0% found this document useful (0 votes)
70 views

Basic Security Control

The document discusses various types of security controls that can be implemented to protect systems and data. It describes administrative and technical controls, as well as preventative, detective, and corrective controls. Prevention controls help prevent threats, detection controls help discover threats, and correction controls help mitigate the consequences of threats. Compensating controls provide alternative protections when primary controls cannot be implemented. The document also provides examples of common security controls and explains the security management process of identifying risks and implementing appropriate controls to monitor and address issues.

Uploaded by

Abiyau Neo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Basic Security Control

The document discusses various types of security controls that can be implemented to protect systems and data. It describes administrative and technical controls, as well as preventative, detective, and corrective controls. Prevention controls help prevent threats, detection controls help discover threats, and correction controls help mitigate the consequences of threats. Compensating controls provide alternative protections when primary controls cannot be implemented. The document also provides examples of common security controls and explains the security management process of identifying risks and implementing appropriate controls to monitor and address issues.

Uploaded by

Abiyau Neo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Basic Security Control

Sesi 7
DigiTalent Scholarship 2018
Security Controls


technical or administrative safeguards or
counter measures to avoid, counteract or
minimize loss or unavailability due to threats
acting on their matching vulnerability, i.e.,
security risk
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Types of Controls
(environment based)
Administrative controls technical controls
• process of developing and • controls in security that are
ensuring compliance with policy carried out or managed by
and procedures computer systems
• tend to be things that
employees may do, or must
always do, or cannot do

https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Types of Controls
(phase based)
Prevention controls: Help to prevent a threat or attack from
exposing a vulnerability.
Detection controls: Help to discover if a threat or vulnerability has
entered a computer system.
Correction controls: Help to mitigate the consequences of a threat
or attack from adversely affecting a computer system.

OR Preventative, Detective,
Corrective according SANS

Prevention Control Detection Control Correction Control


Compensating controls


alternate controls designed to accomplish
the intent of the original controls as closely
as possible, when the originally designed
controls can not be used due to limitations
of the environment.
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Illustration of controls
Preventative Detective Corrective Compensatory
Security System OS Upgrade Backup
Awareness Monitoring Generator
Training
Firewall IDS Backup Data Hot Site
Restoral
Anti-virus Anti-Virus Anti-Virus Server Isolation
Security Guard Motion Detector Vulnerability
Mitigation
IPS IPS

https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
Physical controls include locks, fences, mantraps and even
geographic specific controls.

Access controls that limit or detect access to computer resources


(data, programs, equipment, and facilities), thereby protecting these
resources against unauthorized modification, loss, and disclosure.
Application software development and change controls that prevent
unauthorized programs or modifications to an existing program from
being implemented.
https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
The management framework. Entity Wide security program planning
and management that provides a framework and continuing cycle of
activity for managing risk, developing security policies, assigning
responsibilities, and monitoring the adequacy of the entity’s computer-
related controls
System software controls that limit and monitor access to the powerful
programs and sensitive files that (1) control the computer hardware
and (2) secure applications supported by the system.

https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
Segregation of duties that are policies, procedures, and an
organizational structure established so that one individual cannot
control key aspects of computer-related operations and thereby
conduct unauthorized actions or gain unauthorized access to assets or
records.
Service continuity controls to ensure that when unexpected events
occur, critical operations continue without interruption.

https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Security Management Process
• Identification: Detecting
problems and determining how
best to protect the system.
Monitoring Identification • Implementation: Installing
control mechanisms to prevent
problems in a system.
• Monitoring: Involves detecting
Implementation and solving any security issues
that arise after security controls
are implemented.
Identify security controls
Principle Description
Prevents intentional or unintentional disclosure of communications between sender and
recipient
Confidentiality
• Includes trade and military secrets, personnel, health, and tax records.
• Controlled via encryption, access control, and steganography.
Ensures the accuracy and consistency of information during all processing
Integrity • Includes modification of test scores or other information stored on network servers.
• Controlled via hashing, digital signatures, certificates, and change control.
Assurance that authorized users can access resources in a reliable and timely manner
• Includes ensuring that vital data such as radar images are both captured and distributed
Availability
to airports.
• Controlled via redundancy, fault tolerance, and patching.
Identify security controls (cont’d)
Principle Description
Ensuring that the party that sent a transmission or created data remains associated with
Non-
the data and cannot deny sending or creating the data.
Repudiation
• Controlled via Digital signatures, certificates, and change control.
Determining who to hold responsible for a particular activity or event.
Accountability
• Controlled via role and logging monitor
Identification, Authentication, and
Authorization
Identification
Authentication
The process by Authorization
which a claim A method of
is made about validating a The process of
the nature of a particular determining
particular entity’s or what rights
entity. individual’s and privileges
unique a particular
credentials. entity has.
Authentication Factors
Something you are
◦ Fingerprints, handprints, and retinal patterns

Something you have


◦ Key or ID card

Something you know


◦ Password or PIN

Somewhere you are or are not


◦ IP address or GPS location

Something you do
◦ Keystroke patterns or tracing picture passwords
Passwords
• User name and password combination is probably the most widely authentication schemes (what
you know).
• Credentials are compared to those stored in a database.
• Match -> Authenticated
• No Match -> Access is denied
• No guarantee that the correct user is supplying the credentials.
• When credentials are not encrypted for transmission, they are susceptible to an attacker.

Password

User name

Source: Comptia S+
Tokens
Physical or virtual objects that store authentication information. Common
examples include smart cards, ID badges, and data packets.

• Can store PINs, user information, and passwords (what you have).
• Token values can be generated to respond to authentication server challenges.

PIN

User Information Unique value

Password
Token

Source: Comptia S+
Biometrics

Authentication schemes based on the identification of individuals by


their physical characteristics.

Fingerprint scanners
Retinal scanners
Hand geometry scanners
Voice-recognition software
Fingerprint Scanner
Facial-recognition software

Source: Comptia S+
Geolocation
The process of identifying the geographic location of an object.

Authentication Approved

Association of street addresses with:


◦ IP addresses
◦ Wi-Fi positioning systems Authentication
Request
◦ GPS coordinates
Approved
Locations
Authentication requests from approved
locations are granted. Authentication Denied

Source: Comptia S+
Keystroke Authentication
An authentication type that relies on detailed information describing
exactly when a key is pressed and released as someone types information
into a computer or other electronic device.
• Uses your personal typing
tendencies (what you do).
• Records and stores your typing
for comparison purposes.
• Keystroke logger and other
metrics are collected to derive
a keystroke pattern that is Keystroke
Pattern Detector
unique to a user.

Source: Comptia S+
Multi-factor Authentication

An authentication scheme that requires validation of two or more distinct


authentication factors.
• Bank debit card: card (token) and PIN
(password). Password
• Some chip cards might not be multi-factor, if
you don’t have to enter the PIN.
• Authenticator app for email or other
applications.
ID card
• Key in a validation code from a text message as
part of logging into email or another
application.
• Make sure the factors are different!

Source: Comptia S+
Mutual Authentication
A security mechanism that requires that each party in a communication
verifies the identity of every other party in the communication.

• The service or resource verifies the client’s credentials, while the client verifies the
credentials of the service or resource.
• Prevents clients from sending confidential information to non-secure servers.
• Helps to avoid man-in-the-middle attacks.

Source: Comptia S+
Terminology

Access Control Accounting Auditing:


The process of determining and The process of tracking and The portion of accounting that
assigning privileges to resources, recording system activities and entails security professionals
objects, and data. resource access. examining logs of what was
recorded.
Principle of Least
Privilege
• The principle that establishes that users and
software should have the minimal level of
access that is necessary for them to
perform the duties required of them.
• Applies to access to facilities, computer
hardware, software, and information.
• Assign only the level of access required
to perform the necessary tasks.
Privilege Management
Privilege management: The use of Accounting/Auditing

authentication and authorization


mechanisms to provide centralized or
decentralized administration of user
and group access control.
SSO: An aspect of privilege Authorization
management that provides users with
one-time authentication to multiple Access Control Administrator

resources, servers, or sites.

Authentication

Source: Comptia S+
Further Reading
1. NIST Special Publication 800-18 Revision 1, Guide for
Developing Security Plans for Federal Information Systems
2. NIST Special Publication 800-30 Revision 1, Guide for
Conducting Risk Assessments
3. NIST Special Publication 800-53 Revision 4, Security and
Privacy Controls for Federal Information Systems and
Organizations
Thank you

You might also like