What is computer security?
Computer security is the protection of the items that a subject values, called the assets ofa computer or computer systems.
Assets: hardware, software,data,people,processes,reputation,…: their value is subjective:based on the asset owner’s or user’s perspective.
Another definition: Computer security deals with the prevention and detection of unauthorizedaccess by users of a computer system.
What are the three different types of security violations?
In 1972 James Anderson identified three different types of security violation in computer systems:
What is a security policy?
A statement that defines the security objectives of an organization; it has to state what needs to be protected; it may also indicate how this is to be done.
Why might security violations occur?
Security violations mightoccur because of:
What is a bug?
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
Examples: mistakes and errors in a program’s source code, its design, in components,and operating systems
The term “bug” was used in an account by Grace Hopper, who publicized the cause of a malfunction in an early electromechanical computer.
“In 1946, when Hopper was released from active duty, she joined the Harvard Faculty at the Computation Laboratory where she continued her work on the Mark II and Mark III. Operators traced an error in the Mark II to a moth trapped in a relay, coining the term bug. This bug was carefully removed and taped to the log book. Stemming from the first bug,today we call errors or glitches in a program a bug.”
What is a vulnerability?
Avulnerability is a flaw in the design or implementation of a computer system that could lead to a security violation.
Examples of vulnerabilities include:
A vulnerability represents a threat to the security of a system.
What is the lifecycle of a vulnerability?
A vulnerability life goes through several phases:
What is a zero-day vulnerability?
A zero-day vulnerability (0-day vulnerability) is an undisclosed computer-software vulnerability that attackers can exploit to adversely affect computer programs, data, additional computers or a network. It is known as a “zero-day” because it is not publicly reported or announced before becoming active, leaving the software’s author with zero days in which to create patches or advise workarounds to mitigate against its actions. Zero-day attacks can occur because a vulnerability window exists between the time a threat is released and the time security vendors release patches.Zero-day attacks are a severe threat.
Where can you find a list of known vulnerabilities?
Common Vulnerabilities and Exposures (CVE) - Database of known security vulnerabilities and exposures
What is CVSS?
Common Vulnerability Scoring System (CVSS) - Standard measurement system to score vulnerability impact
What is exposure?
An information security “exposure” is a system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network. CVE considers a configuration issue or a mistake an exposure if it does not directly allow compromise but could be an important component of a successful attack, and is a violation of a reasonable security policy. An “exposure” describes a state in a computing system (or set of systems) that is not a vulnerability, but either:
What are some examples of exposures?
Examples of exposures include:
What are the three metrics CVSS is composed of?
What are some other vulnerability scoring systems?
ERT/CC produces a numeric score ranging from 0 to 180 but considers such factors as whether the Internet infrastructure is at risk and what sort of preconditions are required to exploitthe vulnerability.
The SANS vulnerability analysis scale considers whether the weakness is found in default configurations or clientor server systems.
Microsoft’s proprietary scoring system tries to reflect the difficulty of exploitation and the overall impactofthe vulnerability
What is the CVSS vector?
When the base metrics are assigned values, the base equation calculates a score ranging from 0 to 10,and a vector is created.
The vector facilitates the “open” nature of the framework. It is a text string that contains the values assigned to each metric, and it is used to communicate exactly how the score for each vulnerability is derived.
What is the latest version of CVSS and what did it include?
The new version is CVSS v3.0.
New metrics such as Scope (S) and User Interaction (UI) were added including old metrics such as Authentication (Au) being changed to newer ones such as Privileges Required(PR).
The Environmental Metrics group also saw an new addition with the Modified Base Metrics, allowing analysts to customize CVSS scores based on the host that has been affected in the analyst’s organisation,making it contextual when required to be
What is a threat?
A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
A threat can be either “intentional” (e.g., an individual cracker or a criminal organization) or “accidental” (e.g., the possibility of a computer malfunctioning, or natural disasters, such as an earthquake,a fire, or a tornado).
What must an attacker know in order to exploit a vulnerability?
A vulnerability might be exploited by an attacker to create a security violation. In order to exploitthe vulnerability:
Where can attacks come from and which pose the biggest threat?
When we discuss security, we will often refer to attackers, i.e. active opponents of system security.
There are, of course, many types of attacker, each of which poses different threats. It is important to be aware of possible attacks from both insiders (individuals with legitimate access to parts of system) and outsiders (other parties).
Insider attacks are a huge threat in practice,and are difficultto defend against
What are the phases of an attack?
What is STRIDE?
STRIDE is a system developed by Microsoft for thinking about computer security threats. It provides a mnemonic for security threats in six categories.
Spoofing: an agent pretends to be somebody else (e.g., to avoid responsibility or misuse authority).
Tampering: violates the integrity of an asset (e.g., security settings are changed).
Repudiation: an agent denies having performedan action to escape responsibility.
Information disclosure: violates the confidentiality of an asset.
Denial of service: violates the availability ofan asset.
Elevation of privileges: an agent gains more privileges beyond its entitlement
What is DREAD?
DREAD is part of a system for risk-assessing threats that provides a mnemonic for risk rating using five categories:
Damage - how bad would an attack be?
Reproducibility - how easy is it to reproduce the attack?
Exploitability - how much work is it to launch the attack?
Affected users - how many people will be impacted?
Discoverability - how easy is it to discover the threat?
E.g. (damage): If a threat exploitoccurs,how much damage will be caused? 0 = Nothing 5 = Individual user data is compromised or affected. 10 = Complete system or data destruction
Risk_DREAD = (DAMAGE + REPRODUCIBILITY + EXPLOITABILITY + AFFECTED USERS+ DISCOVERABILITY)/ 5
What does an attacker need to ensure access?
An attacker must have three things to ensure access: method, opportunity and motive.
Method (how): skills, knowledge,tools,…
Opportunity (when): time and access to execute an attack
Motive (why) :a reason to want to attack, Money, Fame, Self-esteem, Politics, Terror