Elements of Security
Assets
Everything that has a value
Threats
Everything that potentially harms Assets
Vulnerabilities
“Vulnerabilities are weaknesses which allow a threat to occur”
(Vulns do not neccesarily cause damage)
safeguards
Means to reduce threats or vulnerabilities
Example: Access Control, Encryption, training of personell,…
Risks
Risk is a Function of
There always remains a residual Risk
Relations
Confidentiality
Integrity
Availability
No unauthorized denial of access to information / resources
denial of service
prevention of authorised access of resources or the delaying of time-critical operations
⇒ hard to prevent in real life
Privacy and Secrecy
property
state
integrity property or state
integrity a detective or preventative mechanism?
Integrity services are classified according to the following criteria
type of protection they support
data integrity mechanisms can be detective or preventative
Security Evaluation
“Security evaluation checks whether a product delivers a promised security service. ”
Security Policy
Specification of Security Properties of a System
E.g. two employees are needed to open the safe with confidential documents, only possible between 9 and 4
→ An electronic System might enforce an equivalent policy
Data origin authentication
Difference DOA from Integrity
Different from Integrity, see the following relation:
Dual of integrity difference from “no integrity”
Contingency
Contingency describes the verifiable state that the data’s integrity is intended to be unknown. Data in that state is said to be contingent.
Non-Repudiation - Differences and Relations
Diffrence DOA
Entity Authentication - Difference and Relations
… is the assurance that a given entity is involved and currently active in a communication session
DIfference to DOA:
Classifying Attackers