1-BasicNotions-2p
1-BasicNotions-2p
§ What is security?
§ The CIA triad
§ Risk
§ Vulnerabilities, threats, attacks, and mitigations
(security controls)
§ Likelihood and impact (w.r.t. stakeholders)
§ Wrap-up
1
9/11/24
permit
prevent
§ Integrity
§ prevent un-authorised modification of information
§ permit authorized modification of information
§ Availability
§ prevent un-authorised withholding of information or
services
§ readily permit authorized access to information or
services
2
9/11/24
https://csrc.nist.gov/Glossary/?term=3591 4
§ Data encryption is one way to ensure confidentiality and that unauthorized users cannot
retrieve data for which they do not have access
3
9/11/24
https://www.informationisbeautiful.net/visualizations/
worlds-biggest-data-breaches-hacks/ Violation of
Confidentiality
Impact can be
substantial
• Privacy:
disclosure of
personal
information
including
healthcare
• Economy:
perform financial
transactions on
your behalf
4
9/11/24
• Authenticity
§ Guarding against improper information modification
• The property or destruction,
of being and includes
genuine and being able
ensuring information non-repudiation and
to be authenticity.
verified and trusted; confidence in the
§ The property that sensitive data hasvalidity
not beenof a modified
transmission,
or adeleted
message,
in or
an
unauthorized and undetected manner. message originator.
§ Implementing version control and audit trails into an IT program will allow an organization to
guarantee that its data is accurate and authentic
5
9/11/24
Impact is on
trustworthiness of
resources and services
available online… bots
can influence social media
by massive posting of
messages carrying
manipulated information
with a negative impact on
social/democratic life
https://www.darkreading.com/vulnerabilities---threats/why-information-integrity-attacks-pose-new-security-challenges/a/d-id/1331562
https://csrc.nist.gov/Glossary/?term=3103#AlphaIndexDiv 11
6
9/11/24
§ Employing a backup system and a disaster recovery plan is essential for maintaining data
availability should a disaster, cyber-attack, or another threat disrupt operations
§ Utilizing cloud solutions for data storage is one way in which an organization can increase the
availability of data for its users
12
600 Gbps!
§ Impact of attacks
§ Krebs on security: “The Democratization of Censorship”
§ DYN (DNS provider): impossible to access popular web sites
such as Amazon, Twitter, Paypal, …
§ Lonestar (telco): shutting down Internet for an entire country
(Liberia)
Violation of
Availability
7
9/11/24
§ Its generality is, at the same time, a positive and a negative feature
§ positive since it decomposes the notion of security into simpler (although interdependent)
notions and applies to a wide range of situations and use cases
§ negative since it must be instantiated to every situation and use case; such instantiations are
called security policies that require security mechanisms or services to be enforced
§ Defining security policies is far from being an obvious task
15
8
9/11/24
§ Security policy
§ The rules and requirements established by an organization that governs the acceptable use of
its information and services, and the level and means for protecting the confidentiality,
integrity, and availability of its information
https://csrc.nist.gov/Glossary/?term=1268#AlphaIndexDiv
§ Security mechanism
§ A device or function designed to provide one or more security services usually rated in terms
of strength of service and assurance of the design.
§ Implementation of a security policy https://csrc.nist.gov/Glossary/?term=1262#AlphaIndexDiv
§ Security service
§ A capability that supports one, or more, of the security requirements (Confidentiality, Integrity,
Availability). Examples of security services are key management, access control, and
authentication.
https://csrc.nist.gov/Glossary/?term=1268#AlphaIndexDiv
16
is enforced Security
implements
service
Security
mechanism N
17
9
9/11/24
§ Purpose
§ <Company X> must protect restricted, confidential or sensitive data from loss to avoid
reputation damage and to avoid adversely impacting customers. The primary objective
is user awareness and to avoid accidental loss scenarios (data leakage prevention)
§ Scope
§ Any employee, contractor or individual with access to <Company X> systems or data.
§ Definition of data to be protected
Try to answer the question:
§ Personal data
What does it mean for
§ Financial Company X
§ Intellectual Property “confidential/sensitive
data”?
§ Policy rules
1. Employees need to complete <Company X>’s security awareness training and agree to
uphold the acceptable use policy.
2. Visitors to <Company X> must be escorted by an authorized employee at all times. If an
employee is responsible for escorting visitors, he/she must restrict them to appropriate
areas.
3. Employees must keep a clean desk. To maintain information security, employees need to
ensure that all printed in scope data is not left unattended.
4. Employees need to use a secure password on all <Company X> systems as per the
password policy. These credentials must be unique and must not be used on other
external systems or services.
5. Terminated employees will be required to return all records, in any format, containing
personal information.
10
9/11/24
§ Authentication
§ Verifying the identity of a user, process, or device, often as a prerequisite to allowing
access to resources in an information system.
https://csrc.nist.gov/Glossary/?term=3052#AlphaIndexDiv
§ Authorization
§ The granting or denying of access rights to a user, program, or process.
https://csrc.nist.gov/Glossary/?term=3081#AlphaIndexDiv
§ Access control
§ The process of granting or denying specific requests: 1) obtain and use information and
related information processing services; and 2) enter specific physical facilities (e.g.,
Federal buildings, military establishments, border crossing entrances).
https://csrc.nist.gov/Glossary/?term=2785#AlphaIndexDiv
20
21
11
9/11/24
22
QUESTION: How can we mitigate attacks and reduce impact or, in other
words, minimize risks?
ANSWER: Use security services… Recall that a security service is a
capability that supports one, or more, of
the security requirements (CIA)
12
9/11/24
Access control,
seen as the
combination of
authentication and
authorization, is
typically used to
guarantee
confidentiality and
integrity of data
(typically at rest)
§ The CIA triad is not only essential for achieving security but also helps understanding
security violations (i.e. what went wrong)
§ Which security properties of the CIA triad can be violated in a ransomware attack?
25
13
9/11/24
§ The CIA triad also helps understanding security violations (i.e. what went wrong)
§ Which security properties of the CIA triad can be violated in a ransomware attack?
§ Availability as access is blocked but also confidentiality if the victim’s data is exfiltrated…
and even integrity as files are encrypted and can be modified by the attacker
26
§ The CIA triad also helps understanding security violations (i.e. what went wrong)
14
9/11/24
§ The CIA triad also helps understanding security violations (i.e. what went wrong) and
suggests how to avoid such problems by defining security policies and mechanisms
(the latter enforce the former)
§ More precisely, the CIA triad is crucial for risk management that involves identifying,
assessing, and treating risks to the confidentiality, integrity, and availability of an
organization data and systems
§ The end goal of risk management is to treat risks in accordance with an organization’s overall
risk tolerance
§ Organizations should not expect to eliminate all risks rather to identify and achieve an
acceptable risk level
§ Risk management main phases
§ Identification of assets, vulnerabilities, threats and controls (i.e. policies and enforcement
mechanisms)
§ Assessment as likelihood and impact of a threat exploiting a vulnerability
§ Treatement to reduce risks by selecting appropriated controls
28
29
“Things are not quite so simple always as Black and White” – Doris Lessing
15
9/11/24
https://csrc.nist.gov/Glossary/?term=2436#AlphaIndexDiv 30
§ Hidden backdoors
§ Example: Huawei equipment (https://www.bloomberg.com/news/articles/2019-04-
30/vodafone-found-hidden-backdoors-in-huawei-equipment)
§ Weak passwords
https://koofr.eu/blog/posts/worst-passwords-of-2020
http://intronetworks.cs.luc.edu/current1/
uhtml/security.html 31
16
9/11/24
https://csrc.nist.gov/Glossary/?term=2156#AlphaIndexDiv 32
§ Hackers
§ Break a password or sniff it off the network
§ Use social engineering to get a password
§ Taking up resources with irrelevant messages
§ Denial-of-service attacks aim aims to disrupt a service by either exploiting a vulnerability or by
sending a lot of bogus messages to a computer offering a service
33
17
9/11/24
§ Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or
destroy information system resources or the information itself
§ The realization of some specific threat that impacts the confidentiality, integrity,
accountability, or availability of a computational resource.
https://csrc.nist.gov/glossary/term/attack 34
35
18
9/11/24
The attribution
problem
“[…] without the fear of being caught, convicted and punished, individuals and
organizations will continue to use the Internet to conduct malicious activities.”
Hunker, J., Hutchinson, B., & Margulies, J. (2008). “Role and Challenges for
Sufficient Cyber-Attack Attribution.” Dartmouth College, United States
37
19
9/11/24
https://www.enisa.europa.eu 38
20
9/11/24
40
ausing that
n tially c a s ystem
p o te ss o f it Likelihood and potential amplitude
An acti
vity or data akne explo
to a system A we ckers can of the damage when threat
harm atta exploits vulnerability by
mounting an attack
41
21
9/11/24
Security controls
as specified by
security policies
and enforced by
enforcement
mechanisms
43
22
9/11/24
Security control
§ The probability that a particular security threat will exploit a system vulnerability.
§ A measure of the extent to which an entity is threatened by a potential
circumstance or event, and typically a function of: (i) the adverse impacts that
would arise if the circumstance or event occurs; and (ii) the likelihood of
occurrence.
Note: Information system-related security risks are those risks that arise from the
loss of confidentiality, integrity, or availability of information or information
systems and reflect the potential adverse impacts to organizational operations
(including mission, functions, image, or reputation), organizational assets,
individuals, other organizations, and the Nation. Adverse impacts to the Nation
include, for example, compromises to information systems that support critical
infrastructure applications or are paramount to government continuity of
operations as defined by the Department of Homeland Security.
https://csrc.nist.gov/Glossary/?term=1013#AlphaIndexDiv 45
23
9/11/24
24
9/11/24
§ Assumptions that can be checked / challenged in the future as the threat landscape
changes
§ offline attacks to passwords are the only security concerns
§ Potential threats to the system
§ decryption of hashed passwords using brute force possible since weak hashing algorithm
(MD5) is used
§ Controls that can be taken to mitigate each threat
§ update hashing algorithm to known secure one
§ A way of validating the model and threats, and verification of success of controls
taken
49
25
9/11/24
https://money.cnn.com/2015/07/24/technology/chrysler-hack-recall/index.html?sr=twmoney072415chrysler900story 51
26
9/11/24
1 2 3 4 5
likelihood 5
risk 4
impact 3
2
risk = likelihood x impact
1
52
MESSAGE
INTEGRITY
IS THE
PROBLEM!
No hope that
automotive industry
will replace the CAN
bus for better security https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
27
9/11/24
Likelihood
MESSAGE
INTEGRITY
IS THE
PROBLEM!
Impact
MESSAGE
INTEGRITY
IS THE
PROBLEM!
28
9/11/24
Impact
MESSAGE
INTEGRITY
IS THE
PROBLEM!
57
29
9/11/24
https://csrc.nist.gov/projects/usable-cybersecurity
https://www.zdnet.com/article/the-worst-passwords-of-2020-show-we-
Worst are-as-lazy-about-security-as-ever/
passwords
of 2020
https://readgroup.co.uk/news/data-protection-why-
passwords-are-like-pants/
30
9/11/24
61
31
9/11/24
Security
affects Threat
control
exploits
mitigated by
Security should
consider the
capabilities of
attackers or threats to
defend against
63
32
9/11/24
enforced by
Technological
settings
Enforcement techniques Security
including cryptography, services &
authentication, authorization
mechanisms 64
65
33
9/11/24
66
67
34
9/11/24
Custom software
product
3rd
Thompson’s Turing Award Lecture in 1984 entitled party APIs
“Reflections on Trusting Trust”:
To what extent should one trust a statement that a program is
Edge
free of Trojan horses? Perhaps it is more important to trust the
people who wrote the software.
Mobile
Cloud 69
35
9/11/24
§ In other words, we are left with a (non-null) residual risk, i.e. the amount of danger
associated with an attack after risks have been mitigated by security controls
70
71
36