Lecture 1
Lecture 1
Concepts
Computer security
Measures and controls that ensure
– confidentiality,
– integrity, and
– availability
of information system assets including hardware,
software, firmware, and information being
processed, stored, and communicated.”
Key Security Concepts
Computer Security
Terminology
Risk
- A measure of the extent to which an
entity is threatened by a potential
circumstance or event, and typically
a function of 1) the adverse impacts
that would arise if the circumstance
or event occurs; and 2) the likelihood
of occurrence.
Computer Security Terminology
Security Policy
- A set of criteria for the provision of security services. It
defines and constrains the activities of a data processing
facility in order to maintain a condition of security for systems
and data.
System Resource (Asset)
- A major application, general support system, high impact
program, physical plant, mission critical system, personnel,
equipment, or a logically related group of systems.
Threat
- Any circumstance or event with the potential to adversely
impact organizational operations (including mission,
functions, image, or reputation), organizational assets,
individuals, other organizations, or the Nation through an
information system via unauthorized access, destruction,
disclosure, modification of information, and/or denial of
service.
Vulnerability
- Weakness in an information system, system security
procedures, internal controls, or implementation that could
be exploited or triggered by a threat source.
Assets of a Computer System
Hardware
Software
Data
Residual
vulnerabilities
may remain
Goal is to
May itself minimize
introduce new residual level
vulnerabilities of risk to the
assets
Threat
Consequences,
and the
Types of
Threat Actions
That Cause
Each
Consequence
Based on
RFC 4949
Least
Separation of Least Psychological
common
privilege privilege acceptability
mechanism
Least
astonishment
Attack Surfaces
Examples:
Code that
Open ports on processes An employee with
outward facing incoming data, access to sensitive
Services available
Web and other email, XML, office Interfaces, SQL, information
on the inside of a
servers, and code documents, and and Web forms vulnerable to a
firewall
listening on those industry-specific social engineering
ports custom data attack
exchange formats
Attack Surface Categories
Vulnerabilities created by
personnel or outsiders,
such as social engineering,
Included in this category are human error, and trusted
network protocol insiders
vulnerabilities, such as
those used for a denial-of- Particular focus is Web
service attack, disruption of server software
communications links, and
various forms of intruder
attacks
Computer Security Strategy
Security Policy Security
• Formal statement of rules Implementation
and practices that specify • Involves four
or regulate how a system complementary courses of
or organization provides action:
security services to • Prevention
protect sensitive and
• Detection
critical system resources
• Response
• Recovery
Assurance Evaluation
• Encompassing both • Process of examining a
system design and system computer product or
implementation, system with respect to
assurance is an attribute certain criteria
of an information system • Involves testing and may
that provides grounds for also involve formal
having confidence that the analytic or mathematical
system operates such that techniques
the system’s security
policy is enforced
Standards