Data Breach
A confirmed incident in which sensitive, confidential, or otherwise protected data has been accessed or disclosed in an unauthorized fashion.
ex: PHI (personal health information), PII (personally identifiable information), trade secrets, intellectual property
Security Concepts (AKA CIA Triad) (SC)
From top, right, left:
From left, right, bottom:
[SC] Authentication vs Authorization
- Authorization (2nd): decides if you have permissions to access a resource
Top 10 Security Principles
Security w/in an SDLC (S in SDLC)
Software security best practices involve explicitly thinking about the security situations throughout the SDLC.
[Security Terms] Vulnerability
A weakness (in an information system, security system procedure, or implementation) that could be exploited/triggered.
[Security Terms] Threat
A potential violation or security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
[Security Terms] Threat Agent
An individual or group which can manifest a threat.
[Security Terms] Asset
A major app, general support system, high impact project, physical plant, mission critical system, personnel, equipment, or a logically related group of systems.
[Security Terms] Risk
(level of threat) * (level of vulnerability). Likelihood of a successful attack.
[Security Terms] Countermeasure
Reactive methods use to prevent an exploit from successfully occurring once a threat has been detected.
ex: IPS (intrusion prevention systems), patches, access control lists, malware filters
[Security Terms] Security Model
Application Threat Modeling [ATM]
An structured approach for analyzing the security of an application that enables you to identify, quantify, and address the security risks with an application.
[ATM] Process
1) Identify Assets
2) Create an Architecture Overview
3) Decompose the Application
4) Identify the Threats
5) Document the Threats
6) Rate the Threats
Security Design Practices
Security Testing [ST]
A type of software testing that intends to uncover vulnerabilities of the system and determine that its data and resources are protected from intruders.
[ST] of an Application Component (AST)
[AST] Static vs Dynamic
STATIC
DYNAMIC
[AST] Coverage
STATIC (N.I.C.T)
DYNAMIC (B.A.R.S)
BOTH (S.X.X.L.H.B)
[ST] Principles
[ST] Techniques