




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、OverviewC o n fid e n tia lityDataandservicesFigure 1.1 The Security Requirements TriadIn te g rityAvailabilityConfidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary informationIntegrity Guarding agains
2、t improper information modification or destruction, including ensuring information nonrepudiation and authenticityAvailability Ensuring timely and reliable access to and use of informationLowThe loss could be expected to have a limited adverse effect on organizational operations, organizational asse
3、ts, or individualsModerateThe loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individualsHighThe loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individualsC
4、omputer security is not as simple as it might first appear to the novicePotential attacks on the security features must be consideredProcedures used to provide particular services are often counterintuitivePhysical and logical placement needs to be determinedAdditional algorithms or protocols may be
5、 involvedAttackers only need to find a single weakness, the developer needs to find all weaknessesUsers and system managers tend to not see the benefits of security until a failure occursSecurity requires regular and constant monitoringIs often an afterthought to be incorporated into a system after
6、the design is completeThought of as an impediment to efficient and user-friendly operationassetsthreatsFigure 1.1 Security Concepts and RelationshipsThreat agentswish to minimizewish to abuseand/ormay damagetotothatincreasegiverise toOwnerscountermeasuresriskimposevaluetoreduceHardwareSoftwareDataCo
7、mmunication facilities and networksCategories of vulnerabilities Corrupted (loss of integrity) Leaky (loss of confidentiality) Unavailable or very slow (loss of availability)Threats Capable of exploiting vulnerabilities Represent potential security harm to an assetAttacks (threats carried out) Passi
8、ve attempt to learn or make use of information from the system that does not affect system resources Active attempt to alter system resources or affect their operation Insider initiated by an entity inside the security parameter Outsider initiated from outside the perimeterCountermeasuresMeans used
9、to deal with security attacksPreventDetectRecoverMay itself introduce new vulnerabilitiesResidual vulnerabilities may remainGoal is to minimize residual level of risk to the assets*Table is on page 40 in the textbook.Table 1.2 Threat Consequences, and the Types of Threat Actions That Cause Each Cons
10、equence Based on RFC 4949 Threat Consequence Threat Action (Attack) Unauthorized Disclosure A circumstance or event whereby an entity gains access to data for which the entity is not authorized. Exposure: Sensitive data are directly released to an unauthorized entity. Interception: An unauthorized e
11、ntity directly accesses sensitive data traveling between authorized sources and destinations. Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of
12、communications. Intrusion: An unauthorized entity gains access to sensitive data by circumventing a systems security protections. Deception A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. Masquerade: An unauthorized entity gains acces
13、s to a system or performs a malicious act by posing as an authorized entity. Falsification: False data deceive an authorized entity. Repudiation: An entity deceives another by falsely denying responsibility for an act. Disruption A circumstance or event that interrupts or prevents the correct operat
14、ion of system services and functions. Incapacitation: Prevents or interrupts system operation by disabling a system component. Corruption: Undesirably alters system operation by adversely modifying system functions or data. Obstruction: A threat action that interrupts delivery of system services by
15、hindering system operation. Usurpation A circumstance or event that results in control of system services or functions by an unauthorized entity. Misappropriation: An entity assumes unauthorized logical or physical control of a system resource. Misuse: Causes a system component to perform a function
16、 or service that is detrimental to system security. Availability Confidentiality Integrity Hardware Equipment is stolen or disabled, thus denying service. An unencrypted CD-ROM or DVD is stolen. Software Programs are deleted, denying access to users. An unauthorized copy of software is made. A worki
17、ng program is modified, either to cause it to fail during execution or to cause it to do some unintended task. Data Files are deleted, denying access to users. An unauthorized read of data is performed. An analysis of statistical data reveals underlying data. Existing files are modified or new files
18、 are fabricated. Communication Lines and Networks Messages are destroyed or deleted. Communication lines or networks are rendered unavailable. Messages are read. The traffic pattern of messages is observed. Messages are modified, delayed, reordered, or duplicated. False messages are fabricated. Tabl
19、e 1.3 Computer and Network Assets, with Examples of Threats Passive AttackActive AttackAttempts to learn or make use of information from the system but does not affect system resourcesEavesdropping on, or monitoring of, transmissionsGoal of attacker is to obtain information that is being transmitted
20、Two types:oRelease of message contentsoTraffic analysisAttempts to alter system resources or affect their operationInvolve some modification of the data stream or the creation of a false streamFour categories:oReplayoMasqueradeoModification of messagesoDenial of serviceTable 1.4 Security Requirement
21、s (FIPS PUB 200) (page 1 of 2) (Table can be found on page 46 in the textbook.)Table 1.4 Security Requirements (FIPS PUB 200) (page 2 of 2) (Table can be found on page 47 in the textbook.)Economy of mechanismFail-safe defaultsComplete mediationOpen designSeparation of privilegeLeast privilegeLeast c
22、ommon mechanismPsychological acceptabilityIsolationEncapsulationModularityLayeringLeast astonishmentConsist of the reachable and exploitable vulnerabilities in a systemExamples:Open ports on outward facing Web and other servers, and code listening on those portsServices available on the inside of a
23、firewallCode that processes incoming data, email, XML, office documents, and industry-specific custom data exchange formatsInterfaces, SQL, and Web formsAn employee with access to sensitive information vulnerable to a social engineering attackNetwork Attack SurfaceVulnerabilities over an enterprise
24、network, wide-area network, or the InternetIncluded in this category are network protocol vulnerabilities, such as those used for a denial-of-service attack, disruption of communications links, and various forms of intruder attacksSoftware Attack SurfaceVulnerabilities in application, utility, or op
25、erating system codeParticular focus is Web server softwareHuman Attack SurfaceVulnerabilities created by personnel or outsiders, such as social engineering, human error, and trusted insidersFigure 1.3 Defense in Depth and Attack SurfaceAttack SurfaceMediumSecurity RiskHighSecurity RiskLowSecurity Ri
26、skDeepLayeringShallowSmallLargeMediumSecurity RiskFigure 1.4 An Attack Tree for Internet Banking AuthenticationBank Account CompromiseUser credential compromiseUser credential guessingUT/U1a User surveillanceUT/U1b Theft of token andhandwritten notesMalicious softwareinstallationVulnerability exploitUT/U2a Hidden codeUT/U2b WormsUT/U3a Smartcard analyzersUT/U2c E-mails withm
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 銅仁職業(yè)技術(shù)學(xué)院《設(shè)計(jì)軟件應(yīng)用》2023-2024學(xué)年第二學(xué)期期末試卷
- 浙江省溫州市蒼南縣2024-2025學(xué)年數(shù)學(xué)三下期末教學(xué)質(zhì)量檢測(cè)試題含解析
- 四川省成都市達(dá)標(biāo)名校2025年高三下學(xué)期第二次調(diào)研測(cè)試英語試題含解析
- 江西師范大學(xué)《醫(yī)學(xué)微生物學(xué)C》2023-2024學(xué)年第二學(xué)期期末試卷
- 齊魯師范學(xué)院《廣告市場(chǎng)調(diào)查》2023-2024學(xué)年第二學(xué)期期末試卷
- 割膠打膠施工方案
- 工程項(xiàng)目文件及信息管理要點(diǎn)
- 山東省威海市2024-2025學(xué)年高二上學(xué)期期末考試英語試題【含答案】
- 隔斷吊頂施工方案模板
- 廣西南寧市2024-2025學(xué)年高一上學(xué)期期末教學(xué)質(zhì)量調(diào)研數(shù)學(xué)試卷
- 高數(shù)常微分方程-高階微分方程
- 項(xiàng)目總工崗位職責(zé)
- 竹里館ppt課件
- 【最新】中考?xì)v史專題復(fù)習(xí) 中外科技發(fā)展課件 新人教-新人教初中九年級(jí)全冊(cè)歷史課件
- 最新-路面標(biāo)線技術(shù)交底
- 醫(yī)院卒中質(zhì)量控制考核方案
- 立風(fēng)井瓦斯管路安裝施工組織設(shè)計(jì)
- 附件 流動(dòng)人員人事檔案轉(zhuǎn)遞通知單存根
- 計(jì)算機(jī)信息檢索第三章
- ISO22716:2007標(biāo)準(zhǔn)(中英文對(duì)照SN T2359-2009)47
- 融媒體檔案信息化管理探究
評(píng)論
0/150
提交評(píng)論