ECE509 Cyber Security : Concept, Theory, and Practice

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
David A. Brown Chief Information Security Officer State of Ohio
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
September 28, 2006U.S. National Cybersecurity Martin Casado Keith Coleman Sponsored by William J. Perry MS&E 91SI Fall 2006 Stanford University.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
September 30th, 2004U.S. National Cybersecurity William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Fall 2004 Stanford University.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Network security policy: best practices
Securing Information Systems
A First Course in Information Security
Information Security Technological Security Implementation and Privacy Protection.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lecture 1: Overview modified from slides of Lawrie Brown.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Copyright © 2013 – Curt Hill Computer Security An Overview.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Information Management System Ali Saeed Khan 29 th April, 2016.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
U.S. NATIONAL CYBERSECURITY BY: SEIF ABOU NAR. WHY ARE WE TALKING ABOUT CYBERSECURITY? Attacks received the attention of president Clinton and Attorney.
Securing Information Systems
CS457 Introduction to Information Security Systems
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Secure Software Confidentiality Integrity Data Security Authentication
Securing Information Systems
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Chapter 9 E-Commerce Security and Fraud Protection
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
Cybersecurity Threat Assessment
Presentation transcript:

ECE509 Cyber Security : Concept, Theory, and Practice Introduction Spring 2014

Meet Thursday 4:00pm – 6:50 pm, ECE Bldg, Room 258 ACL lab is ECE251 Office hours: 11:00 AM - 12:00 PM Th in ECE356p Questions via email are encouraged alnashif@ece.arizona.edu Web site http://acl.ece.arizona.edu/classes/ece509

Topics Fundamentals of Cyber Security – Network Security, Risk Models and Assessments Understand Network Attacks Scanning / Probe DoS / DDoS attack Worm / Virus / Trojans Spam / Botnet / phishing Insider Attacks Hardware/Software Security Technologies Encryption / Authorization/Authentication Access Control Matrix, Firewall, IDS/IPS, IPSec, Honeypot, etc

More Topics Network Security Monitoring (NSM) Vulnerability Analysis Payload / Session / Connection Level Active / Passive Vulnerability Analysis Operation System IPv4/v6 Wireless Network Layer 2(ARP) Application (Web, Database)

More Topics Defensive system design Labs Security architectures Penetration testing Labs Network Scanning Network Security Monitoring Firewalls/IDS

Recommended References

Course Grading Homework and Assignments: 25% Midterm Exam: 10% Term paper + Presentation: 25% Term project: 25% Final Exam: 15%

Note All information contained in this course information sheet, other than grading policy, may be subject to change.

Important Dates Abstracts for projects and term paper Midterm Feb. 6, 2014 Midterm Mar. 13, 2014 Term paper and presentation Apr. 24, 2014 Project Report May 1, 2014 Final Exam (24 hour take home exam)

Questions for the class Are you comfortable with C, C++, and/or Java?

Questions for the class Are you familiar with IP networking?

Questions for the class Are you familiar with Operating System? Linux and/or Windows?

Questions for the class What is your goal of this class?

Prohibited Conduct Students enrolled in academic credit bearing courses are subject to this Code. Conduct prohibited by this Code consists of all forms of academic dishonesty, including, but not limited to: 1. Cheating, fabrication, facilitating academic dishonesty, and plagiarism as set out and defined in the Student Code of Conduct, ABOR Policy 5-308-E.10, and F.1 2. Submitting an item of academic work that has previously been submitted or simultaneously submitted without fair citation of the original work or authorization by the faculty member supervising the work. Violating required disciplinary and professional ethics rules contained or referenced in the student handbooks (hardcopy or online) of undergraduate or graduate programs, or professional colleges. Source: http://deanofstudents.arizona.edu/policies-and-codes/code-academic-integrity

Prohibited Conduct 4. Violating discipline specific health, safety or ethical requirements to gain any unfair advantage in lab(s) or clinical assignments. 5. Failing to observe rules of academic integrity established by a faculty member for a particular course. 6. Attempting to commit an act prohibited by this Code. Any attempt to commit an act prohibited by these rules shall be subject to sanctions to the same extent as completed acts. 7. Assisting or attempting to assist another to violate this Code. Source: http://deanofstudents.arizona.edu/policies-and-codes/code-academic-integrity

The Average Individual Cost due to Cyber Attack According to 2013’s Consumer Security Risks Survey, conducted by B2B International and Kaspersky Lab, the average cost of multimedia files that a user might lose as a result of a cyber attack or other damage is estimated at $418. According to the same survey, “over 60% of users who were victims of malware that either damaged or destroyed data admitted that they had not been able to fully restore their files.” “in the 16-24 age group would face an average loss of $670, while those in the 25-34 group would incur an average loss of $455; users aged 45 and older would lose an average of $227.”

Cyber attacks cost for US Organizations The Ponemon Institute sponsored by HP Enterprise Security Products conducted the “2013 Cost of Cyber Crime Study” that showed “the average annualized cost of cybercrime incurred by a benchmark sample of US organizations was $11.56 million, with a range of $1.3 million to $58 million. That represent a 78% increase since the initial study was conducted four years ago and an increase of 26%, or $2.6 million, over the average cost reported in 2012.” Source: http://www.infosecurity-magazine.com/view/34990/cyberattacks-cost-1-million-on-average-to-resolve/

Cyber attacks cost for US Organizations It also stated: “the time it takes to resolve a cyber-attack has increased by nearly 130% during this same period. The average time to resolve a cyber-attack is 32 days, with an average cost incurred during the resolution period of $1,035,769, or $32,469 per day – a 55% increase over last year’s estimated average cost of $591,780 for a 24-day period.” Source: http://www.infosecurity-magazine.com/view/34990/cyberattacks-cost-1-million-on-average-to-resolve/

Cyber attacks cost for US Organizations “Overall, organizations experience an average of 122 successful attacks per week, up from 102 attacks per week in 2012. Cybercrime cost varies by company size, but smaller organizations incur a significantly higher per-capita cost than larger organizations. Organizations in financial services, defense, and energy and utilities also experience substantially higher cybercrime costs than those in retail, hospitality and consumer products.” Source: http://www.infosecurity-magazine.com/view/34990/cyberattacks-cost-1-million-on-average-to-resolve/

Small Businesses “Forty-four percent say they have been the victim of a cyber- attack – that’s high, and really concerning,” says Molly Brogan, the director of communications for the NSBA. Of the 44% of businesses that had experienced an attack, 59% say they incurred service interruptions, and 35% say information was falsely sent from their domain names. Nineteen percent say their website was taken down, and 5% say sensitive information and data was stolen. The NSBA’s 2013 Small Business Technology Survey was conducted in August and surveyed 845 small-business owners, including both NSBA members and non-members. Source: http://smallbusiness.foxbusiness.com/technology-web/2013/09/17/cyber-attacks-cost-small-businesses-nearly-000/

Cloud Attacks On Oct. 3, 2013, Adobe announced that their Creative Cloud customers database has been the target of a cyber attack which may have compromised the data of some 2.9 million Creative Cloud customers.

Healthcare “A top Homeland Security Department official testified Wednesday that there have been approximately 16 cyberattacks on the HealthCare.gov website and one ‘denial of service’ attack that was unsuccessful.” Source: http://investigations.nbcnews.com/_news/2013/11/13/21440068-healthcaregov-targeted-about-16-times-by-cyberattacks-dhs-official-says

Oct. 2013 Source: http://hackmageddon.com/category/security/cyber-attacks-statistics/

Oct. 2013 Source: http://hackmageddon.com/category/security/cyber-attacks-statistics/

Oct. 2013 Source: http://hackmageddon.com/category/security/cyber-attacks-statistics/

Oct. 2013 Source: http://hackmageddon.com/category/security/cyber-attacks-statistics/

Why Internet Security Internet attacks are increasing in frequency, severity and sophistication Security has become one of the hottest jobs even with downturn of economy 2.4 billion loss: http://www.gao.gov/docdblite/summary.php?recflag=&accno=A01693&rptno=GAO-01-1073T Economic loss: http://www.mxlogic.com/PDFs/IndustryStats.2.28.04.pdf

Why Internet Security (cont’d) Virus and worms Melissa, Nimda, Code Red, Code Red II, Slammer … Cause over $28 billion in economic losses in 2003, growing to over $75 billion in economic losses by 2007. Code Red (2001): 13 hours infected >360K machines - $2.4 billion loss Slammer (2003): 10 minutes infected > 75K machines - $1 billion loss 2.4 billion loss: http://www.gao.gov/docdblite/summary.php?recflag=&accno=A01693&rptno=GAO-01-1073T Economic loss: http://www.mxlogic.com/PDFs/IndustryStats.2.28.04.pdf

U.S. National Cybersecurity Martin Casado • Keith Coleman Sponsored by William J. Perry MS&E 91SI Fall 2006 Stanford University

Why are we talking about cybersecurity?

Case 1: Blue Security DoS May 2006, anti-spam company “Blue Security” attacked by PharmaMaster PharmaMaster bribed a top-tier ISP's staff member into black holing Blue Security's former IP address (194.90.8.20) at internet backbone routers. Attack disrupts the operations of five top-tier hosting providers in the US and Canada, as well as a major DNS provider for several hours. Blue security operation was disrupted, and they had to shutdown their service.

Case 2: Slammer Worm January 2003 Infects 90% of vulnerable computers within 10 minutes Effect of the Worm - Interference with elections - Cancelled airline flights - 911 emergency systems affected in Seattle - 13,000 Bank of America ATMs failed No malicious payload! Estimated ~$1 Billion in productivity loss Note that $1billion dollars in damage puts it in 9th place behind code-red (2.6 billion), LoveLetter (8.8 billion) and Klez (9 billion) Does anyone actually believe those estimates? As a result people weren’t getting dial tones, planes couldn’t fly and ATM’s weren’t giving cache. 404-byte UDP packet!!

Vulnerabilities are not just technical Case 3: WorldCom July 2002 WorldCom declares bankruptcy Problem WorldCom carries 13% - 50% of global internet traffic. About 40% of Internet traffic uses WorldCom’s network at some point October 2002 Outage affecting only 20% of WorldCom users snarls traffic around the globe Congressional Hearings Congress considers, but rejects, extension of FCC regulatory powers to prevent WorldCom shutdown Vulnerabilities are not just technical WorldCom in particular carries somewhere between thirteen to fifty percent of the entire world’s Internet traffic and its failure or shut down could spell global disaster on economic and other levels. In fact, government officials were so worried that bankruptcy might force the giant to close its internet services division that Congress held special hearings in 2002 to consider what might happen in that event.[1] These fears got a boost of validity when in October 2002 a WorldCom outage that affected a mere twenty percent of its customers snarled internet traffic around the globe.[2] In an effort avoid a complete outage, the Congressional hearings went so far as to consider extending FCC regulatory power so that the government could in fact prevent the bankrupt provider from shutting down its internet services division. [1] Zager, Masha. “Will WorldCom’s Bankruptcy Choke the Internet?” NewsFactor Network. August 2, 2002. Available online at: http://www.newsfactor.com/perl/story/18843.html [2] Salkever, Alex. “When the Net’s Backbone is Out of Joint,” Business Week. October 8, 2002. Available online at: http://www.businessweek.com:/print/technology/content/oct2002/tc2002108_4317.htm?tc&sub=isecurity

Case 4: “Titan Rain” Successful network intrusions on U.S. military installations Increasing in frequency since 2003 Originating from China Successful intrusion into… U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona Defense Information Systems Agency in Arlington, Virginia Naval Ocean Systems Center in San Diego, California United States Army Space and Strategic Defense installation in Huntsville, Alabama more…

Increasing Dependence Communication (Email, IM, VoIP) Commerce (business, banking, e-commerce, etc) Control systems (public utilities, etc) Information and entertainment Sensitive data stored on the Internet e.g. Biz, Edu, Gov have permanently replaced physical/manual processes with Internet- based processes Navy command dissemination? U.S. is particularly dependent Data privacy is currently a big driver behind regulation Why does this dependency cause problems? Why is it a risk? It’s a risk because we’re depending heavily on a system for which security is not often a top priority. Permanent replacement: this is scary, because if our information systems fail, we have no processes to fall back on. Commerce/etc stops.

Security Initially Not a Priority Other design priorities often trump security: Cost Speed Convenience Open Architecture Backwards Compatibility Problem isn’t that people don’t care about security, it’s that the Internet has so many other priorities. It needs to do all these things really well in order to meet the needs of its users. It’s understandable why it got this way. Plus there is an open culture that is constraint averse Convenience – remembering passwords, don’t want to configure

And It’s Really Hard … Hard to retrofit security “fixes” No metrics to measure (in)security Internet is inherently international (no real boundaries) Private sector owns most of the infrastructure “Cybersecurity Gap”: a cost/incentive disconnect? Businesses will pay to meet business imperatives Who’s going to pay to meet national security imperatives? This problem is compounded by the fact that it’s difficult to manage Internet security *QUESTION PAUSE* There comes a point when the amount of money you’d have to spend to achieve a certain level of security would be greater than the all the profit you could potentially earn. Since you’re a business, you want to make money, so you’re not going to spend this much. Power outage in NY cost the city over a half-billion dollars

and a weak spot for accidents and failures An Achilles Heel? This level of dependence makes the Internet a target for asymmetric attack Cyberwarfare Cyberterrorism Cyberhooliganism* and a weak spot for accidents and failures The level of dependence we have on a system that’s hard to secure makes the Internet a target for asymmetric attack. Asymmetric – nuclear weapons take years to develop, but a 15 yr old kid can take down US commerce infrastructure * Coined by Bruce Schneier, Counterpane

That’s what this class is about. The Challenge Clearly not just a technical problem. Requires consideration of economic factors, public policy, legal issues, social issues etc. That’s what this class is about. Protecting against these threats will require both the right technology and the right public policy. Accomplishing this is the “cybersecurity challenge” Pause for questions?

What is “cybersecurity?” When we talk about the “cybersecurity challenge” and “cybersecurity problems,” what are we really referring to? We have all these things labeled with the term “cybersecurity” – House Cybersecurity Subcommittee, Stanford Cybersecurity Center, etc… So what is “Cybersecurity?” Whenever anyone hears it, they never know. I bet students were even unsure when they first saw it Is it about crypto? Is it about buffer overflow attacks? Is it about international intelligence collaboration? What?

Some Definitions According to the U.S. Dept of Commerce: See “information security” According to the U.S. Dept of Commerce: n. cybersecurity: n. information security: The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. Focuses on information – the data Does not say anything about interruption – ability to communicate that information Not fundamentally tied to “cyber”

Some Definitions According to S. 1901 “Cybersecurity Research and Education Act of 2002”: cybersecurity: “information assurance, including scientific, technical, management, or any other relevant disciplines required to ensure computer and network security, including, but not limited to, a discipline related to the following functions: (A) Secure System and network administration and operations. (B) Systems security engineering. (C) Information assurance systems and product acquisition. (D) Cryptography. (E) Threat and vulnerability assessment, including risk management. (F) Web security. (G) Operations of computer emergency response teams. (H) Cybersecurity training, education, and management. (I) Computer forensics. (J) Defensive information operations. Cybersecurity is a discipline Heavily technical – nothing about disciplines that study the economics, legal aspects, etc

Some Definitions According to S. 1900 “Cyberterrorism Preparedness Act of 2002 ”: cybersecurity: “information assurance, including information security, information technology disaster recovery, and information privacy.” Again, doesn’t really say much about availability of systems & *ability* to communicate information (this is sometimes considered part of the definition of “info assurance”, but leaving it as such is still pretty vague – we’re not a whole lot better off than we were with “cybersecurity”) Could apply to things that aren’t computers

One way to think about it cybersecurity = security of cyberspace What is cyberspace? Information Systems and Networks

One way to think about it cybersecurity = security of cyberspace information systems and networks

One way to think about it cybersecurity = security of information systems and networks It’s not really the security of the information systems and networks that we care about, it’s that we care about the operations and assets that depend on these information systems.

One way to think about it cybersecurity = security of information systems and networks + with the goal of protecting operations and assets

One way to think about it cybersecurity = security of information systems and networks with the goal of protecting operations and assets People often think of security as being security against attackers, but as we showed earlier you also need to protect against accidents and failures

One way to think about it cybersecurity = security of information systems and networks with the goal of protecting operations and assets security in the face of attacks, accidents, and failures

One way to think about it cybersecurity = security of information systems and networks in the face of attacks, accidents, and failures with the goal of protecting operations and assets “Security” still a bit vague here. From earlier definitions we saw that security can mean a number of things – most notably availability, integrity and secrecy Availability – ability to communicate Integrity – that what is being communicated is authentic Secrecy – that communications and information can be kept private

One way to think about it cybersecurity = security of information systems and networks in the face of attacks, accidents and failures with the goal of protecting operations and assets availability, integrity, and secrecy

One way to think about it cybersecurity = availability, integrity and secrecy of information systems and networks in the face of attacks, accidents, and failures with the goal of protecting operations and assets STILL A WORK IN PROGRESS! This is an umbrella term (Still a work in progress…comments?)

In Context corporate cybersecurity = availability, integrity and secrecy of information systems and networks in the face of attacks, accidents and failures with the goal of protecting a corporation’s operations and assets national cybersecurity = availability, integrity and secrecy of the information systems and networks in the face of attacks, accidents and failures with the goal of protecting a nation’s operations and assets This definition works well in context

What is computer security? Why do we need? Closer look at exactly what we’ll do in this class. Please hold questions until the end.

Cybersecurity Questions How vulnerable is the United States to a cyberattack? Are we heading for an “electronic pearl harbor”? What areas of vulnerability require the greatest attention in order to improve our national cybersecurity? Is the Internet an appropriate platform upon which to operate infrastructure systems critical to US economic or government operation?  Here are some of the questions our speakers will be addressing If you’re intrigued by these questions, this is the right class for you.

Cybersecurity Questions What characteristics would we want in an “Ideal Internet”? Can the current Internet evolve into a network with significantly improved security guarantees or will another system need to created? Does greater Internet security necessarily entail decreased online privacy? These and many more are all questions we will touch on during the course of the class. The consideration of these types of questions is what drove us to create this course, and we hope that you all share this interest.

information security triad (CIA) Confidentiality Integrity Availability

Confidentiality Prevent from unauthorized access Prevent from unauthorized disclosure Guarantee privacy

Integrity Prevent from unauthorized modifications to information

Availability Ensuring the availability of resources (System, Services, or Information) to users in a timely manner

CIA in action

Some of the methods used to protect the CIA of information Identification: Using unique naming to enforce access control and establish accountability Authentication Verification of the provided identification Authorization Define what actions the user, the system, or the process can perform on the information.

Accountability Tracing back actions and events back in time to the entity (User, System, Process) that invokes them.

Logs Ordered list (usually by time) of actions and events created by systems and applications to provide accountability. The term Audit trail is used when to distinguish low level actions or events.

Functionality vs. Assurance We are looking on Functionality and Assurance from security prospective The functionality of the system provides information about what the system can perform. The assurance of the system provides the information about what the system won’t perform. Conservative System Assurance Holistic System Functionality

Privacy the state or condition of being free from being observed or disturbed by other people. New Oxford American Dictionary 3rd edition © 2010, 2012 by Oxford University Press

System Resource (Asset) Information, Services, Functionalities, or Hardware. What about Network?

Threat Threat: Set of conditions that has the potential of causing a security breach that harm the system. Types of threat: Unauthorized Disclosure: Unauthorized access to data Deception: Acceptance of false data Disruption: Interruption or prevention of correct operation Usurpation: Unauthorized control of a system or part of it.

Which of the security CIA properties does each threat type affect?

Unauthorized Disclosure Exposure: Sensitive data is released to unauthorized entity Interception: Unauthorized entity directly gain data being transferred between authorized entities. Inference: Unauthorized entity get data indirectly Intrusion: Unauthorized entity gain data by cheating the security enforcement entities.

Deception Masquerade: Unauthorized entity perform an malicious activity as an authorized entity. Falsification: Providing false data Repudiation: An entity denies the occurrence of an event.

Disruption Incapacitation: interrupt operation by disabling some functionality Corruption: Change in system and data to interrupt the system’s operation Obstruction: disallow system from providing services.

Usurpation Misappropriation: an unauthorized entity controls system’s resources. Misuse: an unauthorized entity perform actions that reduce the system security.

Security Policy A set of rules that regulate how the system provides security services in order to protect its services or resources.

Vulnerability and Attack Vulnerability: A flaw in the system that could be exploited to violate the security policy. Attack: An exploit of a vulnerability. Adversary: the entity that is launching the attack

Risk and Countermeasure Risk: The probability that a certain threat will attack and cause a particular harmful result. Countermeasure: An action that reduces the risk or the harm by eliminating or preventing from certain threats or attacks.

Security Concepts’ Relations Adversary rise Countermeasures Threat impose Owners Wish to abuse or damage reduce Increase Wish to reduce Risk Value to to Asset Stallings, William. Computer Security: Principles and Practice (2nd Edition)

Reading http://cryptome.org/2013/09/infosecurity- cert.pdf [ Read to end of page 10]