- Confidentiality
- Resources should be protected from unauthorized access
- Prioritized by governments
- Concepts
- Sensitivity
- How harmful is disclosure
 
- Discretion
- Controlled disclosure to prevent damage
 
- Criticality
- How essential the information is to the organisation
 
- Concealment
- Hiding information (e.g. obfuscation)
 
- Secrecy
- Keeping something a secret
 
- Privacy
- Keeping personal information secret
 
- Seclusion
- Storing data in out-of-the-way locations
 
- Isolation
- Keeping data separate
 
 
- Sensitivity
 
- Integrity
- Resources should be protected from unauthorized modification
- Resources should maintain semantic consistency
 
- Availability
- Resource should be accessible to authorized parties
- Prioritized by businesses
 
- Required to hold a subject accountable for actions
- Identification
- Subject identifies themselves
 
- Authentication
- Subject proves their identity
 
- Authorization
- Subject is allowed/disallowed to perform an action
- What can the subject do and not do?
 
- Auditing
- Subject's actions are logged
 
- Accounting
- Subject's logs are reviewed for violations
- Subject is held accountable for their actions
- Legally Defensible Security
- Required to hold subjects accountable
- You need to prove:
- Efforts were made to prevent the crime
- Log files are accurate
- All laws and regulations were followed
- Warning and notifications were posted
- Electronic evidence is decisive
 
 
- Non-repudiation
- Subjects cannot deny performing an action
 
 
- Layering/Defense-in-Depth
- Use of multiple controls in a series
- Uses series vs. parallel
- Series
- Useful for security
- Data passes through multiple filters
- Airport with multiple gates
 
- Parallel
- Useful for performance
- Data can pass any filter
- Mall with multiple entrances
 
 
- Series
 
- Abstraction
- Generalizes a group of objects and subject
- Defines object and subject templates
- E.g. "Employee" can be used to describe "Linda", "Mark", etc.
 
- Data Hiding
- Places data in location not seen by subject
- Prevents data from being accessed by unauthorized subjects
 
- Encryption
- Hides intent of data rather than hiding the data itself
- Makes data unreadable to unauthorized subjects
 
- Administration of an organization's security program
- Business Case
- Justifies starting a new project
 
- Approaches
- Top-down
- Upper management makes security policies
- Lower professionals flesh out security policies
 
- Bottom-up
- IT staff makes security decisions
- Problematic
 
 
- Top-down
- Autonomous InfoSec Team
- Led by the CSO
- Reports directly to senior management
 
- Security Policy
- Requires support of senior management to succeed
- Evidence of due care and due diligence
 
- Strategic Plan
- Long-term plan
- Defines security purpose of organization
- Lifetime: 5 years
 
- Tactical Plan
- Mid-term plan
- Contains TASKS to achieve Strategic Plan
- Examples
- Project plans
- Acquisition plans
- Hiring plans
- Budget plans
 
- Lifetime: 1 year
 
- Operation Plan
- Short-term plan
- Contains STEPS to achieve Tactical Plan
- Examples
- Training plans
- System deployment plans
- Product design plans
 
- Lifetime: 1 month/1 quarter
 
- Changes can lead to security issues
- Purpose
- Prevents compromise after change
 
- Goals
- Monitor change
- Test change
- Allow rollback of change
- Inform users of change
- Analyze effects of change
- Minimize negative impact of change
- Allow review of change by Change Approval Board (CAB)
 
- Identify which data need to be prioritized for protection
- Identify which controls is needed for which data
- Benefits
- Demonstrates commitment to protection of data
- Identifies critical assets
- Justifies selection of controls
- Required for regulations
- Defines proper access, declassification, and destruction method
- Helps with data life-cycle management
 
- Classification Criterias
- Usefulness
- Timeliness
- Value
- Age
- Lifetime
- Relationship with subjects
- Sensitivity
- Criticality
- National Security Implications
- Storage method
- Ownership
 
- Implementing Classification
- Identify custodian
- Determine evaluation criteria
- Classify resources
- Determine exceptions
- Determine security controls
- Determine declassification procedure
- Staff awareness/training
 
- Classification Schemes
- Government/Military
- Classified
- Top Secret
- Secret
- Confidential
 
- Unclassified
- Sensitive
- Unclassified
 
 
- Classified
- Private/Business
- Confidential/Private
- Confidential/Proprietary: Related to business
- Private: Related to personnel
 
- Sensitive
- Public
 
- Confidential/Private
 
- Government/Military
- Roles and Responsibilities
- Senior Manager
- Signs off on policy issues
- Liable for security solution
 
- Security Professional
- Designs and implements security solutions
 
- Data Owner
- Classifies data
 
- Data Custodian
- Implements controls to protect data
- Protects data based on classification
 
- User
- Accesses the system
- Complies with security policies
 
- Auditor
- Checks for compliance to security policy
- Checks effectiveness of security policy
 
 
- Senior Manager
- Training vs Education
- Training
- So users can comply with security policies
 
- Education
- Users lean more than what they need to know
 
 
- Training
- For planning IT security of an organization
- Control Objectives for Information and Related Technology (COBIT)
- By ISACA
- Principles
- Meeting Stakeholder Needs
- Covering the Enterprise End-to-End
- Applying a Single Integrated Framework
- Enabling a Holistic Approach
- Separating Governance from Management
 
 
- Due Care
- Required effort to protect data
- Compliance to legal regulations
- Legal duty of company
- Failure will result in negligence
 
- Due Diligence
- Maintaining due care
- Continuous improvement of security
- Penetration tests, vulnerability assessments, etc.
 
- Operational Security
- Ongoing maintenance of due care and due diligence
 
- Should be kept as separate dcuments
- Only changed materials need to be redistributed
- Not all users are concerned with all documents
 
- Security Policy
- Generalization of security needs, goals, and practices
- Broad overview of security
- Strategic plan
- Proof of due care
- Compulsory
- Responsibilities must be roles-based, not individual-based
- Types
- Organizational
- Issue-specific
- Network Service
- Department
 
- System-specific
 
- Categories
- Regulatory
- Required by law
 
- Advisory
- Required by senior management
- Acceptable Use Policy
- Assigns security roles
- Assigns responsibilities to roles
- Contains expected behaviour
 
 
- Informative
- Not required
- Provides background information to issues
 
 
- Regulatory
 
- Standard
- Describes uniform implementation of technology
- Tactical documents
 
- Baselines
- Describes a secure state for a system
- System-specific
 
- Guideline
- Recommendations and suggested actions for compliance
- Describes controls rather than products
- Not compulsory
 
- Procedure
- Step-by-step instruction on how to implement a security control
- Specific to a system or product
- Ensures compliance to standard
 
- Approaches
- Proactive
- Performed before and while the system is being implemented
- Predicting threats and designing defenses in advance
- More cost effective and more successful
- Security Development Lifecycle
- Reduce number of coding defects
- Reduce severity of remaining defects
 
 
- Reactive
- Performed after the system has been implemented
- Less effective but more cost effective than redesign
- E.g. penetration testing, source code review, fuzz testing
- Fuzz Testing
- Random invalid input is fed to a program
- Attempts to find previously undetected flaws
 
 
 
- Proactive
- Steps
- Threat Identification
- Approaches
- Focused on Assets
- Protect valuable assets
 
- Focused on Attackers
- Protect the things that attackers want to attack
 
- Focused on Software
- Protect the software
 
 
- Focused on Assets
- Individual Threats
- Be cautious of
- Contractors
- Trusted Partners
 
 
- Be cautious of
 
- Approaches
- Threat Categorization
- STRIDE
- Spoofing
- Falsifying information to gain access
 
- Tampering
- Making unauthorized changes
 
- Repudiation
- Denying having done an action
 
- Information Disclosure
- Revelation of controlled information
 
- Denial-of-Service
- Prevents the use of an asset
 
- Escalation of Privilege
- Elevates capability of under privileged account
 
 
- Spoofing
 
- STRIDE
- Determining Potential Attacks
- Data Flow Diagrams
- Entities
- Technologies
- Transactions
- Attacks vs each element
 
 
- Data Flow Diagrams
- Reduction Analysis
- Decomposing system/process/environment
- Modules
- Functions
- Protocols
- etc.
 
- Identify the Following
- Trust Boundaries
- Data Flow Paths
- Input Points
- Privileged Operations
- Security Approach
 
 
- Decomposing system/process/environment
- Prioritization and Response
- Probability x Damage Potential
- High/Medium/Low
- DREAD
- Discoverability
- Reproducibility
- Exploitability
- Affected Users
- Damage Potential
 
 
 
- Threat Identification
- Select software with integrated security
- Evaluate 3rd party service provider
- On-Site Assessment
- Observe their operating habits
 
- Document Exchange and Review
- Investigate data exchange process
 
- Process/Policy Review
- Review their security poilicy
 
 
- On-Site Assessment
- Review Service Level Agreements
- People
- Weakest link in security chain
 
- Hiring Process
- Job Description
- Concepts
- Separation of Duties
- Least Privilege
- Job Responsibilities
- Job Rotation
- Cross-training
 
- Maintain throughout organization lifecycle
 
- Concepts
- Job Classification
- Employee Screening
- Background checks, etc.
 
- Hiring and Training
- Non-disclosure Agreement
- Non-compete Agreement
 
- Termination
- Notify employee
- Request return of company equipment
- Disable electronic access
- Exit interview and NDA review
- Escort off premises
 
 
- Job Description
- Separation of Duties
- Work tasks divided among administrators
- Applies to administrators instead of users
- Prevents collusion
 
- Least Privilege
- Users should only have privileges that they require
- Applies to users instead of admins
 
- Job Responsibilities
- Work tasks that an employee is required to perform
- Defines required objects, resources, and services
 
- Job Rotation
- Provides knowledge redundancy
- Less downtime
- Reduces risk of fraud via peer auditing
- Protects against collusion
 
- Cross-training
- Alternative to job rotation
- Employees are trained for other jobs
- Workers are not rotated through different job
 
- Collusion
- When peole work together to commit a crime
 
- Non-disclosure Agreement (NDA)
- Protects confidential information within an organization
 
- Non-compete Agreement (NCA)
- Prevents employees from jumping to a competitor
- Has time limit
- Allows company to keep competitive edge
- Difficult to enforce
- Deters violation of NDA
 
- Mandatory Vacations
- Used to audit employees
 
- Termination Best Practices
- Have one witness
- Escort off premises
- Escort required when in work area
- Return employee identification and equipment
- Disable network user account at same time of termination
- Notify HR to issue final paychecks
- Inform security personnel of termination
- Terminate at end of shift in middle of week
- Perform exit interview
 
- Exit Interview
- Review liabilities and restrictions
- Review NDA and other agreements
 
- Third-party Controls
- Service Level Agreements
- Defines expected level of service from third-party
- Put in place for network connections and services
- Includes remedies if not met
- Common SLA Issues
- System uptime
- Maximum consecutive downtime
- Peak load
- Average load
- Responsibility for diagnostics
- Failover time
 
 
 
- Service Level Agreements
- Compliance
- Adherance to regulations
- Employees need to follow polcies, etc.
 
- Privacy
- Secrecy of personal information
- Prevention of unauthorized access to PII
- Freedom from being monitored without knownledge
- For employees, site visitors, customers, suppliers, and contractors
 
- Personally Identifiable Information
- Information that can be traced back to a person
- Includes
- Phone
- Address
- SSN
- Name
 
- Excludes
- MAC Address
- IP Address
- OS Type
 
 
- Directing the security efforts of an organization
- Third-party Governance
- Employment of external auditors
- External auditors review your security
 
- Compliance of external providers
- Providers must comply with your security policies
- Documentation Review
- On-site assessments
 
 
- Employment of external auditors
- Documentation review
- Exchanging materials
- Reading and verifying them against expectations
- Required before preforming on-site assessments
 
- On-site assessments
- First hand exposure to security mechanisms
- Auditors should follow COBIT
 
- Authorization to Operate (ATO)
- For government contractos
- Required when complying with government security policies
 
- Risk
- Possibility that assets could be damaged or disclosed
 
- Risk Management
- Actions to reduce risk to an acceptable level
- Steps
- Risk Analysis
- Identify
- Evaluate
- Countermeasures
 
- Risk Responses
- Mitigate
- Using countermeasures to reduce risk
 
- Transfer
- Transferring risk to another organization
- Purchashing insurance
- Outsourcing business processes
 
- Accept
- When countermeasure costs more than risk cost
- Organization absorbs risk cost
- Signed off by management
 
- Reject
- Ignoring the existence of the risk
- Not prudent due-care responses to risk
 
 
- Mitigate
- Countermeasure Selection and Implementation
- Rules
- Countermeasure Cost < Asset Value
- Countermeasure Cost < Countermeasure Benefit
- Benefit of Attack < Cost of Attack
- Secure by design
- Benefit should be testable and verifiable
 
 
- Rules
- Monitoring and Measurement
- Continuous Improvement
 
- Risk Analysis
 
- Risk Analysis
- Process of achieving risk management goals
- Steps
- Identifying risk
- Evaluating risk
- Likelihood
- Damage Potential
- Risk Rating
 
- Determining countermeasures
- Cost/benefit analysis
 
 
- Types
- Quantitative
- Qualitative
- Hybrid
 
- Quantitaive Risk Analysis
- Assigning dollar value to risks
- Steps
- Identify assets and value (AV)
- Identify threats against assets and exposure factor (EF)
- Determine single loss expectancy (SLE)
- Identify annual rate of occurence (ARO)
- Determine annual loss expectancy (ALE)
- Identify countermeasures and changes to ARO and ALE if applied
- Determine countermeasure cost and benefit (Raw ALE - Controlled ALE - Annual Control Cost)
 
- Values
- Asset Value (AV)
- The value of an asset
 
- Exposure Factor (EF)
- Percentage of loss to an asset if a risk to it is realized
 
- Single Loss Expectancy (SLE)
- Cost if a risk is realized
- SLE = AV * EF
 
- Annualized Rate of Occurence (ARO)
- Number of times a risk is realized per year
- Historical records, statistical analysis, guesswork
- Determined through Probability Determination
- ARO = Threat Sources * Single Likelihood
 
- Annualized Loss Expectancy (ALE)
- Expected yearly cost of a risk
- ALE = ARO * SLE
 
- Annualized Loss Expectancy with Safeguard (ALE)
- When safeguard is applied, ARO and EF changes
- Recalculate ALE with modified ARO
- ALE = ARO * SLE
 
- Annualized Cost of Safeguard (ACS)
- Yearly cost to implement safeguard
- Safeguard cost should be less than asset value
- If asset value is less than safeguard, just accept the risk
 
- Safeguard Benefit
- The amount of money saved by implementing the safeguard
- Benefit = ALE w/o safeguard - ALE w/ safeguard - ACS
 
 
- Asset Value (AV)
 
- Qualitative Risk Analysis
- Scenario-based
- Uses threat-ranking
- Techniques
- Delphi Technique
- Brainstorming
- Surveys
- etc.
 
- Scenarios
- One page description of a threat
- Contains
- Threat Vectors
- Impact
- Safeguards
- Threat Level
 
 
- Delphi Technique
- Anonymous feedback-response process
- For reaching a consensus
- For honest feedback from participants
 
 
 
- Risk Terminology
- Asset
- Items that have value to the organization
- Items that will damage of organization of disclosed
- Any item that needs to be protected
 
- Asset Valuation
- Monetary or intangible value of asset
- Can be based on cost to develop or replace, market value, etc.
 
- Threats
- Undesirable occurences that can damage assets
 
- Threat Agents
- Sources of threats
 
- Exposure
- Possibility of threat realization
- Exposure is equivalent to risk
 
- Risk
- Possibility of threat realization
- risk = threat * vulnerability
 
- Safeguards / Countermeasure
- Things or acts that reduce a threat or vulnerability
- Safeguard
- Pro-active controls
 
- Countermeasure
- Reactive controls
 
 
- Attack
- Exploitation of vulnerability by threat agent
- Intentional attempt to exploit
 
- Breach
- Occurence of security mechanism bypass
 
- Penetration
- State where threat agent has access to organization's infrastructure
 
- Total Risk
- Risk that organization faces without safeguards
- Total Risk = Threat * Vulnerabilities
 
- Residual Risk
- Risk that remains after countermeasures are implemented
- Risk that management has chosen to accept
- Residual Risk = Total Risk - Control Gap
- Control Gap: Amount of risk reduced by controls
 
 
- Asset
- Risk Elements
- Threat exploits...
- Vulnerability, resulting in...
- Exposure, which is...
- Risk, which is mitigated by...
- Safeguards which protected...
- Assets which are endagered by...
 
- Identifying Threats
- Listing down all threat agents and events
- Should involve various departments
- Employment of external consultants
 
- Countermeasure Selection and Implementation
- Categories
- Technical
- Hardware or software mechanisms
- Firewalls, IDSs, etc.
 
- Administratives
- Policies and procedures
- Management controls
 
- Physical
- Physically tangible
- Guards, fences, CCTV, etc.
 
 
- Technical
- Types
- Deterrent
- Discourages violation of security policy
- Fences, trainings, guards, etc.
 
- Preventive
- Stops violations of security policies
- Firewalls, IPS, mantraps, etc.
 
- Detective
- Discovers violations of security policies
- CCTV, audit trails, motion detectors, etc.
 
- Compensating
- Added in addition to other security controls
- Encryption of PII at rest and in transit
 
- Corrective
- Return system to secure state after violation of policy
- Terminating malicious activity, patching software, etc.
 
- Recovery
- Extension of corrective controls, but more advanced
- Backups, fault tolerance, shadowing, clustering, etc.
 
- Directive
- Directs the actions of subjects
- Notifications, escape route signs, procedures, etc.
 
 
- Deterrent
 
- Categories
- Asset Valuation
- Assigning dollar value to assets
- Factors
- Acquisition/Development Cost
- Management Cost
- Maintenance Cost
- Cost to Protect
- Value to Owners and Users
- Value to Competitors
- Intellectual Property
- Market Value
- Replacement Cost
- Productivity Enhancement
- Operational Cost
- Liability of Asset Loss
- Usefulness
 
 
- Risk Management Framework (NIST 800-37)
- Categorize
- Categorize information system elements
- Based on impact analysis
 
- Select
- Select initial security controls
 
- Implement
- Implement selected security controls
 
- Asses
- Check if controls are appropriate
- Check if controls are implemented correctly
 
- Authorize
- Authorize operation of information system
- Acceptance of risks
 
- Monitor
- Monitor effectiveness of controls
 
 
- Categorize
- Humans are weakst element in security
- Awareness
- Make users recognize security
- Prerequisite to training
- Posters, memos, courses, etc.
 
- Training
- Teaching how to perform work tasks
- Sometimes required before access to network is allowed
- Provided in-house
 
- Education
- Students learn more than what they need to know
- For people pursuing certification or promotion
- For personnel seeking security positions
 
- Project Scope and Planning
- Business Organization Analysis
- Who are the stakeholders to BCP planning?
- Senior management
- Operational departments
- Critical support services
 
 
- Who are the stakeholders to BCP planning?
- BCP Team Selection
- Departmental representatvies
- Legal representatives
- IT and Security representatvies
- Senior management
 
- Approval of Senior Management
- Explain benefits of BCP
- Cost of disaster
- Regulatory requirements
- Legal consequences
- Loss of customer trust
 
 
- Explain benefits of BCP
- Resource Requirements
- BCP Development
- Manpower
 
- BCP Testing, Training, and Maintenance
- Manpower and some material costs
 
- BCP Implementation
- Manpower and large material costs
 
 
- BCP Development
 
- Business Organization Analysis
- Business Impact Assessment
- Determine Recovery Goals
- Approaches
- Quantitative
- Qualitative
 
- Steps
- Identify Priorities
- Critical Processes
- Maximum Tolerable Downtime
- Recovery Time Objective
 
 
- Critical Processes
- Risk Analysis
- Risk Identification
- Likelihood Assessment
- Impact Assessment
 
- Resource Prioritization
 
- Identify Priorities
 
- Continuity Planning
- Minimize impact of risks
- Steps
- Strategy Development
- Know risks which require mitigation
- Know resources to be allocated
 
- Provisions and Processes
- Risk mitigation mechanisms
- Catgories
- People
- Most valuable asset
- Takes priority over everything else
- Must be provided equipment
- Food and shelter if must stay for extended time
 
- Facilities
- Hardening
- Alternate Site
 
- Infrastructure
- Hardening
- Alternate Systems
 
 
- People
 
- Plan Approval
- Senior management must approve
- Approval gives BCP authority and weight
 
- Plan Implementation
- Schedule implementation
- Utilize resources to achieve goals
 
- Training and Education
- Education about the plan
- BCP Team
- BCP Task Training
 
- BCP Backup
- BCP Task Training
 
- Everyone Else
- Plan Overview
 
 
- BCP Documentation
- Goals
- Provide reference if BCP members are absent
- Track BCP history
- Allows review of BCP plan
 
- Contains
- Continuity Planning Goals
- Continue business in an emergency
- MTD and RTO goals
 
- Statement of Importance
- Says why BCP plan is important
- Signed by senior management
 
- Statement of Priorities
- List of critical activities
- Arranged from most critical to least critical
 
- Statement of Organizational Responsibility
- "Business continuity is everyone's responsibility"
- Expectation from employees to help in continuity
 
- Statement of Urgency and Timing
- Expresses criticality of BCP
- Timetable of implementation
 
- Risk Assessment
- Documented results of risk assessment
- AV, EF, ARO, SLE, ALE
 
- Risk Actions (Acceptance/Mitigation)
- Reason for risk acceptance
- Provisions for mitigated risks
 
 
- Continuity Planning Goals
- Vital Records Program
- Vital Records
- Critical business records
- Records that need to be present when rebuilding the business
- Identify, find, and secure vital records
 
 
- Vital Records
- Emergecy Response Guidelines
- Immidiate response procedures
- Individuals that should be notified
- Secondary response procedures until BCP team arrives
 
 
- Goals
- Maintenance
- Revise and improve the plan
- Do not disband BCP team
- Keep track of changes
- Add to job descriptions
 
- Testing and Exercises
- Perform exercises to test BCP process
 
 
- Strategy Development
 
- Categories
- Criminal Law
- To keep peace and order
- Punishes acts against society
- Prosecuted by federal and state governments
 
- Civil Law
- To settle matters between entities
- Enforcement of contracts
- Not prosecuted unless a party sues another
 
- Administrative Law
- Regulation of government agencies
- Granted to executive branch
- Must comply with civil and criminal law
 
- Religious Law
 
- Criminal Law
- Laws
- Comprehensive Crime Control Act 1984 (CCCA)
- Coverage
- Federal computers
- Offending interstate computers
 
- Provisions
- Unauthorized access to systems or information
- Fraud using federal systems
- Damaging federal systems exceeding $1000
- Modify medical records impairing medical care of individual
- Trafficking passwords affecting interstate commerce
 
 
- Coverage
- Computer Fraud and Abuse Act 1986 (CFAA)
- Amends CCCA 1984
- Coverage
- CCCA 1984
- Federal interest computers
- Government computers
- Financial institution computers
 
 
- Provisions
- Same as CCCA 1984
 
 
- Computer Fraud and Abuse Act 1994 (CFAA)
- Amends CFAA 1986
- Coverage
- CFAA 1986
- Interstate commerce computers
 
- Provisions
- Same as CFAA 1986
- Creation of malware
- Imprisonment of offenders
- Authority for victims to sue
 
 
- Computer Security Act of 1987 (CSA)
- Federal system security baselines
- Provisions
- Gives NIST authority to develop standards
- For non-classified federal systems
- NIST still gets advice from NSA
- NSA retains authority for classified systems
 
- Enacts said standards and guidelines
- Security plans must be established
- Mandatory preiodic training
 
- Gives NIST authority to develop standards
 
- Federal Sentencing Guidelines 1991 (FSG)
- Punishment guidelines for computer crime
- Provisions
- Requires due care from executives
- Due diligence reduces punishment
- Burdens of proof for negligence
- Accused must have legal obligation
- Accused failed to comply to standards
- Causal relationship between negligence and damages
 
 
 
- National Information Infrastructure Protection Act of 1996 (NIIPA)
- Extends CFAA 1994 to include infrastructure systems
- Coverage
- CFAA 1994
- National infrastructure computing systems
 
 
- Paperwork Reduction Act of 1995 (PRA)
- Request for information from public requires OMB approval
- OMB: Office of Management and Budget
- Includes
- Forms
- Interviews
- Record-keeping requirements
 
 
 
- Request for information from public requires OMB approval
- Government Information Security Reform Act of 2000 (GISRA)
- Amends PRA 1995
- Required government agencies to implement an infosec programs
- Created "mission-critical system" category
- A national security system
- Protected by classified information procedures
- Breach would result in debilitating impact of an agency
 
- Agency leaders responsible for informayion system security
 
- Federal Information Security Management Act 2002 (FISMA)
- Replaces GISRA
- Required government agencies to implement an infosec programs
- Include activities of contractors in security management programs
- NIST is responsible for FISMA guidelines
- Requirements
- Periodic risk assessment
- Policies and procedures based on risk assessment
- Security Awareness Trainings
- Testing of Policies and Procedures
- Remediation plans
- Incident response plan
- Continuity of operations plan
 
 
- Digital Millenium Copyright Act (DMCA)
- Prohibits attempts to circumvent copyright protection mechanisms
- Limits libability of ISPs for transitory activities
- Transmission initiated by person other than provider
- Transmission must be automated without selection of material by ISP
- ISP does not determine recepient
- Intermediate copies not accessible to anyone and not retained
- Material transmitted without modification to content
 
- Service providers must respond promptly to remove copyrighted materials
- Allows backup of backup copies of software
- Must be deleted when no longer needed
 
- Applies copyright law to content published on internet
 
- Economic Espionage Act of 1996
- Protects U.S. trade screts
- Stealing trade secrets to benefit foreign agent
- $500,000 fine
- 15 years in prison
 
- Stealing trade secrets in general
- $250,000 fine
- 10 years in prison
 
 
- Uniform Computer Information Transactions Act (UCITA)
- Regulates computer business transactions
- Addresses software licensing
- Backs validity of shrink-wrap and click-wrap licensing
- Allows users to reject agreements and get refunds
 
- Fourth Amendment
- Prevents unreasonable searches and seizures of houses
- Requires probable cause before search is conducted
 
- Privacy Act of 1974 (PA)
- Agencies must have consent of person before disclosing their info to others
- Agencies must only maintain necessary records
- Agencies must destroy records no longer needed
 
- Electronic Communication Privacy Act 1986 (ECPA)
- Protects electronic privacy of individuals
- Prohibits interception of electronic communications
- Prohibits unauthorized disclosure of communications
 
- Communications Assistance for Law Enforcement Act 1994 (CALEA)
- Requires all carriers to make wiretaps possible for law enforcement
- Requires a court order
 
- Economic Protection of Proprietary Information Act of 1996 (EPPIA)
- Extends definition of property to include proprietary economic information
- Theft no longer restricted by physical constraints
 
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- Governs health insurance and health maintenance organizations
- Privacy and security regulations for organizations storing patient information
- Defines the rights of individuals subject to medical records
 
- Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH)
- Updates HIPAA's privacy and security requirements
- Business associates of organizations under the scope of HIPAA must comply with it as well
- Requires business associate agreement
- Added data breach notification requirement
 
- SB 1386
- California law requiring disclosure of breach to affected individuals
- Breach includes disclosure of unencrypted copies of:
- SSN
- Driver's License Number
- State Identification Card Number
- Credit or Debit Card Number
- Bank Account Number + Security Code
- Medical Records
- Health Insurance Information
 
 
- Children's Online Privacy Protection Act of 1998 (COPPA)
- Applies to websites that caters to children
- Requires privacy notice
- States type of collected information
- Which information is disclosed to 3rd parties
 
- Parents must be able to review and delete children's information
- Parental consent required for info collection on children younger than 13
 
- Gramm-Leach-Bliley Act of 1999 (GLBA)
- Relaxed restrictions on information sharing between financial organizations
- Still provides limitations on what sort of information could be exchanged
- Institutions required to provide privacy notice to all customers
 
- USA PATRIOT Act of 2001
- Expanded power of law enforcement to monitor electronic communications
- Police can now obtain blanket wiretapping warrants
- ISPs can voluntarily provider government with detailed information
- Government can obtain detailed information on user activity with a subpoena
- Amends CFAA and adds more sever penalties
 
- Family Educational Rights and Privacy Act (FERPA)
- For educational institutions receiving funding from governemnt
- Parents and students given right to inspect educational records
- Parents and students given right to request correction of records
- Schools may not release personal information from student records without written consent
 
- Identity Theft and Assumption Deterrence Act of 1998
- Before: defrauded creditors were the only victims of identity theft
- Now: the person with stolen identity is also the victim
- Provides severe pentalties of 15 years and $250,000
 
- European Union Privacy Law of 1995
- Requires that personal data processing meet one of the following criteria
- Consent
- Contract
- Legal obligation
- Vital interest of the data subject
- Balance between interest of data holder and subject
 
- Outlines rights of data subjects
- Right to access data
- Right to know data source
- Right to correct innacurate data
- Right to not consent to data processing
- Right of legal action if rights are violated
 
- Organizations that want to operate in the EU must comply to these
- Department of Commerce certifies "safe harbor" businesses
- Requirements for "safe harbor"
- Notice
- Subjects must know which info is collected from them
 
- Choice
- Opt-out policy required for data shared with 3rd parties
- Opt-in policy required for sensitive information
 
- Onward Transfer
- Data can only be shared with other safe harbor organizations
 
- Access
- Data subjects must be able to access the data stored about them
 
- Security
- Data must be secure from loss, misuse, and disclosure
 
- Data Integrity
- Reliability of data must be maintained
 
- Enforcement
- Dispute process must be available to subjects
 
 
- Notice
 
- Requires that personal data processing meet one of the following criteria
- Sarbanes-Oxley Act Of 2002
- Protect investors from fraudulent accounting activities by corporations
 
 
- Comprehensive Crime Control Act 1984 (CCCA)
- Intellectual Property
- Copyright
- Original works of authorship
- For art and software
- Protects expression rather than idea
- Automatically granted to creator
- Can be work for hire as well
- Protected until 70 years after death of last author
- Protected until 95 years of publication for anonymous works
- Indicated by (c) symbol
 
- Trademark
- Brand name, logos, slogans, etc.
- Avoids confusion in marketplace
- Does not have to be registered
- Indicated by TM symbol if not registered
- Can also be registered
- Indicated by (R) symbol if registered
- Renewed for unlimited successive 10-year periods
- Requirements
- Must not be similar to another trademark
- Must not describe the product
 
 
- Patent
- For inventions, hardware, and manufacturing processes
- Not all software can be patented
- Protects expressions rather than idea
- Requirements
- Inventions must be new and original
- Must be useful and must actually work
- Must not be obvious (e.g. collection rainwater with a cup)
 
 
- Trade Secret
- Business-critical intellectual property
- Not disclosed to competitors or anyone
- Applying for copyright or patent would require disclosure
- Anyone who has access to it needs a Non-Disclosure Agreement
 
 
- Copyright
- Licensing
- Contractual License
- Written contract
- Signing = acceptance
- Active consent
 
- Shrink-wrap License
- Written on software packaging
- Braking package = acceptance
- No active consent
 
- Click-through License
- Written on software box or documentation
- Clicking "I Agree" = acceptance
- Actice consent
 
- Cloud Service License
- Agreement flashed on the screen
- Clicking "I Agree" = acceptance
- Active consent
 
 
- Contractual License
- Import/Export
- Computer Export Controls
- No high-performance computing exports to countries:
- Posing a threat to nuclear proliferation
- Sponsoring terrorism
- Includes
- India
- Pakistan
- Afghanistan
- Cuba
- North Korea
- Sudan
- Syria
 
 
 
- No high-performance computing exports to countries:
- Encryption Export Controls
- Export used to be banned
- Export now possible
- Requires Commerce Department review
 
 
- Computer Export Controls
- Privacy
- Right to privacy not in constitution
- Still upheld by numerous courts
- U.S. Privacy Laws
- Fourth Amendment
- Privacy Act of 1974
- Electrionic Communication Privacy Act 1986
- Communications Assistance for Law Enforcement Act 1994
- Economic Protection of Proprietary Information Act of 1996
- Health Insurance Portability and Accountability Act 1996
- Health Information Technology for Economic and Clinical Health Act of 2009
- Children's Online Privacy Protection Act of 1998
- Gramm-Leach-Bliley Act of 1999
- USA PATRIOT Act of 2201
- Family Educational Rights and Privacy Act
- Identity Theft and Assumption Deterrence Act of 1998
 
- Privacy in Workplace
- There is no reasonable expectation of privacy when using employer equipment
- Make sure there is no implied expectation of privacy in the office:
- State it in the employment contracts
- State it in corporate acceptable use and privacy policies
- State it in logon banners
- State it on warning labels in telephones and computers
 
 
 
- Data Breach Notification
- Health Information Technology for Economic and Clinical Health Act of 2009
- SB 1386
 
- Compliance
- Payment Card Industry Data Security Standard (PCI DSS)
- For entities that accept, store, and process credit cards
- Requirements
- Install firewall
- Do not use default passwords
- Protect cardholder data
- Encrypt transmission of cardholder data
- Protect systems against malware by updating antivirus programs
- Develop secure systems and applications
- Restrict access to cardholder data by business need-to-know
- Authenticate access to system
- Restrict physical access to cardholder data
- Track and monitor all access to network resources and cardholder data
- Regularly test security systems and processes
- Maintain a policy that addresses information security for all personell
 
- Might also require external auditors to report to regulators
 
 
- Payment Card Industry Data Security Standard (PCI DSS)
- Contracting and Procurement
- Make sure to review vendor security policies
- Questions to ask
- Information stored, processed, and transmitted?
- Information protection controls?
- How information is segregated from other clients?
- Encryption algorithms and key management?
- Types of security audits performed?
- Third parties used by the vendor?
- Location of data storage, processing, and transmission?
- Incident response process?
- How is integrity ensured?
 
 
- Sensitive Data
- Personally Identifiable Information
- Can be used to distinguish an individual's identity
- Information linkable to an individual
 
- Personal Health Information
- Processed by health organizations, schools, employer
- Relates to past, present, or future health condition of individual
- Relates to past, present, or future payment for healthcare
 
- Proprietary Data
- Helps maintain competitive edge of organization
 
 
- Personally Identifiable Information
- Sensitive Data Management
- Marking
- Applying classification labels
- Digital Labels
- Headers and Footers
- Watermarks
- Metadata
- Background Colors
 
- Physical Labels
- Hardware Color
- Text Label
 
 
- Digital Labels
- Label unclassified assets as well
- Prevents omission
 
- Identify downgrade procedures
- Purging, etc.
- Usually prohibited
- Destruction and repurchasing is safer
 
 
- Applying classification labels
- Handling
- Secure use and transport of data based on classification
- Backup should be as protected as production data
- Log, monitor, and audit to ensure compliance and accountability
 
- Storage
- Apply appropriate controls based on classification
- Encryption
- AES256
 
- Physical Security
- Safes
- Secure Rooms
- Cabinets
- HVAC
 
 
- Encryption
- Data is more valuable than the media
- Buy high quality media
- Buy media with built-in security
 
 
- Apply appropriate controls based on classification
- Destruction
- Data disposal requirements based on classification
- Prevents unauthorized disclosure
- Data Remanance
- Magnetic Media
- Residual magnetic footprint of data on hard drive
- Can be recovered even if data was overwritten
- Use a degausser to remove it
 
- Solid State Drives
- No reliable way to destroy data
- Has built-in erase commands, but innefective
- Physical destruction is best solution
 
 
- Magnetic Media
- Terms
- Erasing
- Normal delete operation
- Frees file space but doesn't remove data
- Data might be overwritten eventually
 
- Clearing
- Overwriting, essentially
- Write a single character, its complement, and then random data
 
- Bad and spare sectors are not overwritten
- Might still be recoverable
 
- Overwriting, essentially
- Purging
- Prepares media for less secure environments
- Involves both clearing and degaussing
 
- Declassification
- Involves purging and changing media classification
- Not recommended; destruction is better
- Organization risks an undiscovered recovery technique
 
- Sanitation
- Umbrella term referring to removal of sensitive data from media
- Can involve purging, or destruction, etc.
 
- Degaussing
- Using strong magnets to erase data on media
- Destroys media electronics sometimes
- Does not affect CDs, DVDs, or SSDs
 
- Destruction
- Physical destruction, basically
- Crushing, shredding, incineration, chemicals, etc,
- Most secure data destruction method
 
 
- Erasing
 
- Retention
- Data retention requirements based on classification
- Can reduce liabilities
- Record Retention
- Retaining important information as needed
- Timeframe identified by regulation or organization policy
 
- Media/Hardware Retention
- Retaining hardware until it has to be replaced
 
- Personnel Retention
- Retaining personnel knowledge
- Ensuring personnel don't violate NDA
 
 
 
- Marking
- Data Classifications
- Allows appropriate controls to be implemented for assets
- Government
- Focuses on value to national security
- Classified
- Top Secret (Class 3)
- Disclosure = exceptionally grave damage
 
- Secret (Class 2)
- Disclosure = serious damage
 
- Confidential (Class 1)
- Disclosure = damage
 
 
- Top Secret (Class 3)
- Unclassified
- Sensitive
- Unclassified (Class 0)
- Disclosure = no damage
- Available via FOI request
 
 
 
- Private
- Focuses on value to organization
- Proprietary (Class 3)
- Disclosure = exceptionally grave damage
- Keeps the organization competitive
- Business depends on secrecy of this data
- E.g. unreleased Sony movies, trade secrets, etc.
 
- Private (Class 2)
- Disclosure = serious damage
- Personal information of staff, customers, and contractors
- E.g. salary information
 
- Sensitive (Class 1)
- Disclosure = damage
- Sensitive information that is not proprietary or private
- E.g. company records, emails, etc.
 
- Public (Class 0)
- Disclosure = no damage
- Meant for public consumption
- Only integrity and availability is protected
- E.g. brochures, websites, etc.
 
 
 
- Data States
- Data at Rest
- Stored on media
- E.g. data stored in hard drive
- Controls
- Symmetic Encryption
- AES
- Triple DES
- Blowfish (basis for bcrypt)
 
 
- Symmetic Encryption
 
- Data in Motion
- Moving across a network
- E.g. data moving across wired or wireless connection
- Controls
- Transport Encryption
- HTTPS
- Encrypts HTTP Data
 
- TLS/SSL
- SSL - Vulnerable to POODLE (do not use)
- Encrypts data between sockets
 
- IPSec
- Encrypts data between two networks
- Allows VPN solutions
- Modes
- Authentication Header
- Provides Integrity
 
- Encapsulating Security Payload
- Provides Confidentiality
 
 
- Authentication Header
 
- SSH/SCP/SFTP
- Encypted terminal sessions with file transfers
 
 
- HTTPS
 
- Transport Encryption
 
- Data In Use
- Data in temporary storage buffer while being used
- E.g. data in RAM, registers, etc.
- Controls
- Purging after use
 
 
 
- Data at Rest
- Data Roles
- Data Owner
- Ultimately responsible for the data
- Liable for negligence
- Identifies data classification
- Roles
- Determine acceptable use policy
- Determine security controls policy
- Determine access and privilege policy
 
- e.g. President, CEO, etc.
 
- System Owner
- Owns the system that processes data
- Roles
- Craft system security plan w/ data owner
- Manage system security plan
- Train users and personnel on acceptable use policy
- Implement system security plan
 
- e.g. IT department
 
- Business/Mission Owner
- Owns a business process that leverages systems
- Leverages on systems to provide value to organization
- Goals may sometimes conflict with system owners
- e.g. Sales department
 
- Data Processor
- Processes data for a data controller (business/mission owner?)
- Must not use data for anything else aside from intended purpose
- e.g. 3rd party payroll processor
 
- Administrator
- Grants access to personnel
- Follows principle of least privilege
- Uses role-based access control model
- Adds and removes users from roles
 
- Data Custodian
- Implements data security controls
- Implements safe backup and storage of data based on policy
- e.g. IT department
 
- User
- Accesses data to accomplish work tasks
- e.g. employees, end users
 
 
- Data Owner
- Protecting Privacy
- Security Baselines
- List of security controls
- Image of a secure system
 
- Scoping and Tailoring
- Revising a standard/baseline to meet your requirements
- e.g. removing WAF when you have no web application
- e.g. not complying with safe harbor if you don't do business in EU
 
- Selecting Standards
- Determine which regulations apply to your service
- e.g. PCI DSS, HIPAA, Safe Harbor
 
 
- Security Baselines
- History
- Caesar Cipher
- Used by Julius Caesar
- ROT 3
- Defeated by frequency analysis
 
- Engigma
- Used by Germans
- Defeated by project Ultra
 
- Purple Machine
- Used by Japanese
 
 
- Caesar Cipher
- Goals
- Confidentiality
- Date at Rest
- Data in Motion
 
- Integrity
- Authentication
- Non-repudiation
 
- Confidentiality
- Concepts
- Kerchoff Principle
- Cryptosystem must be secure even if mechanism disclosed
- Key is the only thing that needs to be a secret
- Security by design instead of obscurity
 
- Cryptography
- Methods to keep information secret
 
- Cryptanalysis
- Art of defeating cryptography
 
- Cryptology
- Cryptography + Cryptanalysis
 
- Codes
- Representation of words or messages
- e.g. 10-4 = "Acknowledged"
- Not always meant to provide confidentiality
 
- Ciphers
- Hides true meaning of messages
- Always meant to provide confidentiality
 
- Confusion
- Disassociation of relationship between plain text and key
 
- Diffusion
- Slight change in plain text changes the whole cipher text
 
- Frequency Analysis
- Examination of recurring data
- E.g. some letters of the alphabet occur more than the others
 
- Period Analysis
- Frequency examiniation based on repeated use of key
 
- Block Ciphers
- Encryption occurs per chunk
 
- Stream Ciphers
- Encryption occurs per bit or byte
 
 
- Kerchoff Principle
- Mathematics
- Boolean Mathematics
- AND
- OR
- NOT
- XOR
 
- One-way Functions
- Producing output is easy
- Deriving input is hard
- E.g. factoring very large numbers
 
- Nonce
- Initialization Vector
- Adds randomness to encryption process
 
- Zero Knowledge Proof
- Proving knowledge of fact without revealing fact itself
- E.g. providing password hash instead of password
- E.g. answering to an authentication challenge
 
- Split Knowledge
- Key Escrow
- Parts of key sent to different escrow providers
 
- M of N Control
- M of N individuals must be present to perform high security task
 
 
- Key Escrow
- Work Function
- Amount of work to brute force an encryption system
- Key length is primary factor to determining work function
 
 
- Boolean Mathematics
- Ciphers
- Transposition Ciphers
- Rearrangement of data/characters
- Example: Columnar Transposition
- Message is split into len(key)blocks/rows
- Each letter of the key is associated with a column
- Columns are arranged based on the value of the key letter associated with them
- Columns are converted into strings and concatenated
 
- Message is split into 
 
- Substitution Ciphers
- Replacement of data/characters (ROT3)
- Example: Vignere Cipher
- Have a matrix of the alphabet where the letters of each row is increment by 1
- Have columns and rows in total
- Ci = Matrix[Ki][Pi]
 
 
- One-Time Pads
- Key as large as message itself
- Each message letter is padded by each key letter
- Unbreakable encryption scheme
- Requirements
- Key must be random
- Protection of key from disclosure
- Keys must only be used once
- Key must be as long as message
 
 
- Running Key Ciphers
- AKA book cipher
- One-time pad, except you get the key from a book
- E.g. using a specific chapter and paragraph of Moby Dick
 
 
- Transposition Ciphers
- Symmetric Key Algorithms
- Single shared key is used to encrypt and decrypt
- AKA private key cryptography
- Provides
- Confidentiality
 
- Advantages
- Very fast
- 1000 times faster than asymmetric cryptography
 
 
- Very fast
- Disadvantages
- Key distribution is hard
- A secure channel must be established first before key is communicated
 
- No non-repudiation mechanism
- No way to prove an encrypted message came from someone since many people know the key
 
- Not scalable
- Each two-party communication in a large group requires a unique key
 
- Frequent key regeneration
- When someone leaves the group, key needs to be regenerated
 
 
- Key distribution is hard
 
- Asymmetric Key Algorithms
- Private and public key decrypt message encrypted with the other
- AKA public key algorithms
- Private key must be kept private by a user
- Public key must be known by everyone
- Provides
- Confidentiality
- Integrity
- Authentication
- Non-repudiation
 
- Advantages
- Key distribution is simple
- No secure channel required to start communication
 
- Supports Non-repudiation mechanism
- Since only the person knows their private key
- Allows digital signatures to be generated
- Hash of a message encrypted with a private key
- Verification involves decryption using public key and cross-checking hashes
 
 
- Scalable
- No new key needs to be generated for each pair of communicating parties
- New users only require generation one key pair
 
- Infrequent key regeneration
- Required only if private key is compromised
- Key can easily be invalidated when user leaves system
 
 
- Key distribution is simple
- Disadvantages
- Very slow
- 1000 times slower than symmetric cryptography
 
 
- Very slow
 
- Hashing
- Production of message digest
- One-way function
- Summary of message's content
 
- Key Management
- Creation and Distribution
- Offline Distribution
- Sheet of paper or storage media is physically transported
- Interception might occur via mail
- Telephones can be wiretapped
- Papers might get thrown in the trash
 
- Public Key Cryptography
- Requires public key infrastructre
 
- Diffie-Hellman
- No public key infrastructure is required
- Steps
- Parties agree on two large prime numbers
- p and g
- 1 < g < p
 
- Each party chooses a random integer and performs
- gi mod p
 
- Results are sent to each other
- Each party multiplies their origin random integer with received number
- They end up with same value
 
- Parties agree on two large prime numbers
 
 
- Offline Distribution
- Storage and Destruction of Symmetric Keys
- Don't store key and data in same system
- Provide two different individuals half the key (split knwoledge)
- Key must be regenerated when someone who knows the key leaves the organization
 
- Key Escrow and Recovery
- Allows government to get copy of key upon court order
- Fair Cryptosystems
- Key is divided and sent to multiple third parties
- Court provides evidence of court order to third parties in order to retrieve key
 
- Escrowed Encryption Standard
- Provides government with technological means to decrypt ciphertext
- Uses skipjack algorithm
 
 
 
- Creation and Distribution
- Cryptographic Life Cycle
- Computers get faster all the time
- Encryption algorithms will eventually get obsoleted
- Appropriate algorithm must be used depending on how long data needs to be retained
- Algorithm Governance Controls
- Specifying acceptable cryptographic algorithms
- Identifying acceptable key lengths
- Enumerating transport potocols that may be used
 
 
- Algorithms
- Data Encryption Standard (DES)
- Old standard required for government communications
- Insecure and deprecated; replaced by AES
- Key size: 56 bits (technically 64, but 8 bits is used for parity)
- Modes
- ECB (Electronic Code Book)
- Each block is encrypted separately
- Generates the same ciphertext for the same plaintext
- Vulnerable to cryptanalysis
 
- CBC (Cipher Block Chaining)
- Plaintext block is XORed with previous ciphertext
- Difference from CFB: Splits messages into block before encrypting
- Requires an Initialization Vector
- Destroys patterns
- Allows errors to propagate
 
- CFB (Cipher Feedback Mode)
- Streaming version of CBC
- Difference from CBC: Encrypts once a buffer is filled
- Requires an Initialization Vector
- Destroys patterns
- Allows errors to propagate
 
- OFB (Output Feedback Mode)
- Plaintext is XORed with DES-encrypted seed value
- Seed value is re-encrypted for every block
- Requires an Intialization Vector
- Destroys patterns
- Errors do not propagate
 
- CTR (Counter Mode)
- Like OFB but incrementing counter is used rather than DES of previous seed value
- Requires an Initialization Vector
- Destroys patterns
- Errors do not propagate
 
 
- ECB (Electronic Code Book)
 
- Triple DES (3DES)
- Three passes of DES algorithm
- Produces a more secure encryption
- Uses 3 or 2 keys depending on the mode
- Variants
- EEE3 (three keys)
- E(K1,E(K2,E(K3,P)))
- Total key length: 168
 
- EDE3
- E(K1,D(K2,E(K3,P)))
- Total key length: 168
 
- EEE2
- E(K1,E(K2,E(K1,P)))
- Total key length: 112
 
- EDE2
- E(K1,D(K2,E(K1,P)))
- Total key length: 112
 
 
- EEE3 (three keys)
 
- International Data Encryption Algorithm (IDEA)
- Patended by Swiss developers
- Used in PGP
- Block size: 64
- Key size: 128 (divided into 52 16-bit keys)
- Has same modes as DES
 
- Blowfish
- Basis of bcrypt
- Used in SSH
- No license required
- Faster than DES an IDEA
- Block size: 64
- Key size: 32-448
 
- Skipjack
- Escrowed Encryption Standard (EES)
- Supports escrow of encryption keys
- Not adopted by the public
- Block size: 64
- Key size: 80
 
- Rivest Cipher 5 (RC5)
- By Rivest, Shamir, and Adleman
- Block size: 32, 64, 128
- Key Sizes: 0-2048
 
- Two-Fish
- AES finalist
- Includes pre-whitening and post-whitening
- Prewhitening
- Before first round of encryption
- XORing plaintext with separate subkey
 
- Postwhitening
- After 16th round of encryption
- XORing plaintext with separate subkey
 
- Block size: 128
- Key size: 256
 
- Rijndael
- Block sizes: 128, 192, 256
- Key sizes: 128, 192, 256
- Chosen as AES
 
- Advanced Encryption Standard (AES)
- Meant to replace DES
- Rijndael with 128 block size
- Key sizes: 128, 192, 256
 
 
- Data Encryption Standard (DES)
- Private and Public Keys
- Decrypts each other
- Private Key
- Kept private
- Used to generate digital signatures
- Used to decrypt confidential messages
 
- Public Key
- Published
- Used to verify digital signatures
- Used to encrypt confidentail messages
 
 
- Algorithms
- Rivest Shamir Adlement (RSA)
- Key Length: 1024
- n = p * q
- select random e where e < n and e and (p-1)(q-1) is relatively prime
- Find d such that (ed-1)mod(p-1)(q-1) = 1
- e and n are public keys
- d is private key
- Encryption: C = Pe mod n
- Decryption: P = Cd mod n
 
- Merkle-Hellman Knapsack
- Like RSA but relies on super-increasing sets
- Provden ineffective in 1984
 
- El Gamal
- Based on Diffie-Hellman
- Not patented
- Doubles length of data it encrypts
 
- Elliptic Curve
- Key Length: 160
- Uses elliptic curve mathematics
- Elliptic curve definition:
- y2 = x3 + ax + b
 
- Elliptic Curve Group
- Points that lie on the elliptic curve
- O = located at infinity
- Two points can be added: P + Q
- Can be multipled: Q = xP (Q is multiple of P)
- It's extremely difficult to find X
 
- 160-bit key is just as strong as 1024 RSA ket
 
 
- Rivest Shamir Adlement (RSA)
- Key Management
- Use publicly-vetted encryption system
- Select appropriate length keys
- Ensure that private key is secret
- Retire keys after they're no longer useful
- Keep backups of your key
 
- Facts
- Converts messages into fixed length outputs
- Generated value is called a Message Digest
- Used to ensure message integrity
- Used as a component of Digital Signatures
 
- Requirements (According to RSA)
- Input can be any length
- Output has fixed length
- Easy to compute for any input
- Is one-way
- Collision-free
 
- Algorithms
- SHA
- Facts
- Stands for Secure Hash Algorithm
- Developed by NIST
- Part of Secure Hash Standard
 
- Algorithms
- SHA-1
- Block Size: 512
- Output Size: 160
 
- SHA-2
- SHA-256
- Block Size: 512
- Output Size: 256
 
- SHA-192
- Block Size: 512
- Output Size: 192
- Truncated SHA-256
 
- SHA-512
- Block Size: 1024
- Output Size: 512
 
- SHA-384
- Block Size: 1024
- Output Size: 384
- Truncated SHA-512
 
 
- SHA-256
- SHA-3
- Keccak Algorithm
- Not yet published
 
 
- SHA-1
 
- Facts
- MD Series
- Facts
- Developed by Ronald Rivest
 
- Algorithms
- MD2
- Block Size: 16
- Output Size: 128
- Facts
- Proved to be reversible
 
 
- MD4
- Block Size: 512
- Output Size: 128
- Facts
- Uses 3 rounds
- Block data must be 64 bits less than 512
 
 
- MD5
- Block Size: 512
- Output Size: 128
- Facts
- Uses 4 rounds
- Block data must be 64 bits less than 512
- Subject to collisions
 
- HAVAL
- Hash of variable length
- MD5 variant
 
 
 
- MD2
 
- Facts
 
- SHA
- Facts
- Ensures non-repudiation
- Message digest encrypted with a private key
- Verified using the public key
- Does not provide ny privacy
 
- Achieves
- Non-repudiation
- Authentication
- Integrity
 
- Generation
- Message is hashed
- Hash is encrypted with sender private key
- Encrypted hash is attached to the message
- Message with signature is sent
 
- Verification
- Signature is decrypted with sender public key
- Message is hashed
- Decrypted hash is compared to hash of message
- If same, signature is valid
 
- Hashed Message Authentication Code (HMAC)
- Facts
- Just like Digital Signatures, but uses a symmetric algorithm
- Provides no non-repudiation
- Operates more efficiently
 
 
- Facts
- Digital Signature Standard
- Acceptable Digital Signature Algorithms
- Digitial Signature Algorithm (DSA)
- Rivest, Shamir, Adleman (RSA)
- Elliptic Curve DSA (ECDSA)
 
- Acceptable Hashing Algorithms
- SHA-2
 
 
- Acceptable Digital Signature Algorithms
- Allows communications between previously unknown parties
- Components
- Certificates
- Endorsed copies of public key
- E.g. Public key digitally signed by Certificate Authority
- Information Contained (X.509 Certificate)
- X.509 Version
- Serial Number
- Signature Algorithm Identifier
- Issuer Name
- Validty Period
- Subject's Name
- Subject's Public Key
 
- Used to establish SSL connections
 
- Certificate Authorities
- Notarizes digital certificates
- People trust them and they trust various organizations
- You prove your identity to CA and they vouch for you
- Examples
- Symantec
- Thawte
- GeoTrust
- GoDaddy
- Comodo Limited
- DigiCert
- etc.
 
- Default trusted CAs are built-into the browser
 
- Registration Authorities
- Assist CA with verifying user idnetities
 
 
- Certificates
- Certificate Path Validation
- Verification of the chain of trust from the root down to the client
 
- Certificate Generation and Destruction
- Enrollment
- Registration to a Certificate Authority
- Steps
- Providing documents / physically appearing, etc.
- User provides CA with public key
- CA creates X.509 digital certificate
- CA digital signs the certificate
- CA provides user signed copy of certificate
 
 
- Verification
- Steps
- Verify digital signature of certificate
- Verify that the CA is trusted
- Check if the certificate is not in a CRL
- Check if certificate contains data that us trusted (e.g. email/domain)
 
 
- Steps
- Revocation
- Reasons
- Compromise of private key
- Incorrectly issued certificate
- Certificate details chnaged
- Security association changed (e.g. subject no longer employed)
 
- Verification
- Certificate Revocation List (CRL)
- List of revoked certificate serial numbers
- Has to be downloaded and cross-checked
- May have some latency issues
 
- Online Certificate Status Protocol (OCSP)
- Allows lookup of certificate status without downloading CRL
- Allows real-time verification
- Return status
- Valid
- Invalid
- Unknown
 
 
 
- Certificate Revocation List (CRL)
 
- Reasons
 
- Enrollment
- Portable Devices
- Disk/Volume Encryption
- Trusted Platform Modules
 
- Email
- Pretty Good Privacy
- By Phil Zimmerman
- Uses web of trust
- Decide which users to trust
- Transitive trust takes effect
 
- Commercial Version
- Key Exchange: RSA
- Encryption: IDEA
- Message Digest: MD5
 
- Freeware Version
- Key Exchange: Diffie-Hellman
- Encryption: CAST
- Message Digest: SHA-1
 
 
- S/MIME
- De facto standard for encrypted email
- Key Exchange: X.509 Certificates
- Public Key Protocol: RSA
- Symmetric Encryption: AES and 3DES
- Supported by desktop mail clients
- Not supported by web clients
 
 
- Pretty Good Privacy
- Web Applications
- SSL/TLS/HTTPS
- Originally by Netscape, adopted by Microsoft
- Steps
- Browser retrieves website certificate
- Browser extracts public key from certificate
- Browser generates random symmetric key
- Public key is used to encrypt random symmetric key
- Encrypted key is sent to webserver
- Server decrypts symmetric key using its private key
- All future messages are encrypted using the symmetric key
 
- POODLE Attack
- Makes TLS fallback to SSL 3.0
- Organizations now just drop suppport for SSL
 
 
 
- SSL/TLS/HTTPS
- Steganography and Watermarking
- Embedding secret messages within other files
- May be used to add digital watermarks to assets
- Can be used to protect intellectual property
- Watermark can be traced back to original copy
 
- Digital Rights Management
- Music
- Movie
- Content Scrambling System
- Enforces playback and region restrictions on DVDs
- Broken with release of DeCSS tool
 
- Advanced Access Content System (AACS)
- Protects content stored on Blu-Ray and HD DVD
- AACS encryption keys have been retrieved and posted online
 
 
- Content Scrambling System
- E-Book
- Most successful type of DRM
- Adobe Digital Experience Protecttion
- DRM for e-books
- Encrypted with AES
- RSA to protect AES key
- Used by a variety of e-readers
 
 
- Adobe Digital Experience Protecttion
 
- Most successful type of DRM
- Video Game
- Make video games dependent on internet to verify the game license
 
- Document
- Prevents actions from being performed on a document
- Examples
- Reading a fle
- Modifying a file
- Removing watermarks
- Downloading/saving
- Printing
- Taking screenshots
 
 
 
- Networking
- Circuit Encryption
- Link Encryption
- Encrypts communication between two network locations
- Entire packets are encrypted
- Slower but less succeptible to sniffing
- Done beneath transport layer
- E.g. two office networks
 
- End-to-end Encryption
- Encrypts communication between two hosts
- Only data is encrypted
- Faster but more succeptible to sniffing
- Done in transport layer or above
- E.g client and webserver
 
 
- Link Encryption
- IPSec
- IETF standard for setting up secure comms channel
- Parties can be two gateways, two systems, etc.
- Uses publci key cryptography
- Modes
- Transport Mode
- Between two gateways
- Uses L2TP (layer 2 tunneling protocol)
 
- Tunnel Mode
- Between two hosts (peer-to-peer)
 
 
- Transport Mode
- Components
- Authentication Header
- Uses public keys(?)
- Authentication
- Access Control
- Integrity
- Non-repudiation
- Prevents replay attacks
 
- Encapsulating Security Payload
- Uses symmetric keys(?)
- Encryption
- Some authentication
- Prevents replay attacks
- Sometimes used without AH
 
 
- Authentication Header
- Security Association
- Represents communication session
- Records configuration ststus about connection
- Represents a one-way connection
- Additional SA must be setup per direction and IPSec component
 
- Internet Security Association Key Management Protocol (ISAKMP)
- Establishes, modifies, and deletes Security Associations
- Requirements for ISAKMP
- Authenticate communicating peers
- Create and management security associations
- Provide key generation mechanisms
- Protect against threats (DOS, replay attacks, etc.)
 
 
 
- Wireless Networking
- Wired Equivalent Privacy
- Not secure - do not use
- 64 and 128-bit encryption
 
- WiFi Protected Access
- WPA
- Adds TKIP to the mix
- Temporal Key Integrity Protocol
- Secure IV generation
 
- WPA2
- Uses CCMP instead of TKIP
- Uses AES instead of RC4
 
 
- WPA
- 802.1X
- For network authentication
- Clients that connect to a network are authenticated
- Client runs a supplicant application
- Supplicant communicates with Authentication Server
 
 
- Wired Equivalent Privacy
 
- Circuit Encryption
- Analytic Attack
- Reduces complexity of the algorithm
 
- Implementation Attack
- Attacks specific implementations
 
- Statistical Attack
- Exploits statistical weaknesses
- Inability to produce random numbers
- Floating-point errors
 
 
- Exploits statistical weaknesses
- Brute Force
- Trying every possible key
- Time to break depends on length of key
- Approaches
- Rainbow table
- Table of hashes and corresponding values
- Makes brute force attacks faster
- Prevented by salting passwords
- Adding a random nonce before hashing a password
- Salt is stored alongside password hash
- Salt is added to any new string that needs to be compared w/ password
- This increases the difficulty of brute force attacks
 
 
- Specialized computing hardware
 
- Rainbow table
 
- Ciphertext Only / Frequency Analysis
- Only ciphertext is available to cryptanalyst
- One can perform a frequency analysis attack
- E T O A I are the most frequent letters of the alphabet
- If these letters are also the most common, expect a transposition cipher
- If other letters are more common, expect a substitution cipher
 
 
- E T O A I are the most frequent letters of the alphabet
 
- Known Plaintext
- Attacker knows plaintext and corresponding ciphertext
 
- Chosen Plaintext Attack
- Attack can encrypt any plaintext of his choosing
 
- Chosen Ciphertext
- Attacker has ability to decrypt certain portions of ciphertext
 
- Meet in the Middle
- Defeats algorithms that use two rounds of encryption
- This is what broke 2DES
- Process
- Have specific plaintext
- Encrypt it with every possible key
- Each ciphertext is decrypted with all possible keys
- When match is found, the pair of keys represent both portions of double encryption
 
- Key strength is only 2^n rather than 2^n * 2^n
- Only adds minimal amount of protection
 
- Man in the Middle
- Interception of communications
- Key is intercepted and replaced
- A different secure session is started by MitM between the 2 hosts
- 2 hosts don't know they're not communicating with each other
 
- Birthday Attack
- AKA collision attack / reverse hash matching
- Attacker replaces signed communication with another message w/c has the same hash
 
- Replay Attack
- Used against algorithms w/c do not use temporal protections
- E.g. algorithms without initialization vectors, etc.
- Captured messages can simply be resent in order to trigger some action
 
- Objects and Subjects
- Subject
- User/process trying to access a resource
 
- Object
- A resource a user/process wants to access
 
 
- Subject
- Closed and Open Systems
- Open System
- System built on agreed-upon industry standards
- Easy to integrate with other systems
- More likely to be targetted
 
- Closed System
- Works with narrow range of other systems
- Usually proprietary
- Less likely to be targetted
 
 
- Open System
- Open Source and Closed Source
- Open Source
- Source code is exposed to the public
- Depends on pubic scrutiny to evaluate and secure
 
- Closed Source
- Source code is hidden from the public
- Depends on vendor to evaluate and secure
- Also called "commercial"
- Can still be an open system
 
 
- Open Source
- Ensuring CIA
- Confinement
- Restricting program to a specific memory and resource space
- Also called "sandboxing"
- Implemented by the operating system
 
- Bounds
- The range of memory and resources that a program can operate in
- Enforced by the operating system
- Physical Bounding
- Processes can be required to run on a range that is physcially separated from other processes
 
- Logical Bounding
- Process can be allowed to run on a range that is in the same physical range of other processes
 
 
- Isolation
- The state of being confined
- Program is prevented from accessing memory of another processes
- OS provides resource sharing capabilities instead
 
 
- Confinement
- Controls
- Control
- Limits subject access to an object
 
- Mandatory Access Control
- Subjects and objects have static labels
- Labels determine access right
 
- Rules Based Access Control
- Uses rules to determine access right
- Rules grant access rights to objects
 
- Discretionary Access Control
- Subjects define access rules to objects
- If they have the authority to, that is
 
 
- Control
- Trust and Assurance
- Trusted System
- One which protects data for many types of users
 
- Assurance
- Degree of confidence in satisfaction of security needs
- Needs to be maintained
- Changes decrease assurance, hences, reevaluation is needed
 
 
- Trusted System
- Concepts
- Security Model
- Maps abstract statements into a security policy
- Used to measure system support of security policy
 
- Tokens, Capabilities, and Labels
- Tokens
- Separate object associated with a resource
- Describes resource's security attributes
 
- Capabilities
- A list of capabilities for each object
- Not very flexible but faster
 
- Labels
- Attached to a resource and is a part of it
- Cannot be altered
 
 
- Tokens
 
- Security Model
- Models
- Trusted Computing Base
- Set of computing components which enforces security policy
- Foundation of most security models
- Restrict activities of components outside the TCB
- Concepts
- Security Perimeter
- Bounds between TCB and rest of system
- Prevents insecure communications between TCB and rest of system
- Trusted Path
- Used by TCB to communicate with rest of system
- Adheres to strict standards to prevent compromise of TCB
 
 
- Reference Monitor
- Validates access to every resource
- Grants access to resources
- Stands between subject and object
- Just a theory, not an actual thing
 
- Security Kernel
- TCB components that implement the reference monitor
- Launches components that enforce reference monitor
- Uses trusted paths to communicate with subjects
- Mediates all resource access
 
 
- Security Perimeter
 
- State Machine Model
- Describes a system that is always secure
- All valid states are secure
- All valid state transitions are secure
- Also called Secure State Machine
- Basis for other security models
- Based on Finite State Machine
 
- Information Flow Model
- Only valid information flows may be allowed
- Prevents insecure information flows
- Addresses covert channels
- Focuses on flow of information
- Composition Theories
- Describes information flow between systems
- Theories
- Cascading
- Input of one system comes from output of another
- Example: Web server with database backend
- A -> B -> C : Chaining
 
- Feedback
- System receives input and responds with output
- Example: HTTP Request and Response
- A -> B : Request
- A <- B : Response
 
- Hookup
- System sends input to one system and sends copy to another
- Example: CC and BCC in email
- A -> B : To Destination
- A -> C : To Hookup
 
 
- Cascading
 
- Based on State Machine Model
 
- Noninterference Model
- High privileged actions should not affect lower priviliged subjects
- Unauthorized parties should not be affected by information flows
- Prevents inference attacks and covert channels
- Based on the Information Flow Model
 
- Take-Grant Model
- Describes how rights can be passed/taken from subject to subject/objects
- Allows you to track where rights can change
- Allows you to track where leakage can occur
- Rules
- Take Rule
- Allows subjects to take rights over an object
 
- Grant Rule
- Allows a subject to grant rights over an object
 
- Create Rule
- Allows a subject to create new rights
 
- Remove Rule
- Allows a subject to remove rights it has
 
 
- Take Rule
 
- Access Control Matrix
- A matrix of subjects an objects
- Indicates the rights each subject has over each object
- Parts
- Row
- Subjects
- Capabilities List
- Each row shows capability of each subject
- List of rights a subject has for every object
 
 
- Columns
- Objects
- Access Control Lists
- Each column shows subjects that have rights to object
- List of subject that has rights to an object
 
 
- Cells
- Access Rights
- Access rights of a subject to an object
 
 
- Access Rights
 
- Row
 
- Lattice-Based Access Control
- Subject are assigned position in a lattice
- Positions fall between security labels
- Subjects only access objects that are within "range"
- Example
- A subject between Private and Sensitive
- Can only access an object within those two labels
 
 
- Bell-LaPadula Model
- Prevents information flow to lower sensitivity levels
- Protects Confidentiality
- Does not address integrity or availability
- Used by military organizations
- Properties
- Simple Security Property
- No Read Up
- Subjects can't read objects with higher sensitivity labels
 
- (*) Security Property
- No Write Down
- Subjects can't write to objects with lower sensitivity labels
- Unless performing declassification, which is a valid operation
 
- Discretionary Security Property
- An access matrix is used to enforce discretionary access control
 
 
- Simple Security Property
- Trusted Subject
- Exception to * Security Property
- Can declassify objects
 
- Based on State Machine and Information Flow Model
 
- Biba Model
- Prevents information flow to higher integrity levels
- Protects Integrity
- Prevent unauthorized modification of objects
- Protects object consistency
- Does not address confidentiality or availability
- Used by commercial organizations
- Properties
- Simple Integrity Property
- No Read Down
- Subjects can't read objects at lower integrity levels
 
- (*) Integrity Property
- No Write Up
- Subjects can't write objects at higher integrity levels
 
 
- Simple Integrity Property
- Based on Bell-LaPadula Model
- Based on State Machine and Information Flow Model
 
- Clark-Wilson Model
- Access to subject must be mediated through a program
- Program enforces well-formed transactions
- Protects
- Confidentiality
- Integrity
 
- Constrained Interface
- Enforces well-formed transactions
- Enforces separation of duties
- Authorizes transactions
 
- Access Control Triple
- Subject
- Object
- Program/Transaction/Interface
 
- Constrained Data Item
- Data items protected by the model
- Can only be modified by transformation procedures
 
- Unconstrained Data Item
- Data not controlled by the model
- Input and output data
 
- Integrity Verification Procedure
- Determines integrity of data items
 
- Transformation Procedures
- Used to modify a constrained data item
- The only thing that can
- Essentially the backbone of the model
- Example: Store Procedure in Database
 
- Restricted Interface Model
- Provides subjects authorized information and functions
- Subjects at different levels see different set of data
- Like a webapp that shows you only the info and features you can access
- Enforces separation of duties in effect
 
 
- Brewer and Nash Model / Chinese Wall
- Focused on confidentiality
- Uses security domains / conflict classes
- Prevents conflict of interests
- Based on a user's previous actions
- Security domains are not predetermined
- Examples
- Separate conflict classes for accessing data of two competing companies
- Preventing access to data irrelevtant to a current operation
 
 
- Goguen-Meseguer Model
- Focused on integrity
- Basis for non-interference model
- Security domains are predetermined
- List of objects a subject can access is predetermined
- List of operations a subject can perform is predetermined as well
 
 
- Sutherland Model
- Focused on integrity
- A non-interference model
- A state machine model
- Defines a set of system states, and transitions
- Integrity is maintained if the defined states and transitions are used
 
- Grahan-Denning Model
- Focused on secure creation and deletion of objects
- Specifies how to securely:
- Create
- Object
- Subject
 
- Delete
- Object
- Subject
 
- Provide Right
- Read
- Grant
- Delete
- Transfer
 
 
- Create
 
 
- Trusted Computing Base
- Evaluation Steps
- Certification
- Notes
- Initiated by a vendor
- Test system security capabilities
- Compare design, security criteria, and actual capabiltiies
- Auditors decided if security criteria is met
- Security criteria is based on intended use (commercial, health, etc)
- Usually performed by a 3rd party
 
- Steps
- Choose security crtieria (TCSEC/ITSEC/CC)
- Analyze each system component beased on criteria
- Evaluate deployment environment
- Determine level of security
 
 
- Notes
- Accreditation
- Recognition of the certification
- Performed by an adopting organization/customer
 
- Maintenance
- Ensuring that the security criteria is up to date
- Ensuring that the system still meets security criteria
 
 
- Certification
- Rainbow Series
- Orange - Trusted Computer System Evaluation
- Green - DoD Password Management Guidelines
- Yellow - TCSEC in Specific Environments
- Tan - Audit in Trusted Systems
- Bright Blue - Trusted Product Evaluation for Vendors
- Light Blue - PC Security Considerations
- Neon Orange - Discretionary Access Controls
- Aqua - Computer Security Terms
- Red - Trusted Network Interpretation
- Amber - Configuration Management
- Burgundy - Design Documentation
- Lavender - Trusted Distribution
- Venice Blue - Computer Security Subsystem Interpretation
 
- Evaluation Models
- TCSEC - Orange Book
- Categories
- D - Minimal Protection
- Do not meet the requirement to belong to any other category
 
- C - Discretionary Protection
- C1 - Discretionary Protection
- Access is controlled using users and groups
 
- C2 - Controlled Access Protection
- Meets requirements of C1
- Strict logon procedures
- Enforces media cleansing
 
 
- C1 - Discretionary Protection
- B - Mandatory Protection
- B1 - Labeled Security
- Access is controlled using subject and object labels
 
- B2 - Structured Protection
- Meets requirements of B1
- Ensures that no covert channels exists
- Operator and administrators are separated
- Enforces process isolation
 
- B3 - Security Domains
- Meets requirements of B2
- Administrators are separated from other users
- Reduce exposure to vulnerabilities
 
 
- B1 - Labeled Security
- A - Verified Protection
- A1 - Verified Protection
- Meets requirements of B3
- Each step of implementation is documented
 
 
- A1 - Verified Protection
 
- D - Minimal Protection
- Limitations
- Doesn't control what users do with information once granted
- Focused on confidentiality and doesn't work in commercial contexts
- No physical, personnel, procedural provisions
- Doesn't deal with networked systems
 
 
- Categories
- TNI-TCSEC - Red Book
- TCSEC with Networking Considered
- Includes
- CIA Rating
- Communications Integrity
- DoS protection
- Intrusion prevention
 
- Rating Level
- None
- C1 - Minimum
- C2 - Fair
- B2 - Good
 
- Restrictions
- Centralized networks
- Single accreditation authority
 
 
- ITSEC
- European security evaluation criteria
- Corresponds to TCSEC categories
- Categories
- F0: F-D - Minimal Protection
- F1: F-C1 - Discretionary Protection
- F2: F-C2 - Controlled Access Protection
- F3: F-B1 - Labeled Security
- F4: F-B2 - Structured Access Protection
- F5: F-B3 - Security Domains
 
- Difference from TCSEC
- Change doesn't require re-evaluation of a system
- Also considers integrity
- Doesn't require a TCB
 
 
- Common Criteria
- A product evaluation model
- Does not ensure that a system has no vulnerabilities
- Helps buyers purchase products
- An official ISO standard: ISO 15408
- Goals
- Add to buyer confidence in purchasing products
- Eliminates duplicate evaluations
- To make security evaluations more cost effectove
- To evaluation functionality and assurance of TOE/target of evaluation
 
- Elements
- Protection Profiles
- Specify security demands of customers
- "What I want" from customers
 
- Security Targets
- Security claims of a vendor about their system
- "I will provide" from a vendor
- A target that a vendor sets for itself
- Customers compare their requirements to this
 
- Package
- Additional security components provided by the vendor
- Can be added and removed
 
 
- Protection Profiles
- Process
- Customer compares their protection profile to security targets of various vendors
- Customer chooses product with closest security target based on published assurance levels
 
- Structure
- Introduction and General Model
- Explains the security evaluation process
 
- Security Function Requirements
- Specifies requirements for each function that needs evaluation
 
- Security Assurance
- Specifies how systems are designed, checked, and tested
 
 
- Introduction and General Model
- Categories
- EAL1 - Functionally Tested
- TCSEC: D
- For non-serious threats to security
- Requirements
- Features are working as intended
 
 
- EAL2 - Structurally Tested
- TCSEC: C1
- For low to moderate assurance requirements
- Requirements
- EAL1 is passed
- Design information is evaluated
 
 
- EAL3 - Methodically Tested and Checked
- TCSEC: C2
- For moderate assurance requirements
- Requirements
- EAL2 is passed
- Security is engineered since design stage
 
 
- EAL4 - Methodically Designed, Reviewed, and Tested
- TCSEC: B1
- For moderate assurance requirements
- Requirements
- EAL3 is passed
- Security and commercial best practices are followed
 
 
- EAL5 - Semi-Formally Designed and Tested
- TCSEC: B2
- For high assurance requirements
- Requirements
- EAL4 requirements
- Specialist security engineering techniques are followed
 
 
- EAL6 - Semi-Formally Verified, Designed, and Tested
- TCSEC: B3
- For high risk situations
- Requirements
- EAL5 requirements
- Specialist security engineering techniques are used at all phases of design
 
 
- EAL7 - Formally Verified, Designed, and Tested
- TCSEC: A1
- For highest-risk situations
- Requirements
- EAL6 requirements
 
 
 
- EAL1 - Functionally Tested
 
 
- TCSEC - Orange Book
- Certification and Accreditation Systems
- Standards
- Department of Defense
- RMF - Risk Management Framework (Current)
- DIACAP - DoD Information Assurance Certification and Accredication Process
- DITSCAP - Defense Information Technology Security Certification and Accreditation Process
 
- Executive Branch
- CNSSP - Committee on National Security Systems Policy (Current)
- NIACAP - National Information Assurance Certification and Accreditation Process
 
 
- Department of Defense
- Phases of Current Standards
- Definition
- Assign personnel
- Document mission need
- Registration and negotiation
- Creation of System Security Authorization Agreement
 
- Verification
- Refinement of SSAA
- Development activities
- Certification analysis
 
- Validation
- Further refinement of SSAA
- Certification evaluation
- Recommendation development
- Accreditation decision
 
- Post Accreditation
- Maintenance of SSAA
- System operation
- Change management
- Compliance validation
 
 
- Definition
 
- Standards
- Memory Protection
- Prevents processes from interacting with memory locations not allocated to them
 
- Virtualization
- Allows mutliple operating systems to run on the same set of hardware
 
- Hardware Security Module
- Hardware cryptoprocessors
- Used to store keys
- Used by banks and authorities to store certificates
 
- Trusted Platform Module
- Specs for a cryptoprocessor chip
- A type of a hardware security module (HSM)
- Provides
- Key storage
- Hardware encryption
- Hard drive encryption
- More secure
- Key is stored in TPM so TPM is required to decrypt the hard drive
- Hard drive can't be decrypted when put in a separate system
 
 
- Hard drive encryption
 
 
- Interfaces
- Provides users access to the data
- Must be constrained based on user privileges
- Through hiding, if permission is not granted to a user
 
- Implementation of Clark-Wilson model
 
- Fault Tolerance
- Ability of a system to continue to operate when experiencing a fault
- Achieved by adding redundant components
- Essential element of security design
 
- Hardware
- Processor
- Execution Types
- Multitasking
- Single processor, multiple tasks
 
- Multiprocessing
- Multiple processors, multiple tasks
- Types
- SMP - Symmetric Multiprocessing
- Single OS distributes task to processors
- Multiple processors treated equally
- Good for simple operations
 
- MMP - Massive Multiprocessing
- Multiple OS environment
- Tasks assigned to coordinating processors
- Coordinating processors assign tasks to other processors
- Good for complex operations
 
 
- SMP - Symmetric Multiprocessing
 
- Multiprogramming
- Singl processor, one task at a time
- Switch to different task when one waits
- Needs to be specially written
 
- Multithreading
- Multiple tasks in a single process
 
 
- Multitasking
- Processing Types
- Single State
- Processors handle only one security level
- The system only handles one security level
- Access is controlled via policy
- Cheaper
 
- Multistate
- Processors handle multiple security levels
- The system handles multiple security levels
- Access is controlled via technical protection mechanisms
- More expensive
 
 
- Single State
- Protection Mechanisms
- Protection Rings
- Lower rings, higher privilege
- Multics has six rings, modern OSes has 4 rings
- Rings
- Ring 0 - Kernel
- Ring 1 - OS Components
- Ring 2 - Drivers
- Ring 3 - User Programs
 
- Mediated Access Model
- Process communicate to lower ring via interfaces
 
- System Call
- Request to resources on lower level ring
- Usually a programming interface
- Lower ring must authorize requester
 
 
- Process States / Operational States
- Ready
- Process is ready to be given a time slice
- Initial state of a process
- Transitions to Running State
 
- Waiting / Blocking
- Process is waiting on a resource
- Transitions to Running State
 
- Running
- Process is currently in execution
- Ends upon termination or end of time slice
- Also called Problem State as errors can occur
- Transitions to Ready, Waiting, or Stopped State
 
- Supervisory
- Process is performing privileged operation
- States other than this is user mode
 
- Stopped
- Process is finished or must be terminated
 
 
- Ready
- Security Modes
- Requirements
- MAC Environment
- Physicial control of system and room
 
- Modes
- Dedicated Mode
- Right to know everything in system
- Permission to access everything in the system
- Need to know everything in system
 
- System High Mode
- Right to know everything in system
- Permission to access everything in the system
- Need to know some things in the system
 
- Compartmented Mode
- Right to know everything in the system
- Permission to access some things in the system
- Need to know things to be accessed in the system
 
- Multilevel Mode
- Right to know some things in the system
- Permission to access some things in the system
- Need to know things to be accessed in the system
 
 
- Dedicated Mode
 
- Requirements
 
- Protection Rings
- Operating (System) Modes
- User Mode / Problem State
- Ring 3
- When user applications are being executed
- Prevents accidental damage to system
- User programs are executed in a sandbox
- Also called a Virtual Machine
 
 
- Kernel Mode / Privileged Mode / System Mode
- Ring 0 to 2
- Allows OS to perform full range of CPU instructions
 
 
- User Mode / Problem State
 
- Execution Types
- Memory
- ROM - Read Only Memory
- Types
- ROM - Read Only Memory
- Contents are written at factory
- Can't be modified
 
- PROM - Programmable Read Only Memory
- Unwritten ROM
- Users can write once
- Example: CDs
 
- EPROM - Erasable Programmable Read Only Memory
- Can be erased using chemicals or UV light
 
- EEPROM - Electronically Erasable Programmable Read-Only Memory
- Can be erased electronically
- All contents must be erased
 
- Flash Memory
- Can be erased electronically
- Allows erasure of individual blocks
- Example: NAND Flash, SSDs, Flash Drives
 
 
- ROM - Read Only Memory
- Issues
- Data retention
 
 
- Types
- RAM - Random Access Memory
- Types
- Real Memory
- Main memory
- Made up of Dynamic RAM
 
- Cache RAM
- Attached to a processor
- Contains RAM data that is accessed frequently
- Levels
- Level 1 Cache
- Attached to processor chip
 
- Level 2 Cache
- On a separate chip
 
 
- Level 1 Cache
- Peripherals also have RAM caches
- Printers have RAM caches which can load an entire job
 
- Dynamic RAM
- Loses charge over time even if power is supplied
- Must be refreshed by CPU
- Made up of capacitors
- Cheaper but slower than static RAM
 
- Static RAM
- Does not lose charge over time if power is supplied
- Does not need to be refreshed by CPU
- Made up of flip flops
- More expensive but faster than dyanmic RAM
 
 
- Real Memory
- Issues
- Pilferable
- Data retention
- Cold boot attack
 
 
- Types
- Registers
- Limited amount of onboard CPU memory
- ALU - Arithmetic Logic Unit
- Perform arithmetic operations
- Can directly access registers
- Values to process must be loaded to registers first
 
 
- Addressing
- Register Addressing
- Value to process is in a register
- Register address is provided by instruction
 
- Immediate Addressing
- Value to process is in the instruction
- Provided value is used in operation
 
- Direct Addressing
- Value to process is in memory
- Memory address of value is provided by instruction
 
- Indirect Addressing
- Address of value to process is in memory
- Memory address of value's address is provided by instruction
 
- Base + Offset Addressing
- Address of value to process is in a register
- Register address and offset is provided by instruction
 
 
- Register Addressing
- Secondary memory
- Storage devices; non-volatile
- Example: optical disk, hard drive, etc.
- Cheaper but slower than primary memory
 
- Virtual Memory / Paging
- Used to extend main memory
- Stores overflowing contents onto secondary memory
- Pages from main memory are "swapped" into secondary memory
- Non-used parts of main memory are stored in pagefile
- They are restored into main memoery when they need to be used
 
- Storage
- Primary and Secondary
- Primary
- RAM
- Data is readily available to CPU
 
- Secondary
- SSDs, CDs, hard drives
- Data not readily available to CPU
 
 
- Primary
- Volatile and Non-volatile
- Volatile
- Not designed to retain data
 
- Non-volatile
- Designed to retain data
 
 
- Volatile
- Random and Sequential
- Random
- Any memory location can be accessed immediately
- Faster but more expensive; for shorter term storage
- Examples: Hard Drives, RAM, CDs, DVDs
 
- Sequential
- Data prior to desired location must be read
- Slower but cheaper; for long term storage
- Examples: Magnetic Tape
 
 
- Random
- Issues
- Data Remanence
- Files can be recovered after deletion
- SSD blocks may retain information even after wiping
- Some blocks might hold a copy of data when copied to lower leveled blocks
 
 
- Theft
- May disclose confidential information
- Removable media are pilferable
 
 
- Data Remanence
 
- Primary and Secondary
 
- ROM - Read Only Memory
- IO Devices
- Types
- Monitors
- Van Eck radiation
- Electronic emanations coming from monitors
- Can be read via TEMPEST program
- Also called Van Eck phreaking
- CRT are more vulnerable than LCDs
 
 
- Van Eck radiation
- Printers
- Print outs can be taken if not secured
- Printers store data locally
 
- Keyboards/Mice
- Vulnerable to TEMPEST attacks
- Keyboards are vulnerable to keyloggers
- Signal interception if wireless
 
- Modems
- Uncontrolled entry points into the network
- Can establish external connections by themselves
- Needs a telephone line
 
 
- Monitors
- Structures
- Memory-Mapped IO
- Memory space is reserved for input and output communication with device
- CPU reads from those memory locations to read input from device
- CPU writes to those memory locations to write output to device
- CPU facilitates transfer of data to and from device (synchronously)
 
- IRQ - Interrupt Request
- Specific signal lines are used for CPU and device communication
- Signal lines are identified via IRQ number
- IRQ numbers range from 8 to 16
- OS assigns IRQ to devices
- Interrupt conflict happens when two devices share the same IRQ
 
- DMA - Direct Memory Access
- Like memory-mapped IO but data transfer is done asynchronously
- CPU not needed to facilitate data transfer between memory and device
- Steps
- DMQ - DMA Request
- Device requests to access memory location
- CPU locks target memory for device
- Device access the memory location
- CPU continues with other tasks
 
- DACK - DMA Acknowledgement
- Device finishes accessing memory location
- Device tells CPU that it can now access the memory location
- CPU accesses data on shared memory location
 
 
- DMQ - DMA Request
 
 
- Memory-Mapped IO
 
- Types
- Firmware
- Hard-coded software
- Software stored on a ROM chip
- Not changed frequently
- Types
- BIOS
- Starts up the operating system from the disk
- Stored on an EEPROM chip
- Phlashing: Malicious BIOS is flashed onto the ROM
 
- Device Firmware
- Mini operating systems onboard devices
- Stored on EEPROM chip
 
 
- BIOS
 
 
- Processor
- Client-Based Systems
- Applets
- Client executes code sent by the server
- Self contained mini programs
- Processing burden is shifted to client
- Privacy advantage as data is never sent to server
- Applets can be trojans though
- Examples
- Java Applets
- By Sun Microsystems
- Sandboxed Java programs; requires JVM
- Can run on different operating systems
- Widely exploited
 
- ActiveX Controls
- By Microsoft
- Non-sandboxed VB, C, C++, and Java programs
- Has full access to Windows operating system
- Can run on Microsoft browsers only
- Widely exploited; usually prohibited altogether
 
 
- Java Applets
 
- Local Caches
- ARP Cache (Poisoning)
- Spoofed ARP replies
- Spoofed ARP reply is used to populate ARP table
- ARP: translates IP to MAC address
- Spoofing: Wrong machine associated with an IP address
- Allows man in the middle attack
 
- ARP Poisoning: Static ARP Entries
- Malicious ARP entries manually configured in the operating system
- Must be modified locally on the machine
- Attack Vector: Using a trojan or social engineering attack
- Allows man in the middle attack
 
 
- Spoofed ARP replies
- DNS Cache (Poisoning)
- HOSTS File Poisoning
- Malicious entries added to hostsfile
- HOSTS File: local configuration file used to translate names to IPs
- Attack Vector: Using trojan or social engineering attack
- Allows impersonation of intended server with malicious dummy
 
- Authorized DNS Server Attacks
- Atacking DNS records stored on authoritative DNS servers
- Affects the entire internet and gets noticed pretty quickly
- Allows impersonation of intended server with malicious dummy
 
- Caching DNS Server Attacks
- Attacking DNS records on cache servers
- These are provided by ISP and companies
- Watched by less people and can occur without notice for some time
- Allows impersonation of intended server with malicious dummy
 
- DNS Lookup Address Changing
- Changing the DNS server used by a system to a malicious one
- Attack Vectors: intercepting DHCP responses or local system attacks vis trojans
- Allows impersonation of intended server with malicious dummy
 
- DNS Query Spoofing
- Intercepting DNS responses and changes substitutes it with false information
- Allows impersonation of intended server with malicious dummy
 
 
- HOSTS File Poisoning
- Temporary Internet Files
- Contains cached website content
- Can be posioned to contain malicious content (client sid scripts, etc.)
- Malicious content is invoked when cached items are accessed
 
 
- ARP Cache (Poisoning)
- Other Considerations
- Emails, Phishing, and Trojans
- Upload and Downloads
- System Access Control
- User Interfaces
- System Encryption
- Process Isolation
- Protection Domains
- Data and Media Labels
- Data Backups
- Awareness Trainings
- Physical Protections
- Disaster Recovery Procedures
- Secure Coding, Configuration, and Updates
 
 
- Applets
- Server-Based Systems
- Database
- Aggregation
- Combining multiple instances of data
- Produces useful information that may be classified
- Examples: Sum, Average, Max, Min, etc.
- Individual records might not be classified
- Sum/Average/Max/Min of data might be classified
- Example: record for 1 soldier and total number of troops
 
- Inference
- Deducing classified information from available information
- Example
- Clerk knows total salary expenses of entire company
- A new person gets hired
- Total salaries increase
- The increase in salary expenses is the salary of new person
 
 
- Data Warehousing
- Stores large amounts of information
- For use with specialized analysis techniques
 
- Data Dictionary
- Stores usage and access rights of data
 
- Data Mining
- Process of analyzing data warehouses
- Search for patterns in large data sets
- Produces metadata
 
- Metadata
- Data about data
- Can be representation of data
- Can be aggregation(?)
- Something that describes the bulk of data in the warehouse
- Examples:
- Security incident report
- Sales trends report
 
- May be more valuable than the bulk data
 
- Data Analytics
- Examination of bulk data to extract useful information
 
- Large-Scale Parallel Data Systems
- Performs simultaneous calculations / Multiprocessing
- Breaking down tasks into subtasks and distributing the load
 
 
- Aggregation
- Distributed Systems
- Cloud Computing
- Computing is outsourced to a service provider
- Service is accessdible via the internet
- Types
- SaaS - Software-as-a-Service
- Provider manages:
- Networking
- Storage
- Virtualization
- Operating System
- Middleware
- Applications
 
- Customer uses the application
- Examples
- GMail
- Google Docs
 
 
- Provider manages:
- PaaS - Platform-as-a-Service
- Provider manages:
- Networking
- Storage
- Virtualization
- Operating System
- Middleware
 
- Customer manages:
- Applications
 
- Examples:
- Heroku
 
 
- Provider manages:
- IaaS - Infrastructure-as-a-Service
- Provider manages:
- Networking
- Storage
- Virtualization
 
- Customer manages:
- Operating System
- Middleware
- Applications
 
- Examples:
- Amazon Web Services EC2
 
 
- Provider manages:
 
- SaaS - Software-as-a-Service
 
- Grid Computing
- Computing tasks are distributed to clients
- Clients return result to central server
- Similar to asymmetric multiprocessing
- Clients are able to view the data that they are handling
- Clients are not guranteed to return results
- Returned results need to be validated to ensure integrity
 
- Peer-to-Peer
- No central server
- Clients connect directly to each other
- Examples
- VoIP
- Skype
- BitTorrent
 
- Same security concerns as grid computing
 
 
- Cloud Computing
 
- Database
- Industrial Control Systems
- DCS - Distributed Control Systems
- Each piece of equipment have their own control system
- Remotely accessed and managed from a central location
- Keyword: Central Management
 
- PLC - Programmable Logic Controllers
- Single-purpose computers
- E.g. displaying signs, marquees, etc.
- Keyword: Single-purpose
 
- SCADA - Supervisory Control and Data Acquisition
- Stand alone device networked with each other
- Keyword: Stand-alone; Peer-to-Peer
 
 
- DCS - Distributed Control Systems
- Web-Based Systems
- Security Association Markup Language
- Used to provide web-based SSO
 
- Open Web Application Security Project
 
- Security Association Markup Language
- Mobile Systems
- Operating Systems
- Android
- Based on Linux
- Open Source Apache Lincense
- Made by Google
- App Store: Google Play
- Can be rooted
 
- iOS
- Made by Apple
- Closed Source
- App Store: Apple App Store
- Can be jailbroken
 
 
- Android
- Issues
- Easy to hide
- Can be used to steal data
- Contains sensitive info
- Eavesdropping
 
- Device Security
- Full Device Encryption
- Storage and voice encryption
- Prevents reading of data
 
- Remote Wiping
- Delete entire phone data remotely
- Can be blocked
- Deleted data may still be recovered
 
- Lockout
- Disable access if unlock attempts fail
- Requires a pre configured screen lock
- Gets longer with every failure
 
- Screen Locks
- Prevents access to unauthorized users
- Doesn't prevent access via network or USB
- Triggered if phone is left idle
- Examples: PIN, patterns, biometrics, etc.
 
- GPS
- Receives GPS signals
- Apps can record GPS locations
- Allows tracking of movement
 
- Application Control
- Limits installable aplications
- Enforces application settings
 
- Storage Segmentation
- Compartmentalizes various data in storage
- Used to separate device apps from user apps
- Can separate company data from user data
 
- Asset Tracking
- Checks in at office
- Location tracking
- Verifies if device is still with user
 
- Inventory Control
- Using mobile device to track hardware
- Devices can read RFID, bar codes, etc.
 
- Mobile Device Management
- Controls and monitors a device remotely
 
- Device Access Control
- Lock screens, etc.
- Device should be unlocked to access USB / bluetooth
 
- Removable Storage
- Devices support microSD cards
- Can also support external storage
- Sometimes bluetooth and WiFi based sotrage too
 
- Disabling Unused Features
- Lessens the chance of exploitation
 
 
- Full Device Encryption
- Application Security
- Key Management
- Key generation
- Mobile devices have poor RNGs
 
- Key storage
- Use Trusted Platform Module
- Use Removable Hardware
 
 
- Key generation
- Credential Management
- Password managers with multifactor authentication
 
- Authentication
- Methods
- Patterns
- PINs
- Biometrics
- RFID
 
- Encryption when locked
 
- Methods
- Geotagging
- Embedding of location and data time on photos
- Can dislose your location when photo is uploaded
 
- Encryption
- Prevents access to data in storage or transit
- Natively available on devices
- Can also be implemented via apps
 
- Application Whitelisting
- Allows only a specific list of apps to be installed
- Implicit deny
 
- BYOD Concerns
- Devices can access the company network
- They need to comply with security policies
 
- Data Ownership
- Personal and cmpany data might be mixed in the device
- They should be segmented
- Policy should define who owns what data
 
- Support Ownership
- Responsibility for repair and maintenance
 
- Patch Management
- Responsibility for installing updates
- How are updates to be installed
- How frequent are updates to be installed
 
- Antivirus Management
- What antivirus solution to use
- Should an antivirus be used
 
- Forensics
- Involvement of a device in investigations
 
- Privacy
- Workers might be tracked when they are out of work
- Contents of device may be monitored by the company
 
- On-boarding/Off-boarding
- On-boarding
- Installing security/management apps
- Secure configuration
 
- Off-boarding
- Wiping business data
- Full reset?
 
 
- On-boarding
- Adherence to Corporate Policies
- Personal mobile devices still need to comply with BYOD policies
 
- User Acceptance
- BYOD policy details should be explained well to user
- User must accept BYOD policy so they can be held accountable
 
- Architecture/Infrastructure Considerations
- Allowing BYOD devices might cause more network load
- Might require more IP addresses
- Might require new hardware to be installed (access points)
 
- Legal Concerns
- BYOD increases burden of liability
 
- Acceptable Use Policy
- BYOD opens up inappropriate use of mobile devices
- Risk of information disclosure is also increased
 
- On-board Camera/Video
- Allows employees to take picture of company premises
- Pictures of confidential information may be taken
 
 
- Key Management
 
- Operating Systems
- Cyber-Physical Systems
- Limited functionality
- May be part of a larger system/product
- Examples
- Static Systems
- Does not change
- Can't install new apps on it
- Can't be configured
 
- Network Enabled Devices
- Devices that can communicate via networks
- WiFi, Ethernet, Bluetooth
 
- Cyber Physical Systems
- Can control physical components programatically
- Robots, doors, HVACs, self-driving cars, IoT, etc.
 
- Mainframes
- Usually designed around a single task
- Might be considered static systems
- Able to operate for decades
 
- Game Consoles
- OS is fixed and changed only when vendor releases a system upgrade
- Focused on playing games and media
 
 
- Static Systems
- Methods of Securing
- Network Segmentation
- Isolate Cyber-Physical Systems in a separate VLAN
- Prevents remote exploits
 
- Security Layers
- Isolating high security systems from lower security ones
- Implementations
- Physical Isolation
- Network Isolation
- etc.
 
 
- Application Firewalls
- Prevents application specific attacks
- A server-side firewall
- Use a network firewall as well
 
- Manual Updates and Firmware Version Control
- Ensures that updates are tested
- Automatic updates allow for untested versions
- This might lead to reduction in security
 
- Wrappers
- Encapsulates a solution or environment
- Restricts and controls changes to an environment
- Ensures that only valid and secure updates are applied
 
- Control Redundancy and Diversity
- Use multiple and redundant security controls
- Fulfills defense in depth
 
 
- Network Segmentation
 
- Technical Mechanisms
- Layering
- Levels vs. Rings
- Layering: Highest layer is most privileged
- Rings: Lower ring is most privileged
 
- Processes in different layers communicate via interfaces
- Security policy set by higher privileged layers take precedence
 
- Levels vs. Rings
- Abstraction
- Generalizing a bunch of objects
- Hiding implementation details
- Only giving information on interfaces and attributes
- Allows setting of policies to groups of generalized objects
 
- Data Hiding
- Put objects in different container from subject
- Ensure that object can only be accessed via a legal way
- Hide data from processes running at different levels
- Hide data from those who don't need to know and are unauthorized
 
- Process Isolation
- Each processes have their own memory spaces
- Processes shouldn't be able to read each other's memory spaces
- Prvents unauthorized data access
- Protects integrity of a process as it can't be modified by another process without its consent
- Implemented via sandboxing processes
 
- Hardware Segmentation
- Process isolation but uses hardware implementations for separation
- Rare; used for national security concerns
 
 
- Layering
- Policy Mechanisms
- Least Privilege
- Only give processes the privileges they need
- Processes should run in user as much as possible
- Use APIs to communicate with kernel mode processes instead
 
- Separation of Privilege
- Minimize the number of privileged operations a process can do
- Basically, principle of least privilege for administrators
- Compartmentalize reposnibilities of processes
- Prevents conflict of interest
 
- Accountability
- Record who does what
- Requires authentication and authorization to associate activity with user
- Allows users to be held acocuntable for their actions
 
 
- Least Privilege
- Covert Channels
- Allows unauthorized transmission of information
- Detected by analyzing log files
- Types
- Covert Timing Channel
- Modifies system's behaviour to generate timing regularities
- Observing system can then extract information by watching it
 
- Covert Storage Channel
- Writing data to a common storage area
 
 
- Covert Timing Channel
 
- Coding Flaw Attacks
- Initialization and Failure States
- Security controls get unloaded when a system crashes
- System crashes while its in privileged mode, giving attacker access
 
- Input and Parameter Checking
- Buffer Overflows: Length checking
- Injection Attacks: Input sanitaztion and validation
 
- Maintenance Hooks and Privileged Programs
- Allows unauthorized privileged access
- Allows bypassing of security controls
 
- Incremental Attacks
- Data Diddling
- Making small random incremental changes to data
- Difficult to detect
 
- Salami Attack
- Small whittling at assets like a salami
- Transferring small amounts of cash from a compromised bank account over time
 
 
- Data Diddling
 
- Initialization and Failure States
- Time of Check to Time of Use
- Race condition
- Object verified might be different from the one used
- TOC - Time of Check
- Process checks if the object is available and valid
- Attack replaces object after the program checks it
 
- TOU - Time of Use
- Process then uses the object placed by attacked
 
- Example:
- Process: Check length of file
- Attacker: Replace file with bigger one
- Process: Reserves memory as large as the file that was read
- Process: Leading the actual file into memory causes a buffer overflow
 
 
- Technology and Process Integration
- Systems are being implemented via SOA
- SOA integrates seperate service applications into a single solution
- Pay attention to Single Points of Failure
 
- Electromagnetic Radiation
- EM leaks create a possible covert channel
- Faraday Cage
- Prevents radiation from going in and out of a bounded area
 
- Jamming / Noise Generation
- Creates meaningless radiation to prevent disclosure of information
 
- Control Zones
- Zone protected by jammers and faraday cages
- A zone where not EM disclosure can occur
 
 
- There is no security without physical security
- Secure Facility Plan
- Critical Path Analysis
- Identifying mission critical assets/processes
- Results in a list of items to secure
- Technology Convergence must be considered
- Technology Convergence
- Tendency for technologies to merge over time
- Results in single points of failure
- Examples
- Voice, Video, Fax, and Data uses single connection
- Integrated Routers, Switches, and Firewalls
 
 
- Example: E-Commerce Server
- Internet Connection
- Computer Hardware
- Electricity
- Temperature Control
- Storage Facilty
 
- Site Selection
- Considerations
- Visibility
- Terrain
- Visibility of Approaching Parties
 
- Crime
- Riots
- Vandalism
- Break-ins
 
- Natural Disasters
- Fault Lines
- Tornadoes
- Hurricanse
- Flooding
 
- Surrounding Businesses
- Too Many Visitors
- Noise
- Vibrations
- Dangerous Materials
 
- Utilities
- Fire Department
- Medical
- Police
 
 
- Visibility
- Facilty Design
- Considrations
- Required Security Level
- Forced Intrusions
- Emergency Access
- Resistance to Entry
- Direction of Entries and Exits
- Alrams
- Conductivity
 
- Safety
- Fire Rating
- Construction Materials
- Load Rating
 
- Access Control
- Walls
- Doors
- Ceilings
- Flooring
 
- Utilities
- HAVC
- Power
- Water
- Sewage
- Gas
 
 
- Required Security Level
- Secure Architecture
- CPTED - Crime Prevention Through Environmental Design
 
 
 
- Critical Path Analysis
- Categories of Physical Controls
- Administrative
- Facility Construction and Selection
- Site Management
- Personnel Controls
- Awareness Training
- Emergency Response and Procedures
 
- Technical
- Access Controls
- Intrusion Detection
- Alarms
- CCTV
- Monitoring
- Heating
- Ventilating
- Air Conditioning
 
- Physical
- Fencing
- Lighting
- Locks
- Construction Materials
- Mantraps
- Dogs
- Guards
 
 
- Administrative
- Corporate v. Personal Property
- Security controls should be placed where company assets are involved
- Company is not responsible for safekeeping employee property
- Company can be responsible for safekeeping key personnel and their property
 
- Functional Order of Controls
- Deterrence
- Make attackers think attacking is a bad idea
- Example: Fencing
- Denial
- Prevent attackers from making an intrusion
- Example: Vault Doors
- Detection
- Detect when an attacker has made an intrusion
- Example: Motion Sensors
- Delay
- Make extraction of asset more difficult
- Example: Cable Lock
 
- Equipment Failure
- Considerations
- Replacement part vendor
- Transport and storage
- Pre-purchasing
- Installation and restoration skills
- Scheduling maintenance and replacements
 
- SLA - Service Level Agreement
- Required response time from vendor to deliver a service
- Includes repair, internet, hosting, etc.
- Must be established with vendor for critical assets
 
- MTTF - Mean Time to Failure
- Time before a device fails
- Expected lifetime of a device
- Devices should be replaced before MTTF expires
 
- MTTR - Mean Time to Repair
- Time it takes to repair a device
 
- MTBF - Mean Time Between Failures
- Time between subsequent failures
- Usually same with MTTF
 
 
- Considerations
- Wiring Closets
- AKA, Premises Wire Distribution Room
- Connects floor/building cables to essential equipment
- Building management must be notified of wiring closet policies
- Multiple wiring closets may exist for large buildings
- To work around the maximum run length
- Maximum run length is 100 meters
- Run length is reduced in noisy environments
 
- Houses wiring for other utilities as well:
- Alarm systems
- Circuit breakers
- Telephone punch down blocks
- Wireless access points
- Security cameras
 
- Rules
- Do not use as storage area
- Have adequate locks
- Keep area tidy
- Remove flammable items
- Video surveillance
- Door open sensor
- Regular physical inspections
- Include in environmental controls plan
 
 
- Server Rooms
- Houses mission critical servers
- Human Incompatibility
- Fill room with halon substitutes
- Low temeperature
- Little or no lighting
- Equipment stacked with little room to maneuver
 
- Location
- At the center of the building
- Away from sewage lines, water, and gas
 
- Walls
- One hour minimum fire rating
 
 
- Media Storage Facilities
- Stores blank and reusable media
- Threats
- Theft
- Restrict Access to Media
- Asset Tracking (RFID/NFC)
 
- Malware Planting
- Sanitize Returned Media
- Restrict Access to Media
 
- Data Remnant Recovery
- Secure Data Wiping
- Restrict Access to Media
 
- Destruction
- Fire
- Flood
- Electromagnetic Field
- Temperature Monitoring
 
 
- Theft
- Data Remnants
- Remaining data on storage left over after deletion
- Deletion only removes file record
- Doesn't remove actual file data from disk
- Can be recovered using un-delete utilities
 
- Restricting Access to Media
- Use a locked cabinet or safe
- Check in and check out procedure
- Have a custodian who manages access
 
 
- Evidence Storage
- Stores evidence after breach
- Requirements
- Dedicated storage system/network
- Keeping storage system offline
- Block internet connectivity
- Tracking all activities on system
- Calculating hashes for all datasets within
- Limiting access to security administrator
- Encrypting all datasets stored within
 
 
- Work Area Security
- Controls
- Separate work areas and visitor areas
- Escort requirements for visitors
- Require badges and RFID tags
- More restrictive access to more sensitive areas
- Sensitive areas should be in the center of facility protection
- Universal access to essential facilities (e.g. restrooms)
- Work area sensitivity classifications
- Walls / Partitions
- Prevents shoulder surfing or eavesdropping
- Walls should cut off false ceilings
- For separating areas with different sensitivity
 
 
 
 
- Controls
- Data Center Security
- Usually the same as server rooms
- Same policies as server rooms
- Might be a separate building or remote location
- Might be leased
- Technical Controls
- Smartcards
- Types
- Magnetic Strip
- Bar Code
- Integrated Circuit Chip
 
- Threats
- Social Engineering
- Theft
 
- Should come with 2-factor authentication (e.g. PIN)
- Examples: Memory Cards
- Machine readable ID cards with magnetic strip
 
 
- Types
- Proximity Readers
- Passive
- Alters reader EM field
- No electronics
- Just a small magnet
 
- Field Powered
- Uses reader EM field for power
- Must be waved near reader
 
- Transponder
- Self powered
- Transmits signal received by reader
- Occurs consistently or at press of button
 
 
- Passive
- Intrusion Detection Systems
- Detects attempted intrusions
- Used to raise an alarm
- Points of Failure
- Power
- Lack of power prevents the system from operating
 
- Communication
- Lack of communication prevents alarm from being raised
 
 
- Power
- Controls
- Heart Beat Sensor
- Periodically tests connectivity between alarm and IDS
- Alarm is raised if heartbeat signal fails
 
 
- Heart Beat Sensor
 
- Access Abuses
- Examples
- Opening Secured Doors
- Bypassing Locks and Access
- Maquerading
- Using someone else's security ID
 
- Piggybacking
- Following someone through a secured gate
 
 
- Controls
- Audit Trails
- Can be manually or automatically generated
 
 
- Audit Trails
 
- Examples
 
- Smartcards
- Emanation Security
- Sources
- Wireless Networking Equipment
- Mobile Phones
 
- TEMPEST
- Government reseearch
- For protecting equipment against EMP
- Expanded to monitoring emanations
 
- Controls
- Faraday Cage
- Box fully surrounded by a wire mesh
- Prevents EM signals from entering an exiting enclosure
 
- White Noise
- False traffic to hide presence of real emanations
- Real signal from another source can be used
- Used around the perimeter of an area
 
- Control Zone
- A zone protected by a Faraday cage or white noise
- Can be a room, floor, or building
 
 
- Faraday Cage
 
- Sources
 
- Utilities and HVAC
- Power Issues
- Terms
- Fault
- Momentary loss of power
 
- Blackout
- Prolonged loss of power
 
- Sag
- Momentary low voltage
 
- Brownout
- Prolonged low voltage
 
- Spike
- Momentary high voltage
 
- Surge
- Prolonged high voltage
 
- Inrush
- Initial surge of power when connecting to source
 
- Transient
- Momentary power fluctuation
 
- Noise
- Prolonged power fluctuation
 
- Clean
- Non fluctuating power
 
- Ground
- The wire in a circuit that is grounded
 
 
- Fault
- Controls
- UPS - Uninterrptable Power Supply
- Sanitizes power
- Provides power for a few minutes
 
- Power Strips + Surge Protectors
- Fuse blows when damaging power levels occurs
 
- Power Generators
- Provides power until main power comes back on
 
 
- UPS - Uninterrptable Power Supply
 
- Terms
- Noise Issues
- Generated by electric current
- Affects quality of communications
- EMI - Electromagnetic Interference
- Common Mode Noise
- From difference in power between hot and ground wires
 
- Traverse Mode Noise
- From difference in power between hot and neutral wires
 
 
- Common Mode Noise
- RFI - Radio Frequency Interference
- Generated by common electrical appliances
- Microwaves, lights, heaters, computers
 
- Controls
- Shielding
- Grounding
- Power Conditioning
- Limiting RFI and EMI exposure
 
 
- Temperature, Humidity, and Static
- Temperature
- 60F to 70F
- 15C to 23C
 
- Humity
- 40% to 60%
- Too Much: Corrosion
- Too Low: Static
 
 
- Temperature
- Water Issues
- Threats
- Leakage
- Flooding
- Electrocution
 
- Controls
- Monitor plumbing for leaks
- Ensure water is away from electricity
- Ensure servers are away from water
- Ensure the facility is away from flooding areas
 
 
- Threats
- Fire Prevention, Detection, and Suppression
- Fire Triangle
- Heat
- Oxygen
- Fuel
- Chemical Reaction
 
- Stages of Fire
- Incipient
- Air ionization; No smoke
 
- Smoke
- Smoke is visible from point of ignition
 
- Flame
- Flame can be seen with naked eye
 
- Heat
- Heat buildup and fire spreads
 
 
- Incipient
- Suppression Mediums
- Water
- Suppresses heat
 
- Soda Acid / Dry Powders
- Suppresses fuel
 
- CO2
- Suppresses oxygen
 
- Halon Subsitutes / Nonflammable Gases
- Suppresses reaction
 
 
- Water
- Controls
- Training
- Emergecny Shutdown Procedures
- Rendevouz Location
- Safety Verification Mechanism
 
- Fire Extinguishers
- A - Wood/Paper - Water, Soda Acid
- B - Oils/Liquids - CO2/Halon/Soda Acid
- Splashes when doused
 
- C - Electrical   - CO2/Halon
- Electrocution
 
- D - Metal        - Dry Powder
- Produces own oxygen
 
 
- Detection Systems
- Types
- Fixed Temperature
- Metal/plastic which melts at a temperature
 
- Rate-of-Rise
- Monitors speed of temperature change
 
- Flame-Actuated Systems
- Monitors infrared energy
 
- Smoke-Actuated Systems
- Photoelectic / radioactive ionization
 
 
- Fixed Temperature
 
- Types
- Suppression
- Water Suppression
- For human friendly environments
- Types
- Wet Pipe / Closed HEad
- Pipe is always full of water
 
- Dry Pipe
- Water is filled with gas and is discharged
 
- Deluge
- Large pipes; large volumes of water
 
- Preaction
- Dry pipe until fire is detected
- Has a secondary trigger which releases water
- Allows fire to be dealt with before activating
- Good for areas with electronics and humans
 
 
- Wet Pipe / Closed HEad
 
- Gas Discharge Systems
- For human incompatible environments
- Degrades into toxic gas
- Halon is now banned by the EPA
- Types
- Halon
- FM-200 (HFC-227ea)
- CEA-410 / CEA-308
- NAF-S-III (HCFC Blend A)
- FE-13 (HCFC-23)
- Argon (IG55) or Argonite (IG01)
- Inergen (IG541)
- Low Pressure Water Mists
 
 
 
- Water Suppression
- Damage
- Smoke
- Smoke from a fire can damage storage devices
 
- Heat
- Heat from a fire can damage storage tapes and hardware
 
- Suppression
- Suppression mechanism can damage equipment
- Water and soda acid damages computers
- Can cause short circuits and corrosion
 
- Fire Department
- May damage equipment and walls using axes
- May damage using chosen fire suppression
 
 
- Smoke
 
- Fire Triangle
 
- Power Issues
- Perimeter
- Accessibility
- Entrances
- Single Entrance
- For security
 
- Multiple Entrances
- For emergencies
 
 
- Single Entrance
- Roads and Transportation
- Constrained by perimeter security
 
- Entrances
- Controls
- Fence
- Defines a security perimeter
- Deterrent levels
- Vs. Casual Trespassers
- 3 to 4 feet
 
- Vs. Most Trespassers
- 6 to 7 feet
 
- Vs. Determined Trespassers
- 8 feet or more
- With barbed wire
 
 
- Vs. Casual Trespassers
 
- Gate
- Controlled entry and exit point
- Must match deterrent level of fence
- Must be hardened vs tampering/removal/destruction
- Must not offer access when closed
- Number must be kept to a minimum
- Must be protected by guards or CCTV
 
- Turnstile
- Prevents tailgating
- Allows one person at a time
- Allows movement in 1 direction
- Used for entry rather than exit
 
- Mantrap
- Double set of doors
- Protected by a guard
- Prevents piggybacking or tailgating (e.g. weight measurement)
- Immobilizes a subject until authenticated
- If unauthenticated, subject is locked until authorities respond
 
- Lighting
- Discourages casual intruders
- Not a strong deterrent
- Should not show positions of detection controls
- Should not cause glare to detection controls
- Should illuminate critical areas w/ 2 candle feet of power
- Should be placed apart as their illumination diameter
 
- Guards and Dogs
- Advantages
- Can adjust to changing environment
- Can detect and respond to threats
- Acts as a deterrent
 
- Disadvantages
- Cannot be posted in human incompatible locations
- No guarantees of reliability
- Can be subject to injury or sickness
- Vulnerable to social engineering
- Protection stops when life is endangered
- Not aware of the scope of operations of facility
- Expensive
 
 
- Advantages
 
- Fence
 
- Accessibility
- Internal Security
- Controls
- Visitor Control
- Escorts
- Monitoring
 
- Locks
- Key / Preset Locks
- Vulnerable to picking / shimming
- Key can be lost
 
- Combination
- Combination can be forgotten
- Can include electronic controls
- Can include multiple valid combinations
 
 
- Key / Preset Locks
- Badges
- Identification cards
- Can be visual/smartcard/both
- Can be used to authenticate to facility
- Authenticated by security guards or scanning devices
- May require other autnentication factors
 
- Motion Detectors
- Detects movement or sound in an area
- Types
- Infrared
- Detects changes in infrared lighting
 
- Heat-based
- Detects changes in heat levels
 
- Wave-pattern
- Transmits signal into area
- Detects changes in reflected pattern
 
- Capacitance
- Detects changes in electrical field
 
- Photoelectric
- Detects changes in visible light patterns
 
- Passive Audio
- Detects abnormal sound in area
 
 
- Infrared
 
- Intrusion Alarms
- Triggered by a sensor
- By Mechanism
- Deterrent Alarm
- Engages additional locks or shuts down doors
- Makes attack more difficult
 
- Repellant Alarm
- Triggers siren and lights
- Meant to discourage attackers
- Forces them off premises
 
- Notification Alarm
- Sends a notification to guards
- Usually silent
- Allows security to capture intruder
 
 
- Deterrent Alarm
- By Location
- Local Alarm
- Audible alarm
- Can be heard for 400 feet
- Locally positioned guards must be able to respond
- Must be protected from tampering
 
- Central Station Systems
- Notifies a central station
- Locally silent
- Usually well-known security companies
- Examples: Residential security systems
- Proprietary System
- Central station system used by private companies
 
 
- Auxiliary Station
- Alarm which notifies emergency services
- E.g. police/fire/medical
- Can be added to local alarms and central station systems
 
 
- Local Alarm
- Secondary Verification
- Used to verify if alarm was valid
- Examples
- Multiple Sensor Systems
- Must be triggered in quick succession
 
- CCTV
- Allows guards to manually verify area
 
 
- Multiple Sensor Systems
 
 
 
- Visitor Control
 
- Controls
- Safety
- Life
- Protecting human life is the first priority of security
- Includes providing them with means to survive during disasters
- E.g. food, water, etc.
 
- Environment
- Ensuring that environment remains safe during disaster
- Deals with flooding, fires, toxic gas, etc.
 
- Occupant Emergency Plans
- Sustains personnel safety in the wake of a disaster
- How to minimize threats to life and prevent injury
- Does not address IT issues
 
 
- Life
- Privacy and Legal
- Privacy
- Protecting personal information from disclosure
- Personal information includes:
- Name
- Address
- Phone
- Race
- Religion
- Age
 
 
 
- Privacy
- Regulatory Requirements
- Depends on industry
- Regulatory requirements must be considered a baseline for security
 
Clark–Wilson is an integrity model.
it's concerned about information integrity, isn't it?