01 Introduction
01 Introduction
• Integrity
• Data Integrity: assures that information and programs are changed only in a
specified and authorized manner.
• System Integrity: Assures that a system performs its operations in
unimpaired/not damaged manner.
• Availability:
• Assures that systems works promptly and service is not denied to authorized
users.
Additional Concepts to a Complete Security
Picture
• Authenticity:
• The property of being genuine and being able to be verified and trusted;
confident in the validity of a transmission, or a message, or its originator.
• e.g. Verifying the users who they say they are from trusted source.
• Accountability:
• Generates the requirement for actions of an entity to be traced uniquely to
that individual to support nonrepudiation, deterrence (prevent offender from committing
same crime in future), fault isolation (self checking), forensics, IDS, IDP etc.
• Because truly secure system are not yet an achievable goal, we must be able
to trace security breach to a responsible party. Keep records for activities.
• High:
• The loss has severe or catastrophic adverse effect on operations,
organizational assets or on individuals (e.g., loss of life)
• Protection of the data is required by law/regulation
Examples of security requirements:
Confidentiality
• Student grade/exam information is an asset whose
confidentiality is considered to be ?? level
• The US FERPA* Act: grades should only be available to students, their parents, and their
employers (when required for the job)
• Security Services
• CIA
• Security Concepts
• Security Breaches Levels
• Security Challenges
Activity
• Consider an automated teller machine (ATM) in which users provide a
personal identification number (PIN) and a card for account access.
• Think……………………..
Activity II
• Sniffing
• Faked identity
• ATM machine spoofing
• Saving passwords in a plaintext file
• Think……………………..
Overview
• Why and What to Secure?
• Computer Security Concepts
• A Model of Computer Security
• Threats, Attacks, and Assets
• OSI Security Architecture
• Security Functional Requirements
• Fundamental Security Design Principles
• Attack Surfaces and Attack Trees
• Computer Security Strategy
A model for computer security
• Lets start with the concept of Systems resources or assets that
user/owner wish to protect.
• Hardware: computer system, data storage/processing, communication device
• Software :OS, apps, system utilities
• Data: Files, database, i.e. password files
• Communication facilities and network: LAN, bridges, routers
• In context of security our concern is with vulnerability of these
resources w.r.t CIA. Its categories
• Corrupted: system can be corrupted it does wrong things, gives wrong
answers, i.e. database values modified
• Leaky: Unauthorized access to files through network
• Unavailable: Very slow or becomes impossible to reach/access.
Countermeasures may itself introduce new vulnerability. https://msrc.microsoft.com/update-guide/vulnerability
Recent: Top 10 Vulnerabilities for OWASP* 2023
*OWASP: Open Web Application Security Project
2. Cryptographic Failures Weak encryption algorithms or short encryption keys which can make it easier for attackers to decrypt sensitive data, weak SSL/TLS
protocols
6. Vulnerable and Outdated Components Attackers are looking for websites with vulnerable components which they can exploit to spread malware
7. Identification and Authentication Failures A session ID configured without a validity period can run and run
8. Software and Data Integrity Failures Vulnerabilities Legacy code used in third party application, improper update
9. Security Logging and Monitoring Failures Not having an efficient logging and monitoring , process, missed and alerts aren’t generated
10. Server-Side Request Forgery (SSRF) Unauthorized requests from the server to other internal or external resources, manipulate input fields or
parameters in the application to trick the server into sending requests to arbitrary URLs
Computer
Security
Terminology
Lets understand…again
• Asset ?
• Vulnerability ?
• Risk ?
• Threat ?
Computer Security Terminology
• Threats exploit vulnerabilities
Remember:
• Threat: Potential violation of security, possible danger
• Attacks: Intelligent act deliberately evade security services
Threats and Attacks
Unauthorized disclosure:
threat to confidentiality
Exposure (hardware error,
release data, sensitive info,
credit card etc.)
• Software (CIA)
• OS, utilities and application programs (easily delete)
• Altered (Virus), Software Piracy (modified functioning)
• Data (CIA)
• Database – Confidentiality (unauthorized reading of file), integrity and availability. E.g.
salary aggregate database table
Threats and Assets
• Communication Lines and Network: threat to CIA
• Message can be destroyed deleted
• Message can be read, traffic pattern
• Message can be modified, reordered
Example:
Look for particular patterns in communications.
Solution:
Strong confidentiality, message padding, random message when no message is being
transmitted
Masquerading
Example:
Stolen username and password used for masquerading
Solution:
Strong Authentication and identity protection
Replay Attack
Example:
Capture a message and then replay it later.
Solution:
Strong Authentication, packet sequencing, confidentiality, nonce
Modification of Messages
Example:
Capture a message. Modify it. Then send it to receiver.
Solution:
Intrusion detection and prevention systems. Strong authentication and confidentiality.
Denial of Service
Example:
Disable/ hinder connections or data services. Make a server busy by overloading.
Solution:
Intrusion detection and prevention systems. Roll back services, fail safe systems, backup
services etc.
2- Security Services: OSI Security Architecture
• X.800 defines the security service as a service at protocol layer of communication
open system that ensure adequate security of system and data. However, clear
definition can be found in RFC 2828.
• Denial-of-service attacks
• Minimum security requirements for Federal Information and information system, FIPS PUB
200.
“If you think technology can solve your security problems, then you don’t understand the
problems and you don’t understand the technology”.
• Because both technical and managerial approaches are required to achieve effective
computer security.
Security Functional Requirements (FIPS PUB 200)
• Technical measures
• Access control; identification & authentication; system & communication
protection; system & information integrity
• But good practices for good design have been documented (analogous to software
engineering)
• Economy of mechanism, fail-safe defaults, complete mediation, open design,
separation of privileges, least privilege, least common mechanism, psychological
accountability, isolation, encapsulation, modularity, layering, least astonishment
• Key point: Restriction may minimizes the control, Access only that needs
• Fail-safe default: restricts how privileges are initialized when a subject or object is
created i.e. default access to an object is none
• (e.g. spool directory fail should stop not write any other )
• Complete mediation: every access must be checked against the access, restricts
the caching of information,
• E.g. DNS cache “poison” may redirect to another IP.
Fundamental Security Design Principles [1/4]
• Open design: the design should be open rather than secret (e.g. encryption
algorithms).
• Complexity does not add security
• “security through obscurity”
• Careful implementation
Overview
• Why and What to Secure?
• Computer Security Concepts
• Threats, Attacks, and Assets
• OSI Security Architecture
• Security Functional Requirements
• Fundamental Security Design Principles
• Attack Surfaces and Attack Trees
• Elaborate on two concepts that are useful in evaluating and classifying threats.
• Specification/policy:
• What security scheme supposed to do?
• Implementation/mechanisms:
• How does it do it?
• Correctness/assurance:
• Does it really work?
Computer security strategy
• Policy (specs): First step is to develop Policy (informal and formal
specification). So security manager focus on what security schemes are
supposed to do. Following key point must ensure.
• The value of the assets being protected
• The vulnerabilities of the system
• Potential threats and the likelihood of attacks
• https://purplesec.us/resources/cyber-security-statistics/
• Confidentiality: high, card has personal information and only available to authorized
student.
• Integrity: high, Card # only used by student
• Availability: high, Card # is only available to authenticate student
Activity
Consider a company whose operations are housed in two buildings on the same property:
one building is headquarters, the other building contains network and computer services.
• The property is physically protected by a fence around the perimeter.
• The only entrance to the property is through a guarded front gate.
• The local networks are split between the Headquarters’ LAN and the Network Services’
LAN.
• Internet users connect to the Web server through a firewall.
• Develop an attack tree in which the root node represents disclosure of proprietary
secrets. Include physical, social engineering, and technical attacks.
• The tree may contain both AND and OR nodes. Develop a tree that has at least 10 leaf
nodes.
Activity
1. Physical Attacks
• Bypassing the Perimeter Fence 1.1.1. Cutting the fence 1.1.2. Climbing over the fence 1.1.3. Tunneling under the fence
• Gate Access Breach 1.2.1. Social engineering attack on the guard 1.2.2. Forging access credentials 1.2.3. Tailgating behind
authorized personnel
2. Social Engineering Attacks
• Phishing Attacks 2.1.1. Email phishing targeting employees 2.1.2. Phone phishing (vishing) targeting employees
• Impersonation Attacks 2.2.1. Impersonating an employee or vendor 2.2.2. Impersonating a maintenance worker
3. Technical Attacks 3.1.
• LAN Network Attacks 3.1.1. LAN eavesdropping 3.1.2. LAN-injection attacks 3.2.
• Web Server and Firewall Attacks 3.2.1. Web server vulnerabilities exploitation 3.2.2. Firewall misconfigurations
4. Insider Threats 4.1.
• Employee Data Theft 4.1.1. Unauthorized access by disgruntled employee 4.1.2. Insider sharing login credentials
• Vendor or Contractor Breach 4.2.1. Unauthorized access by a contractor/vendor 4.2.2. Insider collusion with a contractor/vendor
5. USB/Removable Media Attacks 5.1.
• Malicious USB Insertion 5.1.1. Inserting malware-infected USB drives 5.1.2. Dropping infected USBs in parking lots
6. Physical Break-ins 6.1.
• Breaking into Buildings 6.1.1. Breaking into the headquarters building 6.1.2. Breaking into the network services building 6.2.
Server Room Access 6.2.1. Gaining physical access to server rooms
7. Internet-based Attacks 7.1.
• External Network Attacks 7.1.1. DDoS attacks on the web server 7.1.2. Exploiting web application vulnerabilities 7.2.
• Remote Employee Compromise 7.2.1. Exploiting vulnerabilities in remote employee systems 7.2.2. Phishing remote employees
8. Physical Surveillance and Espionage 8.1.
• Eavesdropping on Conversations 8.1.1. Planting listening devices 8.1.2. Intercepting phone calls 8.2.
• Physical Espionage 8.2.1. Infiltrating the company as a spy
Summary
• Why and What to Secure?
• Computer Security Concepts
• A Model of Computer Security
• Threats, Attacks, and Assets
• OSI Security Architecture
• Security Functional Requirements
• Fundamental Security Design Principles
• Attack Surfaces and Attack Trees
• Computer Security Strategy
• Activities
Reference
• Chapter 1
• (Computer Security Principles & Practice)