CH01-IS Principles
CH01-IS Principles
Practice
Fourth Edition
Chapter 1
Overview
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
The NIST Internal/Interagency Report NISTIR 7298
(Glossary of Key Information Security Terms , May 2013)
Defines the Term Computer Security as Follows:
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Figure 1.1 Essential Network and
Computer Security Requirements
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Key Security Concepts
• Confidentiality
– Preserving authorized restrictions on information
access and disclosure, including means for protecting
personal privacy and proprietary information
• Integrity
– Guarding against improper information modification or
destruction, including ensuring information
nonrepudiation and authenticity
• Availability
– Ensuring timely and reliable access to and use of
information
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Levels of Impact
• Low
– The loss could be expected to have a limited adverse effect
on organizational operations, organizational assets, or
individuals
• Moderate
– The loss could be expected to have a serious adverse effect
on organizational operations, organizational assets, or
individuals
• High
– The loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational
assets, or individuals
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Computer Security Challenges (1 of 2)
1. Computer security is not as simple as it might first appear to the novice
6. Attackers only need to find a single weakness, while the designer must find
and eliminate all weaknesses to achieve perfect security
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Computer Security Challenges (2 of 2)
7. Security is still too often an afterthought to be incorporated into a system
after the design is complete, rather than being an integral part of the design
process
10. Many users and even security administrators view strong security as an
impediment to efficient and user-friendly operation of an information system
or use of information
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.1 Computer Security Terminology, from R FC
2828, Internet Security Glossary, May 2000 (1 of 2)
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.1 Computer Security Terminology, from R FC
2828, Internet Security Glossary, May 2000 (2 of 2)
Security Policy
A set of criteria for the provision of security services. It defines and constrains the
activities of a data processing facility in order to maintain a condition of security for
systems and data.
System Resource (Asset)
A major application, general support system, high impact program, physical plant,
mission critical system, personnel, equipment, or a logically related group of systems.
Threat
Any circumstance or event with the potential to adversely impact organizational
operations (including mission, functions, image, or reputation), organizational assets,
individuals, other organizations, or the Nation through an information system via
unauthorized access, destruction, disclosure, modification of information, and/or denial of
service.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or
implementation that could be exploited or triggered by a threat source.
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Figure 1.2 Security Concepts and
Relationships
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Assets of a Computer System
• Hardware
• Software
• Data
• Communication facilities and networks
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Vulnerabilities, Threats and Attacks
• Categories of vulnerabilities
– Corrupted (loss of integrity)
– Leaky (loss of confidentiality)
– Unavailable or very slow (loss of availability)
• Threats
– Capable of exploiting vulnerabilities
– Represent potential security harm to an asset
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.2 Threat Consequences, and the Types of
Threat Actions That Cause Each Consequence (1 of 2)
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.2 Threat Consequences, and the Types of
Threat Actions That Cause Each Consequence (2 of 2)
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Figure 1.3 Scope of Computer Security
This figure depicts security concerns other than physical security, including control of
access to computers systems, safeguarding of data transmitted over communications
systems, and safeguarding of stored data.
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.3 Computer and Network Assets,
with Examples of Threats
Blank
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Passive and Active Attacks
Passive Attack Active Attack
• Attempts to learn or make use of • Attempts to alter system
information from the system but resources or affect their
does not affect system resources operation
• Eavesdropping on, or monitoring • Involve some modification of
of, transmissions the data stream or the
creation of a false stream
• Goal of attacker is to obtain
information that is being • Four categories:
transmitted – Replay
• Two types: – Masquerade
– Release of message contents – Modification of messages
– Traffic analysis – Denial of service
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.4 Security Requirements (1 of 7)
Access Control: Limit information system access to authorized users, processes acting
on behalf of authorized users, or devices (including other information systems) and to the
types of transactions and functions that authorized users are permitted to exercise.
Awareness and Training:
(i) Ensure that managers and users of organizational information systems are made
aware of the security risks associated with their activities and of the applicable laws,
regulations, and policies related to the security of organizational information
systems; and
(ii) ensure that personnel are adequately trained to carry out their assigned information
security-related duties and responsibilities.
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.4 Security Requirements (2 of 7)
Certification, Accreditation, and Security Assessments:
(i) Periodically assess the security controls in organizational information systems to
determine if the controls are effective in their application;
(ii) develop and implement plans of action designed to correct deficiencies and reduce
or eliminate vulnerabilities in organizational information systems;
(iii) authorize the operation of organizational information systems and any associated
information system connections; and
(iv) monitor information system security controls on an ongoing basis to ensure the
continued effectiveness of the controls.
Configuration Management:
(i) Establish and maintain baseline configurations and inventories of organizational
information systems (including hardware, software, firmware, and documentation)
throughout the respective system development life cycles; and
(ii) establish and enforce security configuration settings for information technology
products employed in organizational information systems.
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.4 Security Requirements (3 of 7)
Contingency Planning: Establish, maintain, and implement plans for
emergency response, backup operations, and postdisaster recovery for
organizational information systems to ensure the availability of critical
information resources and continuity of operations in emergency situations.
Incident Response:
Media Protection:
(i) Protect information system media, both paper and digital;
(ii) limit access to information on information system media to authorized users; and
(iii) sanitize or destroy information system media before disposal or release for reuse.
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.4 Security Requirements (6 of 7)
Systems and Services Acquisition:
(i) Allocate sufficient resources to adequately protect organizational information
systems;
(ii) employ system development life cycle processes that incorporate information
security considerations;
(iii) employ software usage and installation restrictions; and
(iv) ensure that third-party providers employ adequate security measures to protect
information, applications, and/or services outsourced from the organization.
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Table 1.4 Security Requirements (7 of 7)
System and Information Integrity:
(i) Identify, report, and correct information and information system
flaws in a timely manner;
(ii) provide protection from malicious code at appropriate locations
within organizational information systems; and
(iii) monitor information system security alerts and advisories and take
appropriate actions in response.
(FIPS 200)
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Fundamental Security Design Principles
• Economy of mechanism • Isolation
• Fail-safe defaults • Encapsulation
• Complete mediation • Modularity
• Open design • Layering
• Separation of privilege • Least astonishment
• Least privilege
• Least common mechanism
• Psychological acceptability
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Attack Surfaces
• Consist of the reachable and exploitable vulnerabilities in a
system
• Examples:
– Open ports on outward facing Web and other servers, and
code listening on those ports
– Services available on the inside of a firewall
– Code that processes incoming data, email, X ML, office
documents, and industry-specific custom data exchange
formats
– Interfaces, SQL, and Web forms
– An employee with access to sensitive information vulnerable
to a social engineering attack
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Attack Surface Categories
• Network Attack Surface • Software Attack Surface
– Vulnerabilities over an – Vulnerabilities in application,
enterprise network, utility, or operating system
wide-area network, or code
the Internet – Particular focus is Web server
– Included in this software
category are network
protocol vulnerabilities, • Human Attack Surface
such as those used for
a denial-of-service – Vulnerabilities created by
attack, disruption of personnel or outsiders, such
communications links, as social engineering, human
and various forms of error, and trusted insiders
intruder attacks
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Figure 1.4 Defense in Depth and Attack
Surface
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Figure 1.5 An Attack Tree for Internet
Banking Authentication
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Computer Security Strategy (1 of 2)
• Security Policy
– Formal statement of rules and practices that specify or
regulate how a system or organization provides security
services to protect sensitive and critical system resources
• Security Implementation
– Involves four complementary courses of action:
▪ Prevention
▪ Detection
▪ Response
▪ Recovery
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Computer Security Strategy (2 of 2)
• Assurance
– Encompassing both system design and system
implementation, assurance is an attribute of an
information system that provides grounds for having
confidence that the system operates such that the
system’s security policy is enforced
• Evaluation
– Process of examining a computer product or system
with respect to certain criteria
– Involves testing and may also involve formal analytic
or mathematical techniques
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Standards (1 of 2)
• Standards have been developed to cover management practices and
the overall architecture of security mechanisms and services
• The most important of these organizations are:
– National Institute of Standards and Technology (N IST)
NIST is a U.S. federal agency that deals with measurement
science, standards, and technology related to U.S. government
use and to the promotion of U.S. private sector innovation
– Internet Society (ISOC)
ISOC is a professional membership society that provides
leadership in addressing issues that confront the future of the
Internet, and is the organization home for the groups
responsible for Internet infrastructure standards
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Standards (2 of 2)
– International Telecommunication Union (I TU-T)
ITU is a United Nations agency in which governments and the
private sector coordinate global telecom networks and
services
– International Organization for Standardization (I SO)
ISO is a nongovernmental organization whose work results in
international agreements that are published as International
Standards
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Summary
• Computer security concepts • Fundamental security design
– Definition principles
– Challenges • Attack surfaces and attack trees
– Model – Attack surfaces
• Threats, attacks, and assets – Attack trees
– Threats and attacks • Computer security strategy
– Threats and assets – Security policy
• Security functional – Security implementation
requirements – Assurance and evaluation
• Standards
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Copyright
Copyright © 2018, 2015, 2012 Pearson Education, Inc. All Rights Reserved