Sect1 Ch1 Intro
Sect1 Ch1 Intro
Slides not created by the above authors are © 2006-2007 by Leszek T. Lilien
Requests to use original slides for non-profit purposes will be gladly granted upon a written request.
Section 1 Outline
1. Introduction to Security
1.1. Examples – Security in Practice
1.2. What is „Security?”
1.3. Pillars of Security:
Confidentiality, Integrity, Availability (CIA)
1.4. Vulnerabilities, Threats, and Controls
1.5. Attackers
1.6. How to React to an Exploit?
1.7. Methods of Defense
1.8. Principles of Computer Security
2 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
1.Introduction to Security
1.1. Examples – Security in Practice [Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
The most serious financial losses occurred through theft of proprietary information and
financial fraud:
26 respondents: $170M
25 respondents: $115M
For the fifth year in a row, more respondents (74%) cited their Internet connection as a
frequent point of attack than cited their internal systems as a frequent point of attack (33%).
34% reported the intrusions to law enforcement. (In 1996, only 16% acknowledged
reporting intrusions to law enforcement.)
3 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
More from CSI/FBI 2002
40% detected external penetration
Denial
Cyberterrorism of Modified
Service Databases
Virus
Espionage
Identity
Theft
Equipment
Theft Stolen
Customer
Data
[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
12 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
1.3. Pillars of Security:
Confidentiality, Integrity, Availability (CIA)
Confidentiality: Who is authorized?
Integrity: Is data „good?”
Availability: Can one access data whenever needed?
Confidentiality Integrity
S
Availability
S = secure
[cf. Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
13 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
Balancing
CIA Biographical
Data
Payroll
Data
Health
Data
Confidentiality Integrity
S
Sensitive
Data
Availability S = secure
Complex
Context-dependent
Could mean any subset of these asset (data or service)
properties :
{ usefulness / sufficient capacity /
progressing at a proper pace /
completed in an acceptable period of time / ...}
[Pfleeger & Pfleeger]
17 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
Availability (2)
cause harm
Controls = means and ways to block a threat, which
Successful
resulting in a breach of security, a system
penetration, etc.
Unsuccessful
when controls block a threat trying to exploit a
vulnerability
[Pfleeger & Pfleeger]
Examples
Fig. 1-1 (p.6)
New Orleans disaster (Hurricane Katrina):
What were city vulnerabilities, threats, and controls
20 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
Kinds of Threats
Kinds of threats:
Interception
an unauthorized party (human or not) gains access to
an asset
Interruption
an asset becomes lost, unavailable, or unusable
Modification
an unauthorized party changes the state of an asset
Fabrication
an unauthorized party counterfeits an asset
...
Bacteria
Worms
Logic Bombs Viruses
Adequate protection
Cryptography
Good if intractable for a long time
design/implem./usage mistakes
„bringing close” physically distant attackers
Disgruntled employees
38 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
1.3.5. Attackers
Amateurs
Opportunistic attackers
Uses a password he found
Script kiddies
Hackers - nonmalicious
in broad use beyond security community: also malicious
Crackers - malicious
Career criminals
State-supported spies and information warriors
40 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
Types of Attackers (2)
(in: the „Threat Spectrum” slide)
Hactivism
Electro-Hippies
Stealth Diagnotics
DDOS Sophistication of
Hacker Tools
Sweepers Sniffers
Hijacking Sessions
Back Doors
Password Guessing
Time
[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
43 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
1.6. How to React to an Exploit?
Deter attack
Make attack harder (can’t make it impossible )
Deflect attack
Make another target more attractive than this
target
Detect attack
During or after
Crenellations
Strong gate
Tower
Guards / passwords
tower / ladders up
Protects CIA:
confidentiality – by „masking” data
different users
detection system)
internal program controls (part of a program)
E.g. read/write controls in DBMSs
development controls
E.g. quality standards followed by developers
incl. testing
52 Section 1 (Ch.1) – Computer Security and Information Assurance – Spring 2007
Considerations for Software Controls:
Impact on user’s interface and workflow
E.g. Asking for a password too often?
change
Walls, locks
Guards, security cameras
Backup copies and archives
Cables an locks (e.g., for notebooks)
Natural and man-made disaster protection
Fire, flood, and earthquake protection
Accident and terrorism protection
...