网络安全与加密_第1页
网络安全与加密_第2页
网络安全与加密_第3页
网络安全与加密_第4页
网络安全与加密_第5页
已阅读5页,还剩20页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、OverviewC o n fid e n tia lityDataandservicesFigure 1.1 The Security Requirements TriadIn te g rityAvailabilityConfidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary informationIntegrity Guarding agains

2、t improper information modification or destruction, including ensuring information nonrepudiation and authenticityAvailability Ensuring timely and reliable access to and use of informationLowThe loss could be expected to have a limited adverse effect on organizational operations, organizational asse

3、ts, or individualsModerateThe loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individualsHighThe loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individualsC

4、omputer security is not as simple as it might first appear to the novicePotential attacks on the security features must be consideredProcedures used to provide particular services are often counterintuitivePhysical and logical placement needs to be determinedAdditional algorithms or protocols may be

5、 involvedAttackers only need to find a single weakness, the developer needs to find all weaknessesUsers and system managers tend to not see the benefits of security until a failure occursSecurity requires regular and constant monitoringIs often an afterthought to be incorporated into a system after

6、the design is completeThought of as an impediment to efficient and user-friendly operationassetsthreatsFigure 1.1 Security Concepts and RelationshipsThreat agentswish to minimizewish to abuseand/ormay damagetotothatincreasegiverise toOwnerscountermeasuresriskimposevaluetoreduceHardwareSoftwareDataCo

7、mmunication facilities and networksCategories of vulnerabilities Corrupted (loss of integrity) Leaky (loss of confidentiality) Unavailable or very slow (loss of availability)Threats Capable of exploiting vulnerabilities Represent potential security harm to an assetAttacks (threats carried out) Passi

8、ve attempt to learn or make use of information from the system that does not affect system resources Active attempt to alter system resources or affect their operation Insider initiated by an entity inside the security parameter Outsider initiated from outside the perimeterCountermeasuresMeans used

9、to deal with security attacksPreventDetectRecoverMay itself introduce new vulnerabilitiesResidual vulnerabilities may remainGoal is to minimize residual level of risk to the assets*Table is on page 40 in the textbook.Table 1.2 Threat Consequences, and the Types of Threat Actions That Cause Each Cons

10、equence Based on RFC 4949 Threat Consequence Threat Action (Attack) Unauthorized Disclosure A circumstance or event whereby an entity gains access to data for which the entity is not authorized. Exposure: Sensitive data are directly released to an unauthorized entity. Interception: An unauthorized e

11、ntity directly accesses sensitive data traveling between authorized sources and destinations. Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of

12、communications. Intrusion: An unauthorized entity gains access to sensitive data by circumventing a systems security protections. Deception A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. Masquerade: An unauthorized entity gains acces

13、s to a system or performs a malicious act by posing as an authorized entity. Falsification: False data deceive an authorized entity. Repudiation: An entity deceives another by falsely denying responsibility for an act. Disruption A circumstance or event that interrupts or prevents the correct operat

14、ion of system services and functions. Incapacitation: Prevents or interrupts system operation by disabling a system component. Corruption: Undesirably alters system operation by adversely modifying system functions or data. Obstruction: A threat action that interrupts delivery of system services by

15、hindering system operation. Usurpation A circumstance or event that results in control of system services or functions by an unauthorized entity. Misappropriation: An entity assumes unauthorized logical or physical control of a system resource. Misuse: Causes a system component to perform a function

16、 or service that is detrimental to system security. Availability Confidentiality Integrity Hardware Equipment is stolen or disabled, thus denying service. An unencrypted CD-ROM or DVD is stolen. Software Programs are deleted, denying access to users. An unauthorized copy of software is made. A worki

17、ng program is modified, either to cause it to fail during execution or to cause it to do some unintended task. Data Files are deleted, denying access to users. An unauthorized read of data is performed. An analysis of statistical data reveals underlying data. Existing files are modified or new files

18、 are fabricated. Communication Lines and Networks Messages are destroyed or deleted. Communication lines or networks are rendered unavailable. Messages are read. The traffic pattern of messages is observed. Messages are modified, delayed, reordered, or duplicated. False messages are fabricated. Tabl

19、e 1.3 Computer and Network Assets, with Examples of Threats Passive AttackActive AttackAttempts to learn or make use of information from the system but does not affect system resourcesEavesdropping on, or monitoring of, transmissionsGoal of attacker is to obtain information that is being transmitted

20、Two types:oRelease of message contentsoTraffic analysisAttempts to alter system resources or affect their operationInvolve some modification of the data stream or the creation of a false streamFour categories:oReplayoMasqueradeoModification of messagesoDenial of serviceTable 1.4 Security Requirement

21、s (FIPS PUB 200) (page 1 of 2) (Table can be found on page 46 in the textbook.)Table 1.4 Security Requirements (FIPS PUB 200) (page 2 of 2) (Table can be found on page 47 in the textbook.)Economy of mechanismFail-safe defaultsComplete mediationOpen designSeparation of privilegeLeast privilegeLeast c

22、ommon mechanismPsychological acceptabilityIsolationEncapsulationModularityLayeringLeast astonishmentConsist of the reachable and exploitable vulnerabilities in a systemExamples:Open ports on outward facing Web and other servers, and code listening on those portsServices available on the inside of a

23、firewallCode that processes incoming data, email, XML, office documents, and industry-specific custom data exchange formatsInterfaces, SQL, and Web formsAn employee with access to sensitive information vulnerable to a social engineering attackNetwork Attack SurfaceVulnerabilities over an enterprise

24、network, wide-area network, or the InternetIncluded in this category are network protocol vulnerabilities, such as those used for a denial-of-service attack, disruption of communications links, and various forms of intruder attacksSoftware Attack SurfaceVulnerabilities in application, utility, or op

25、erating system codeParticular focus is Web server softwareHuman Attack SurfaceVulnerabilities created by personnel or outsiders, such as social engineering, human error, and trusted insidersFigure 1.3 Defense in Depth and Attack SurfaceAttack SurfaceMediumSecurity RiskHighSecurity RiskLowSecurity Ri

26、skDeepLayeringShallowSmallLargeMediumSecurity RiskFigure 1.4 An Attack Tree for Internet Banking AuthenticationBank Account CompromiseUser credential compromiseUser credential guessingUT/U1a User surveillanceUT/U1b Theft of token andhandwritten notesMalicious softwareinstallationVulnerability exploitUT/U2a Hidden codeUT/U2b WormsUT/U3a Smartcard analyzersUT/U2c E-mails withm

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论