Lec1 - Foundation of Computer Security
Lec1 - Foundation of Computer Security
Lec1 - Foundation of Computer Security
Data
oun
and
city
services
tabi
ti
hen
lity
Aut
Availability
2. In developing a particular security mechanism or algorithm, one must always consider potential attacks
on those security features
5. Security mechanisms typically involve more than a particular algorithm or protocol and also require that
participants be in possession of some secret information which raises questions about the creation, distribution, and
protection of that secret information
6. Attackers only need to find a single weakness, while the designer must find and eliminate all weaknesses
to achieve perfect security
7. Security is still too often an afterthought to be incorporated into a system after the design is complete,
rather than being an integral part of the design process
9. There is a natural tendency on the part of users and system managers to perceive little benefit from
security investment until a security failure occurs
10. Many users and even security administrators view strong security as an impediment to efficient and
user-friendly operation of an information system or use of information
Table 1.1
Computer Security Terminology, from RFC 2828, Internet Security Glossary, May 2000
Attack
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the
information itself.
Countermeasure
A device or techniques that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity, or
the prevention of espionage, sabotage, theft, or unauthorized access to or use of sensitive information or information systems.
Risk
A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse
impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Security Policy
A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to
maintain a condition of security for systems and data.
Threat
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access,
destruction, disclosure, modification of information, and/or denial of service.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or
triggered by a threat source.
(Table can be found on page 8 in the textbook)
Owners Threat agents
value
wish to abuse
wish to impose and/or
minimize may damage
give
rise to
countermeasures assets
to
reduce
to to
risk threats
that
increase
Software
Data
• Threats
• Capable of exploiting vulnerabilities
• Represent potential security harm to an asset
Residual
vulnerabilities
may remain
Goal is to
May itself minimize
introduce new residual level of
vulnerabilities risk to the
assets
Table 1.3
Computer and Network Assets, with Examples of Threats
Availability Confidentiality Integrity
Equipment is stolen or
An unencrypted CD-
Hardware disabled, thus denying
ROM or DVD is stolen.
service.
A working program is
modified, either to
Programs are deleted, An unauthorized copy cause it to fail during
Software
denying access to users. of software is made. execution or to cause it
to do some unintended
task.
An unauthorized read
of data is performed. Existing files are
Files are deleted,
Data An analysis of modified or new files
denying access to users.
statistical data reveals are fabricated.
underlying data.
Messages are destroyed Messages are modified,
Communication or deleted. Messages are read. The delayed, reordered, or
Lines and Communication lines traffic pattern of duplicated. False
Networks or networks are messages is observed. messages are
rendered unavailable. fabricated.
Passive and Active
Attacks
Passive Attack Active Attack
• Attempts to alter system
• Attempts to learn or make use resources or affect their
of information from the system operation
but does not affect system
resources • Involve some modification
of the data stream or the
• Eavesdropping on, or
creation of a false stream
monitoring of, transmissions
• Four categories:
• Goal of attacker is to obtain o Replay
information that is being o Masquerade
transmitted
o Modification of messages
• Two types: o Denial of service
o Release of message contents
o Traffic analysis
Attack Surfaces
Consist of the reachable and exploitable vulnerabilities in
a system
Examples:
Code that
processes An employee
Open ports on incoming data, with access to
outward facing Services email, XML, sensitive
Web and other available on the office Interfaces, SQL, information
servers, and inside of a documents, and and Web forms vulnerable to a
code listening firewall industry- social
on those ports specific custom engineering
data exchange attack
formats
Attack Surface Categories
Network Software Human Attack
Attack Surface Attack Surface Surface
Vulnerabilities created by
personnel or outsiders, such as
social engineering, human
error, and trusted insiders
Included in this category are
network protocol vulnerabilities,
such as those used for a denial- Particular focus is Web server
of-service attack, disruption of software
communications links, and
various forms of intruder attacks
Shallow
Medium High
Layering Security Risk Security Risk
Low Medium
Deep
Small Large
Attack Surface
Malicious software
Vulnerability exploit
installation
UT/U3a Smartcard analyzers UT/U2a Hidden code
CC2 Sniffing
User communication
UT/U4a Social engineering
with attacker
UT/U4b Web page
obfuscation
Redirection of
Injection of commands CC3 Active man-in-the communication toward
middle attacks fraudulent site
User credential guessing IBS1 Brute force attacks CC1 Pharming