INFO3005.1 - Intro and Security Models Flashcards
General security terms & definitions Learn about theoretical and practical security models. Purpose: High level - to understand what is going on Theoretical - to evaluate
Computer Security Model (wikipedia)
scheme for specifying and enforcing security policies.
A security model may be founded upon
a formal model of access rights,
a model of computation,
a model of distributed computing,
or no particular theoretical grounding at all.
Security is there to ensure
- Confidentiality
- Integrity
- Availability, also;
- Authenticity - is it from who it says its from, is it genuine, uses digital signature
- Non-repudiation - law focused, obligation of the contract. you canot say did not send/receive. tech helps but it is law based
We protect hardware, software, data from
Vulnerabilities Threats Attacks through Control as a protective measure
Vulnerability
Weakness in the security system,
in procedures,
design, or
implementation,
might be exploited to cause loss or harm.
(e.g. unauthorized data manipulation because the system does not verify a user’s identity before allowing data access)
Threat
(to a computing system) is a set of circumstances that has the potential to cause loss or harm.
Attack
A human who exploits a vulnerability perpetrates an attack on the system. An attack can also be launched by another system, as when one system sends an overwhelming set of messages to another, virtually shutting down the second system’s ability to function.
Control
Protective measure
a control is an action, device, procedure, or technique that removes or reduces a vulnerability
A threat is blocked by control of a vulnerability
devising controls
means knowing as much about threats as possible
Four kinds of threat
Interception
Interruption
Modification
Fabrication
Interception
Unauthorized party has gained access to an asset. Can be:
person,
program,
computing system.
e.g. illicit copying of program or data files,
wiretapping to obtain data in a network.
Although a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected.
Interruption
Asset of the system becomes lost, unavailable, or unusable.
e.g. malicious destruction of a hardware device,
erasure of a program or data file,
malfunction of an operating system file manager so that it cannot find a particular disk file.
Modification
Unauthorized party not only accesses but tampers with an asset
e.g. someone might change the values in a database,
alter a program so that it performs an additional computation,
modify data being transmitted electronically.
It is even possible to modify hardware.
Some cases of modification can be detected with simple measures, but other, more subtle, changes may be almost impossible to detect.
Fabrication
Unauthorised party might create a fabrication of counterfeit objects on a computing system.
The intruder may insert spurious transactions to a network communication system or add records to an existing database.
Sometimes these additions can be detected as forgeries, but if skillfully done, they are virtually indistinguishable from the real thing.
Malicious attacker must have 3 things - MOM
Method
Opportunity
Motive
Method
the skills, knowledge, tools, and other things with which to be able to pull off the attack