CH01-CompSec4e Term2 2024
CH01-CompSec4e Term2 2024
CH01-CompSec4e Term2 2024
• Standards
Computer Security Definition
• Confidentiality
o Data confidentiality
o Privacy
• Integrity
o Data integrity
o System integrity
• Availability
Key Security Concepts
Confidentiality Integrity Availability
2. In developing a particular security mechanism or algorithm, one must always consider potential attacks
on those security features
3. Security mechanisms typically involve more than a particular algorithm or protocol and require that
participants be in possession of some secret information which raises questions about the creation,
distribution, and protection of that secret information
4. Attackers only need to find a single weakness, while the designer must find and eliminate all weaknesses
to achieve perfect security
5. Security is still too often an afterthought to be incorporated into a system after the design is complete, rather than
being an integral part of the design process
7. There is a natural tendency on the part of users and system managers to perceive little benefit from
security investment until a security failure occurs
8. Many users and even security administrators view strong security as an impediment to efficient and
user-friendly operation of an information system or use of information
Table 1.1
Computer Security Terminology, from RFC 2828, Internet Security Glossary, May 2000
Attack
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the
information itself.
Countermeasure
A device or techniques that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity, or
the prevention of espionage, sabotage, theft, or unauthorized access to or use of sensitive information or information systems.
Risk
A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse
impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Security Policy
A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to
maintain a condition of security for systems and data.
Threat
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access,
destruction, disclosure, modification of information, and/or denial of service.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or
triggered by a threat source.
to
reduce
to to
risk threats
that
increase
Software
Data
• Threats
• Capable of exploiting vulnerabilities
• Represent potential security harm to an asset
Residual
vulnerabilities
may remain
Goal is to
May itself minimize
introduce new residual level of
vulnerabilities risk to the
assets
Computer System Computer System
4 Sensitive files
must be secure
Data (file security) Data
Security
Requirements
(FIPS 200)
(page 1 of 2)
Security
Requirements
(FIPS 200)
(page 2 of 2)
Least
astonishment
Attack Surfaces
Consist of the reachable and exploitable vulnerabilities in
a system
Examples
Code that
Open ports on processes
An employee with
outward facing Services incoming data,
Interfaces, access to sensitive
Web and other available on email, XML, office
SQL, and information
servers, and code the inside of a documents, and
Web forms vulnerable to a social
listening on those firewall industry-specific
engineering attack
ports custom data
exchange formats
Attack Surface Categories
Network Software Human Attack
Attack Surface Attack Surface Surface
Vulnerabilities created by
personnel or outsiders, such as
social engineering, human
error, and trusted insiders
Included in this category are
network protocol vulnerabilities,
such as those used for a denial- Particular focus is Web server
of-service attack, disruption of software
communications links, and
various forms of intruder attacks
Bank Account Compromise
Malicious software
Vulnerability exploit
installation
UT/U3a Smartcard analyzers UT/U2a Hidden code
CC2 Sniffing
User communication
UT/U4a Social engineering
with attacker
UT/U4b Web page
obfuscation
Redirection of
Injection of commands CC3 Active man-in-the communication toward
middle attacks fraudulent site
User credential guessing IBS1 Brute force attacks CC1 Pharming
• Standards