




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、OverviewC o n fid e n tia lityDataandservicesFigure 1.1 The Security Requirements TriadIn te g rityAvailabilityConfidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary informationIntegrity Guarding agains
2、t improper information modification or destruction, including ensuring information nonrepudiation and authenticityAvailability Ensuring timely and reliable access to and use of informationLowThe loss could be expected to have a limited adverse effect on organizational operations, organizational asse
3、ts, or individualsModerateThe loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individualsHighThe loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individualsC
4、omputer security is not as simple as it might first appear to the novicePotential attacks on the security features must be consideredProcedures used to provide particular services are often counterintuitivePhysical and logical placement needs to be determinedAdditional algorithms or protocols may be
5、 involvedAttackers only need to find a single weakness, the developer needs to find all weaknessesUsers and system managers tend to not see the benefits of security until a failure occursSecurity requires regular and constant monitoringIs often an afterthought to be incorporated into a system after
6、the design is completeThought of as an impediment to efficient and user-friendly operationassetsthreatsFigure 1.1 Security Concepts and RelationshipsThreat agentswish to minimizewish to abuseand/ormay damagetotothatincreasegiverise toOwnerscountermeasuresriskimposevaluetoreduceHardwareSoftwareDataCo
7、mmunication facilities and networksCategories of vulnerabilities Corrupted (loss of integrity) Leaky (loss of confidentiality) Unavailable or very slow (loss of availability)Threats Capable of exploiting vulnerabilities Represent potential security harm to an assetAttacks (threats carried out) Passi
8、ve attempt to learn or make use of information from the system that does not affect system resources Active attempt to alter system resources or affect their operation Insider initiated by an entity inside the security parameter Outsider initiated from outside the perimeterCountermeasuresMeans used
9、to deal with security attacksPreventDetectRecoverMay itself introduce new vulnerabilitiesResidual vulnerabilities may remainGoal is to minimize residual level of risk to the assets*Table is on page 40 in the textbook.Table 1.2 Threat Consequences, and the Types of Threat Actions That Cause Each Cons
10、equence Based on RFC 4949 Threat Consequence Threat Action (Attack) Unauthorized Disclosure A circumstance or event whereby an entity gains access to data for which the entity is not authorized. Exposure: Sensitive data are directly released to an unauthorized entity. Interception: An unauthorized e
11、ntity directly accesses sensitive data traveling between authorized sources and destinations. Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of
12、communications. Intrusion: An unauthorized entity gains access to sensitive data by circumventing a systems security protections. Deception A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. Masquerade: An unauthorized entity gains acces
13、s to a system or performs a malicious act by posing as an authorized entity. Falsification: False data deceive an authorized entity. Repudiation: An entity deceives another by falsely denying responsibility for an act. Disruption A circumstance or event that interrupts or prevents the correct operat
14、ion of system services and functions. Incapacitation: Prevents or interrupts system operation by disabling a system component. Corruption: Undesirably alters system operation by adversely modifying system functions or data. Obstruction: A threat action that interrupts delivery of system services by
15、hindering system operation. Usurpation A circumstance or event that results in control of system services or functions by an unauthorized entity. Misappropriation: An entity assumes unauthorized logical or physical control of a system resource. Misuse: Causes a system component to perform a function
16、 or service that is detrimental to system security. Availability Confidentiality Integrity Hardware Equipment is stolen or disabled, thus denying service. An unencrypted CD-ROM or DVD is stolen. Software Programs are deleted, denying access to users. An unauthorized copy of software is made. A worki
17、ng program is modified, either to cause it to fail during execution or to cause it to do some unintended task. Data Files are deleted, denying access to users. An unauthorized read of data is performed. An analysis of statistical data reveals underlying data. Existing files are modified or new files
18、 are fabricated. Communication Lines and Networks Messages are destroyed or deleted. Communication lines or networks are rendered unavailable. Messages are read. The traffic pattern of messages is observed. Messages are modified, delayed, reordered, or duplicated. False messages are fabricated. Tabl
19、e 1.3 Computer and Network Assets, with Examples of Threats Passive AttackActive AttackAttempts to learn or make use of information from the system but does not affect system resourcesEavesdropping on, or monitoring of, transmissionsGoal of attacker is to obtain information that is being transmitted
20、Two types:oRelease of message contentsoTraffic analysisAttempts to alter system resources or affect their operationInvolve some modification of the data stream or the creation of a false streamFour categories:oReplayoMasqueradeoModification of messagesoDenial of serviceTable 1.4 Security Requirement
21、s (FIPS PUB 200) (page 1 of 2) (Table can be found on page 46 in the textbook.)Table 1.4 Security Requirements (FIPS PUB 200) (page 2 of 2) (Table can be found on page 47 in the textbook.)Economy of mechanismFail-safe defaultsComplete mediationOpen designSeparation of privilegeLeast privilegeLeast c
22、ommon mechanismPsychological acceptabilityIsolationEncapsulationModularityLayeringLeast astonishmentConsist of the reachable and exploitable vulnerabilities in a systemExamples:Open ports on outward facing Web and other servers, and code listening on those portsServices available on the inside of a
23、firewallCode that processes incoming data, email, XML, office documents, and industry-specific custom data exchange formatsInterfaces, SQL, and Web formsAn employee with access to sensitive information vulnerable to a social engineering attackNetwork Attack SurfaceVulnerabilities over an enterprise
24、network, wide-area network, or the InternetIncluded in this category are network protocol vulnerabilities, such as those used for a denial-of-service attack, disruption of communications links, and various forms of intruder attacksSoftware Attack SurfaceVulnerabilities in application, utility, or op
25、erating system codeParticular focus is Web server softwareHuman Attack SurfaceVulnerabilities created by personnel or outsiders, such as social engineering, human error, and trusted insidersFigure 1.3 Defense in Depth and Attack SurfaceAttack SurfaceMediumSecurity RiskHighSecurity RiskLowSecurity Ri
26、skDeepLayeringShallowSmallLargeMediumSecurity RiskFigure 1.4 An Attack Tree for Internet Banking AuthenticationBank Account CompromiseUser credential compromiseUser credential guessingUT/U1a User surveillanceUT/U1b Theft of token andhandwritten notesMalicious softwareinstallationVulnerability exploitUT/U2a Hidden codeUT/U2b WormsUT/U3a Smartcard analyzersUT/U2c E-mails withm
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 第二单元电路(专项训练)-2024-2025学年四年级科学下册期中复习(教科版)
- 2024计算机基础考试策略与技巧试题及答案
- 有效复习2024年药理学考试试题及答案
- 美容师职业发展路径与考试相关试题答案
- 2024-2025员工三级安全培训考试试题(研优卷)
- 2025年员工安全培训考试试题及答案参考
- 2025工厂职工安全培训考试试题及完整答案(夺冠系列)
- 2025年员工三级安全培训考试试题带答案(B卷)
- 2025年员工安全培训考试试题4A
- 2025年安全管理员安全培训考试试题及答案7A
- 浙江省金丽衢十二校2025届高三下学期二模试题 地理 含解析
- 2024年员工知识产权与保密协议范本:企业知识产权保护实务3篇
- JGJ46-2024 建筑与市政工程施工现场临时用电安全技术标准
- GB 17790-2008家用和类似用途空调器安装规范
- 中医体质辨识共57张课件
- 魔幻泡泡秀七彩体验馆介绍
- 育苗花卉种子采购合同 修
- 表面工程学第十二章-表面微细加工技术
- 聚乙烯塑料袋检验记录新
- 《建筑桩基技术规范》JGJ94-94送审报告
- 员工入职确认单
评论
0/150
提交评论