Lecture 5
Lecture 5
In collaboration with:
Prof. Leszek T. Lilien, Western Michigan University
Threats - examples
Viruses, trojan horses, etc.
Denial of Service
Stolen Customer Data
Modified Databases
Identity Theft and other threats to personal privacy
Equipment Theft
Espionage in cyberspace
Hack-tivism
Cyberterrorism
…
3
3. Basic Components of Security:
Confidentiality, Integrity, Availability (CIA)
CIA
Confidentiality: Who is authorized to use data? C I
Integrity: Is data „good?” S
Availability: Can access data whenever need it?
A
S = Secure
CIA or CIAAAN…
(other security components added to CIA)
Authentication
Authorization
Non-repudiation
…
4
Need to Balance
CIA
Example 1: C vs. I+A
Disconnect computer from Internet to increase confidentiality
Availability suffers, integrity suffers due to lost updates
5
Confidentiality
“Need to know” basis for data access
How do we know who needs what data?
Approach: access control specifies who can access
what
How do we know a user is the person she claims to be?
Need her identity and need to verify this identity
Approach: identification and authentication
“Need to access/use” basis for physical assets
E.g., access to a computer room, use of a desktop
Confidentiality is:
difficult to ensure
easiest to assess in terms of success (binary in nature:
6
Yes / No)
Integrity
Integrity vs. Confidentiality
Concerned with unauthorized modification of assets (=
resources)
Confidentiality - concered with access to assets
Integrity is more difficult to measure than confidentiality
Not binary – degrees of integrity
Context-dependent - means different things in different
contexts
Could mean any subset of these asset properties:
{ precision / accuracy / currency / consistency /
meaningfulness / usefulness / ...}
Types of integrity—an example
Quote from a politician
Preserve the quote (data integrity) but misattribute (origin
integrity)
7
Availability (1)
Not understood very well yet
„[F]ull implementation of availability is security’s next
challenge”
E.g. Full implemenation of availability for Internet users
(with ensuring security)
Complex
Context-dependent
Could mean any subset of these asset (data or service)
properties :
{ usefulness / sufficient capacity /
progressing at a proper pace /
completed in an acceptable period of time / ...}
[Pfleeger & Pfleeger]
8
Availability (2)
Unsuccessful
when controls block a threat trying to exploit a vulnerability
[Pfleeger & Pfleeger]
11
Threat Spectrum
Local threats
Recreational hackers
Institutional hackers
Shared threats
Organized crime
Industrial espionage
Terrorism
National security threats
National intelligence
Info warriors
12
Kinds of Threats
Kinds of threats:
Interception
an unauthorized party (human or not) gains access to
an asset
Interruption
an asset becomes lost, unavailable, or unusable
Modification
an unauthorized party changes the state of an asset
Fabrication
an unauthorized party counterfeits an asset
13
Levels of Vulnerabilities / Threats
14
A) Hardware Level of Vulnerabilities /
Threats
Add / remove a h/w device
Ex: Snooping, wiretapping
Snoop = to look around a place secretly in order to discover things
about it or the people connected with it. [Cambridge Dictionary of
American English]
Ex: Modification, alteration of a system
...
Physical attacks on h/w => need physical security: locks and
guards
Accidental (dropped PC box) or voluntary (bombing a
computer room)
Theft / destruction
Damage the machine (spilled coffe, mice, real bugs)
...
15
Example of Snooping:
Wardriving / Warwalking, Warchalking,
Wardriving/warwalking -- driving/walking
around with a wireless-enabled notebook looking
for unsecured wireless LANs
18
C) Data Level of Vulnerabilities / Threats
Adequate protection
Cryptography
Good if intractable for a long time
19
Types of Attacks on Data CIA
Disclosure
Attack on data confidentiality
Unauthorized modification / deception
E.g., providing wrong data (attack on data integrity)
Disruption
DoS (attack on data availability)
Usurpation
Unauthorized use of services (attack on data confidentiality, integrity
or availability)
20
Ways of Attacking Data CIA
Examples of Attacks on Data Confidentiality
Tapping / snooping
Examples of Attacks on Data Integrity
Modification: salami attack -> little bits add up
E.g/ „shave off” the fractions of cents after interest calculations
Fabrication: replay data -> send the same thing again
E.g., a computer criminal replays a salary deposit to his account
Examples of Attacks on Data Availability
Delay vs. „full” DoS
Examples of Repudiation Attacks on Data:
Data origin repudiation: „I never sent it”
mistakes
„bringing close” physically distant attackers
23
Types of Attackers
Types of Attackers - Classification 1
Amateurs
Opportunistic attackers (use a password they found)
Script kiddies
Hackers - nonmalicious
In broad use beyond security community: also malicious
Crackers – malicious
Career criminals
State-supported spies and information warriors
24
New Internet
Attacks
High Packet Forging & Spoofing
Stealth Diagnotics
DDOS Sophistication of
Hacker Tools
Sweepers Sniffers
Hijacking Sessions
Back Doors
Password Guessing
Time
[Barbara Edicott-Popovsky and Deborah Frincke, CSSE592/492, U. Washington]
25
6. Reacting to an Exploit
Etc.
26
“To Report or Not To Report:”
Tension between Personal Privacy
and Public Responsibility
An info tech company will typically lose between
ten and one hundred times more money from
shaken consumer confidence than the hack attack
itself represents if they decide to prosecute the
case.
Deter attack
Make attack harder (can’t make it impossible )
Deflect attack
Make another target more attractive than this
target
Detect attack
During or after
Crenellations
Strong gate
Tower
Guards / passwords
29
A.1) Controls: Encryption
Primary controls!
Protects CIA:
confidentiality – by „masking” data
integrity – by preventing data updates
e.g., checksums included
availability – by using encryption-based protocols
e.g., protocols ensure availablity of resources for
different users
30
A.2) Controls: Software Controls
Secondary controls – second only to encryption
Software/program controls include:
OS and network controls
E.g. OS: sandbox / virtual machine
system)
internal program controls (part of a program)
E.g. read/write controls in DBMSs
development controls
E.g. quality standards followed by developers
incl. testing
31
Considerations for Software Controls:
Impact on user’s interface and workflow
E.g. Asking for a password too often?
32
A.3) Controls: Hardware Controls
33
A.4) Controls: Policies and Procedures
34
Policy - must consider:
Alignment with users’ legal and ethical standards
Probability of use (e.g. due to inconvenience)
Inconvenient: 200 character password,
change password every week
(Can be) good: biometrics replacing passwords
Periodic reviews
As people and systems, as well as their goals, change
35
A.5) Controls: Physical Controls
Walls, locks
Guards, security cameras
Backup copies and archives
Cables an locks (e.g., for notebooks)
Natural and man-made disaster protection
Fire, flood, and earthquake protection
Accident and terrorism protection
...
36
B) Effectiveness of Controls
Awareness of problem
People convined of the need for these controls
Likelihood of use
Too complex/intrusive security tools are often disabled
Overlapping controls
>1 control for a given vulnerability
To provide layered defense – the next layer compensates for a
Periodic reviews
A given control usually becomess less effective with time
Need to replace ineffective/inefficient controls with better ones
37
8. Principles of Computer Security
[Pfleeger and Pfleeger]
38
Principle of Effectiveness (p.26)
Controls must be used—and used properly—to be
effective.
They must be efficient, easy to use, and appropriate.