Computer Security Technology and Principles
Computer Security Technology and Principles
BY
DR RUKAYAT A. KOLEOSO
z
Table of Contents
Availability: Ensuring authorised users can access information and systems when needed.
Different technologies address different layers and aspects of the digital environment.
We'll look at network, endpoint, data, database, and cloud security technologies.
Firewalls: Act as a barrier between trusted and untrusted networks, controlling inbound and
outbound traffic based on rules.
Virtual Private Networks (VPNs): Create encrypted tunnels over public networks, ensuring
secure remote access and data transmission.
Network Segmentation: Dividing a network into smaller, isolated segments to limit the spread of
attacks.
z
Endpoint Security Technologies: Protecting Devices at
the Edge
Endpoint Detection and Response (EDR): Advanced tools that continuously monitor
endpoint activity for suspicious behaviour, providing incident response capabilities.
Device Encryption: Encrypting entire hard drives or specific files on laptops, desktops,
and mobile devices to protect data at rest.
Access Control: Strict access control (often using RBAC) for database users, roles, and applications.
Encryption: Encrypting sensitive data within the database (at rest) and encrypting communication channels (in transit).
Auditing and Logging: Comprehensive tracking of database activities (who accessed what, when, and how) for security
monitoring, forensics, and compliance.
Vulnerability Management: Regular patching, secure configuration hardening, and vulnerability scanning specifically for
database systems.
Database Activity Monitoring (DAM): Real-time monitoring of database transactions and alerting on suspicious or
unauthorised activities.
Principle of Least Privilege: Granting database users only the minimum necessary permissions to perform their job
functions.
Discussion: Why are databases a prime target for attackers, and what's the greatest risk if they are compromised?
Cloud Security Basics: Protecting Data and Applications
z
in the Cloud
Shared Responsibility Model: Understanding the division of security responsibilities between the cloud provider and the customer.
Provider: Security of the cloud (physical infrastructure, global network, underlying services).
Customer: Security in the cloud (customer data, applications, network configurations, identity and access management).
Identity and Access Management (IAM): Crucial for controlling who can access specific cloud resources and services.
Network Security in Cloud: Implementing virtual private clouds (VPCs), security groups, network access control lists (NACLs), and
cloud-native firewalls.
Data Encryption: Ensuring data is encrypted both at rest (in cloud storage services) and in transit (between cloud services or
to/from users).
Configuration Management: Regularly auditing and ensuring secure configurations for all cloud services and resources (e.g.,
public S3 buckets, open security groups).
Compliance: Adapting security controls to meet regulatory and industry compliance requirements in the cloud environment.
Discussion: What are the common misunderstandings about the shared responsibility model in the cloud?
z
What is Access Control? Access Control: Who Gets In
and What Can They Do?
Principle: The owner of a resource (e.g., a file, a folder) dictates who can access it and what permissions they
have.
Characteristics:
Highly flexible and common in operating systems (e.g., Windows NTFS permissions, Unix file permissions).
"Discretionary" because the owner has full control over access permissions.
Cons: Can be difficult to manage at scale, prone to misconfigurations if not properly controlled, and security
depends heavily on user discretion.
Example: A user creates a document and decides who can read, write, or execute it.
z
Type 2: Mandatory Access Control
(MAC)
Principle: Access decisions are enforced by a system-wide policy, not by the individual owner.
Characteristics:
Based on security labels (e.g., "Top Secret," "Confidential") assigned to both subjects (users/processes)
and objects (data/resources).
Users can only access resources with matching or lower security classifications.
Often used in high-security environments (e.g., military, government) where strict separation is required.
Pros: Very strong security, central control, reduces risk of human error.
Example: A "Secret" clearance user cannot access "Top Secret" documents, regardless of who owns them.
z
Type 3: Role-Based Access Control
(RBAC)
Principle: Access permissions are assigned to specific roles within an organisation, not directly to individual users. Users
are then assigned to one or more roles.
Characteristics:
Simplifies management as users change roles; permissions are updated by changing role assignments, not individual
permissions.
Pros: Scalable, easier to manage large user bases, improves consistency, aligns with organisational structure.
Cons: Roles need to be carefully defined; they can become complex if too many roles or overly granular permissions are
created.
Example: A "Sales Manager" role has access to sales reports; any user assigned to this role automatically gains those
permissions.
z
Type 4: Attribute-Based Access Control (ABAC)
Principle: Access decisions are made dynamically at the time of access request, based on a set of
attributes associated with the user, the resource, the environment, and the action being requested.
Characteristics:
Highly flexible and granular, suitable for complex, dynamic environments.
Attributes can include the user's department, time of day, location, resource sensitivity, and type of
action (read, write).
Pros: Extremely fine-grained control, adaptable to changing conditions, supports "zero trust" models.
Cons: Very complex to design, implement, and manage; requires robust policy engines.
Example: A user from the "Finance" department can access "Financial Reports" only during "business
hours" from a "company-approved network."
Authentication and Authorisation Revisited: Deeper Dive -
z
Authentication & Authorisation
Definition: The art and science of secure communication in the presence of adversaries.
Key Functions:
Confidentiality: Encryption (Symmetric/Asymmetric).
Integrity: Hashing, Digital Signatures.
Authentication: Digital Signatures, Certificates.
Non-repudiation: Digital Signatures.
Applications: Secure communication (HTTPS, VPNs), data at rest encryption, digital certificates,
secure coding practices.
Security Policy: High-level statements that define what is acceptable and unacceptable
behaviour and what security objectives the organisation aims to achieve. (e.g., "All
sensitive data must be encrypted.")
Discussion: What happens if an organisation has great technology but weak policies?
The Human Element in Computer Security: People - The
z
Strongest Link, or the Weakest?
Often, the Target: Social engineering attacks (phishing, pretexting, baiting) exploit
human psychology.
Source of Error: Accidental misconfigurations, sharing passwords, and losing devices.
Crucial for Defence: Employees who are well-trained and security-aware can be the
first line of defence.
Security Awareness Training: Essential for educating users about threats, policies,
and best practices.
Culture of Security: Fostering an environment where security is a shared
responsibility.
Access Control is central to managing who can do what, with different models (DAC,
MAC, RBAC, ABAC) offering varying levels of flexibility and control.