Basic Components

Total Page:16

File Type:pdf, Size:1020Kb

Basic Components Basic Concepts There are three basic tenants to computer security, namely confidentiality, integrity, and availability. We will be discussing each of these relative to computer security. Confidentiality Concealment of information or resources enciphering income tax returns, medical data, etc Existence of data Resource hiding Integrity Trustworthiness of data or resources Preventing improper or unauthorized change to the data Data integrity Content of the information Origin integrity Source of the data, Authentication Integrity Mechanisms Prevention Mechanisms Blocking any unauthorized attempts to change the data Tries to change data but has no authority to change Attempts to change the data in unauthorized ways Authority to change certain data but tries to change other data Detection Mechanism Report that data’s integrity is no longer trustworthy Analyze system events Data Report file corruption Specific data corrupt Confidentially Data is either compromised or it is not Integrity Correctness & Trustworthiness of data - Origin of Data - How well protected before - How well protected current Availability Ability to use the information or resource desired DOS attacks – ability to block availability of information or resource Threats Potential violation of security Violation might occur Attacks – violation of security Attackers – those who execute such actions 4 classes of threats Disclosure Unauthorized access of information Deception Acceptance of false data Disruption Interruption or prevention of correct operation Usurpation Unauthorized control of some part of a system Snooping - disclosure Unauthorized interception of information Characteristics Passive Wiretapping Confidentiality services counter Modification (Alteration) – deception, disruption, usurpation Unauthorized change of information Deception if modification of data to determine which action to take if incorrect information is accepted as correct and is released Disruption, Usurpation If modified data controls the operation of the system Characteristics Active – changing information Man in the middle – intruder read messages from sender and sends modified version to recipient Integrity services counter Masquerading (Spoofing) – deception and usurpation Impersonation of one entity by another Spoof to get information Characteristics Passive Usually active attack Integrity services counter Reputation of Origin - deception False denial that an entity sent something False ordering, claim did not order when really did Characteristics Integrity services counter Denial of Receipt - deception False denial that an entity received some information or message Deny receiving something Characteristics Integrity & Availability services counter Delay – usurpation, deception Temporary inhibition of Service Delay confirmation Characteristics Availability services counter Denial of Service - usurpation Long term inhibition of service Characteristics Availability services counter Policy & Mechanism Def: A Security Policy is a statement of what is and what is not allowed Def: A Security Mechanism is a method, tool, or procedure for enforcing a security policy Copying homework relative to policy. What about just looking and not copying. Policy provides an axiomatic description of secure states and nonsecure states. Difficult to sometimes determine policy when more than one entity is involved. Goals of Security Security mechanisms can prevent the attack, detect the attack, or recover from the attack. Prevention Attack will fail Disconnect from internet Resource protected by the prevention mechanism need not be monitored for security problems. Detection Determine attack underway, has occurred, and report it Resource protected by the detection mechanism is continuously monitored for security problems Recovery Stop attack, fix vulnerability, repair system Continues to run while under attack, fault tolerance techniques Assumptions and Trust Two assumptions that policy designers make: 1. The policy correctly and unambiguously partitions the set of system states into “secure” and “non- secure” states. 2. The security mechanisms prevent the system from entering a “non-secure” state. Let P be the set of all possible states. Let Q be the set of all secure states The security mechanism restricts the system to some set of states R, R P Def: A Security Mechanism is secure if R Q; it is precise if R = Q; it is broad if there are state r R and r Q. Assumptions relative to trusting security mechanisms 1. Each mechanism is designed to implement one or more parts of the security policy 2. The union of the mechanisms implements all aspects of the security policy 3. The mechanisms are implemented correctly 4. The mechanisms are installed and administered correctly. Assurance How much to trust a system System specifications design implementation Def: A system is said to satisfy a specification if the specification correctly states how the system will function. e.g. Drug example System high secret machine example Specification Formal or informal statement of the desired functioning of the system mathematical English Medical computer vs desktop Design Translates the specification into components that will implement them Implementation Creates a system that satisfies the design Formal verification Testing Operational Issues Balance between policy and mechanism vs Benefits of the protection against the cost of design, implementation, and using the mechanism Cost-Benefit Analysis Risk Analysis Determines what assets to protect and at what level to protect Function of Environment – no internet connection Time – change with time Remote but still exist Analysis paralysis Laws and Customs Laws restrict the availability and use of technology and affect procedural controls Difference between legal and acceptable practices Human Issues Best Security can easily be defeated by people Organizational Problems Secondary Costs Resources People Problems Heart of security Outsiders Insiders Social Engineering Complex configuration files Misread or not analyze security mechanisms .
Recommended publications
  • Operating Systems and Virtualisation Security Knowledge Area (Draft for Comment)
    OPERATING SYSTEMS AND VIRTUALISATION SECURITY KNOWLEDGE AREA (DRAFT FOR COMMENT) AUTHOR: Herbert Bos – Vrije Universiteit Amsterdam EDITOR: Andrew Martin – Oxford University REVIEWERS: Chris Dalton – Hewlett Packard David Lie – University of Toronto Gernot Heiser – University of New South Wales Mathias Payer – École Polytechnique Fédérale de Lausanne © Crown Copyright, The National Cyber Security Centre 2019. Following wide community consultation with both academia and industry, 19 Knowledge Areas (KAs) have been identified to form the scope of the CyBOK (see diagram below). The Scope document provides an overview of these top-level KAs and the sub-topics that should be covered under each and can be found on the project website: https://www.cybok.org/. We are seeking comments within the scope of the individual KA; readers should note that important related subjects such as risk or human factors have their own knowledge areas. It should be noted that a fully-collated CyBOK document which includes issue 1.0 of all 19 Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas. Operating Systems and Virtualisation Security Herbert Bos Vrije Universiteit Amsterdam April 2019 INTRODUCTION In this knowledge area, we introduce the principles, primitives and practices for ensuring security at the operating system and hypervisor levels. We shall see that the challenges related to operating system security have evolved over the past few decades, even if the principles have stayed mostly the same. For instance, when few people had their own computers and most computing was done on multiuser (often mainframe-based) computer systems with limited connectivity, security was mostly focused on isolating users or classes of users from each other1.
    [Show full text]
  • BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE
    Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15
    [Show full text]
  • Malware Information
    Malware Information Source: www.onguardonline.gov Malware Quick Facts Malware, short for "malicious software," includes viruses and spyware to steal personal information, send spam, and commit fraud. Criminals create appealing websites, desirable downloads, and compelling stories to lure you to links that will download malware – especially on computers that don't use adequate security software. But you can minimize the havoc that malware can wreak and reclaim your computer and electronic information. If you suspect malware is on your computer: • Stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. • Confirm that your security software is active and current. At a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. • Once your security software is up-to-date, run it to scan your computer for viruses and spyware, deleting anything the program identifies as a problem. • If you suspect your computer is still infected, you may want to run a second anti-virus or anti-spyware program – or call in professional help. • Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. Malware is short for "malicious software;" it includes viruses – programs that copy themselves without your permission – and spyware, programs installed without your consent to monitor or control your computer activity. Criminals are hard at work thinking up creative ways to get malware on your computer. They create appealing web sites, desirable downloads, and compelling stories to lure you to links that will download malware, especially on computers that don't use adequate security software.
    [Show full text]
  • DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
    An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • Fedramp SECURITY ASSESSMENT FRAMEWORK
    FedRAMP SECURITY ASSESSMENT FRAMEWORK Version 2.4 November 15, 2017 EXECUTIVE SUMMARY This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP is a Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services. FedRAMP uses a “do once, use many times” framework that intends to save costs, time, and staff required to conduct redundant Agency security assessments and process monitoring reports. FedRAMP was developed in collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), and the Department of Homeland Security (DHS). Many other Government Agencies and working groups participated in reviewing and standardizing the controls, policies and procedures. | i DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR Major revision for NIST SP 800-53 Revision 4. 06/06/2014 2.0 All FedRAMP PMO Includes new template and formatting changes. Formatting changes throughout. Clarified distinction 12/04/2015 2.1 All between 3PAO and IA. Replaced Figures 2 and 3, and FedRAMP PMO Appendix C Figures with current images. 06/06/2017 2.2 Cover Updated logo FedRAMP PMO Removed references to CSP Supplied Path to 11/06/2017 2.3 All Authorization and the Guide to Understanding FedRAMP PMO FedRAMP as they no longer exist. 11/15/2017 2.4 All Updated to the new template FedRAMP PMO HOW TO CONTACT US Questions about FedRAMP or this document should be directed to [email protected]. For more information about FedRAMP, visit the website at http://www.fedramp.gov.
    [Show full text]
  • Global Terrorism: IPI Blue Paper No. 4
    IPI Blue Papers Global Terrorism Task Forces on Strengthening Multilateral Security Capacity No. 4 2009 INTERNATIONAL PEACE INSTITUTE Global Terrorism Global Terrorism Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 4 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. suggested citation: International Peace Institute, “Global Terrorism,” IPI Blue Paper No. 4, Task Forces on Strengthening Multilateral Security Capacity, New York, 2009. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge for Multilateral Counterterrorism. .6 Ideas for Action. 18 I. strengThen Political SupporT For The un’S role In CounTerIng Terrorism ii. enhanCe straTegic CommunicationS iii. deePen relationShips BeTween un head- quarTerS and national and regIonal parTnerS Iv.
    [Show full text]
  • E-Commerce (Unit - III) 3.1 Need for Computer Security Computer Security: It Is a Process of Presenting and Detecting Unauthorized Use of Your Computer
    36 E-Commerce (Unit - III) 3.1 Need for Computer Security Computer Security: It is a process of presenting and detecting unauthorized use of your computer. Prevention is measures help you stop unauthorized users (hackers) System often they want to gain control of your computer so they can use it to launch attack on other computer systems. Need for computer security Threats & Count measures Introduction to Cryptography Authentication and integrity Key Management Security in Practice – secure email & SMTP User Identification Trusted Computer System CMW SECMAN standards. The Importance of computer security: A computer security its very important, primarily to keep your information protected. Its also important for your computer overall health, helping to prevent various and malware and allowing program to run more smoothly. Computer Security – Why? Information is a strategic resource. A Significant portion of organizational budget is spent on managing information. Have several security related objectives. Threats to information security. The Security addressed here to general areas: Secure file / information transfers, including secure transactions. Security of information’s as stored on Internet – connected hosts. Secure enterprise networks, when used to support web commerce. Protecting Resources: The term computer and network security refers in a board sense to confidence that information and services available on a network cannot be accessed by unauthorized users. Security implies safety, including assurance to data integrity, freedom from unauthorized access, freedom snooping or wiretapping and freedom from distribution of service. Reasons for information security The requirements of information’s security in an organization have undergone two major changes in the last several decades. Types of Risks As the number of peoples utilizing the internet increases, the risks of security violations increases, with it.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • The Interim National Security Strategic Guidance
    March 29, 2021 The Interim National Security Strategic Guidance On March 3, 2021, the White House released an Interim and what the right emphasis - in terms of budgets, priorities, National Security Strategic Guidance (INSSG). This is the and activities—ought to be between the different kinds of first time an administration has issued interim guidance; security challenges. The 2017 Trump Administration NSS previous administrations refrained from issuing formal framed the key U.S. national security challenge as one of guidance that articulated strategic intent until producing the strategic competition with other great powers, notably congressionally mandated National Security Strategy (NSS) China and Russia. While there were economic dimensions (originating in the Goldwater-Nichols Department of to this strategic competition, the 2017 NSS emphasized Defense Reorganization Act of 1986 P.L. 99-433, §603/50 American military power as a key part of its response to the U.S.C §3043). The full NSS is likely to be released later in challenge. 2021 or early 2022. By contrast, the Biden INSSG appears to invert traditional The INSSG states the Biden Administration’s conceptual national security strategy formulations, focusing on approach to national security matters as well as signaling its perceived shortcomings in domestic social and economic key priorities, particularly as executive branch departments policy rather than external threats as its analytic starting and agencies prepare their Fiscal Year (FY) 2022 budget point. The Biden Administration contends that the lines submissions. With respect to the latter, FY2022 will be the between foreign and domestic policy have been blurred to first budget prepared after the expiration of the budget caps the point of near nonexistence.
    [Show full text]
  • Operating Systems & Virtualisation Security Knowledge Area
    Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels.
    [Show full text]
  • Operating System Security – a Short Note
    Operating System Security – A Short Note 1,2Mr. Kunal Abhishek, 2Dr. E. George Dharma Prakash Raj 1Society for Electronic Transactions and Security (SETS), Chennai 2Bharathidasan University, Trichy [email protected], [email protected] 1. Introduction An Operating System (OS) is viewed as a Reference Monitor (RM) or a Reference Validation Mechanism (RVM) that provides basic level security. In [1], Anderson reported three design requirements for a Reference Monitor or Operating System. He suggested that an OS or RM should be tamper proof that means OS programs are not alterable, OS should always be invoked and OS must be small enough for analysis and testing purposes so that completeness of which can be assured. These OS design requirements became the deriving principle of OS development. A wide range of operating systems follow Anderson’s design principles in modern time. It was also observed in [2] that most of the attacks are imposed either on OS itself or on the programs running on the OS. The attacks on OS can be mitigated through formal verification to a great extent which prove the properties of OS code on various criteria like safeness, reliability, validity and completeness etc. Also, formal verification of OS is an intricate task which is feasible only when RVM or RM is small enough for analysis and testing within a reasonable time frame. Other way of attacking an OS is to attack the programs like device drivers running on top of it and subsequently inject malware through these programs interfacing with the OS. Thus, a malware can be injected in to the sensitive kernel code to make OS malfunction.
    [Show full text]
  • Coalition for Academic Scientific Computation C A
    Coalition for Academic Scientific Computation C A S C Advancing High Performance Computation and Communication through Collaboration Coalition for Academic Scientific Computation is a nonprofit organization of supercomputing centers and CASC research universities that offer leading edge hardware, software, and expertise in high performance computing resources and “advanced visualization environments.” Founded in 1989, CASC has grown into a national association representing 35 centers and programs in 22 states. Working individually and together, coalition members complement traditional methods of laboratory and theoretical investigation by using high performance computers to simulate natural phenomena and environmental threats, handle and analyze data and create images – all at performance levels not available from smaller computers. By applying the technology, CASC members help extend the state of the art to achieve the scientific, technical, and information management breakthroughs that will keep the U.S. in the forefront of the 21st century IT revolution. Coalition members are involved in activities that foster major advances for virtually every element of society. The range of these efforts encompasses: ♦ Aiding in Homeland Security ♦ Accessing Information ♦ Improving Health Care ♦ Conducting Research ♦ Combating Cyber-Terrorism ♦ Enhancing Education ♦ Innovating in Design and Construction ♦ Understanding the Environment ♦ Preparing for Bio-Terrorism ♦ Advancing Bioinformatics 1 Coalition for Academic Scientific Computation Aiding in Homeland Security members are involved in a wide CASC range of activities supporting the Federal government in its efforts to develop and improve security measures to combat terrorism. ♦ The National Center for Supercomputing Applications (NCSA) has developed the Multi- Sector Crisis Management Consortium (MSCMC) at the University of Illinois at Urbana-Champaign. The MSCMC uses cutting edge technology to mitigate and respond to crises of national security and national disasters.
    [Show full text]