CSI1101 Module+2
CSI1101 Module+2
Module 1 Recap
‒ 3 x case studies
Module 1 Recap
• 5 Aims of security
‒ Confidentiality
‒ Integrity Often referred to as the CIA triad
‒ Availability
‒ Authenticity Some consider there to be only 3 aims i.e. CIA
Others consider there to be 5 aims
‒ Non-repudiation
Module 1 Recap
• 3 Goals of Security
‒ Prevention
‒ Detection
‒ Recovery
Module 1 Recap: Let’s test our Understanding
‒ Jack changes the amount of Sophie’s check from $100 to $1,000 - breach of integrity
‒ Jack spoofs Mat’s IP address to gain access to his computer - breach of integrity
Compromise of one Aim leading to another
• Situation 1:
‒ Cyber criminals sending emails pretending to be originated from
Centers for Disease Control and Prevention or the World Health
Organisation
Breaching the Aims of Security
• Situation 1:
• Cyber criminals sending emails pretending to be originated from Centers
for Disease Control and Prevention or the World Health Organisation
Breaching the Aims of Security
• Situation 2:
‒ Cyber criminals sending emails that contains attached files (PDF, Word
Docs, MP4)
• Situation 2:
What is a Cyber Criminal?
• Hacker (or hacking) is an abused term often confused with cyber criminal
• Interception
‒ when an entity access info that it/they should not be accessing
‒ e.g. accessing a computer
‒ breach of confidentiality
• Modification
‒ when an entity modify an existing data
‒ when a disgruntled employee making a false entry into a database or
intercepts wireless traffic and alters it before forwarding
‒ breach of integrity
Grouping Generic Threats
• Fabrication
‒ when an entity creates new data
‒ a sale order is created and items are taken out of the store without payment being
made
‒ breach of integrity and authenticity (can you think of a situation J)
• Interruption
‒ making a resource unavailable
‒ a website becomes inaccessible
‒ breach of availability
What is a Vulnerability?
‒ Leaky
• confidentiality (someone accessing information who should not have
access to it)
‒ Unavailable
• availability (system or network becoming unavailable)
What is an Exploit?
‒ Telephones don’t fully authenticate callers - call someone and tell them
you are from the bank and you need their credit card number because
they are compromised -> Identity theft? Profit?
Threat Agents/Attackers
• A threat agent is the individual or group who has the potential to manifest a
threat
• Financial
• Emotional – revenge etc.
• Ideological – activists, hacktivists etc.
• Opportunistic
• Compulsion/addiction
• Social acceptance
• Challenge
This is by no means an exhaustive list
Capabilities of Attackers
e.g. e.g.
Security guards Security guards
Log file analysis Detective Responsive Law Enforcement
Intrusion Detection Forensic analysis
Systems
Countermeasures: Controls and Safeguards
• Each control has strengths and weaknesses that need to be evaluated and
acknowledged
Countermeasures: Determining Effective Controls - Questions
Passwords ü ü
Encryption ü
Data backup ü
Network firewalls ü ü ü
Intrusion Detection ü ü
Systems
Anti-virus software ü ü ü
Biometric ü ü
authentication
What is Risk and Risk Assessment
Risk is
the likelihood of the occurrence of a vulnerability
multiplied by
the value of the asset
minus
the percentage of risk mitigated by current controls
plus
the uncertainty of current knowledge of the vulnerability
Risk Management
‒ Deciding what actions are cost effective for controlling the risks
Risk Management
Risk Management
Identify Issues,
Assess Risks
Implement
Controls
to
reduce
to to
risk threats
that
increase
• Phishing – the use of fraudulent bulk-based emails to obtain sensitive information from a target
• Spear phishing – the use of a fraudulent email to specifically target a single user to obtain
information
• Vishing – simulating calls (via VoIP) from legitimate entities to perform phishing centric attacks
• Reverse social engineering – techniques to encourage target to initiate contact with attacker
Contingency Planning (CP)
• The BIA takes up where the risk assessment process leaves off
• BCP: occurs concurrently with the DR plan when the damage is major or
ongoing, requiring more than a simple restoration of information and
information resources. BC plan establishes critical business functions at an
alternate site
Defence in Depth (DiD) Model
Lookout towers
High walls
Water
Defence in Depth (DiD)
Modelling Threats
Attack Trees
• Suppose that our ultimate aim is to steal a diamond from a store that
we already know is kept inside of a locked safe
Steal Diamond
Optional Topic
• Next we need to consider perhaps through ‘research’ the ways in which the
diamond could be stolen from the safe…
• In this scenario 4 ways have been identified
• However, we could have identified 2 or even 20 ways…
• The 4 identified ways on row 2 now become our new goals
Steal Diamond
Determine Intercept
combination of Force Safe Open Steal entire safe Diamond
safe to/from safe
Optional Topic
• Again we have researched and identified 4 ways as to how we could determine the
combination of the safe
Steal Diamond
Determine
combination of
safe
• Next, we look at the ways that we could force the safe open
Steal Diamond
Placing
By using Drilling into the
explosives near
crowbar safe
safe
Optional Topic
Steal Diamond