5.8 KiB
| title | aliases | tags | sr-due | sr-interval | sr-ease | ||
|---|---|---|---|---|---|---|---|
| 02-concepts-and-roles |
|
2022-07-17 | 3 | 250 |
News
- more personal email scams
- They have more knowledge about your personal information
- deakin university attack
- staff credentials were leaked and acces to students information was gathered
- rusian hackers attack lithuania
- attacks against india
- retbleed attack affects AMD and Intel CPUs (spectre-based speculative-execution attacks)
Vulnerabilities
- a potential weakness in an asset
- or in its defense security control
- e.g., flaws in software packages or an unprotected system port
exploit is the technique used to attack
- RAND report r-609-1 (1979)
- need to be aware of vulnerabilities
e.g.,
- websites can steal browser data via extension APIs
Security services and control
- services
- the intended security goal or property (C.I.A provides the three main security services)
- confidentiality
- integrity
- awareness
- controls
- the mechanisms employed to implement the services
- encryption
- firewalls
- awareness
Controls
-
physical controls
- facility protection
- guards
- locks
- monitoring
- environment controls
- intrustion detection
-
technical controls
- network security
- cryptography
- forensics
- user authentication
- etc
-
administrative controls
- policies
- standards
- procedures
- guidelines
- personnel screening
- awareness training
-
Preventive
- e.g., "prevent exposure of critical information"
- control - e.g., encrpytion
-
detective
- e.g., "we want to warn attempts of intrustions"
- control - e.g., intrusion detection systems
-
corrective
- reduce/fix damage
- e.g., "we want to repair our system in case of errors"
- conrtol - e.g., restoration point mechanisms (e.g., version control systems like git)
-
we need security controls for all info states:
- storage
- information storage containers
- electronic, physical, human
- transmission
- physical or electronic
- processing
- physical or electronic
- storage
CIA
- a security service provides a high level security property
Confidentiality
- information should not be available to unauthorised people
- divided into:
- secrecy: protecting business data
- privacy: protecting personal data
- anonymity: hide who is engaging in what actions
- threats: information theft, unintentional disclosure
- controls: encyption, access control, perimeter defense
- general controls: secure systems development, and incident response
Integrity
- data integrity: should not be corruped, tampered, altered with etc in an unauthorised manner
- system inegrity: accuracy and completeness
- threats: data and system corruption, loss of accountability
- controls:
- hashing, cryptographic integrity check and encryption
- authentiation, access control
- digital signing
- config management and change control
- general controls: Secure Systems Development and Incident Response
Availability
- information should be accessible and usable upon demand by an authorised entity
- main threat: DoS
- controls:
- redundancy of resources
- load balancing
- software and data backups
- general controls: Secure Systems Development and Incident Response
Additionally properties
- accuracy - free from mistakes and erors
- authenticity - genuine or original
- utility - serve a purpose (e.g., census data)
- possession - ownership or control (importat for privacy)
Privacy and Actors
GDPR
-
To protect specific aspects of information that may be related to natural persons (personal information)
-
Prevent unauthorized collection and storage of personal information
-
Make sure your personal information is correct
-
Ensure transparency and access for data subjects
-
Provide adequate information security (C.I.A) around personal information
-
Define clear responsibilities around personal information
-
GDPR became EU law on 25 May 2018 (General Data Protection Regulation)
Actors
-
threat actors
- those responsible for the security incident
-
(security) Hacker
- uses technical skills and knowledge to uncover bugs or exploits
-
Attacker
- may use other (non-technical) means to exploit data and system (the malicious intention is what matters here)
-
intelligence agencies
-
law enforcement
-
nation states
-
independents (hackers, criminals, private surveillance, manufacturers etc)
Skills and focus of actors
- low skill & low focus
- high skill & low focus
- high skill & high focus
- intelligence agencies
- highly sophicticated
Shared responsibility
- business needs first
- information securty functions
- protecting the functionality of an organization
- enablling safe operation of applications
- safeguarding technology assets in organizations