Summary CyberSec
Summary CyberSec
2. In developing a particular security mechanism or algorithm, one must always consider potential attacks
on those security features
5. Security mechanisms typically involve more than a particular algorithm or protocol and also require that
participants be in possession of some secret information which raises questions about the creation, distribution, and
protection of that secret information
6. Attackers only need to find a single weakness, while the designer must find and eliminate all weaknesses
to achieve perfect security
7. Security is still too often an afterthought to be incorporated into a system after the design is complete,
rather than being an integral part of the design process
9. There is a natural tendency on the part of users and system managers to perceive little benefit from
security investment until a security failure occurs
10. Many users and even security administrators view strong security as an impediment to efficient and
user-friendly operation of an information system or use of information
Table 1.1
Computer Security Terminology, from RFC 2828, Internet Security Glossary, May 2000
Adversary (threat agent)
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Attack
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Countermeasure
A device or techniques that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity, or the
prevention of espionage, sabotage, theft, or unauthorized access to or use of sensitive information or information systems.
Risk
A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts
that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.
Security Policy
A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to maintain a
condition of security for systems and data.
Vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a
threat source.
Software
Data
• Threats
• Capable of exploiting vulnerabilities
• Represent potential security harm to an asset
Residual
vulnerabilities
may remain
Goal is to
May itself
minimize residual
introduce new
level of risk to the
vulnerabilities
assets
Table 1.2
Threat
Consequences,
and the
Types of
Threat Actions
That Cause
Each
Consequence
Based on
RFC 4949
Security
Requirements
(FIPS 200)
(page 1 of 2)
Security
Requirements
(FIPS 200)
(page 2 of 2)
Least
astonishment
Attack Surfaces
Consist of the reachable and exploitable vulnerabilities
in a system
Examples:
Vulnerabilities created by
personnel or outsiders, such as
social engineering, human error,
and trusted insiders
Included in this category are
network protocol vulnerabilities,
such as those used for a denial-of- Particular focus is Web server
service attack, disruption of software
communications links, and various
forms of intruder attacks
Computer Security Strategy
Security Policy Security
• Formal statement of rules Implementation
and practices that specify or • Involves four
regulate how a system or complementary courses of
organization provides action:
security services to protect • Prevention
sensitive and critical system
• Detection
resources
• Response
• Recovery
Assurance Evaluation
• Encompassing both system • Process of examining a
design and system computer product or system
implementation, assurance with respect to certain
is an attribute of an criteria
information system that • Involves testing and may
provides grounds for having also involve formal analytic
confidence that the system or mathematical techniques
operates such that the
system’s security policy is
enforced
Standards
• Standards have been developed to cover management practices
and the overall architecture of security mechanisms and
services
• The most important of these organizations are:
o National Institute of Standards and Technology (NIST)
• NIST is a U.S. federal agency that deals with measurement science, standards,
and technology related to U.S. government use and to the promotion of U.S.
private sector innovation
o Internet Society (ISOC)
• ISOC is a professional membership society that provides leadership in
addressing issues that confront the future of the Internet, and is the organization
home for the groups responsible for Internet infrastructure standards
o International Telecommunication Union (ITU-T)
• ITU is a United Nations agency in which governments and the private sector
coordinate global telecom networks and services
o International Organization for Standardization (ISO)
• ISO is a nongovernmental organization whose work results in international
agreements that are published as International Standards
Symmetric Encryption
• The universal technique for providing confidentiality for
transmitted or stored data
• Also referred to as conventional encryption or single-key
encryption
Strength concerns:
Concerns about the algorithm itself
DES is the most studied encryption algorithm
in existence
Concerns about the use of a 56-bit key
The speed of commercial off-the-shelf processors makes
this key length woefully inadequate
Table 2.2
Significantly improved
3DES was not efficiency
Published as
reasonable for long
term use FIPS 197
Symmetric block cipher
Modes of operation
Alternative techniques developed to increase the security of symmetric
block encryption for large sequences
Overcomes the weaknesses of ECB
Block & Stream Ciphers
Block Cipher
Stream Cipher
• Processes the input elements continuously
• Produces output one element at a time
• Primary advantage is that they are almost always faster and use far less
code
• Encrypts plaintext one byte at a time
• Pseudorandom stream is one that is unpredictable without knowledge of
the input key
Message Authentication
Protects against
active attacks
Can use
• Only sender and receiver share a
conventional key
encryption
Message Authentication
Without Confidentiality
• Message encryption by itself does not provide a secure form of
authentication
• It is possible to combine authentication and confidentiality in a single
algorithm by encrypting a message plus its authentication tag
• Typically message authentication is provided as a separate function from
message encryption
• Situations in which message authentication without confidentiality may
be preferable include:
• There are a number of applications in which the same message is broadcast to a number of
destinations
• An exchange in which one side has a heavy load and cannot afford the time to decrypt all incoming
messages
• Authentication of a computer program in plaintext is an attractive service
Cryptanalysis Passwords
• Exploit logical weaknesses in • Hash of a password is stored
the algorithm by an operating system
Asymmetric
• Uses two
Publicly separate keys Some form of
proposed by Based on • Public key and protocol is
Diffie and mathematical private key needed for
Hellman in functions • Public key is
distribution
1976 made public for
others to use
Plaintext
Readable message or data that is fed into the algorithm as input
Encryption algorithm
Performs transformations on the plaintext
Public and private key
Pair of keys, one for encryption, one for decryption
Ciphertext
Scrambled message produced as output
Decryption key
Produces the original plaintext
User encrypts data using his or her own
private key
Computationally easy
Useful if either key can for sender knowing
be used for each role public key to encrypt
messages
Computationally
infeasible for opponent to
determine private key
from public key
Asymmetric Encryption
Algorithms
RSA (Rivest, Most widely accepted and
Block cipher in which the
Shamir, Developed in 1977 implemented approach to
public-key encryption
plaintext and ciphertext are
integers between 0 and n-1 for
Adleman) some n.
Digital
Signature Provides only a digital
signature function with SHA-1
Cannot be used for encryption
or key exchange
Standard (DSS)
Elliptic curve
cryptography Security like RSA, but with
much smaller keys
(ECC)
Digital Signatures
NIST FIPS PUB 186-4 defines a digital signature as:
”The result of a cryptographic transformation of data that,
when properly implemented, provides a mechanism for
verifying origin authentication, data integrity and signatory non-
repudiation.”
Thus, a digital signature is a data-dependent bit pattern, generated by an
agent as a function of a file, message, or other form of data block
FIPS 186-4 specifies the use of one of three digital signature algorithms:
Digital Signature Algorithm (DSA)
RSA Digital Signature Algorithm
Elliptic Curve Digital Signature Algorithm (ECDSA)
Random Keys for public-key
Numbers algorithms
Stream key for symmetric
stream cipher
Uses include
generation of: Symmetric key for use as a
temporary session key or in
creating a digital envelope
Handshaking to prevent
replay attacks
Random Number
Requirements
Randomness Unpredictability
Criteria:
Uniform distribution Each number is statistically
Frequency of occurrence of each
of the numbers should be independent of other
approximately the same numbers in the sequence
Independence
No one value in the sequence
can be inferred from the others
Opponent should not be
able to predict future
elements of the sequence
on the basis of earlier
elements
Random versus
Pseudorandom
Cryptographic applications typically make use of algorithmic techniques
for random number generation
• Algorithms are deterministic and therefore produce sequences of numbers that are not statistically
random
Use a commercially
Library based tape Background laptop/PC
available encryption Back-end appliance
encryption data encryption
package
Even though erased, until disk
sectors are reused data are
recoverable
“Computer crime, or
cybercrime, is a term used
broadly to describe criminal
activity in which computers
or computer networks are a
tool, a target, or a place of
criminal activity.”
--Fromthe New York Law School Course on
Cybercrime, Cyberterrorism, and Digital
Law Enforcement
Types of Computer Crime
• The U.S. Department of Justice categorizes computer
crime based on the role that the computer plays in the
criminal activity:
Computers as
Computers as Computers as
communications
targets storage devices
tools
Cybercrimes
Cited
in the
Convention
on
Cybercrime
(page 1 of 2)
Table 19.1
Cybercrimes Cited in the Convention on
Cybercrime (page 2 of 2)
Table 19.2
CERT 2007
E-Crime
Watch
Survey
Results
Range of behavioral
characteristics is wide
No cybercriminal
databases exist that can
point to likely suspects
Are influenced by
the success of
cybercriminals
and the lack of
Cybercrime
success of law
enforcement Victims
Digital
Software Databases Algorithms
content
• Programs produced • Data that is collected • Includes audio and • An example of a
by vendors of and organized in video files, patentable algorithm
commercial software such a fashion that it multimedia is the RSA public-
• Shareware has potential courseware, Web site key cryptosystem
• Proprietary software commercial value content, and any
created by an other original digital
organization for work
internal use
• Software produced
by individuals
U.S. Digital Millennium
Copyright ACT (DMCA)
• Signed into law in 1998
• Implements WIPO treaties to strengthen
protections of digital copyrighted materials
• Encourages copyright owners to use
technological measures to protect their
copyrighted works
• Measures that prevent access to the work
• Measures that prevent copying of the work
• Prohibits attempts to bypass the measures
• Both criminal and civil penalties apply to attempts to circumvent
DMCA Exemptions
• Certain actions are exempted from the provisions of the
DMCA and other copyright laws including:
Onward
Security Enforcement
transfer
United States Privacy Initiatives
Privacy Act of 1974
1
• Be a positive stimulus and instill confidence
2
• Be educational
3
• Provide a measure of support
4
• Be a means of deterrence and discipline
5
• Enhance the profession's public image
Comparison of Codes of Conduct
• All three codes place their emphasis on the responsibility of
professionals to other people
• Common themes:
• Dignity and worth of other people
• Confidentiality of information
• The notion that public knowledge and access to technology is equivalent to social
power
The Rules
• Collaborative effort to develop a short list of guidelines
on the ethics of computer systems
• Ad Hoc Committee on Responsible Computing
• Anyone can join this committee and suggest changes to the
guidelines
• Moral Responsibility for Computing Artifacts
• Computing artifact
3) People who knowingly use a particular computing artifact are morally responsible for
that use.
4) People who knowingly design, develop, deploy, or use a computing artifact can do so
responsibly only when they make a reasonable effort to take into account the
sociotechnical systems in which the artifact is embedded.
5) People who design, develop, deploy, promote, or evaluate a computing artifact should
not explicitly or implicitly deceive users about the artifact or its foreseeable effects, or
about the sociotechnical systems in which the artifact is embedded.