[Intro. to Computer Security Course Note] Ch 1
Ch1. Overview
3 Key
Confidentiality
Assure that private or confidential info is not disclosed to unauthorized individuals
Privacy: Assure that individuals control or influence what info related to them may be collectd and stored
Integrity
Data integrity: info are changed only in a specified / authorized manner
System integrity: system performs well in an unimpaired manner
Availability
Assure that system works promptly and service is not denied to authorized users
Other 2
Authenticity
Property is genuine and able to be verified and trusted
Accountability
Requirement for actions of an entity to be traced uniquely to that entity
Model of Computer Security
Vulnerability
Weakness
- Corrupt: loss of integrity
- Leaky: loss of confidentiality
- Unavailability or very slow
Threat
Capable of exploiting vulnerability
Attack
- Passive: make use of info, but doesn’t affect system resources
- Active: alter system resources
- Inside: by an authorized user (using in a way not approved)
- Outside: by an unauthorized user
Countermeasures
Security Concepts / Relationships
Threats / Attacks
Threat Consequence | Threat Action (Attack) |
---|---|
Unauthorized Disclosure - threats to confidnentiality |
1. Explosure 2. Interception 3. Inference (推斷) 4. Intrusion |
Deception - threats to integrity |
1. Masquerade 2. Falsification 3. Repudiation (否認) |
Disruption - threats to availability / system integrity |
1. Incapacitation 2. Corruption: alters system operation 3. Obstruction |
Usurpation (篡奪) - threats to system integrity |
1. Misappropriation 2. Misuse |
Security Functional Requirements
Technical Measures
Management Controls / Procedures
Overlapping Technical / Management
Fundamental Security Design
Economy of Mechanisnm
Design should be as simple as possible
Fail-safe Defaults
Access decisions should be based on permission rather than exclusion
Complete Mediation
Every access must be check against the access control mechanism
Open Design
就把設計公開
Separation of Privilege
大家的權限不一樣
Least Privilege
Least Common Mechanism
Psychological Acceptability
Should not interfere unduly with the work of users or hinder the usability or accessibility of resources
Isolation
Encapsulation
A specific form of isolation based on object-oriented functionality
Modularity
就包成 module
Layering
Use of multiple, overlapping protection approaches
Least Astonishment
Attack Surfaces
Make developers aware of where security mechanisms are required
Attack Trees
- Root: the attack goal
- Leaf: different ways to initial an attack
- Each node (other than a leaf): AND / OR node
Why ?
- Effectively exploit the info available on attack pattern
- Document security attacks in a structured form that reveals key vulnerabilities
- Can know how to design system / coutnermeasures
Computer Security Strategy
3 Aspects
- Specification / policy: what is the security scheme supposed to do ?
- Implementation / mechanisms: how to ?
- Correctness / assurance: does it work ?
Security Policy
- A formal statement of rules and practices
- A security manager needs to consider
- value of assets being protected
- vulnerabilities of the system
- potential threats and the likehood of attacks
- trade-off: ease of use v.s. security
- trade-off: cost of security v.s. cost of failure and recovery