You are on page 1of 17

Mastering Security Basics - 1

UNDERSTANDING CORE SECURITY GOALS


The CIA of Security

Confidentiality

Integrity Availability
Confidentiality
Prevents unauthorized disclosure of data
Ensures that data is only viewable by authorized users
◦ Such as Personally Identifiable Information (PII)

Some methods
◦ Encryption
◦ Ex: Advanced Encryption Standard (AES)
◦ Access controls
Access Controls
Identification
◦ Username: Who are you?
◦ A claim, not proof

Authentication
◦ Proof of identity
◦ Often by providing a password

Authorization
◦ Granting access to resources
Steganography
Hiding data within other data
◦ Ex: a secret message inside an image

"Hiding data in plain sight"


Observers won't even know a message is being sent
Integrity
Assures that data has not been modified, tampered with, or corrupted
Only authorized users should modify data
Hashing assures integrity
◦ Hash types: MD5, SHA-1, HMAC
◦ If data changes, the hash value changes
Hash Value for Download
Digital Signatures
Makes a legal agreement
Like a handwritten signature
Provides authentication
Also provides non-repudiation
Non-Repudiation
Prevents entities from denying that they took an action
Examples: signing a home loan, making a credit card purchase
Techniques
◦ Digital signatures
◦ Audit logs
Certificates and PKI (Public Key Infrastructure)

Certificates prove the identity of a server or user


◦ Contain encryption keys

Certificates are managed by the PKI


◦ A group of companies that issue and verify certificates
◦ Analogous to credit card companies
Availability

Data and services are available when needed


◦ Remove SPOF (Single Point of Failure)
Availability
Techniques:
◦ Disk redundancies (RAID)
◦ Server redundancies (clusters)
◦ Load balancing
◦ Site redundancies
◦ Backups
◦ Alternate power
◦ Cooling systems
Balancing CIA
You can never have perfect security
Increasing one item lowers others
Increasing confidentiality generally lowers availability
◦ Example: long ,complex passwords that are easily forgotten
Patching
Software requires frequent updates
Patch Management
◦ Testing patches to make sure they aren't harmful
◦ Deploying them to all devices
Safety
Safety of people
◦ Escape plans and routes for fire, earthquake, etc.
◦ Drills and training

Safety of assets
◦ Physical security controls
◦ Fences, lighting, locks, CCTV (closed-circuit television) systems
Fail-Open
When power fails, exit doors commonly fail in an open state
◦ So people aren't trapped inside

This lowers safety of material assets, but increases safety of people


Defense in Depth
Layers of protection
Example
◦ Firewall
◦ Antivirus
◦ Deep Freeze

You might also like