Introduction
2016 Pearson Education, Inc.,
Hoboken, NJ. All rights reserved.
Objective
To look at the 3 fundamental
questions
1. What assets do we need to protect?
2. How are those assets threatened?
3. What can we do to counter those threats?
Confidentiality
Integrity
Data
and
services
A
vailability
2016
Pearson
Education,
Inc., Hoboken,
NJ. All rights
Confidentiality
Confidentiality covers two related
concepts:
o Data confidentiality : Assures that private or
confidential information is not made available or
disclosed to unauthorized individuals.
o Privacy : Assures that individuals control or influence
what information related to them may be collected
and stored and by whom and to whom that
information may be disclosed.
Integrity
Integrity covers two related concepts:
o Data integrity : Assures that information and programs
are changed only in a specified and authorized
manner.
o System integrity : Assures that a system performs its
intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of
the system.
Availability
Availability assures that systems work promptly and
service is not denied to authorized users.
Confidential
ity
Preserving
authorized
restrictions on
information
access and
disclosure,
including means
for protecting
personal privacy
and proprietary
information
2016 Pearson Education, Inc.,
Hoboken, NJ. All rights reserved.
A loss of
integrity is the unauthorized
modification or destruction of
information.
Integrity
Guarding
against
improper
information
modification or
destruction,
including
ensuring
information
nonrepudiation
and
authenticity
Availabilit
y
Ensuring timely
and reliable
access to and
use of
information
Additional Security
Concepts
Authenticity: The property of being
genuine and being able to be verified and
trusted
o Is this really Bob and how can I verify it
o Is it Bob who sent this message
Levels of Impact
Levels of impact on organizations or individuals should there be a breach of
security (i.e., a loss of confidentiality, integrity, or availability).
Defined in FIPS 199
Low
Moderate
High
Computer Security
Challenges
Computer security is not as simple as it might first
Computer Security
Challenges
Additional algorithms or protocols may be involved
Table 1.1
Computer
Security
Terminology
RFC 4949, Internet
Security Glossary,
May 2000
Owners
wish to
minimize
Threat agents
value
wish to abuse
and/or
may damage
impose
countermeasures
give
riseto
assets
to
reduce
risk
to
to
threats
that
increase
Assets of a Computer
System
Hardware (servers, data
centers,..)
Software(OS, applications,)
Data(files, databases,
password file)
Communication facilities and
networks
2016 Pearson Education, Inc.,
Hoboken, NJ. All rights reserved.
Vulnerabilities, Threats
and Attacks
Categories of vulnerabilities of a computer
system or network asset:
It can be corrupted (loss of integrity)
It can become Leaky (loss of confidentiality)
It can become unavailable or very slow (loss of availability)
Threats
Capable of exploiting vulnerabilities
Represent potential security harm to an asset
Countermeasures
Means used
to deal with
security
attacks
Prevent
Detect
Recover
Residual
vulnerabilitie
s may remain
May itself
introduce
new
vulnerabilitie
s
Goal is to
minimize
residual level
of risk to the
assets
Threat Consequence
Unauthorized
Disclosure
A circumstance or
event whereby an
entity gains access to
data for which the
entity is not
authorized.
Deception
Masquerade: An unauthorized entity gains access to a
A circumstance or
system or performs a malicious act by posing as an
event that may result
authorized entity.
in an authorized entity Falsification: False data deceive an authorized entity.
receiving false data
Repudiation: An entity deceives another by falsely denying
and believing it to be
responsibility for an act.
true.
Disruption
A circumstance or
event that interrupts
or prevents the correct
operation of system
services and
functions.
Usurpation
A circumstance or
event that results in
control of system
services or functions
by an unauthorized
entity.
A threat to either
system integrity or
data integrity
A threat to
availability or system
integrity
A threat to system
integrity
Table 1.3
Software
Confidentiality
Integrity
An unauthorized read
of data is performed.
Files are deleted,
Data
An analysis of
denying access to users.
statistical data reveals
underlying data.
Messages are destroyed
Communication or deleted.
Messages are read. The
Lines and Communication lines
traffic pattern of
Networks or networks are
messages is observed.
rendered unavailable.
A working program is
modified, either to
cause it to fail during
execution or to cause it
to do some unintended
task.
Existing files are
modified or new files
are fabricated.
Messages are modified,
delayed, reordered, or
duplicated. False
messages are
fabricated.
Active Attack
Replay
Masquerade
Modification of messages
Denial of service
Table 1.4
Classification of
Countermeasures
in terms of
Security
Requirements
(FIPS PUB 200)
(page 1 of 2)
Table 1.4
Security
Requirements
(FIPS PUB 200)
(page 2 of 2)
Chapter 1