Terminology
- assets - items of value of computer or system (hw, sw, data)
- value depends on owner's perspective; replacement cost and time
-
computer security - relative to a set of desired properties (secure end system, data in transit, etc.) and capabilities of the adversary
-
vulnerability - weakness in the system that may be exploited to cause loss or harm
-
threat - set of circumstances with potential to cause loss or harm, classes of threats:
- disclosure - unauthorized access to information
- deception - acceptance of false data
- disruption - interruption or prevention of correct operation
- usurpation - unauthorized control of system (can be partial)
-
attack - actual violation of security
- random attack - attacker looking to harm any computer or user
- directed attack - attacker looking to harm specific computers, people, or systems
- attack can be active ("modifying data") or passive ("listening, learning about data")
- types of attackers
- individuals - motivated by fun, challenge, revenge
- organized worldwide groups - motivated by financial gains, fame, ...
- organized crime - fraud, extortion, money laundering
- terrorists - government coordinated targeted attacks
- factors of successful attacks - deny any of these and the attack will fail
- method: skill, knowledge, tools to carry out the attack
- opportunity: time and access to execute
- motive: reason to attack
- control or countermeasure - action, device, procedure, or technique to remove or reduce vulnerability
- control prevents threats from exercising vulnerabilities
- threat is blocked by control of a vulnerability
- types of controls
- physical controls - stop/block attack by something tangible
- procedural/administrative controls - command or agreement to advice people how to act
- technical controls - hardware/software countermeasures (encryption, passwords, access control, firewalls, etc.)
- authorization - determination is person or system is allowed to access resource, based on access control policy
- authentication - determination of role or identify someone has (smart card, password, fingerprint)
- something you know, something you have, something you are
- the ability of system to confirm the identity of sender
- C.I.A
- foundation for thinking about security
- computer security seeks to prevents unauthorized viewing or modifications of data while preserving access, whether in storage, processing or in transit; and denial of service to authorized users, including measures to detect, document and counter such threats
- confidentiality - assets is viewed only by authorized parties
- avoidance of unauthorized disclosure of information, to include knowing about existence of data
- tools: encryption, access control, authorization, authentication, physical security
- integrity - asset is modified only by authorized parties, information has not been altered in unauthorized ways
- data integrity
- origin integrity - authentication
- tools: (prevention) access controls, (detection) checksum, data correcting codes - ability to restore original if transient error occurs
- availability - assets can be used by any authorized parties; access to data/resource in timely fashion
- related: capacity, performance, fault tolerance, usability
- tools: physical protections, computational redundancies
- non-repudiation or accountability - ability of system to confirm that a sender cannot convincingly deny having sent something
- auditability - ability of system to trace all actions related to a given asset
- authenticity - proof of originality;
- tools: using digital signatures -> provides service of nonrepudiation
- anonymity - certain records or transactions not to be attributable to any individual
- not same as privacy - privacy is relative to each individual
- tools: pseudonyms, mixing/interleaving transactions, information, communications such that they are not traceable to any individual
- assurance - confidence that system works as expected
- specs, design, implementation + trusting people who made them
- trust management: policies how uses can access system; permissions; protection from unauthorized access
- information assurance organizations:
- Information Assurance Advisory Council (IAAC)
- National Institute of Standards Technology (NIST)
- Directory of known security vulnerabilities and exposures: https://cve.mitre.org
- Common Vulnerability Scoring System (CVSS) https://nvd.nist.gov/cvss.cfm
- ways to reduce risk:
- prevent violation of security policy
- detect violations of security policy, and measure efficiency of prevention mechanism
- recover from effects: stop policy violations, access and repair damage, ensure availability during ongoing attack, fix vulnerabilities to prevent future attacks, report to authorities
- deter, deflect, mitigate
- Operational issues
- breach caused by improper operation
- risk analysis and management: which threats to control and was resources to devote
- cost-benefit analysis: is it cheaper to prevent or recover
- laws and customs: are security measures illegal, will people do them?
- human issues
- power, responsibility, coordination -> who is the scapegoat
- financial benefits -> maybe no action if no impact on revenue
- people problems: outsiders vs. insiders; social engineering