CIA Notes
CIA Notes
Security
Security Fundamentals
Core textbook used
Our primary goal is to be able to identify security and privacy issues in various
aspects of computing, including:
Programs
Operating systems
Networks
Internet applications
Databases
Secondarily, to be able to use this ability to design systems that are more protective
of security and privacy.
The Present
The Internet brings millions of computer networks
into communication with each other—many of
them unsecured
(Even then you have to do it in the right way, there are standards how
to destroy computers to prevent security/privacy risks...)
What is Security?
“The quality or state of being secure—to be free
from danger”
A successful organization should have multiple
layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
Information security
“Secure” Computer System
To decide whether a computer system is “secure”, you must first decide what
“secure” means to you, then identify the threats you care about.
Some threats are named in the ovals
Denial
Cyberterrorism of Modified
Service Databases
Virus
Espionage
Identity
Theft
Equipment
Theft Stolen
Customer
Data
What is Security? (continued)
The protection of information and its critical
elements, including systems and hardware that
use, store, and transmit that information
Necessary tools: policy, awareness, training, education,
technology
C.I.A.
triangle is standard based on Confidentiality,
Integrity, and Availability
C.I.A.
triangle now expanded into list of critical
characteristics of information
10
What is security? (context of computers)
Categories of vulnerabilities
• Corrupted (Loss of integrity)
• Leaky (Loss of confidentiality)
• Unavailable or very slow (Loss of availability)
Threats represent potential security harm to an asset when
vulnerabilities are exploited.
Attacks are threats that have been carried out
• Passive : Make use of information from the system without affecting
system resources
• Active : Alter system resources or affect operation
• Insider : Initiated by an entity inside the organization
• Outsider : Initiated from outside the perimeter
Computer Criminals
Computer criminals have access to enormous amounts of hardware, software,
and data; they have the potential to cripple much of effective business and
government throughout the world. In a sense, the purpose of computer
security is to prevent these criminals from doing damage.
Computer crime is any crime involving a computer or aided by the use of
one.
Although this definition is admittedly broad, it allows us to consider ways to
protect ourselves, our businesses, and our communities against those who use
computers maliciously.
So at the destination, the receiver can simply check the hash to make
sure that the data has not been modified.
Typical violations of integrity include modification of data, especially
during transit.
Mitigation of Integrity
AVAILABILITY
Means that data is available as and when required.
Typically, availability is enforced through redundancy.
What it means is that you install multiple communication links or for
example, you install multiple Web servers so that even if some of the
communication links or some of the Web servers, they are targeted,
you still have some backups.
Violations of availability happen if someone, for example, damages
your communication infrastructure or they damage your Web server
so that you're no longer able to service your clients.
Violations Of Availability
The CIA Triad is all about information. While this is considered the core factor
of the majority of IT security, it promotes a limited view of the security that
ignores other important factors.
For example, even though availability may serve to make sure you don't lose
access to resources needed to provide information when it is needed,
thinking about information security in itself doesn't guarantee that someone
else hasn't used your hardware resources without authorization.
It's important to understand what the CIA Triad is, how it is used to plan and
also to implement a quality security policy while understanding the various
principles behind it. It's also important to understand the limitations it
presents. When you are informed, you can utilize the CIA Triad for what it has
to offer and avoid the consequences that may come along by not
understanding
it.
Balancing
CIA Biographical
Data
Payroll
Data
Health
Data
Confidentiality Integrity
Sensitive
Availability Data
S = secure
Packet
Switch