| title |
|---|
First Principles |
Cyberspace: The notional environment in which communication over computer networks occurs.
Alternative Definition:
- An operational domain whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange, and exploit information via interconnected and internetted information systems and their infrastructures. (US Military Joint Doctrine).
When you hear the word "cybersecurity", what do you think of?
Cybersecurity: Protection of computer systems from theft, damage, disruption, or misdirection of hardware, software, information, or services.
Foundational principles of security:
- Confidentiality: Protect information from unauthorized disclosure.
- Integrity: Ensure information isn't altered accidentally or unauthorizedly.
- Availability: Ensure information can be used when and where needed.
Example: Confidentiality
Q: Suppose Alice is connected to JFK Airport WiFi.
Bob is listening-in on the public WiFi, what can he see?
A: Bob will be able to see the contents of unencrypted messages, and additional metadata such as sender and reciever.
Alice should avoid public WiFi, but if she needs to use it, she shouldn't access anything sensitive.
WPA3 is the current standard of encrypted wireless channels.
Example: Integrity
Q: Suppose Bob made a fake JFK WiFi to trick Alice to connect.
What should Alice do?
A: Just don't connect, and if you do, don't access anything sensitive (but better to not connect).
Example: Availability
Q: Let's say Alice can't connect to the WiFi because Bob is jamming the WiFi with a denial of service attack.
A: Redundancy and whatnot.
More generally, backup stuff is important, like having backup power for a home security system.
Example: Applying CIA
Suppose your gradebook.
- C: Who should see it?
- Registrar's office? Me? Professor?
- I: Who can edit it?
- All professors? Just your professor? The TA?
- A: Is it available?
- Can I see it 24/7, from anywhere? When's maintenance?
Asset: What we care about
- e.g., info, software, hardware, bandwidth, reputation, privacy, money, etc.
Threat: Potential for occurrence of undesirable effect on asset.
- Often evaluated with respect to CIA.
Safeguard: Control implemented to reduce risk posed by a threat.
Vulnerability: Absence or weakness of safeguards.
- Allows a threat to effect assets.
Exploit: Technique that takes advantage of a vulnerability to effect an asset.
Example: Threats and Safeguards
Threats Safeguards C: Packet sniffing, file grabbing Encryption, access controls I: Spoofed emails, disk drive corruption digital signatures, backups A: DoS attacks, power failure firewall, redundant capability, back-up generator
Remember: Threats don't need malice (e.g., power failure, corruption)
Principle: Do not devote more resources than potential loss.
- Cost of Loss: How much does it cost if I fail to main CIA?
- Remember to include secondary costs.
- Cost of Prevention: How much do safeguards cost?
On Risk: Different businesses have different acceptable risks
- e.g., a healthcare company has lower acceptable risks than a coffee shop
- There are trade-offs between security and usability.
- Security is a process, not a product.
- Perfectly secure systems don't exist, but we can make them more defensible.
Q: Why would you attack systems and networks?
A: Money, reputation, revenge, social change, etc.
Goal: Make our systems harder to attack and easier to defend.
Definition:
- Systems: Hosts and networks
These four elements are from TAO Security
Access Controls:
- What has control access?
- Data, executables, hardware
- Who has control access?
- Subjects: Do-ers
- User, group membership.
- Objects: Do-ees
- Access control lists, owners.
- Subjects: Do-ers
- Enforced by security kernel / reference monitor.
Example: Types of Access Control:
- Mandatory Access Controls (MAC)
- e.g., firing an employee
- Discretionary Access Controls (DAC)
- e.g., giving files to a friend
- Role-Based Access Controls (RAC)
- e.g., an accountant only has access to files relevant to accounting
Don't forget about physical security.
Reduce the attack surface.
- Complexity is the enemy of security.
Example: Things that could be disabled
Basically, anything that is unused.
- Services
- Software
- Accounts
- Hardware (ports, peripherals, etc.)
Least-Privilege: Subjects should only have privilege for stuff their job needs.
Example: Least privilege
A janitor doesn't need to see stuff HR needs, HR doesn't need to see the stuff the CEO sees, etc.
- Logging and Auditing: What should be logged?
- Essential for troubleshooting and security and incident monitoring.
- Antivirus and Intrusion Detection
- File integrity monitoring
Example: Things that can be logged
- Permission changes
- Device information (MAC, IP, unique information)
- Time / what is accessed
- Login/logout, startup/shutdown.
- Access to important things.
- et cetera
Keep things up-to-date.
- Automatic updates should be from a trusted and controlled source.
Example: Things that should be up-to-date
- Executables (OS, services, applications, drivers)
- Antivirus and intrusion detection systems (signature and engine)
- Software inventory and version checking (check for old/unused software)
- Backups (should be up-to-date and easy/routine/validated/secure)
- Probe: Passive and active reconnaissance.
- Who is this? What can I exploit? etc.
- Penetrate: Gain initial access.
- via software vulnerabilities, weak/stolen credentials, social engineering, etc.
- Persist: Maintain access and leave no trace.
- compromised accounts, backdoor, toolkits, bots
- Propagate: Spread up and out.
- Privilege escalation, and
- Extend to other systems/networks.
- Profit: Achieve attack goals, whatever they may be.
Preventative measures can mitigate and lessen the impact of an incident and help the incident response process.
Non-Technical Prep:
- Safety/security training
- The human firewall is the first line of defense
- Implement a security policy
- Incident response plans
- Make security easy and obvious
- This is tied to having a good user experience.
Technical Prep:
- Harden systems and networks.
- Enforce security policy.
- Functional response process
Have an open mindset. Think like an attacker.
- Sometimes, answers are not intuitive.