Chapter 1 - Controls On Security
Chapter 1 - Controls On Security
Tirthankar Ghosh
Computer Science and Information Technology
St Cloud State University
06/02/2020 1
Basic Principles
• CIA Triad
– Confidentiality
– Integrity
– Availability
• Access Control
• Authentication and Authorization
• Non-repudiation
• Privacy
06/02/2020 2
Trust Services Framework
• Security
– Access to the system and data is controlled and restricted to legitimate
users.
• Confidentiality
– Sensitive organizational data is protected.
• Privacy
– Personal information about trading partners, investors, and employees
are protected.
• Processing integrity
– Data are processed accurately, completely, in a timely manner, and only
with proper authorization.
• Availability
– System and information are available.
06/02/2020 3
Security Life Cycle
06/02/2020 4
Security Approach
• Time-based model, security is effective if:
– P > D + C where
• P is time it takes an attacker to break through preventive
controls
• D is time it takes to detect an attack is in progress
• C is time it takes to respond to the attack and take
corrective action
– This can be thought of from a time-complexity
perspective
06/02/2020 5
Understanding Targeted Attacks
• Conduct reconnaissance
• Attempt social engineering
• Scan and map the target
• Research
• Execute the attack
• Cover tracks
06/02/2020 6
How to Mitigate Risk of Attack
Preventive Controls Detective Controls
Response
7
Preventive: People
• Culture of security
– Tone set at the top with management
• Training
– Follow safe computing practices
• Never open unsolicited e-mail attachments
• Use only approved software
• Do not share passwords
• Physically protect laptops/cellphones
– Protect against social engineering
06/02/2020 8
Preventive Process: User Access Controls
06/02/2020 9
Preventive Process: Change Controls and
Change Management
• Formal process used to ensure that modifications to
hardware, software, or processes do not reduce
systems reliability
• Good change management and control requires
– Documentation
– Approval
– Testing
– Develop “backout” plan
– Monitoring
06/02/2020 10
Preventive: IT Solutions
• Antimalware controls
• Network access controls
• Device and software hardening controls
• Encryption
06/02/2020 11
Preventive: Physical Security: Access Controls
06/02/2020 12
Detecting Attacks
• Log Analysis—examining logs to identify evidence of
possible attacks
• Intrusion Detection Systems (IDSs) —system that creates
logs of network traffic that was permitted to pass the
firewall and then analyzes those logs for signs of
attempted or successful intrusions
• Continuous Monitoring—employee compliance with
organization’s information security policies and overall
performance of business processes
– Threat Hunting by businesses using machine learning
06/02/2020 13
Responding to Attacks
• Computer Incident Response Team (CIRT)
• Chief Information Security Officer (CISO)
• Counter offense
06/02/2020 14
Security Implications of Virtualization, Cloud
Computing, and the Internet of Things
• Virtualization and Cloud Computing
– Positive impact on security
• Implementing strong access controls is good security
overall for the systems
– Negative impact on security
• Reliability issues
• Risk of theft or destruction if unsupervised physical
access
06/02/2020 15