chapter 1 lecture notes Principles Cybersecurity

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a security?

A state of being secure and free from danger or harm; the actions taken to make someone or something secure."

The 1960s

Advanced Research Projects Agency (ARPA) began to examine the feasibility of redundant networked communications Larry Roberts developed the ARPANET from its inception

1978

Bisbey and Hollingsworth publish their study "Protection Analysis: Final Report," which discussed the Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system security and examine the possibility of automated vulnerability detection techniques in existing system software.

CIA Triad

Confidentiality, Integrity, Availability

1979

Dennis Ritchie publishes "On the Security of UNIX" and "Protection of Data File Contents," which discussed secure user IDs, secure group IDs, and the problems inherent in the systems.

1982 2

Grampp and Morris write "The UNIX System: UNIX Operating System Security." In this report the authors examined four "important handles to computer security": physical control of primes and computer facilities, management commitment to security objectives, education of employees, and administrative procedures aimed at increased security

SDLC waterfall methodology

Investigation Analysis Logical Design Physical Design Implementation Maintenance and Change

1968

Maurice Wilkes discusses password security in Time - Sharing Computer Systems.

1975

The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard) In the Federal Register.

1982 1

The US. Department of Defense Computer Security Evaluation Center publishes the first version of the Trusted Computer Security (TCSEC) documents, which came to be known as the Rainbow Series

Late 1970s

The microprocessor expanded computing capabilities and security threats.

what is another definition of security?

The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information •Includes information security management, data security, and network security

1970

Willis H. Ware author the report Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security—RAND R.609 which was not declassified until 1979. It became known as the seminal work identifying the need for computer Security.

Mainframe

, time-sharing operating system was developed in the mid-1960s by General Electric (GE), Bell Labs, and Massachusetts Institute of Technology (MIT)‏.

activities of initiation

-Delineation of business requirements in terms of confidentiality, integrity, and availability -Determination of information categorization and identification of known special handling requirements to transmit, store, or create information Determination of any privacy requirements

NIST Special Publication 800-64, rev. 2 maintains that early integration of security in the SDLC enables agencies to maximize return on investment through:

-Early identification and mitigation of security vulnerabilities and misconfigurations -Awareness of potential engineering challenges -Identification of shared security services and reuse of security strategies and tools -Facilitation of informed executive decision making

Using a methodology

-Ensures a rigorous process with a clearly defined goal -Increases probability of success

•C.I.A. triad

-Is a standard based on confidentiality, integrity, and availability, now viewed as inadequate. -Expanded model consists of a list of critical characteristics of information.

•Some commonplace security principles

-Keep design simple and small -Access decisions by permission not exclusion -Every access to every object checked for authority -Design depends on possession of keys/passwords -Protection mechanisms require two keys to unlock -Programs/users utilize only necessary privileges

•Some commonplace security principles also

-Minimize mechanisms common to multiple users -Human interface must be easy to use so users routinely/automatically use protection mechanisms.

SwA CBK, which is a work in progress, contains the following sections

-Nature of Dangers -Fundamental Concepts and Principles -Ethics, Law, and Governance -Secure Software Requirements -Secure Software Design -Secure Software Construction -Secure Software Verification, Validation, and Evaluation -Secure Software Tools and Methods -Secure Software Processes -Secure Software Project Management -Acquisition of Secure Software Secure Software Sustainment

•Fundamental problems with ARPANET security were identified.

-No safety procedures for dial-up connections to ARPANET -Nonexistent user identification and authorization to system

•A successful organization should have multiple layers of security in place to protect:

-Operations -Physical infrastructure -People -Functions -Communications -Information

Seldom works, as it lacks a number of critical features

-Participant support -Organizational staying power

•Several MULTICS key players created UNIX.

-Primary purpose of UNIX was text processing.

The scope of computer security grew from physical security to include

-Securing the data -Limiting random and unauthorized access to data -Involving personnel from multiple levels of the organization in information security

1973

Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes on the Design of Secure Military Computer Systems.

Grassroots effort

Systems administrators attempt to improve security of their systems

Security in the Systems Development Life Cycle

Systems development life cycle methodology

U.S. Department of Defense and Department of Homeland Security supported the Software Assurance Initiative

which resulted in the publication of Secure Software Assurance (SwA) Common Body of Knowledge (CBK).

Analysis

•Consists of assessments of: -The organization -Current systems -Capability to support proposed systems •Analysts determine what the new system is expected to do and how it will interact with existing systems. •Analysis ends with documentation of findings and an update of feasibility.

bottom-up approach

•Grassroots effort: Systems administrators attempt to improve security of their systems. •Key advantage: technical expertise of individual administrators •Seldom works, as it lacks a number of critical features: -Participant support -Organizational staying power

top-down approach

•Initiated by upper management -Issue policy, procedures, and processes -Dictate goals and expected outcomes of project -Determine accountability for each required action The most successful type of top-down approach also involves a formal development strategy referred to as systems development life cycle

The NIST Approach: Development/Acquisition

•Key security activities include: -Conducting risk assessment and using results to supplement baseline security controls -Analyzing security requirements -Performing functional and security testing -Preparing initial documents for system certification and accreditation Designing security architecture

Maintenance and Change

•Longest and most expensive phase •Consists of the tasks necessary to support and modify the system for the remainder of its useful life •Life cycle continues until the team determines the process should begin again from the investigation phase •When current system can no longer support the organization's mission, a new project is implemented

Early focus of computer security research centered on a system called

•Multiplexed Information and Computing Service (MULTICS)‏.

Implementation

•Needed software is created. •Components are ordered, received, and tested. •Users are trained and supporting documentation created. •Feasibility analysis is prepared. -Sponsors are presented with the system for a performance review and acceptance test.

90S

•Networks of computers became more common, as did the need to connect them to each other. •Internet became the first global network of networks. •Initially, network connections were based on de facto standards. •In early Internet deployments, security was treated as a low priority. •In 1993, DEFCON conference was established for those interested in information security.

Physical Design

•Specific technologies are selected to support the alternatives identified and evaluated in the logical design. •Selected components are evaluated on make-or-buy decision. •Feasibility analysis is performed. •Entire solution is presented to organization's management for approval.

2000 to Present

•The Internet brings millions of unsecured computer networks into continuous communication with each other. •The ability to secure a computer's data was influenced by the security of every computer to which it is connected. •Growing threat of cyber attacks has increased the awareness of need for improved security. -Nation-states engaging in information warfare

Logical Design

•The first and driving factor is the business need. -Applications are selected to provide needed services. •Data support and structures capable of providing the needed inputs are identified. •Specific technologies are delineated to implement the physical solution. •Analysts generate estimates of costs and benefits to allow comparison of available options. Feasibility analysis is performed at the end.

investigation

•What problem is the system being developed to solve? •Objectives, constraints, and scope of project are specified. •Preliminary cost-benefit analysis is developed. •At the end of all phases, a process is undertaken to assess economic, technical, and behavioral feasibilities and ensure implementation is worth the time and effort.

Methodology

•a formal approach to solving a problem based on a structured sequence of procedures

Systems development life cycle (SDLC

•a methodology for the design and implementation of an information system

(1970s and 80s) ARPANET grew in popularity, as did

•its potential for misuse.

Information security began with RAND Report R-609

•paper that started the study of computer security and identified the role of management and policy issues in it)‏.

Key advantage

•technical expertise of individual administrators

1984

Reeds and Weinberger publish "File Security and the UNIX System Crypt Command." Their premise was: "No technique can be secure against wiretapping or is equivalent on the computer. Therefore no technique can be secure against the system administrator or other privileged users... the naive user have no chance."

1992

Researchers for the Internet Engineering Task force, working at the Naval Research Laboratory, develop the Simple Internet Protocol Plus (SIPP) Security protocols, creating what is now known as IPSEC security

Security should be considered

a balance between protection and availability.

What is Information Security

a critical business capability that needs to be aligned with corporate expectations and culture that provides the leadership and insight to identify risks and implement effective controls.

To achieve balance, the level of security must

allow reasonable access, yet protect against threats.

A computer can be the subject of

an attack and/or the object of an attack.

procedures

are another frequently overlooked component. Procedures are written instructions for accomplishing a specific task.

the enigma

caused considerable anguish to Allied forces before finally being cracked

When it is the subject of an attack, the computer is used as an active tool to

conduct attack

availability

enables authorized users to access info without interference it in the required format

Groups developing code-breaking computations during World War II created

first modern computers. Multiple levels of security were implemented.

Vulnerabilities

flaws in programs that can be exploited to either crash the system or take control of it

Computer security began

immediately after the first mainframes were developed

Rudimentary

in defending against physical theft, espionage, and sabotage

software

includes applications, operating systems, and assorted command utilities. Software is perhaps the most difficult IS component to secure.

integrity

is a whole, complete and uncorrupted

Software Assurance

is an approach to software development that seeks to build security into the development life cycle rather than address it at later stages. SA attempts to intentionally create software free of vulnerabilities and provide effective, efficient software that users can deploy with confidence.

Network

is the IS component that created much of the need for increased computer and information security.

Hardware

is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system

Impossible to obtain perfect information security

it is a process, not a goal.

the probability of an unwanted occurrence, such as an adverse event or loss, is known as a

loss

The NIST Approach: Initiation

security considerations are key to diligent and early integration, thereby ensuring that threats, requirements, and potential constraints in functionality and integration are considered. At this point, security is looked at more in terms of business risks, with input from the information security office.

First operating system was created with

security integrated into core functions.

Physical controls limiting access to

sensitive military locations to authorized personnel

SwA CBK

serves as a strongly recommended guide to developing more secure applications

data

stored, processed, and transmitted by a computer system must be protected. Data is often the most valuable asset of an organization and therefore is the main target of intentional attacks.

When it is the object of an attack,

the computer is the entity being attacked.

Risk

the probability of an unwanted occurrence. Organizations must minimize risks to match their risk appetite - the quantity and nature of risk they are willing to accept

authenticity

the quality or state of being genuine or original, rather a reproduction or fabrication

Utility

the quality or state of having value for some purpose or end.

possesion

the quality or state of ownership or control

Accuracy

when it is free from mistakes or errors, and has a value that the end user expects

Confidentiality

when its protected from disclosure or exposure to unauthorized individuals or systems.


संबंधित स्टडी सेट्स

PSYC330 - Abnormal Child Psyc - Exam 2

View Set

International Business Chapter 9

View Set

Sapling Learning Questions Test 2

View Set