Chapter 6. Security Basics
Chapter 6. Security Basics
SECURITY
BASICS
CONFIDENTIALITY, INTEGRITY, AVAILABILITY
The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability.
It is a model that forms the basis for the development of security systems.
They are designed to guide security policies, finding vulnerabilities and methods
for creating solutions to security problems.
Ideally, when all three standards have been met, the security profile of an
organization is stronger and better equipped to handle threat incidents.
CONFIDENTIALITY, INTEGRITY, AVAILABILITY
Integrity - unauthorized users should not be able to modify any data (changing
the data, removing data and adding false data) without the owner’s permission
Availability - nobody can disturb the system to make it unusable, such as in the
form of denial-of-service attacks that are increasingly common
CONFIDENTIALITY, INTEGRITY, AVAILABILITY
Goal Threat
Often the ways to compromise the security of a computer system are not very
sophisticated.
e.g. easy to guess passwords, writing down passwords
Exploiting such behaviors of humans, social engineering, is a significant challenge.
e.g. requirement to frequent password change vs. writing down passwords
However, operating systems should also account for targeted attacks that are
more sophisticated in nature, targeting the security framework of operating
systems.
OPERATING SYSTEM SECURITY
Passive attacks
try to steal information passively
sniff the network traffic and tries to break the encryption to get to the data
Active attacks
try to make a computer program misbehave
take control of a user’s Web browser to make it execute malicious code
CAN WE BUILD SECURE SYSTEMS?
Monoalphabetic substitution:
Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ciphertext: QWERTYUIOPASDFGHJKLZXCVBNM