CSCL Chapter 1 Introduction To Computer Security
CSCL Chapter 1 Introduction To Computer Security
CHAPTER 1
Cyber Security attacks refer to the sets of actions that the threat actors perform to gain any
unauthorized access, cause damage to systems or computers, steal data, or compromise the
computer networks. An attacker can launch a cyber-attack from any location. The attacker can
also be an individual or even a group. There are various TTP (tactics, techniques, and procedures)
to do so.
o Active attacks
An active assault tries to change system resources or interfere with their functionality. Active
attacks entail some form of data stream manipulation or false statement generation.
An active attack is a network exploit in which a hacker attempts to make changes to data on
the target or data en route to the target.
o Passive attacks
A passive attack does not eat up system resources and instead makes an effort to gather or
use information from the system. Attacks that are passive in nature spy on or keep tract of
transmission.
Cyber Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security
attack.
Cyber Security Service: A service that enhances the security of data, information, systems or network.
Example, Authentication, Authorization, confidentiality, integrity etc. A security service makes use of one
or more security mechanisms.
B. Integrity
The term ‘integrity’ means guarding against improper information modification or destruction, and
includes ensuring information non-repudiation and authenticity.
Data Integrity: Assures that information and programs are changed only in a specified and authorized
manner.
System Integrity: Assures that a system performs its intended function in appropriate manner, free
from unauthorized manipulation of the system.
C. Availability
Assures that systems works normally and service is not denied to authorize users. It ensures timely
and reliable access to intended users when they need it under any circumstances, including power
outage or natural disasters.
B. Modification or Alteration
Unauthorized change of information. If modified data controls the operation of the system,
threats of failure may arise.
It is an active for of security attack.
Example, man-in-the-middle attack in which intruder reads messages from sender and sends
modified data to the receiver without knowing the changes.
C. Masquerading or Spoofing
Imitate (something) while exaggerating its characteristic feature for cosmic effect.
One entity pretends to be a different entity.
Example, if a user tried to log into a computer across the internet but instead reaches another
computer that claims to be the desired one.
Or if a user tried to read a file, but an attacker has arranged for the user to be given a different
file.
D. Repudiation of Origin
Repudiation is the ability to deny that you did something. Non repudiation is the ability to prove
that you did something.
Example: in a mobile banking app, a user (and potentially an abuser or attacker) creates a
transaction and sends money from one account to another. Afterward, the user claims that they
did not create the transaction and that the money must have been sent by someone else.
E. Denial of Receipt
A false denial that an entity received some information or message.
Example, a customer orders an expensive product with earlier payment and the vendor ships it.
If the customer has already received the product, the attacker may deny that the product is
delivered. The vendor can defend against this attack only by providing that the customer did,
despite his denials, receive the product.
F. Delay
Usually delivery of a message or service requires some time t.
If an attacker can force the delivery to take more than time t, the attacker successfully delayed
delivery. This involves manipulation of system control structures, such as network components or
server components which is a form of attack.
G. Denial of Service
The attacker prevents a server from providing a service.
The denial may occur at the source (by preventing the server from obtaining the resources), at
the destination (by blocking the communications from the server) or along the intermediate path
(by discarding messages from either the client or the server, or both).
It possess the same threat as an infinite delay.
Operational Issues:
A. Cost- Benefit Analysis
Balance between benefits of the protection and the cost of designing, implementing and using
the mechanism.
If the data or resources cost less than their protection, adding security mechanisms or procedures
is not cost-effective.
Example, Database of salary information system in banks: main office and branch offices.
B. Risk Analysis
Priority should be given to the tasks that have higher importance.
Potential threats and possible effects of attack should be analyzed.
Example, network with internet and without internet.
Human Issues:
A. Organizational Problems
Unless the loss occurs, organization believes that they are wasting effort in security.
Security adds added complexity to simple operations, which may cause decrease in productivity.
Comparison between losses caused due to security attack and financial loss due to added security
mechanisms.
B. People Problem
Technological controls depends on human operations.
Risk of human intervention.
Example, A computer system authenticates a user by asking that user for a secret code. If the
correct code is supplied, the computer assumes that the user is authorized to use the system. So,
unauthorized person can masquerade the system.
3. Confidentiality Policy
A confidentiality policy is a security policy dealing only with confidentiality.
Both Military policies and Confidentiality policies deal with the confidentiality. However, a
confidentiality policy does not deal with integrity all all whereas a military policy may.
4. Integrity Policy
An integrity policy is a security policy dealing only with integrity.
Commercial policy may deal with confidentiality also but integrity policy does not.
Roles are defined according to job competency, authority, and responsibility within the
enterprise.
In RBAC, roles can be easily created, changed, or discontinued as the needs of the enterprise
evolve.
The components of RBAC such as role-permissions and user-role relationships make it simple to
perform user assignment.
It is used by the majority of enterprises with more than 500 employees.
This model is the combination of mandatory Access Control and Discretionary Access Control.
The Bell-LaPadula Model stands on the basis of 3 properties.
Property 1: No read-up
o This is a property which says an associate can’t read any documents prepared by his/her
higher officials.
o The documents are highly confidential or may be strategic and can’t be disclosed to lower
level officials.
Property 2
o A user is not allowed to write (alter) access to object with lower security level than the
current security level of subject.
Property 3:
o This is an access control which is based on the identity of the subjects. If a subject has
certain type of access on the object, he/she can transfer rights to other subject of their
choice.
[A subject is usually a human user or process running in memory. An object is any resource that
exists anywhere a subject can access it (in memory, on disk, across a communications channel, in
"the cloud", etc.). Subjects are active and objects are passive.]
Example 1
The truth about the existence of space aliens would probably be something that is Top Secret.
***TOP SECRET***
Example 2
Compared to aliens, the statistics on the number of Navy SEALS unofficially fighting with the Peshmerga
in Kurdistan would probably be labeled a Secret.
***SECRET***
Example 3
What about the number of staplers being delivered to the Pentagon? It seems like a trivial piece of
information, but according to the government it could also be considered a secret. It's not as secretive as
aliens or military commandos, so it might just get a classification label of "Confidential".
***CONFIDENTIAL***
All these types of secret may one day have to transverse from one secure system to the next.
Intelligence may need to go from a server that is Secret, to a server that is Top Secret.
This was why The Bell-LaPadula Model was created, to manage a multiple-level security system.
To manage the flow of different types of secrets, the Bell-LaPadula model utilizes 3 rules:
The tranquility principle of the Bell–LaPadula model states that the classification of a subject or object
does not change while it is being referenced. There are two forms to the tranquility principle: the
"principle of strong tranquility" states that security levels do not change during the normal operation of
the system. The "principle of weak tranquility" states that security levels may never change in such a way
as to violate a defined security policy. Weak tranquility is desirable as it allows systems to observe
the principle of least privilege. That is, processes start with a low clearance level regardless of their
owner’s clearance, and progressively accumulate higher clearance levels as actions require it.
Limitations:
Limitations:
Focuses only on integrity.
System performance and monitoring is difficult due to the denied access to lower level
information.