1.2 Summarize fundamental security concepts. Flashcards
The CIA Triad
Combination of principles
– The fundamentals of security
– Sometimes referenced as the AIC Triad
* Confidentiality
– Prevent disclosure of information to
unauthorized individuals or systems
* Integrity
– Messages can’t be modified without detection
* Availability
– Systems and networks must be up and running
Confidentiality
Certain information should only be known
to certain people
– Prevent unauthorized information disclosure
* Encryption
– Encode messages so only certain people
can read it
* Access controls
– Selectively restrict access to a resource
* Two-factor authentication
– Additional confirmation before information
is disclosed
Integrity
Data is stored and transferred as intended
– Any modification to the data would be identified
* Hashing
– Map data of an arbitrary length to data of a fixed length
* Digital signatures
– Mathematical scheme to verify the integrity of data
* Certificates
– Combine with a digital signature to verify an individual
* Non-repudiation
– Provides proof of integrity, can be asserted to be genuine
Availability
Availability
* Information is accessible to authorized users
– Always at your fingertips
* Redundancy
– Build services that will always be available
* Fault tolerance
– System will continue to run, even when a failure occurs
* Patching
– Stability
– Close security holes
Non-repudiation
You can’t deny what you’ve said
– There’s no taking it back
* Sign a contract
– Your signature adds non-repudiation
– You really did sign the contract
– Others can see your signature
* Adds a different perspective for cryptography
– Proof of integrity
– Proof of origin, with high assurance of authenticity
Proof of integrity
Verify data does not change
– The data remains accurate and consistent
* In cryptography, we use a hash
– Represent data as a short string of text
– A message digest, a fingerprint
* If the data changes, the hash changes
– If the person changes, you get a different fingerprint
* Doesn’t necessarily associate data with an individual
– Only tells you if the data has changed
Hashing the encyclopedia
Gutenberg Encyclopedia, Vol 1,
by Project Gutenberg (8.1 megabytes)
* Change one character somewhere in the file
– The hash changes
* If the hash is different, something has changed
– The data integrity has been compromised
Proof of origin
Prove the message was not changed
– Integrity
* Prove the source of the message
– Authentication
* Make sure the signature isn’t fake
– Non-repudiation
* Sign with the private key
– The message doesn’t need to be encrypted
– Nobody else can sign this (obviously)
* Verify with the public key
– Any change to the message will invalidate the signature
AAA framework
Identification
– This is who you claim to be
– Usually your username
* Authentication
– Prove you are who you say you are
– Password and other authentication factors
* Authorization
– Based on your identification and authentication,
what access do you have?
* Accounting
– Resources used: Login time, data sent and
received, logout time
Authenticating systems
You have to manage many devices
– Often devices that you’ll never physically see
* A system can’t type a password
– And you may not want to store one
* How can you truly authenticate a device?
– Put a digitally signed certificate on the device
* Other business processes rely on the certificate
– Access to the VPN from authorized devices
– Management software can validate the end device
Certificate authentication
An organization has a trusted Certificate Authority (CA)
– Most organizations maintain their own CAs
* The organization creates a certificate for a device
– And digitally signs the certificate with the organization’s CA
* The certificate can now be included on a device as an
authentication factor
– The CA’s digital signature is used to validate the certificate
Authorization models
The user or device has now authenticated
– To what do they now have access?
– Time to apply an authorization model
* Users and services -> data and applications
– Associating individual users to access rights
does not scale
* Put an authorization model in the middle
– Define by Roles, Organizations, Attributes, etc.
No authorization model
A simple relationship
– User -> Resource
* Some issues with this method
– Difficult to understand why an authorization may exist
– Does not scale
Using an authorization model
Add an abstraction
– Reduce complexity
– Create a clear relationship between the user
and the resource
* Administration is streamlined
– Easy to understand the authorizations
– Support any number of users or resources
Gap Analysis
Where you are compared with where you want to be
– The “gap” between the two
* This may require extensive research
– There’s a lot to consider
* This can take weeks or months
– An extensive study with numerous participants
– Get ready for emails, data gathering, and technical
research