1 Introduction
1 Introduction
Values of Assets
• Vulnerability
• Threat
• Attack
• Countermeasure
or control
Access Control
Policy:
Who + What + How = Yes/No
Object
Mode of access (what)
Subject (how)
(who)
10
Types of Threats
Threats
Natural Human
causes causes
Examples: Fire,
Benign Malicious
power failure
intent intent
Example:
Human error
Random Directed
Types of Attackers
Terrorist
Criminal-
Hacker
for-hire
Loosely
Individual connected
group
Organized
crime member
Types of Harm
Interception Interruption
Modification Fabrication
These are the primary types of harm against system data and functions. Understanding these possibilities is
important to considering threat and risk.
Security Attacks
• Interruption: This is an attack on availability
• Interception: This is an attack on confidentiality
• Modification: This is an attack on integrity
• Fabrication: This is an attack on authenticity
15
Controls/Countermeasures
Kind of Threat
t
no
ot
no
/
/n
us
d/
an
te
io
um
c
ic
ire
al
H
Physical
M
Procedural
Confidentiality
Technical
Protects
Integrity
e
yp
Availability
lT
tro
on
C
In this simple representation of a networked system, it is easy to see all the touch points where controls can be placed, as well as some different
types of controls, including deterrence, deflection, response, prevention, and preemption.
Method, Opportunity and Motive
• Method : the skills, knowledge, tools and other things with which to
be able to pull off the attack
• Opportunity : the time and access to accomplish the attack
• Motive : a reason to want to perform this attack against this system
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Methods of Defense
• Prevent it, by blocking the attack or closing the vulnerability
• Deter it, by making attack harder if not impossible
• Deflect it, by making another target more attractive
• Mitigate it, by making its impact less severe
• Detect it, either as it happens or some time after the fact
• Recover from its effects
Methods of Defense
• Controls
– Encryption
– Hardware Controls
• Hardware/smart card implementations of encryption
• Locks or cables limiting access
• Devices to verify users’ identity
• Firewalls
• Intrusion detection systems
– Software Controls
• Internal program controls,
• OS and Network system controls
• Independent control program (anti virus, passwords etc.)
• Development control
– Policies and Procedures
– Physical Controls
Effectiveness of Controls
• Awareness of Problem
– Highlighting Need of security
• Likelihood of Use
– They must be efficient, easy to use, and appropriate
• Overlapping Controls
– Use several different controls, layered defense
• Periodic reviews
– Judging the effectiveness of control is an ongoing task
Others Exposed Assets
• Networks
– Network’s lack of physical proximity
– Use of insecure, shared media
– Inability to identify remote users positively
• Access
– Computer time
– Malicious access
– Denial of service to legitimate user
• Key People
23