SENG411 Week2
SENG411 Week2
Cyber Security
1
Warm up
Which of the following refers to the violation of the principle if a computer is no more
accessible?
a) Access control
b) Confidentiality
c) Availability
d) All of the above
2
Warm up
Which one of the following refers to the technique used for verifying the integrity of the
message?
a) Digital signature
b) Decryption algorithm
c) Protocol
d) Message digest
3
Warm up
Which is potential for loss, damage, or destruction of an asset?
a) Threat
b) Attack
c) Risk
d) Vulnerability
4
Warm up
Which is not a class of attacks?
a) Passive
b) Close-in
c) Authentic
c) Distribution
5
Warm up
Which is a passive attack?
a) Eavesdropping
b) Spoofing
c) Code execution
d) Privilege escalation
6
Warm up
Which is a step in System Hacking?
a) Scanning
b) Enumeration
c) Exploitation
d) Footprinting
7
Warm up
We can identify vulnerabilities and implement defensive measures in advance by the help
of _________.
a) Tactics
b) Policies
c) Techniques
d) Procedures
8
Warm up
Which is not true about White Box testing?
9
Warm up
Which can not be an IoC?
a) Hash values
b) Links
c) DNS requests
d) Threat intelligence
10
Warm up
Backdoors belong to _________ attacks.
a) Close-in
b) DDoS
c) Distribution
d) Wiretapping
11
Syllabus
Week Topic Sub-topics
1 Introduction and Basics Language of security, overview
Identity and Access Identification, authentication,
2 Management, System authorization, access control, system
Architectures architecture concepts
Symmetric and asymmetric encryption,
3 Cryptography
hash functions, digital signatures
Network attacks, security
4 Network Security
architectures, countermeasures
Footprinting and reconnaissance,
5 Hacking Methodology scanning networks, enumeration,
vulnerability analysis
System hacking (gaining access,
Hacking Methodology escalating privileges, maintaining
6
and Sniffing access, clearing logs), sniffing concepts
and techniques
12
Protection of Information
13
Protection of Information
Hospital example:
14
Protection of Information
16
Protection of Information
2. Classification
asset owners are responsible, management can provide
guidelines
3. Labelling
e.g. paper docs can be labelled on the top-right corner,
digital docs?
17
Protection of Information
4. Handling:
Define rules for classes and format (e.g. restricted documents must be
placed in a locked cabinet)
18
Protection of Information
* Handling:
different rules/precautions for different situations w.r.t.
different info classes
• View
• Update
• Delete
• Transfer (digital and paper)
• Mail
• Store
• Destroy
19
Protection of Information
20
Protection of Information
21
Protection of Information
- manuel or automatic
classification (discovery)
- apply handling rules
- allow or deny, log, audit
22
Identity and Access Management
23
Identity and Access Management
24
Identity and Access Management
25
Identity and Access Management
• Authorization: providing access to an authenticated subject
based on its rights
• Accountability: keeping track of actions performed by the
subject on an object
26
Identity and Access Management
27
Identity and Access Management
* Identity - 3 aspects:
- Uniqueness: to be accountable
- Non-descriptive: should not indicate the purpose of
the account
- Issuance: an authority should be providing the
identity
* IdM: management of uniquely identified entities, their
attributes, credentials and entitlements
* Directories: main components of IdM, special dbs
- X.500 standard based hierarchical database format
- LDAP as the protocol
28
Identity and Access Management
- Single Sign-On:
a user provide credentials one time and be able to access all
resources, interoperability is an issue, is it more secure?
- Federated IdM:
allows a user to be authenticated across multiple IT systems and
enterprises, trust establishment is an important issue
30
Identity and Access Management
* General factors for authentication:
• Something a person knows
• Something a person has
• Something a person is
* Multi-factor authentication
* 1:1 Verification: Measurement of an identity against a
single claimed identity (e.g. smart card)
* 1:N verification: Measurement of an identity against
multiple identities (e.g. fp db)
* Mutual Authentication: Two communicating entities
must be authenticated to each other
31
Identity and Access Management
General factors for authentication:
• Something a person knows – knowledge based
- pw, passphrase (longer pw), cognitive pw (several questions,
call centers)
- recommendations for pws:
increased length
special characters, complexity
disallow hints
- techniques used by attackers:
monitoring, listening (copy pws and use again, replay
attack)
access pw file
brute-force
dictionary
social eng
rainbow table: hash format 32
Identity and Access Management
34
Identity and Access Management
General factors for authentication:
• Something a person is – biometric
- fp
- retina
- face
- palm
- hand geometry
- keystroke dynamics
- voice print
35
Identity and Access Management
36
Identity and Access Management
Authorization:
- access should be based on the ‘level of trust’ and ‘need-to-know’
- can be enforced by roles, groups, location, time and transaction types
37
Identity and Access Management
38
Identity and Access Management
Access Control categories:
- Administrative (Management) Access Control
Focuses on people and business practices
Policy, procedures, hiring practices, background checks, data
classification, awareness training, reports, testing …
39
Identity and Access Management
41
Identity and Access Management
42
Identity and Access Management
43
Identity and Access Management
Rule Based Access Control (RB-RBAC):
• built on top of traditional RBAC
• based on the simple concept of “if this, then that”
• before a subject can access an object in a certain circumstance,
subject must meet a set of predefined rules
simple: “If the subject’s ID matches the unique ID value in the
provided digital certificate, then the subject can gain access.”
complex: “If the subject is accessing the object on a weekday
between 8 a.m. and 5 p.m., and if the subject is accessing the object
while physically in the office, and if the subject is in the
procurement role, then the subject can access the object.”
44
Identity and Access Management
45
Identity and Access Management
Risk Based Access Control:
• dynamic: estimate the risk about request in real time, if it
doesn’t exceed a threshold, grant access
• “David works for a technology manufacturer, a super-secret
new product will be released.
If the details of this product are leaked before the announcement,
it will negatively impact revenues.
So the product’s specification sheet will be very sensitive until
the announcement.
Should David be granted access it?”
• question: how likely it is that David’s request will
lead to a leak?
• evaluate his role, trustworthiness, need to access estimate &
compare
46
Identity and Access Management
47
Identity and Access Management
Accountability:
- ensure users are accountable for their actions
- tracked by recording user, system and application activities
- event-oriented audit review: review logs after event
- integrity of logs: how we provide?
- organizational culture is the most important
48
System Architectures
* Client-based systems:
- simplest architecture
- applications that execute entirely on one user device
- no network connectivity except for patches and updates
- core features require no processing on a remote device
- have weak authentication mechanisms, data is stored in
plaintext
49
System Architectures
50
System Architectures
* Database systems:
- DBMS: software system that allows us to create, read,
update, and delete any data
- efficient and organized storage, faster searches, preventing
accidental corruption of data
- security measures that are applied to server-based systems
are required
51
System Architectures
52
System Architectures
* Virtualized systems:
- allows us to run multiple services or full computers
simultaneously on the same hardware
- vulnerabilities in the hypervisor would give an attacker
power to compromise C.I.A. of VMs running on it (not an
hypothetical scenario) --- any component of an information system
could be compromised
53
System Architectures
* Cloud-based systems:
- use of shared, remote computing devices
- three service models:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
54
System Architectures
Some sub services:
55
System Architectures
Four deployment models:
56
System Architectures
Cloud-unique threats
57