Lecture 1 (DS404 Aug-Dec 2023) Security Principles - Part 1
Lecture 1 (DS404 Aug-Dec 2023) Security Principles - Part 1
3
Security Principles – We will study today
4
Read this …
https://theweek.com/articles/441194/why-world-war-iii-fought-internet
5
Email received …
7
SMS received a few days back
9
Know Your Threat Model
⚫ Threat model:
⚫ Potential cause of a harm is a threat
⚫ Threats can be malicious or not
⚫ A model of who your attacker is and what resources they have
10
Why do the Threat Modeling?
11
Security Principle: Know Your Threat Model
12
Know Your Threat Model
⚫ It all comes down to people: The attackers
⚫ No attackers = No problem!
⚫ One of the best ways to counter an attacker is to attack their reasons
⚫ Why do people attack systems?
13
Threat Model: Common Assumptions for Attackers
14
The Threat Modeling Process
1 Identify assets
2 Document architecture
3 Decompose application
4 Identify threats
5 Document threats
6 Rate threats
2. Trusted Computing Base (TCB)
16
Trusted Computing Base
17
Which of the two is good ?
18
Which of the two is good ?
19
Consider a Mobile Handset
20
TCB in Operating Systems
23
It All Comes Down To People
⚫ The users
⚫ Users like convenience (ease of use)
⚫ If a security system is unusable, it will be unused
⚫ Users will find way to subvert security systems if it makes their lives easier
⚫ The programmers
⚫ Programmers make mistakes
⚫ Despite knowing, they continue to make similar mistakes
⚫ Everyone else
⚫ Social engineering attacks exploit other people’s trust and access for personal
gain
Yes No
25
Warning Dialogs
Yes No
26
Warning Dialogs
Website Certified by an Unknown Authority
Examine Certificate...
OK Cancel
27
Warning Dialogs
28
4. Security is Economics
29
How Secure is a system?
30
Physical Safes
TXTL-60 (>$50,000)
TL-15 ($3,000) TL-30 ($4,500) TRTL-30 ($10,000)
60 minutes with common tools,
15 minutes with common tools 30 minutes with common tools 30 minutes with common tools
a cutting torch, and up to 4 oz of
and a cutting torch
explosives
31
Burglar Alarms
32
You can try this !
Without keeping a
dog at home
33
5. Detect if You Can’t Prevent
34
Detect if You Can’t Prevent
35
What if there is an APT that does undetected?
36
Response: Mitigation and Recovery
⚫ Assume that bad things will happen! You should plan
security in way that lets you to get back to a working state
⚫ Example: Earthquakes
⚫ Have resources for 1 week of staying put
⚫ Have resources to travel 50 miles from my current location
⚫ Example: Ransomware
⚫ Ransomware: An attacker steals your data and demands payment in
exchange for recovering your data
⚫ Keep offsite backups!
⚫ If your computer catches fire, it should be no big deal
37
Detection but no Response
https://www.bloomberg.com/news/articles/2016-08-05/hacked-bitcoin-exchange-says-
it-will-spread-losses-among-users
38
Lecture Summary
39