Security Specification & Assessment Flashcards
What is meant by Security Specification? (Recap)
Meaning: A security specification is a set of guidelines that outline how to implement security measures to protect data and ensure confidentiality and integrity.
Note: In common with safety requirements specification – concern is to avoid something bad
happening.
Four Major Differences:
* Safety problems are accidental – the software is not operating in a hostile environment. In security, you must assume that attackers have knowledge of system weaknesses.
- When safety failures occur, you can look for the root cause or weakness that led to the failure.
When failure results from a deliberate attack, the attacker may conceal the cause of the failure. - Shutting down a system can avoid a safety-related failure. Causing a shut down may be the aim
of an attack. - Safety-related events are not generated from an intelligent adversary. An attacker can probe
defences over time to discover weaknesses.
Security Notions (Recap)
- Asset: something of value that has to be protected
- Attack: an exploitation of a system’s vulnerability where an attacker has the goal of causing damage to one or more assets.
- Two types: outside attack
(external) and inside attack
(authorised insider) - Exposure: possible harm or
loss to a computing system
- Two types: outside attack
- Threat: circumstances that have potential to cause harm or loss
- Vulnerability: a weakness
Name and describe the types of security threats?
Interception Threat:
- Allow an attacker to gain access
to an asset (wiretapping,
eavesdropping, etc.)
Interruption Threat:
- Allow an attacker to make the
system unavailable for
some time (denial of service
attack)
Modification Threat:
- Allow an attacker to tamper
with an asset (e.g.,
destroy or change data)
Fabrication Threat:
- Allow an attacker to insert false
information (email spoofing, log
fabrication, etc.)
Name three types of control measures?
- Avoidance
- components not connected to
the internet, data encryption
- components not connected to
- Detection and neutralisation
- detect unusual patterns of
activity
- detect unusual patterns of
- Exposure limitation and recovery
- automated backup strategies
Security and Dependability relations (Notes)
- Reliability
- Availability
- Safety
- Resilience (ability to resist and
recover from damaging events, specially in the context of a cyber attack).
What is an Attack Tree?
Meaning: A diagram that represent an attacker’s goals by exploiting vulnerabilities.
Note: Are used to describe security weaknesses of a system.
Example shown in lecture week 8 slide 10.
What are the limitations of an Attack Tree?
- We only see the attacker’s point of view.
- There are no defensive measures shown in the diagram
- There is no attacker/defender interactions visible in the diagram.
- There is no evolutionary aspects involved in the attack tree.
What is an Attack-Defence Tree?
How does it improve on the Original Attack Tree?
Meaning: An attack-defence tree extends the attack tree with refined or countered defensive actions.
Note: A diagram that shows how an attacker might try to attack a system vulnerability and how a defender (system security) can protect it.
Notes on Quantitative Analysis on Attack-Defence Trees
Of an attack-defence scenario:
* What is the minimal cost of an attack?
- What is the expected impact of a considered attack?
- Is special equipment required to attack?
- How long does it take to secure a system, when the attacker has a limited budget?
- How does the scenario change if A and D are affected by a power outage?
What is the main benefit in using an Attack Defence Tree / Diagram?
They provide information on security metrics allowing engineers to make decisions:
where to invest their security budget, which security solution to implement.
Note: ADDs supports the analysis of various metrics and strategies.
Notes on Keyless Entry in Vehicles
Key issues:
- Fob and Car are constantly communicating
- Relay attacks amplify signal from key fob to trick car into thinking the owner is nearby
- Also some hacks can occur by directly plugging into the On board diagnostics port (used for running diagnostics on the car by the manufacturer) to hack into the car, reprogram keys, etc.
- This is located on/underneath the car itself
Preventative Measures:
* Storing your key in a metal box
or a Faraday pouch
- Physical preventative measures such as an anti-steering lock
- 2FA (ensuring that another code has to be entered before the car actually starts)
- Blocking the OBD port itself, etc.
Summary on Topic (Security Specification and Assessment)
- Having ways to analyse and understand the effect of countermeasures is important in the presence of limited resources
- Different security models have been explored in the literature to identify ways of prioritising security measures, reasoning about cost, time and the
probability of success of an attack - Using strategies helps to identify what counter measures are more effective, etc