Basic Security Control
Basic Security Control
Sesi 7
DigiTalent Scholarship 2018
Security Controls
“
technical or administrative safeguards or
counter measures to avoid, counteract or
minimize loss or unavailability due to threats
acting on their matching vulnerability, i.e.,
security risk
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Types of Controls
(environment based)
Administrative controls technical controls
• process of developing and • controls in security that are
ensuring compliance with policy carried out or managed by
and procedures computer systems
• tend to be things that
employees may do, or must
always do, or cannot do
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Types of Controls
(phase based)
Prevention controls: Help to prevent a threat or attack from
exposing a vulnerability.
Detection controls: Help to discover if a threat or vulnerability has
entered a computer system.
Correction controls: Help to mitigate the consequences of a threat
or attack from adversely affecting a computer system.
OR Preventative, Detective,
Corrective according SANS
“
alternate controls designed to accomplish
the intent of the original controls as closely
as possible, when the originally designed
controls can not be used due to limitations
of the environment.
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Illustration of controls
Preventative Detective Corrective Compensatory
Security System OS Upgrade Backup
Awareness Monitoring Generator
Training
Firewall IDS Backup Data Hot Site
Restoral
Anti-virus Anti-Virus Anti-Virus Server Isolation
Security Guard Motion Detector Vulnerability
Mitigation
IPS IPS
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
Physical controls include locks, fences, mantraps and even
geographic specific controls.
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
Segregation of duties that are policies, procedures, and an
organizational structure established so that one individual cannot
control key aspects of computer-related operations and thereby
conduct unauthorized actions or gain unauthorized access to assets or
records.
Service continuity controls to ensure that when unexpected events
occur, critical operations continue without interruption.
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Security Management Process
• Identification: Detecting
problems and determining how
best to protect the system.
Monitoring Identification • Implementation: Installing
control mechanisms to prevent
problems in a system.
• Monitoring: Involves detecting
Implementation and solving any security issues
that arise after security controls
are implemented.
Identify security controls
Principle Description
Prevents intentional or unintentional disclosure of communications between sender and
recipient
Confidentiality
• Includes trade and military secrets, personnel, health, and tax records.
• Controlled via encryption, access control, and steganography.
Ensures the accuracy and consistency of information during all processing
Integrity • Includes modification of test scores or other information stored on network servers.
• Controlled via hashing, digital signatures, certificates, and change control.
Assurance that authorized users can access resources in a reliable and timely manner
• Includes ensuring that vital data such as radar images are both captured and distributed
Availability
to airports.
• Controlled via redundancy, fault tolerance, and patching.
Identify security controls (cont’d)
Principle Description
Ensuring that the party that sent a transmission or created data remains associated with
Non-
the data and cannot deny sending or creating the data.
Repudiation
• Controlled via Digital signatures, certificates, and change control.
Determining who to hold responsible for a particular activity or event.
Accountability
• Controlled via role and logging monitor
Identification, Authentication, and
Authorization
Identification
Authentication
The process by Authorization
which a claim A method of
is made about validating a The process of
the nature of a particular determining
particular entity’s or what rights
entity. individual’s and privileges
unique a particular
credentials. entity has.
Authentication Factors
Something you are
◦ Fingerprints, handprints, and retinal patterns
Something you do
◦ Keystroke patterns or tracing picture passwords
Passwords
• User name and password combination is probably the most widely authentication schemes (what
you know).
• Credentials are compared to those stored in a database.
• Match -> Authenticated
• No Match -> Access is denied
• No guarantee that the correct user is supplying the credentials.
• When credentials are not encrypted for transmission, they are susceptible to an attacker.
Password
User name
Source: Comptia S+
Tokens
Physical or virtual objects that store authentication information. Common
examples include smart cards, ID badges, and data packets.
• Can store PINs, user information, and passwords (what you have).
• Token values can be generated to respond to authentication server challenges.
PIN
Password
Token
Source: Comptia S+
Biometrics
Fingerprint scanners
Retinal scanners
Hand geometry scanners
Voice-recognition software
Fingerprint Scanner
Facial-recognition software
Source: Comptia S+
Geolocation
The process of identifying the geographic location of an object.
Authentication Approved
Source: Comptia S+
Keystroke Authentication
An authentication type that relies on detailed information describing
exactly when a key is pressed and released as someone types information
into a computer or other electronic device.
• Uses your personal typing
tendencies (what you do).
• Records and stores your typing
for comparison purposes.
• Keystroke logger and other
metrics are collected to derive
a keystroke pattern that is Keystroke
Pattern Detector
unique to a user.
Source: Comptia S+
Multi-factor Authentication
Source: Comptia S+
Mutual Authentication
A security mechanism that requires that each party in a communication
verifies the identity of every other party in the communication.
• The service or resource verifies the client’s credentials, while the client verifies the
credentials of the service or resource.
• Prevents clients from sending confidential information to non-secure servers.
• Helps to avoid man-in-the-middle attacks.
Source: Comptia S+
Terminology
Authentication
Source: Comptia S+
Further Reading
1. NIST Special Publication 800-18 Revision 1, Guide for
Developing Security Plans for Federal Information Systems
2. NIST Special Publication 800-30 Revision 1, Guide for
Conducting Risk Assessments
3. NIST Special Publication 800-53 Revision 4, Security and
Privacy Controls for Federal Information Systems and
Organizations
Thank you