0% found this document useful (0 votes)
58 views9 pages

Chapter3 Secure Design Principles

The document outlines secure design principles based on the CIA triad: confidentiality, integrity, and availability, emphasizing the importance of protecting sensitive information. It discusses two security defense models, the Lollipop and Onion models, with the Onion model being more effective due to its multi-layered approach. Additionally, it covers the concept of zones of trust in cybersecurity, best practices for network defense, and details about ARP poisoning attacks and their defenses.

Uploaded by

ashfaquehurzuk0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views9 pages

Chapter3 Secure Design Principles

The document outlines secure design principles based on the CIA triad: confidentiality, integrity, and availability, emphasizing the importance of protecting sensitive information. It discusses two security defense models, the Lollipop and Onion models, with the Onion model being more effective due to its multi-layered approach. Additionally, it covers the concept of zones of trust in cybersecurity, best practices for network defense, and details about ARP poisoning attacks and their defenses.

Uploaded by

ashfaquehurzuk0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Secure Design

principles
CIA triad
1)Confidentiality-which means keeping sensitive information
private and secure, prevent unauthorised access, To ensure
confidentiality, organizations need security measures that can
identify unauthorized personnel and prevent them from accessing
the data.

2)Integrity: We often think of it in relation to who has (or


doesn’t have) have access to information. However, it’s just as
important to consider whether the information itself is correct.
If there are mistakes within the data, organizations might
accidentally share classified information with the wrong person.
There is also the possibility that the information won’t be
delivered at all.

3)Availability:his refers to an organization's ability to access


information when needed. applications and data must be
accessible to authorized users on demand.
Defense model
These models are mainly used for Defense Purpose i.e., securing the
data or the asset.
By implementing a multi-layered, dynamic defense-in-depth approach that
includes physical security measures, network and system security, application
security, incident response plans, and more, organizations can significantly
reduce the risk of successful cyber attacks.
There are 2 main types of Security Defense Models:
1.Lolipop Model
2.Onion Model.
1.Lolipop Model
• Lollipop Model is Defense Model associated with an analogy
of a Lollipop. A lollipop is having a chocolate in the middle
and around the chocolate, there is a layer of crust, mainly
of sugar flavored syrup. A person licks and licks the lollipop
and finally, the chocolate in the middle is exposed.

• Mapping this analogy of Lollipop to the Model, as shown in


the above diagram, the hacker just needs to break that one
layer of security to get hands on the asset, in this case, say
it is Username and Password. Once it is done, the hacker
can access the asset. So Lollipop Model is not a good model
for Network Security.
2.Onion
Model
• Onion Model is Defense Model associated with an analogy of
an Onion. An Onion is a vegetable which is composed of
layers. Only by peeling each layer, we can get to the center
of the Onion. Also, while peeling, we get tears in our eyes.

• Mapping this analogy of Onion to the Model, as shown in the


above diagram, the hacker needs to break all the layers of
security to get access to the asset. Breaking each layer i.e.,
Firewall, IDS/IPS, Authentication, Authorization, and
Cryptography in this case, should bring tears to his eyes. In
simple words, breaking each layer should be complex and
extremely challenging for the hacker. So Onion Model is
considered as a good model for Network Security.
ZONE OF TRUST
 Zones of Trust
Looking at the most current cybersecurity trends for traditional
enterprise architecture as well as IoT deployments, the
architectural focus is moving toward "zones of trust." This
approach entails mapping, or prioritizing planning and
resources in a ring of zones based on the critical nature of the
networked resources. The most critical zone is one in which
people and resources would be damaged or injured if there is a
breach (cyber or physical).
 The next zone could be one where a breach could cause
serious financial hardship or a significant disruption in business
operations. The next zones follow in terms of inconvenience,
down toward the inconsequential. This helps to frame risk with
assets. In this planning concept, there are significant overlaps
between both physical security and cybersecurity
BEST PRACTICES FOR NETWORK DEFENSE
 Secure Physical Enviroment
 Passworrd Protected Booting
 Password Protected CMOS(to store important system settings and configurations such as the date and time, boot
order, hardware settings, and password information )

 Disable booting from USB and CD


 Harden the Operating System
 Keep patches Updated
 Use Anti-Virus Scanner
 Use Firewall Software
 Secure Network Share Permissions
 Use Encryption
 Secure Applications
 Securing E-Mail
 Blocking Dangerous File Types
 Back up System
ARP Poisoning
• ARP Poisoning (also known as ARP Spoofing) is a type of cyber attack
carried out over a Local Area Network (LAN) that involves sending
malicious ARP packets to a default gateway on a LAN in order to
change the pairings in its IP to MAC address table.

• A hacker that successfully implements either ARP spoofing or ARP


poisoning could gain control of every document on your network. You
could be subject to spying, or your traffic could grind to a halt until you
give the hacker what's requested for ransom.

• Two types of ARP attacks exist.


ARP spoofing: A hacker sends fake ARP packets that link an attacker's
MAC address with an IP of a computer already on the LAN.
ARP poisoning: After a successful ARP spoofing, a hacker changes the
company's ARP table, so it contains falsified MAC maps. The contagion
spreads.

• At the end of a successful ARP attack, a hacker can:


Hijack. Someone may look over everything that heads to the LAN before
releasing it.
Deny service. Someone may refuse to release anything from the
infected LAN unless some kind of ransom is paid.
Sit in the middle. Someone conducting a man-in-the-middle attack can
do almost anything, including altering documents before sending them
out. These attacks both
threaten confidentiality and reduce user confidence. They are among the
most dangerous attacks anyone can perpetrate.
ARP Poisoning defense
 Inventory (list important) assets you have to protect
 Decide value of each asset and highest exposure risk should be given the most
protection
 Static ARP Tables- It’s possible to statically map all the MAC addresses in a network to
their rightful IP addresses.
 Switch Security- Most managed Ethernet switches sport features designed to mitigate
ARP Poisoning attacks. Typically known as Dynamic ARP Inspection (DAI), these features
evaluate the validity of each ARP message and drop packets that appear suspicious or
malicious. DAI can also typically be configured to limit the rate at which ARP messages can
pass through the switch, effectively preventing DoS attacks
 Physical Security- Properly controlling physical access to your place of business can help
mitigate ARP Poisoning attacks.
 Network Isolation- ARP messages don’t travel beyond the local subnet.
 Encryption

You might also like