Week 1 Flashcards
Information Security?
What is information security?
Information security (also called computer security) is the act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction or theft.
It typically includes an in-depth plan on how to secure data, computers, and networks.
The Security Requirements Triad
Confidentiality, Integrity, Availability
The Security Requirements Triad: There is a 4th security tenet. Any guesses?
Non-Repudiation
Confidentiality
Efforts made to prevent unauthorized disclosure of information to those who do not have the need or right to see it. Ex: PII - Personal Identifyable Information.
Controls that help Confidentiality:
Encryption of data at rest (disk/ database)
Encryption of data at motion (SSL, SSH, IPSec, PPTP)
Access Control (physical and technical)
Integrity
Two types of Integrity:
Data Integrity: Ex: Student gaining access to grades database.
System Integrity: Student introducing a malicious program on a windows machine to gain backdoor entry to data like grades database.
Opposite: Alteration
Controls that help Integrity:
Hashing (data integrity)
Configuration Management (system integrity)
Change Control (process integrity)
Access Control (physical and technical)
Software digital signing Transmission CRC functions.
Availability
Efforts made to prevent disruption of service and productivity. DOS Attack - Denial Of Service Attack, denies service (availability) of a system.
Controls that help availability:
RAID - Redundant Array of Inexpensive Disks.
Clustering
Load Balancing
Redundant data and power lines.
Software and Data backups
Disk shadowing
Co-location and offsite facilities
Rollback functions
Fail-over configurations.
Scope of System Security
- Access to the data must be controlled (protection)
- Access to the computer facility must be controlled (user authentication)
- Data must be securely transmitted through networks (network security)
- Sensitive files must be secure (file security)
The following examples affect which TRIAD of IT Security?
Equipment Stolen of Disabled thus affecting users from using the system.
Availability
The following examples affect which TRIAD of IT Security?
Programs Deleted denying access to users.
Availability
The following examples affect which TRIAD of IT Security?
A program was modified to cause it to fail or do unintentional actions
Integrity
The following examples affect which TRIAD of IT Security?
An unauthorized copy of the software is made
Confidentiality
The following examples affect which TRIAD of IT Security?
A program was modified to cause it bring the systems down. What has been compromised?
Integrity
The following examples affect which TRIAD of IT Security?
An unauthorized data read is performed and data is being analyzed.
Confidentiality
The following examples affect which TRIAD of IT Security?
Messages are passively interpreted and directed to a remote location
Confidentiality
The following examples affect which TRIAD of IT Security?
Messages are passively interpreted and directed to a remote location
Confidentiality
Categories of Attacks
Passive attacks
Attempts to learn or make use of information from the system but does not affect system resources.
Are in the nature of eavesdropping on, or monitoring of, transmissions.
Goal of attacker is to obtain information that is being transmitted.
Difficult to detect because they do not involve any alteration of the data.
Emphasis is on prevention rather than detection.
Two types:
Release of message contents
Prevent an opponent from learning the contents of a transmission.
Traffic analysis
Encrypting the contents of a message so even if an opponent captures the message, they cannot extract the information.
Categories of Attacks
Active attacks
Involve some modification of the data stream or the creation of a false stream
Goal is to detect them and to recover from any disruption or delays
Four categories:
Replay
Masquerade
Modification of messages
Denial of service
Intruder Behavior Patterns
Hackers
Organized group of intruders who hack into a computer for the thrill or for status
Criminals
Usually have specific targets or classes of targets in mind
Once a site is penetrated, the attacker acts quickly, scooping up as much valuable information as possible and exiting
Insider Attacks
Difficult to detect and prevent
Employees have access to and knowledge of the structure and content of databases
Can be motivated by revenge or a feeling of entitlement
Zero Day Attacks
APT attackers conduct their own vulnerability assessment and store vulnerabilities detected for later use. They do not disclose these.
Dangerous, because the product owners are not aware of these vulnerabilities. No corrective measures are available for these attacks as vendors are not aware of these.
Targets can easily be compromised with a zero-day exploit
Ex: Stuxnet attack traced to the U.S. and Israeli Governments. A worm that was targeted at Iran’s nuclear facility.
Threat Vectors – Where threat agents can gain access from ?
Email and social media
Phishing messages and spam
Victims are targeted directly on social media or social media is used to harvest information about users and an attack could be carefully crafted using that information.
Direct Access
Attacker could boldly enter public access areas of a building (ex: lobby, customer store) and use unsecure wireless networks to gain access to system or identify vulnerabilities.
They could attempt to gain physical access to facility using stolen access cards.
Could identify unsecured computer terminals or systems after they gain illegal access to the building.
Key to addressing this is having a good physical security measures in place.
Removable media
Cloud
Third-party risks
Malicious Software
Malware
Malicious software that exploits system vulnerabilities
Designed to cause damage to or use up the resources of a target computer
Frequently concealed within or masquerades as legitimate software
Two categories
Those that need a host program
Those that are independent (parasitic)
May or may not replicate
Malicious Programs
Back door (also known as a trap door)
Secret entry point into a program that allows someone who is aware of the back door to gain access without going through the usual security access procedures.
A maintenance hook is a backdoor inserted by a programmer to aid in testing and debugging.
Logic Bomb
One of the oldest types of program threats
Code embedded in some legitimate program that is set to “explode” when certain conditions are met.
Malicious Programs
Trojan Horse
A useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function
Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly
Trojan horses fit into one of three models:
Continuing to perform the function of the original program and additionally performing a separate malicious activity
Continuing to perform the function of the original program but modifying the function to perform malicious activity or to disguise other malicious activity
Performing a malicious function that completely replaces the function of the original program