0% found this document useful (0 votes)
68 views65 pages

Introduction 2

The document discusses key concepts in information security including risk management, assets, threats and vulnerabilities, security goals, and controls/safeguards. It defines risk as the likelihood of a threat exploiting a vulnerability of an asset, and explains the risk assessment and treatment process involves identifying assets, threats, vulnerabilities, potential losses, risk treatment options, and security controls. The goals of security are defined by the CIA triad of confidentiality, integrity and availability.

Uploaded by

kaka ronaldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views65 pages

Introduction 2

The document discusses key concepts in information security including risk management, assets, threats and vulnerabilities, security goals, and controls/safeguards. It defines risk as the likelihood of a threat exploiting a vulnerability of an asset, and explains the risk assessment and treatment process involves identifying assets, threats, vulnerabilities, potential losses, risk treatment options, and security controls. The goals of security are defined by the CIA triad of confidentiality, integrity and availability.

Uploaded by

kaka ronaldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Introduction

 Contains:
1. Risk management
2. Assets
3. Threats & Vulnerabilities
4. Computer Security Definition
5. Goals of Security/Protection
6. Controls/Safeguards
7. Historical Perspective

1
Risk Management

It deals with the process of


identifying, assessing and treating
risk.

2
Risk

 The likelihood of a given threat


exploiting the vulnerability of an asset
(or assets) to cause harm or loss to
the organization
 Risk is probabilistic

 It can be qualitative (Low, Medium,


High)
 … or quantitative

3
Risk
(Fire = air x heat x fuel)
• For a risk to happen these three,
like the Fire, should be satisfied

Risk = threat x vulnerability x asset

4
Risk Assessment
The aim of a risk assessment process is to
provide management with the information
necessary to make reasonable decisions to
prioritize the expenditure of resources on
the protection of an organization

5
Risk Assessment

 An expensive and time consuming


undertaking
 The rapid growth of changes in IT and
thus in assets and corresponding
threats and controls makes RA a
cyclic process and discourages many
in the industry

6
Risk Assessment & Treatment Process

1. Asset identification and valuation


2. Identification of threats & vulnerabilities (to those
assets)
3. Determination of the likelihood of the threats and
frequency
4. Determine the potential loss to the organization
5. Identify and evaluate risk treatment options
6. Selection of security controls (safeguards) or
acceptance of risks

7
Risk Assessment: What
level of risk to accept?
 It is virtually impossible to eliminate all type
of risks at all time
 There is a need to be selective in the risks
we need to mitigate commensurate with the
potential cost to the organization should that
risk occurs
 Acceptable level of risk simply requires
prudence that depends on the available
budget, time and personnel resources

8
Residual Risk

A risk that an organization is willing to


take due to one or more of the
following reasons:
 The risk treatment is too expensive or
simply unavailable
 The risk is considered to be infrequent
enough or its impact is tolerable

9
Organizational
(information) Assets
An asset is anything that needs to be
protected because it has value to the
organization and contributes to the
successful attainment of the organization’s
objectives.

10
Assets

 Hardware
 Software

 Data (information)

 Communication links

 People

11
Security Terminology
 The Figure shows the relationship among some terminology

12
Security Terminology

 Adversary (threat agent) - An entity that


attacks, or is a threat to, a system.
 Attack -An assault on system security
that derives from an intelligent threat; a
deliberate attempt to evade security
services and violate security policy of a
system.

13
Security Terminology

 Countermeasure - An action, device,


procedure, or technique that reduces a
threat, a vulnerability, or an attack by
eliminating or preventing it, by
minimizing the harm it can cause, or by
discovering andreporting it so that
corrective action can be taken.

14
Security Terminology

 Risk - An expectation of loss expressed


as the probability that a particular threat
will exploit a particular vulnerability with
a particular harmful result.
 Security Policy - A set of rules and
practices that specify how a system or org
provides security services to protect
sensitive and critical system resources.

15
Security Terminology

 System Resource (Asset) - Data; a service


provided by a system; a system capability;
an item of system equipment; a facility that
houses system operations and equipment.
 Threat - A potential for violation of
security, which exists when there is a
circumstance, capability, action, or event
that could breach security and cause harm.

16
Security Terminology

 Vulnerability - Flaw or weakness in a


system's design, implementation, or
operation and management that could be
exploited to violate the system's security
policy.

17
Threats & Vulnerabilities

 Threat: A potential cause of an


unwanted incident which may result in
harm to a system or organization

 Vulnerability: A weakness in an asset


or a group of assets (or a system)
which can be exploited by a threat

18
Major Classes of Threats

 Disclosure: Interception, Listening,


Wiretapping, Inference
 Deception: Masquerade, Fabrication,
Repudiation
 Disruption: Interruption, Corruption,
Obstruction
 Usurpation: “Unauthorized control of a
part of a system”
19
These Major Classes of
Threats Results into
 Masquerade/Impersonation
 Unauthorized modification/alteration

 Unauthorized disclosure of data

 Unauthorized disclosure of traffic

 Denial of service

 Repudiation

20
Example of threats
 Malicious logic (virus, worm,  Spam
…)  Eavesdropping
 Password breaking/stealing  Buffer overflow
 Social engineering  ICMP flooding
 Spoofing  Cross site scripting
 Sniffing  Power failure
 Masquerade  Earthquake
 Zero-day attack  Fire
 Illegal use of software
 Traffic analysis
 Man-in-the-middle

21
Example of Vulnerabilities
 Absence of personnel
 Insufficient security training
 Lack of security awareness
 Poorly documented software
 Poorly configured system/software
 Lack of policies
 Poor password management
 Lack or poorly implemented security guards
 Flaws in the system or software
 Lack of effective change control
 Unauthorized installation of software

22
Threats to Hardware

 Denial of service:
 Damage to equipments (accidental or
deliberate)
 Power failures
 Fire
 Flood
 Theft

23
Threats to Software

 Denial of service
 Corruption
 Deletion

 Unauthorized modification
 Corruption
 Virus, Trojan horse, worm

24
Threats to Data

 Unauthorized disclosure
 Unauthorized modification

 Denial of service

 Repudiation

 Traffic analysis

25
Threats to
Communication
Links
Denial of service

26
… Communication Links

Networks are primary targets for hackers


mainly b/c
 Provides connectivity to a wide number of
sites (without a geographical barrier)
 Strong physical security measures at
computer sites
 Growing number of valuable info transiting
on the networks (eCommerce, ATM, POS,
Application servers, Cloud computing, etc)
 Some network technologies are easy targets
(wireless, satellite)

27
Denial of Service
while (1)
mkdir x;
cd x;
end

1. What is the effect of the above code snippet?


2. What existing OS do have a mechanism to counter
such an attack?
3. How do enhance the security model of an OS (of
your choice) in order to counter such an attack?

28
Goals of
Security/Protection

29
Information Security

Information security is the collection of


technologies, standards, policies and
management practices that are
applied to information system to keep
it secure.

30
Computer Security

The protection afforded to an


automated information system in
order to attain the applicable
objectives of preserving the
confidentiality, integrity and availability
of information system resources
[Stalling & Brown].

31
Goals of Security/Protection
 The CIA Triad
These three concepts form what is often referred to
as the CIA triad. The three concepts embody the
fundamental security objectives for both data and for
information and computing services
 Confidentiality
 Integrity
 Availability

32
The CIA Triad

 A useful characterization of these three


objectives in terms of requirements and
the definition of a loss of security in each
category follows on the next slides.

33
The CIA Triad

 Confidentiality:
Preserving authorized restrictions on
information access and disclosure, including
means for protecting personal privacy and
proprietary information. A loss of
confidentiality is the unauthorized disclosure
of information.

34
The CIA Triad

 Integrity:
Guarding against improper information
modification or destruction, and includes
ensuring information non-repudiation and
authenticity. A loss of integrity is the
unauthorized modification or destruction of
information.

35
The CIA Triad

 Availability:
Ensuring timely and reliable access to and
use of information. A loss of availability is
the disruption of access to or use of
information or an information system.

36
The CIA Triad

 Although the use of the CIA triad to


define security objectives is well
established, some in the security field
feel that additional concepts are needed
to present a complete picture. Two of
the most commonly mentioned are:

37
The CIA Triad
 Authenticity:
The property of being genuine and being
able to be verified and trusted; confidence in
the validity of a transmission, a message, or
message originator.
 Accountability:
The security goal that generates the
requirement for actions of an entity to be
traced uniquely to that entity.

38
Controls/Safeguards

Practices, procedures, or mechanisms


which may protect against a threat, reduce
a vulnerability, limit the impact of an
unwanted incident, detect unwanted
incidents and facilitate recovery

39
Examples of Controls

 Authentication
 Software patching
 Cryptography
 Access Control
 Fire extinguisher
 Backup
 Security Policy
 ID Badge

40
Security Functional Requirements

 The requirements encompass a wide


range of countermeasures to security
vulnerabilities and threats.
 Each of the functional areas may involve
both computer security technical
measures and management measures.

41
Security Functional Requirements

 Functional areas that are primarily require


computer security technical measures
include access control; identification and
authentication; system and
communication protection; and system
and information integrity.

42
Security Functional Requirements

 Functional areas that primarily involve


management controls and procedures
include awareness and training; audit and
accountability; certification, accreditation,
and security assessments; contingency
planning; maintenance; physical and
environmental protection; planning;
personnel security; risk assessment; and
systems and services acquisition.

43
Security Functional Requirements

 Functional areas that overlap computer


security technical measures and
management controls include
configuration management; incident
response; and media protection.

44
Controls

 Management
 Technical

 Operational

45
Management
Controls
Focus on security policies, planning,
guidelines, and standards that influence
the selection of operational and technical
controls to protect the organization

46
Management Controls

 Security policy
 Background checking of employees

 Training/awareness

 Physical and environmental protection

 Security risk assessment

47
Technical Controls
Involve the correct use of hardware and
software security capabilities in systems.
This range from simple to complex
measures that work together to secure
critical and sensitive assets of the
organization

48
Technical Controls

 Login
 Encryption

 Authentication protocol

 Access control

 Firewall

 Intrusion detection system

 etc

49
Operational Controls
Address the correct implementation and
use of security policies and standards,
ensuring consistency in security operations
and correcting identified operational
deficiencies. These controls relate to
mechanisms and procedures that are
primarily implemented by people rather
than systems

50
Operational Controls
 Backup/Restore
 Monitor audit trials

 Account/privilege management

 Monitoring and adjusting firewall

 Media disposal

 Patching

51
Controls/Safeguards

 [Directive controls]
 Preventive controls

 Detective controls

 [Corrective/Responsive controls]

 Recovery controls

52
Functionality
Moving the ball
towards security
means moving
away from
functionality and
ease of use.

Security Ease of Use

53
You can’t stop a
hacker
The only thing you can do is
make it harder for a hacker to get
into your system!

54
Historical Perspective

55
Mainframes/Mini

 Multiuser/multitasking
 Each terminal is connected to the
mainframe using a dedicated line
 Security threat is mainly internal
 External threat was just physical
 Once connected to the mainframe, no
serious danger is expected

56
Mainframe/Mini

 Physical security
 Well guarded computer room
 Limited access to personnel
 Internal threats
 Mainly file protections as typically
provided in the UNIX operating
systems
 Centralized control of all resources
 No communication to the external
57
world
Personal Computers
 Single user and unshared
 No internal threats

 No login request on most PCs

 Physical security

58
Networked Computers
(LAN)
 Usually under one organization and under
one or a few “centralized” controls
(domains)
 It is possible to impose a uniform security
policy and hence deter malicious activities
 Shared and unshared resources
 Shared files and applications on servers
 Personal files on PCs
 The LAN is a shared resource (and not a
dedicated one)

59
Networked Computers
(LAN)
 Communication is now peer-to-peer
(no terminal to Mainframe type)
 The resources on the servers must be
protected against unauthorized
access
 So does those on the individual nodes
(PCs)

60
Internet

 Blows up the LAN to the global


 A big untrusted zone (or domains)

 Virtually difficult not to get probed

 The danger is now exponential

 No owner and “centralized” control

 There can not be a single “security


policy”

61
62
(centralized) OS Security

 Authentication (login)
 Access control
 Memory
 File, Printer

 Confidentiality/Encryption
 Integrity

63
Security Policy

 A high level management document


that describes the management’s
expectation of the employees’ security
practice and responsibilities.
 It sets a clear direction and
demonstrate the management’s
support for and commitment to
information security.

64
“If you think technology can
solve your security problems,
then you don’t understand the
problems and you don’t
understand the technology”

65

You might also like