版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、OverviewC o n fid e n tia lityDataandservicesFigure 1.1 The Security Requirements TriadIn te g rityAvailabilityConfidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary informationIntegrity Guarding agains
2、t improper information modification or destruction, including ensuring information nonrepudiation and authenticityAvailability Ensuring timely and reliable access to and use of informationLowThe loss could be expected to have a limited adverse effect on organizational operations, organizational asse
3、ts, or individualsModerateThe loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individualsHighThe loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individualsC
4、omputer security is not as simple as it might first appear to the novicePotential attacks on the security features must be consideredProcedures used to provide particular services are often counterintuitivePhysical and logical placement needs to be determinedAdditional algorithms or protocols may be
5、 involvedAttackers only need to find a single weakness, the developer needs to find all weaknessesUsers and system managers tend to not see the benefits of security until a failure occursSecurity requires regular and constant monitoringIs often an afterthought to be incorporated into a system after
6、the design is completeThought of as an impediment to efficient and user-friendly operationassetsthreatsFigure 1.1 Security Concepts and RelationshipsThreat agentswish to minimizewish to abuseand/ormay damagetotothatincreasegiverise toOwnerscountermeasuresriskimposevaluetoreduceHardwareSoftwareDataCo
7、mmunication facilities and networksCategories of vulnerabilities Corrupted (loss of integrity) Leaky (loss of confidentiality) Unavailable or very slow (loss of availability)Threats Capable of exploiting vulnerabilities Represent potential security harm to an assetAttacks (threats carried out) Passi
8、ve attempt to learn or make use of information from the system that does not affect system resources Active attempt to alter system resources or affect their operation Insider initiated by an entity inside the security parameter Outsider initiated from outside the perimeterCountermeasuresMeans used
9、to deal with security attacksPreventDetectRecoverMay itself introduce new vulnerabilitiesResidual vulnerabilities may remainGoal is to minimize residual level of risk to the assets*Table is on page 40 in the textbook.Table 1.2 Threat Consequences, and the Types of Threat Actions That Cause Each Cons
10、equence Based on RFC 4949 Threat Consequence Threat Action (Attack) Unauthorized Disclosure A circumstance or event whereby an entity gains access to data for which the entity is not authorized. Exposure: Sensitive data are directly released to an unauthorized entity. Interception: An unauthorized e
11、ntity directly accesses sensitive data traveling between authorized sources and destinations. Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of
12、communications. Intrusion: An unauthorized entity gains access to sensitive data by circumventing a systems security protections. Deception A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. Masquerade: An unauthorized entity gains acces
13、s to a system or performs a malicious act by posing as an authorized entity. Falsification: False data deceive an authorized entity. Repudiation: An entity deceives another by falsely denying responsibility for an act. Disruption A circumstance or event that interrupts or prevents the correct operat
14、ion of system services and functions. Incapacitation: Prevents or interrupts system operation by disabling a system component. Corruption: Undesirably alters system operation by adversely modifying system functions or data. Obstruction: A threat action that interrupts delivery of system services by
15、hindering system operation. Usurpation A circumstance or event that results in control of system services or functions by an unauthorized entity. Misappropriation: An entity assumes unauthorized logical or physical control of a system resource. Misuse: Causes a system component to perform a function
16、 or service that is detrimental to system security. Availability Confidentiality Integrity Hardware Equipment is stolen or disabled, thus denying service. An unencrypted CD-ROM or DVD is stolen. Software Programs are deleted, denying access to users. An unauthorized copy of software is made. A worki
17、ng program is modified, either to cause it to fail during execution or to cause it to do some unintended task. Data Files are deleted, denying access to users. An unauthorized read of data is performed. An analysis of statistical data reveals underlying data. Existing files are modified or new files
18、 are fabricated. Communication Lines and Networks Messages are destroyed or deleted. Communication lines or networks are rendered unavailable. Messages are read. The traffic pattern of messages is observed. Messages are modified, delayed, reordered, or duplicated. False messages are fabricated. Tabl
19、e 1.3 Computer and Network Assets, with Examples of Threats Passive AttackActive AttackAttempts to learn or make use of information from the system but does not affect system resourcesEavesdropping on, or monitoring of, transmissionsGoal of attacker is to obtain information that is being transmitted
20、Two types:oRelease of message contentsoTraffic analysisAttempts to alter system resources or affect their operationInvolve some modification of the data stream or the creation of a false streamFour categories:oReplayoMasqueradeoModification of messagesoDenial of serviceTable 1.4 Security Requirement
21、s (FIPS PUB 200) (page 1 of 2) (Table can be found on page 46 in the textbook.)Table 1.4 Security Requirements (FIPS PUB 200) (page 2 of 2) (Table can be found on page 47 in the textbook.)Economy of mechanismFail-safe defaultsComplete mediationOpen designSeparation of privilegeLeast privilegeLeast c
22、ommon mechanismPsychological acceptabilityIsolationEncapsulationModularityLayeringLeast astonishmentConsist of the reachable and exploitable vulnerabilities in a systemExamples:Open ports on outward facing Web and other servers, and code listening on those portsServices available on the inside of a
23、firewallCode that processes incoming data, email, XML, office documents, and industry-specific custom data exchange formatsInterfaces, SQL, and Web formsAn employee with access to sensitive information vulnerable to a social engineering attackNetwork Attack SurfaceVulnerabilities over an enterprise
24、network, wide-area network, or the InternetIncluded in this category are network protocol vulnerabilities, such as those used for a denial-of-service attack, disruption of communications links, and various forms of intruder attacksSoftware Attack SurfaceVulnerabilities in application, utility, or op
25、erating system codeParticular focus is Web server softwareHuman Attack SurfaceVulnerabilities created by personnel or outsiders, such as social engineering, human error, and trusted insidersFigure 1.3 Defense in Depth and Attack SurfaceAttack SurfaceMediumSecurity RiskHighSecurity RiskLowSecurity Ri
26、skDeepLayeringShallowSmallLargeMediumSecurity RiskFigure 1.4 An Attack Tree for Internet Banking AuthenticationBank Account CompromiseUser credential compromiseUser credential guessingUT/U1a User surveillanceUT/U1b Theft of token andhandwritten notesMalicious softwareinstallationVulnerability exploitUT/U2a Hidden codeUT/U2b WormsUT/U3a Smartcard analyzersUT/U2c E-mails withm
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 全面施工合同模板集
- 房屋貸款保險(xiǎn)合同參考
- 合作設(shè)立公司合作協(xié)議2024年
- 建筑工程價(jià)格調(diào)整合同條款12024年
- 2024年簡易工程委托協(xié)議范本
- 共同生活期間財(cái)產(chǎn)分配協(xié)議
- 2024年工廠土地轉(zhuǎn)讓合同書格式
- 環(huán)保搬遷補(bǔ)償安置資金監(jiān)管合同
- 養(yǎng)殖場(chǎng)經(jīng)營合同
- 股權(quán)投資合作協(xié)議編寫
- 第10課感覺肌理
- 鐵路人工鋪軌技術(shù)交底
- 富士M225打印機(jī)無線連接
- B737-300輪艙部件圖
- 各種注射法(課堂PPT)
- 譯林牛津英語7A-unit3-Welcome-to-our-school教案(6課時(shí))
- 第五章 種內(nèi)與種間關(guān)系
- 飛利浦16排螺旋CT機(jī)操作規(guī)程(1)
- 油菜品種田間記載項(xiàng)目與標(biāo)準(zhǔn)
- 渣土車輛駕駛員管理制度
- 德力西系列變頻器說明書
評(píng)論
0/150
提交評(píng)論