and destination, frequency, length, or other characteristics of the traffic on a communications facility
connectionless confidentiality protection of all user data in a single data block the protection of transmitted selective-field confidentiality confidentiality of selected fields within the user data on a connection or a single data block traffic-flow confidentiality protection of the information that might be derived from observation of traffic flows
a connection-oriented integrity
service assures that messages are received as sent, with no duplication, insertion modification, reordering, or replays
destruction of data is also
covered under this service addresses both message stream modification and denial of service can apply to a stream of
rather than prevention the incorporation of automated recovery mechanisms is the more attractive alternative
Availability Service
amenable to authentication and encryption some attacks require a physical action to prevent or recover from loss of availability
system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications of the system
Table 1.6
specification/policy
implementation/mechanisms
correctness/assurance
Security Policy
formal statement of rules and practices that specify or
regulate how a system or organization provides security services to protect sensitive and critical system resources
factors to consider:
value of the assets being
trade-offs to consider:
ease of use versus security cost of security versus cost of
protected vulnerabilities of the system potential threats and the likelihood of attacks
Security Implementation
prevention detection response response
secure encryption intrusion detection algorithms systems prevent detection of denial unauthorized of service access to attacks encryption keys upon detection, uponable to halt being detection, being able to an attack and halt an attack and prevent further prevent damage further damage
detection recovery
intrusion detection use of backup systems systems detection of denial of service attacks
Summary
security concepts CIA triad confidentiality preserving the disclosure of information integrity guarding against modification or destruction of information availability ensuring timely and reliable access to information terminology table 1.1 threats exploits vulnerabilities attack a threat carried out countermeasure means to deal with a security attack assets hardware, software, data, communication lines, networks
security architecture
security services enhances the security of systems and information transfers, table 1.5 security mechanisms mechanisms designed to detect, prevent, or recover from a security attack, table 1.6 security attack any action that compromises the security of information owned by an organization
security trends figure 1.4 security strategy policy, implementation, assurance and evaluation functional requirements
table 1.4