Security+ All-In-One Edition Chapter 1 – General Security Concepts

Slides:



Advertisements
Similar presentations
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Access Control Methodologies
VM: Chapter 5 Guiding Principles for Software Security.
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Security+ Guide to Network Security Fundamentals, Third Edition
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
C. Edward Chow Presented by Mousa Alhazzazi C. Edward Chow Presented by Mousa Alhazzazi Design Principles for Secure.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Defense-in-Depth What Is It?
Troubleshooting Windows Vista Security Chapter 4.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Information Systems Security
Chapter 1  Introduction 1 Chapter 1: Introduction.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Access Control for Security Management BY: CONNOR TYGER.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
General Security Concepts
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CS457 Introduction to Information Security Systems
Port Knocking Benjamin DiYanni.
Critical Security Controls
Cybersecurity First Principles
Chapter One: Mastering the Basics of Security
Security Standard: “reasonable security”
Chapter3 Security Strategies.
Configuring Windows Firewall with Advanced Security
CompTIA Server+ Certification (Exam SK0-004)
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Understanding Security Layers
Chapter 2: System Structures
How to Mitigate the Consequences What are the Countermeasures?
Lecture 3: Secure Network Architecture
Network hardening Chapter 14.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Mohammad Alauthman Computer Security Mohammad Alauthman
Chapter Goals Discuss the CIA triad
6. Application Software Security
Implementing Firewalls
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Session 1 – Introduction to Information Security
Chapter 5 Computer Security
Presentation transcript:

Security+ All-In-One Edition Chapter 1 – General Security Concepts Brian E. Brzezicki

Basic Security Concepts

First Some Terms (NB) First we have to discuss some terms we will use again and again Protocol – an official set of steps or language for communication Algorithm – a specific set of steps to solve a problem or do some task String – a series of characters. Example if a character can be a-z and 0-9 an 8 character string might be “ar01z14b” Control – a countermeasure or attempt to mitigate a security risk. Example. A firewall is technical control. Policies are HR controls. Encryption is a technical control.

CIA No… Not that CIA

CIA* (7) 3 Fundamental Principles of Security Confidentiality Integrity Availability

Operational Model of Security (8) Focus is no longer just on prevention Security now is Prevention What are some preventative controls/measures? Detection What are some detective controls/measures? Response What are some response controls/measures? Protection = Prevention + Detection + Response

Security Models and Concepts

Network Based Security (9) Focuses on protecting a network from outside attackers by placing security devices on the “perimeter” (see visualization next slide) Firewalls IDS Anti-virus Problems? Internal attackers Little protection of network controls are taken out or bypassed

Network Based Security

Host Based Security

Host Based Security (9) Focuses on protecting a specific machine at the machine level. Each computer protects itself Locked down/bastion host model Resource Permissions Host based firewalls HIDS Anti-virus Patching and updating All machines should have host based security Problems / Advantages of this model?

Host and Network Based (12) The ideal model would have components of both Network Based Security along with Host Based Security, this is one example of Layered Security.

Layered Security (12) No one security should be completely relied upon. Instead have many overlapping security controls. Network based firewall Host based firewall IDS system Access controls Proper patching and maintenance practices This is also referred to as “Defense in Depth”

Diversity of Defense (14) Similar but different to defense in depth/layered security. But in this case each layer consists of multiple versions of the same thing. Example – use 2 firewalls to protect your network, from different vendors. That way of someone hacks your first firewall, they should not be able to easily hack your second firewall, and hopefully that will stop them. (see next slide)

Diversity of Defense

Security Through Obscurity (15) Invalid method of security. The idea is that you don’t let people know what you use or how it works. This does help and can be practiced however it should not be relied upon or considered any valid measure of security. Example. You should generally NOT give any information about your systems or networks to people. However this alone is not security, and relying on hiding information rather than truly SECURE information, is NOT a valid security. Ex. It’s not a bad idea to change the default port for ssh from port 22 to something else, but that does not really “secure” ssh in any fashion. Remember when the NT 4.0 code was stolen and published online?

Keep it Simple (16) Keep it Simple… the more complex something is, the harder it is to Understand Secure Audit A good K.I.S.S rule is to remove all un-necessary services and software from a system

Least Privilege (10) One of the Most fundamental rule of security Provide a user the MINIMAL amount of access they needs to complete their work. If you don’t EXPLICITLY need access… you don’t get access Applications should run as a restricted user rather than the “root/administrator” account Services and software should not be running or installed unless they are needed for the operation of the system/network.

Separation of Duty (11) For any given task, more than one person needs to be involved. Ex. An person that puts in a procurement order should NOT be allowed to authorize the order. Fights fraud Requires “collusion” to subvert (see next slide)

Separation of Duties

Separation of Duties

Implicit Deny (11) Fundamental security rule. If you do NOT explicitly have authorization, then you are automatically (implicitly) DENIED access. Should be the default rule for ALL access controls..though often not :( You usually see this in firewalls

Authentication and Access Control If you want to protect a resource you must be able to determine which subject (a user or a program) can access an item, and what level access such a subject has to a resource. This requires Identification Authentication: 3 types + “strong/multi” What is the most common form of authentication? Authorization (ACLs, Rules, Unix Permissions) (chapter 19) Auditing We will talk about these in more detail in later chapters.

SecureID A type of multi factor authentication Has a secret number that is syncronized to the server and changes every minute (what you have) Also requires a PIN number (what you know) we will talk about secureID again later in the upcoming classes

Chapter 1Review Questions Q: What is the CIA triad, what does each mean? Q: What is non-repudiation? Q: Define Layered Security Q: What is the main security reasoning for mandatory vacations?

Chapter 1 Review Questions Q: What type of authentication system does the OS (Security Kernel) determined who is allowed access to a resource Q: What access control model helps fight “authorization creep” Q: Biometrics are an example of “What you ____” Q: What is an advantage of network based security, how about host based?