Lec 2: Security Principals Flashcards
How to analyze the security of a system?
- What is the system and what is its value
- identify the attack surface
– how can it be attacked?
- identify potential vulnerabilities
- identify the threats and adversaries
– what is the threat model you need to protect against?
- triage
What is the system?
What is the attack surface? (What are the avenues by which someone might try to attack your system?)
Why use attack trees?
- to think about attack surface like a bad guy
What are vulnerabilities?
What are threats? What do they correspond to?
- Actions by adversaries who try to exploit vulnerabilities to damage asset
- Correspond to confidentiality, integrity, authenticity and availability
What are the threats to a voting machine?
- Extract records: find out who voted for who
- Tampering with data: change outcome of election
- Spoofing identity: vote as someone else
- Crash machine: prevent others from voting
What is confidentiality and how can it be violated?
What is integrity and how can it be violated?
What is authenticity and how can it be violated?
What is availability and how can it be violated?
Why do you need a threat model?
- to organize what you assume about attackers’s goals and capabilities
What do you assume about attacker’s goals and capabilities?
What is the triage?
- threats, vulnerabilities and asset value
How do you evaluate what combination of threats * vulnerabilities * asset value are the biggest?