Information Security-Lecture 1-A
Information Security-Lecture 1-A
Aliyah Awais
COMPUTER SECURITY
– Software
– Hardware
– Data
– People
– Procedures
– Networks
Security Objectives
● So they are used alongside frameworks to ensure that security goals and
processes are implemented correctly and that organizations meet regulatory
compliance requirements.
Security Layers
Eight Security Dimensions Address the Breadth of Vulnerabilities
ITU -Recommendations
The security architecture logically divides a complex set of end-to-end network security-related features
into separate architectural components.
This separation allows for a systematic approach to end-to-end security that can be used for the planning
of new security solutions as well as for assessing the security of the existing networks.
The security architecture addresses three essential questions with regard to end-to-end security:
What kinds of protection are needed and against what threats?
What are the distinct types of network equipment and facility groupings that need to be protected?
What are the distinct types of network activities that need to be protected?
These questions are addressed by three architectural components -components: security Security Dimensions, Security
Layers and Security Planes.
Challenges of Computer Security
● Attackers only need to find a single weakness, while the designer must find
and eliminate all weaknesses to achieve perfect security.
Attack
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy
information system resources or the information itself.
Countermeasure
A device or technique that has as its objective the impairment of the operational effectiveness
of undesirable or adversarial activity, or the prevention of espionage, sabotage, theft, or
unauthorized access to or use of sensitive information or information systems.
Risk
A measure of the extent to which an entity is threatened by a potential circumstance or event
and is typically a function of 1) the adverse impacts that would arise if the circumstance or
event occurred; and 2) the likelihood of occurrence.
Computer Security Termonology
Security Policy
A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in
order to maintain a condition of security for systems and data.
Threat
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions,
image, or reputation), organizational assets, individuals, other organizations, or the nation through an information system
via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be
exploited or triggered by a threat source.
Computer Systems Assets
Hardware: computer systems and other data processing, data storage, and data communications devices.
Data: including files and databases, as well as security-related data, such as password files.
Communication facilities and networks: local and wide area network communication links, bridges, routers, and so on.
Computer and Network Assets, with Examples of Threats
Incident Response (Countermeasure)
Finally, a countermeasure is any means taken to deal with a security attack.
Ideally, a countermeasure can be devised to prevent a particular type of attack from succeeding.
When prevention is not possible or fails in some instance, the goal is to detect the attack and then
recover from the effects of the attack.
A countermeasure may itself introduce new vulnerabilities. In any case, residual vulnerabilities may
remain after the imposition of countermeasures.
Such vulnerabilities may be exploited by threat agents representing a residual level of risk to the assets.
Owners will seek to minimize that risk given other constraints.
Vulnerabilities, Threats and Attacks
Categories of vulnerabilities
● Passive: attempt to learn or make use of information from the system that does not affect system
resources, like “Traffic Analysis.”
● Active: attempt to alter system resources or affect their operation.
● Insider: initiated by an entity inside the security parameter.
● Outsider: initiated from outside the perimeter.
Passive Attacks
Two types:
Four categories:
● Replay
● Masquerade
● Modification of
messages
● Denial of service
Threat Consequence Threat Action (Attack)
Awareness and Training: (i) Ensure that managers and users of organizational information systems are made aware of
the security risks associated with their activities and of the applicable laws, regulations, and policies related to the security
of organizational information systems; and (ii) ensure that personnel are adequately trained to carry out their assigned
information security-related duties and responsibilities.
Audit and Accountability: (i) Create, protect, and retain information system audit records to the
extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate
information system activity; and (ii) ensure that the actions of individual information system users can be uniquely traced to
those users so they can be held accountable for their actions.
Security Requirements
Certification, Accreditation, and Security Assessments: (i) Periodically assess the security controls in
organizational information systems to determine if the controls are effective in their application; (ii) develop
and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in
organizational information systems; (iii) authorize the operation of organizational information systems and
any associated information system connections; and (iv) monitor information system security controls on
an ongoing basis to ensure the continued effectiveness of the controls.
Configuration Management: (i) Establish and maintain baseline configurations and inventories of
organizational information systems (including hardware, software, firmware, and documentation)
throughout the respective system development life cycles; and (ii) establish and enforce security
configuration settings for information technology products employed in organizational information systems.
Contingency Planning: Establish, maintain, and implement plans for emergency response, backup
operations, and postdisaster recovery for organizational information systems to ensure the availability of
critical information resources and continuity of operations in emergency situations.
Security Requirements
Identification and Authentication: Identify information system users, processes acting on behalf of users, or
devices, and authenticate (or verify) the identities of those users, processes, or devices as a prerequisite to
allowing access to organizational information systems.
Incident Response: (i) Establish an operational incident-handling capability for organizational information
systems that includes adequate preparation, detection, analysis, containment, recovery, and user-response
activities; and (ii) track, document, and report incidents to appropriate organizational officials and/or authorities.
Maintenance: (i) Perform periodic and timely maintenance on organizational information systems; and (ii) provide
effective controls on the tools, techniques, mechanisms, and personnel used to conduct information system
maintenance.
Media Protection: (i) Protect information system media, both paper and digital; (ii) limit access to
information on information system media to authorized users; and (iii) sanitize or destroy information system
media before disposal or release for reuse.
Security Requirements
Physical and Environmental Protection: (i) Limit physical access to information systems, equipment,
and the respective operating environments to authorized individuals; (ii) protect the physical plant and
support infrastructure for information systems; (iii) provide supporting utilities for information systems; (iv)
protect information systems against environmental hazards; and (v) provide appropriate environmental
controls in facilities containing information systems.
Planning: Develop, document, periodically update, and implement security plans for organizational
information systems that describe the security controls in place or planned for the information systems
and the rules of behaviour for individuals accessing the information systems.
Personnel Security: (i) Ensure that individuals occupying positions of responsibility within organizations
(including third-party service providers) are trustworthy and meet established security criteria for those
positions; (ii) ensure that organizational information and information systems are protected during and
after personnel actions such as terminations and transfers; and (iii) employ formal sanctions for personnel
failing to comply with organizational security policies and procedures.
Security Requirements
Risk Assessment: Periodically assess the risk to organizational operations
(including mission, functions, image, or reputation), organizational assets, and
individuals, resulting from the operation of organizational information systems and the
associated processing, storage, or transmission of organizational information.
Systems and Services Acquisition: (i) Allocate sufficient resources to adequately
protect organizational information systems; (ii) employ system development life cycle
processes that incorporate information security considerations; (iii) employ software
usage and installation restrictions; and (iv) ensure that third-party providers employ
adequate security measures to protect information, applications, and/or services
outsourced from the organization.
Security Requirements
System and Communications Protection: (i) Monitor, control, and protect organizational
communications (i.e., information transmitted or received by organizational information systems) at the
external boundaries and key internal boundaries of the information systems; and (ii) employ architectural
designs, software development techniques, and systems engineering principles that promote effective
information security within organizational information systems.
System and Information Integrity: (i) Identify, report, and correct information and information system
flaws in a timely manner; (ii) provide protection from malicious code at appropriate locations within
organizational information systems; and (iii) monitor information system security alerts and advisories and
take appropriate actions in response.
Fundamental Security Design Principles
● Economy of mechanism
● Fail-safe defaults
● Complete mediation
● Open design
● Separation of privilege
● Least privilege
● Least common mechanism
● Psychological acceptability
● Isolation
● Encapsulation
● Modularity
● Layering
● Least astonishment
Fundamental Security Design Principles
The failsafe security principle ensures that, in the event of a failure, the system defaults to a state that does not compromise security.
This means that when a system encounters an issue, it should maintain or revert to a secure state rather than leaving the system open
to threats or vulnerabilities.
For example:
● If a door lock system malfunctions, it should remain locked rather than unlocked.
● If access control software fails, it should deny access by default rather than granting it.
This principle is crucial for minimizing security risks during unexpected failures or malfunctions.
Fundamental Security Design Principles
The open design principle asserts that the security of a system should not rely on the secrecy of its design or implementation. Instead,
systems should be designed to remain secure even if every detail about the system (except for confidential information like passwords
or cryptographic keys) is publicly known.
● Transparency: The system’s architecture, protocols, and design are open for review, which encourages community scrutiny
and helps identify vulnerabilities more quickly.
● Resilience: Even with full knowledge of how the system works, attackers should not be able to compromise it easily.
● Auditing and trust: Open design allows for independent verification and testing of security features, increasing trust in the
system's robustness.
This principle is often applied in open-source software, where code is publicly available, and the system remains secure through
rigorous security practices rather than obscurity.
Fundamental Security Design Principles
Layering (also known as defense in depth) is a security principle that involves implementing multiple layers of defense to protect
systems and data. The idea is that if one layer of security is breached, other layers will still provide protection, making it harder for
attackers to compromise the system.
Each layer addresses different vulnerabilities and risks, and they work together to slow down or mitigate threats. Common layers in
cybersecurity include:
By using multiple overlapping security measures, layering reduces the likelihood of a successful attack.
Fundamental Security Design Principles
Encapsulation is a principle in both security and software design that involves restricting access to certain components or data and
exposing only what is necessary. In cybersecurity, encapsulation ensures that sensitive information is hidden from unauthorized users,
preventing them from manipulating or viewing it directly.
● Hiding internal implementation details of an object and exposing only the necessary methods and properties through a
defined interface.
● Keeping data safe from unauthorized access by bundling it with methods that restrict how it's accessed or modified.
● Using firewalls, encryption, or access controls to limit access to sensitive data or systems.
● Ensuring that different parts of a system are isolated, so a breach in one component doesn’t easily spread to others.
Encapsulation adds a layer of protection by controlling how resources are accessed and manipulated, contributing to the overall
security of systems.
Fundamental Security Design Principles
The Principle of Least Astonishment (PoLA) states that a system or interface should behave in a way that users expect, minimizing
surprises. The design and functionality should align with users' intuitions and prior experiences to avoid confusion and errors.
● Features work consistently and predictably, reducing the risk of users inadvertently compromising security.
● User interfaces and system behaviours are designed to avoid confusion that could lead to security vulnerabilities.
For example, if a password field does not obscure typed characters, users would be astonished because it's against common practice,
and it could lead to a security lapse.
Attack Surface
An attack surface consists of the reachable and exploitable vulnerabilities in a system [BELL16, MANA11,
HOWA03]. Examples of attack surfaces are the following:
Open ports on outward facing Web and other servers, and code listen on those ports.
Services available on the inside of a firewall
Code that processes incoming data, e-mail, XML, office documents, and
industry-specific custom data exchange formats
Interfaces, SQL, and web forms
An employee with access to sensitive information vulnerable to a social engineering attack
Attack Surface
Attack surfaces can be categorized as follows:
Network attack surface: This category refers to vulnerabilities over an enterprise network, wide area network, or the
Internet. Included in this category are network protocol vulnerabilities, such as those used for a denial-of-service attack,
disruption of communications links, and various forms of intruder attacks.
Software attack surface: This refers to vulnerabilities in application, utility, or operating system code. A particular focus in
this category is Web server software.
Human attack surface: This category refers to vulnerabilities created by personnel or outsiders, such as social
engineering, human error, and trusted insiders.
Attack Tree
An attack tree is a branching,
hierarchical data structure that
represents a set of potential
techniques for exploiting security
vulnerabilities.
Computer Security Strategy
Security Policy: A formal statement of rules and practices that specify or regulate how a system or organization provides
security services to protect sensitive and critical system resources.
Security Implementation:
Involves four complementary courses of action:
● Prevention
● Detection
● Response
● Recovery
Assurance:
Encompassing both system design and system implementation, assurance is an attribute of an information system that
provides grounds for having confidence that the system operates such that the system’s security policy is enforced.
Evaluation: