Chapter 1
Chapter 1
Computer security refers to the measures and controls that ensure the confidentiality, integrity,
and availability of the information processed and stored by a computer. This includes everything
from protecting physical information assets, to data security and computer safety practices.
What is Threat ?
A threat is a possible security violation that might exploit the vulnerability or weakness
of a system or asset.
The origin of the threat may be accidental, environmental (natural disaster), human
negligence, or human failure.
Different types of security threats are interruption, interception, fabrication, and
modification.
Types of Threats
Any number of motives could inspire an attacker; two motives that we touched on already are
financial gain and gathering intelligence
Types of Attack
● Active Attack: Active attacks aim to manipulate system resources or impact their
operation.
● Passive Attack: Passive attacks aim to extract sensitive information from a system
without affecting its resources. Passive attack is more dangerous than active attack.
While designing any security system we need to consider some security mechanism. These principles are
review to develop a secure system which prevents the security flaws (weakness) and also prevents
unwanted access to the system. Companies consider security from the start of a project and use
software developed by engineers, aimed at reducing the possibility of defects that could compromise a
company’s information security.
1. Economy of mechanism: keep IT security design as simple as possible that’s why easily
understood and error correction. When making simple security then it is easier to understand
and fix error.
2. Fail-safe defaults: Default action always be deny access. If action fails, system should remain as
secure as when action began. Eg If firewall fails all traffic will be blocked. Policy determines
which traffic should accept or deny.
3. Complete Mediation(Mediator) : Do apply access control in every module. Otherwise a single
user can access all modules in the security system. Checking every access can slow down system
and maximize the cost. If permission changes after, may get unauthorized access.
4. Open design: Security design should be open or openly available. Eg Linux. Like in the
cryptographic algorithm, the encryption key is kept secret while the encryption algorithm is
opened for a public investigation.
5. Separation of privilege: do not give single authentication access to any user of process, must be
multiple factor authentication. Password>>verification>>access.
6. Least privilege: Each user should be able to access the system with the least privilege.
Associated user has only access to the particular security system. Eg: Network user able to login
network device not to programming user. Only those limited privileges should be assigned to
the user which is essential to perform the desired task. Eg Role base access control (RBAC)
7. Least common mechanism: share minimum function among the user so that user does not
compromise whole system. Eg sharing a single file to all they may compromise and remaining
system remain same.
Attack Surface
The attack surface is the number of all possible points, or attack, where an unauthorized user can access
a system and extract data. The smaller the attack surface, the easier it is to protect.
Organizations must constantly monitor their attack surface to identify and block potential threats as
quickly as possible. They also must try and minimize the attack surface area to reduce the risk of cyber
attacks succeeding. However, doing so becomes difficult as they expand their digital footprint and new
technologies.
Common vulnerabilities include any weak point in a network that can result in a data breach. This
includes devices, such as computers, mobile phones, and hard drives, as well as users themselves
leaking data to hackers.
Other vulnerabilities include the use of weak passwords, a lack of email security, open ports, and a
failure to update software, which offers an open backdoor for attackers to target and exploit users and
organizations. Another common attack surface is weak web-based protocols (http/https), which can be
exploited by hackers to steal data through man-in-the-middle (MITM) attacks.
Here are some examples of attack surfaces:
1. Physical Office Space: A business’s physical office is an attack surface. An attacker can try to gain unauthorized access to
the office by breaking and entering, or by exploiting vulnerabilities in the building’s security systems.
2. Domain Names: DoS attack is an attack surface. An attacker can try to compromise the domain name by sending enormous
amount of request to domain.
3. SSL Certificates: A company’s SSL certificates are an attack surface. An attacker can try to compromise the certificates by
exploiting vulnerabilities in the certificate authority or by using techniques like certificate forgery.
4. Network Services: A company’s network services, such as email, file sharing, and remote access, are an attack surface. An
attacker can try to compromise these services by exploiting vulnerabilities in the software or by using techniques like phishing
and social engineering.
5. Software and Operating Systems: A company’s software and operating systems are an attack surface. An attacker can try
to compromise these systems by exploiting vulnerabilities in the code or by using techniques like buffer overflow attacks.
6. Endpoints: A company’s endpoints, such as laptops, desktops, and mobile devices, are an attack surface. An attacker can
try to compromise these devices by exploiting vulnerabilities in the software or by using techniques like malware and
phishing.
Attack Tree
● Attack trees are hierarchical diagrams that show the potential m method
ethod for exploiting
security vulnerabilities. At the root of the tree lies the targeted security incident, with
branches and sub node. The approach uses a visual representation of interconnected
issues, that lead to a single major fault, and as such they are an effective way of
performing root cause analysis.
● In applying the same logic to cyber security, you can investigate the different ways that a
system might be attacked, or how an attacker might achieve a specific objective.
● Node within t he tree can be either AND or OR.
● By using attack tree IT professionals gain insight into potential threats, identifies
vulnerability, priority to security measures and advise effective way to mitigate risk.
Function of Attack Tree
● Visualization:
on: It provide clear visualization of the attack surface, highlighting potential
weakness and pathway for attack. This help security professionals understand how
attacker might exploit vulnerabilities in their network.
● Logical Relationship: the tree struct
structure
ure illustrate the logical relationship between
different attack method. Each level represent conditions necessary for the attacker to
advance further.
● Brainstorming ( clear understanding) tool: It is collaborative tools helps to identify
potential threats and uncover attack that may have been overlooked( fail to notice)
Get Database
Access
AND OR
OR
Get Office Remote
Key Access
2. Security Implementation
Security implementation or mechanisms are the practical measures and technologies used to
enforce security policies and protect assets from threats. Examples include encryption, access
control, intrusion detection, firewalls, antivirus software and backup system. They prevent
unauthorized access, detect breaches, respond to attack and facilitate recovery from security
incidents. Security implementation involvers:
● Prevention : stop security attack
● Detection: Various system like intrusion detection system used to detect
attack.
● Response: once an attack is detected, the system should respond promptly to
mitigate its impact.
● Recovery: Restoring the system to secure and functional state following a
security incident. Eg: Maintaining backup
3. Assurance and evaluation
Consumers of computer security service and mechanism, such as system manager, vendors ,
customers, and end user, seek assurance that fulfill security requirements and enforce
policies.
Assurance refers to the confidence level in the functionality of security measures to protect
system and information. It address whether the system design and implementation meet their
respective requirements and specification.
Evaluation on other hand involves testing and examining computer products or system
against specific criteria to access their security.
Term Subject , Object and Access Rights
Subject: A subject is a user, application, device or a process run by a user Trying to access
resources. A subject should have a level of clearance (permissions) that relates to its ability to
successfully access services or resources.
Owner: creator of a resource
Group: group of users; membership in the group is sufficient for certain access rights
World: Users who are not included in the categories of owner and group may be able to
access the resources with limited permissions.
Object : These are the what in access control. They represent the resources being used like
files, databases, application or even network devices.
Object is anything that a subject attempts to access, It could be a device process, person, user,
program, a server of even a client. An object is passive in the sense that it takes no action
until called upon by the subject.
Access right:
Three Types of Access Rights:
READ
WRITE
EXECUTE
Describes the way in which a subject may access an object: – Read (incl. copy or print);
Write (incl. read access; add, modify or delete); Execute; Delete; Create; Search (list the files
in a directory or search the directory)
Types of Access Control
1. Discretionary Access Control
Discretionary access control (DAC) is a type of security access control that grants or restricts
object access via an access policy also known as ACL determined by an owner group or
subjects. DAC controls are defined by user identification with supplied credentials during
authentication, such as username and password. DACs are discretionary because the subject
(owner) can transfer access to other users. In other words, the owner determines object access
privileges.
In DAC, each system object (file or data object) has an owner, and each initial object owner
is the subject that causes its creation. Thus, an object’s access policy is determined by its
owner.
Users Data Access File # 1 Data Creation Application
Ram Read/Write Execute
Features of DAC
Role-based access control (RBAC) is a method of managing user access to systems, networks, or
resources based on their role within a team or a larger organization. Rather than assigning
permission directly to individual user, RBAC assign permission to role, then role is assigned to
user or group according to their responsibilities.
For example: In IT company there may multiple roles like as Network, Administrator, Database,
System analyst and programming. RBAC assign these role to user. Each role is associated to list
of permission or access right. For eg Database administrator role may have all database related
authority.
Benefits of RBAC
Unlike traditional models, ABAC can adapt to complex, distributed environments, making it ideal for
applications requiring high customization and contextual sensitivity in access decisions. It included
scenarios where user roles are insufficient to capture the full of access needs, offering a smart and
robust solution
There are four types of attributes that the ABAC model utilizes to craft access policies. An ABAC policy
can use one or all of them together, depending on the context and the policy requirements:
An access control method where subject requests to perform operations on objects are granted or
denied based on assigned attributes of the subjects, assigned attributes of the object, environment
conditions, and a set of policies that are specified in terms of those attributes and conditions.
The ABAC framework integrates these components to create a rich, multi-dimensional approach
to access control, enabling precise and adaptable policies for varying scenarios
● Attributes: User role (doctor, nurse, administrative staff), department, patient assignment, data
classification (sensitive, non-sensitive), time of access, and location.
● Policy Example: A doctor can access sensitive patient records only if they are currently assigned
to the patient, the access request is made within hospital premises, and during their shift hours.
ABAC RBAC
1. It provides access rights based on various 1. It provides access rights based on
attributes of the user, resource and user roles.
environment. 2. Limited security for your assets.
2. Enhanced security for your assets. 3. Creating roles is much simpler
3. Security Admin may need to spend a lot of time and faster than assigning
analyzing organizational roles and attributes attributes to users.
while creating access policies. 4. The cost of implementation for
4. The cost of implementation is high. RBAC is relatively lower than
5. No need to modify existing access policies ABAC.
when a new user joins the team. 5. Security Admin may need to
create a new role whenever a new
user joins the team.
Identity management
Identity management (ID management) is the organizational process for ensuring individuals
have the appropriate access to technology resources.
This includes the identification, authentication and authorization of a person, or persons, to have
access to applications, systems or networks. This is done by associating user rights and
restrictions with established identities.
digital identity is the key to access. Identities contain information and attributes that define a
role, specifically provide or deny access to a given resource, and informs others in the
organization who or what that identity belongs to, how to contact them if a person, and where
they fit in the overall enterprise hierarchy
4. User Management
User management involves the creation, modification, and deletion of user accounts. This
process should be carried out by a dedicated team to ensure consistency and security.
User management also includes managing user roles and access rights. This should be done in
line with the organization’s policies and procedures.
For instance, when an employee leaves the organization, their access rights should be promptly
revoked to prevent unauthorized access.
5. Compliance Management
Identity management systems also help the organization ensure that the organization complies
with various data protection laws and regulations. This might involve implementing controls to
protect user data and prevent unauthorized access, such as encryption, access control, auditing.
User Registration Process
The first step in any IMS is the user registration process. This process involves the collection of
user information, which is then stored securely. This information is usually collected via a
registration form, and the user is then provided with credentials (such as a username and
password) that they will use to access the system.
User Authentication Process
After registration, the next step is user authentication. This process verifies the identity of the
user each time they attempt to access the system. The most common method of authentication is
through the use of credentials provided during registration. However, other methods such as
biometrics, tokens, or two-factor authentication may also be used to enhance security.
Access Control Process
Once a user’s identity has been verified through the authentication process, the system then
determines what resources the user is allowed to access. This is known as the access control
process.This process is crucial for maintaining security within the system and ensuring that users
only have access to appropriate resources.
User Management This process involves monitoring user activity within the system, managing
user access rights, and conducting regular audits to ensure that the system remains secure.
Audit Process Finally, every modern IMS includes an audit process. This process is key to
identifying potential security threats and ensuring that the system is functioning as intended.
Credentials Management
Credential management is a security practice that combines strategies, policies, and technologies
to protect login credentials. Organizations use credentials to identify and authenticate users who
need access to system resources. Credentials include data such as passwords, certificates, tokens,
and keys.
It provides a central location for storing users’ account credentials and access privileges and
makes it easier for IT teams to manage the credential lifecycle.
Credentials are the digital equivalent of physical keys. A valid set of credentials enables a user to
unlock a company’s system resources and gain access to sensitive data.
Example of Credential Management
Organization can create barriers to cyber attacks by combining modern credential management
tools with proven security policies and practices. Examples of some strong credential
management practices include
● Multi-factor authentication (MFA)
● Non-password identity verification methods, such as CAPTCHA challenges
● Strict password policies
● Careful account provisioning
● Digital Certificates
● Cryptographics key
Access Management
Organization use access management solutions to authenticate, authorize, and audit access to
applications and IT systems. It’s goal is to verify individuals identities correctly when accessing
sensitive area, system or data.
1. Resource management: define access control rule for resources, including credentials,
user attributes, resources attributes, and environmental condition for access.
2. Privilege management: Maintain individual access profile. This determine access
decisions to physical or logical resources and linked to digital entity or user.
3. Policy management: Make policies for the user or group based on identity attribute,
resource or object attribute and environmental conditions.
ICAM
Identity, credential, and access management (ICAM) is a set of security tools, policies, and systems that
helps organizations manage, monitor, and secure access to their information technology (IT)
infrastructure. ICAM represents the combination of digital identities, credentials, and access controls
into a single comprehensive approach. ICAM reduces the risk of cyber attacks to your organization by
preventing unauthorized access to your networks, systems, and data.
Benefits of ICAM
● Enhanced Security: ICAM provide central management of user identities, access permission
reducing the risk of unauthorized access.
● Improved compliance: Improving your cyber security by limiting access to authorized users and
regulate organization security standards.
● Scalability: Easily add user, user role, attribute and revoke access rights after left the
organization.
● Better user experience: provide single sign-on capabilities that's why user or process can access
multiple resources.
Bell-LaPadula Model
This Model was invented by Scientists David Elliot Bell and Leonard .J. LaPadula.Thus this model is called
the Bell-LaPadula Model. This is used to maintain the Confidentiality. Here, the classification of
Subjects(Users) and Objects(Files) are organized in a non-discretionary fashion, with respect to different
layers of secrecy.
● SIMPLE CONFIDENTIALITY RULE: Simple Confidentiality Rule states that the Subject can only
Read the files on the Same Layer of Secrecy and the Lower Layer of Secrecy but not the Upper
Layer of Secrecy, due to which we call this rule as NO READ-UP
● STAR CONFIDENTIALITY RULE: Star Confidentiality Rule states that the Subject can only Write
the files on the Same Layer of Secrecy and the Upper Layer of Secrecy but not the Lower Layer
of Secrecy, due to which we call this rule as NO WRITE-DOWN
● STRONG STAR CONFIDENTIALITY RULE: Strong Star Confidentiality Rule is highly secured and
strongest which states that the Subject can Read and Write the files on the Same Layer of
Secrecy only and not the Upper Layer of Secrecy or the Lower Layer of Secrecy, due to which we
call this rule as NO READ WRITE UP DOWN
h
Biba Integrity Model
This Model was invented by Scientist Kenneth .J. Biba. Thus this model is called Biba Model. This is used
to maintain the Integrity of Security. Here, the classification of Subjects(Users) and Objects(Files) are
organized in a non-discretionary fashion, with respect to different layers of secrecy. This works the exact
reverse of the Bell-LaPadula Model.
● SIMPLE INTEGRITY RULE: Simple Integrity Rule states that the Subject can only Read the files on
the Same Layer of Secrecy and the Upper Layer of Secrecy but not the Lower Layer of Secrecy,
due to which we call this rule as NO READ DOWN
● STAR INTEGRITY RULE: Star Integrity Rule states that the Subject can only Write the files on the
Same Layer of Secrecy and the Lower Layer of Secrecy but not the Upper Layer of Secrecy, due
to which we call this rule as NO WRITE-UP
Trust Frameworks
Internet companies, network service providers, and big organizations are increasingly focused on the
interconnected ideas of trust, identity, and qualities.
It provides a solution for data exchange between organizations and individuals, enabling secure and
efficient data sharing, processing and use.
The need-to-know principle, which asks what information you need to know about someone in order to
engage with them, is typically used by parties to transactions for efficiency, privacy, and legal simplicity.
There is direct legal agreement only among service provider, relying parties and user.
The relying party need assurance that the user been authenticated. And attribute provided by the
identity service provider are accurate and provider is authoritative for those attributes. For eg A
licensed Certifying Authority (CA) provide digital signature certificate not by other bodies.
User also seek assurance that both parties will handle sensitive information and maintain privacy
of data.