CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC...

53
CS 556 - Computer Security - c 2012 Colorado State University – 1 / 53 CS 556 – Computer Security Dr. Indrajit Ray Email: [email protected] Department of Computer Science Colorado State University Fort Collins, CO 80523, USA

Transcript of CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC...

Page 1: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

CS 556 - Computer Security - c© 2012 Colorado State University – 1 / 53

CS 556 – Computer Security

Dr. Indrajit Ray

Email: [email protected]

Department of Computer Science

Colorado State University

Fort Collins, CO 80523, USA

Page 2: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

BASIC SECURITY CONCEPTS

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 2 / 53

Page 3: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Why Security?

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 3 / 53

● Not a major issue for non-networked centralized systems

✦ Single administrative control

■ Policies can be well defined and enforced

■ System can be physically secured

■ Access can be easily monitored and restricted

Page 4: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Network Connectivity Changes Everything

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 4 / 53

Page 5: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Internet Perspective

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 5 / 53

● Spans 180+ countries

✦ Legal system varies

✦ No central administration means practically impossible to

enforce any policy

● Users - Universities, government agencies, research

organizations, corporations, etc.

Page 6: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Scope of Internet Security Problems

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 6 / 53

● Public, private and government networks have been penetrated

by unauthorized users and rogue programs

● Increased volume of security breaches being reported regularly

✦ Many go unreported for fear of loosing face

Page 7: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

National Cyber Incident Statistics

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 7 / 53

Page 8: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Attack Trends 2005 – 2010

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 8 / 53

Page 9: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

2007 Dollar Amount Losses (Total = $66,930,950)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 9 / 53

Page 10: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

General Attack Strategies and Their

Relationships

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 10 / 53

integrity violation illegitimate use

intercept / alter

repudiation

information leakage

integrity violation

theft

replay

resource exhaustion

integrity violation

theft

planting

Virus / Worms

Trojan Horses

trapdoor

service spoofing

masquerade

bypassing controls

physical intrusion

authriztn. violation

penetration

eavesdropping

traffic analysis

EM/RF interception

indiscretions

media scanvenging

denial of serviceinformation leakage

Page 11: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Contributing Factors

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 11 / 53

● Lack of awareness of Internet threats and risks

✦ Security measures are often not considered until an

enterprise has been attacked

● Wide open network policies

✦ Many sites allow very liberal and open access

● Vast majority of Internet traffic is unencrypted and can be

captured and/or monitored

Page 12: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Contributing Factors (cont’d)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 12 / 53

● Lack of security in the TCP/IP protocol suite

✦ IPSEC not widely available

● Complexity of security management and administration

● Gloated and buggy software

● Improved hacking / cracking skills

● Risky behavior by end users

Page 13: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Objectives

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 13 / 53

Availability

IntegrityConfidentiality

Page 14: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Objectives

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 14 / 53

● Confidentiality

✦ Prevent / detect / deter improper disclosure of information

● Integrity

✦ Prevent / detect / deter improper modification of information

● Availability

✦ Prevent / detect / deter improper denial of access to services

provided by the system

Page 15: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Objectives (cont’d)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 15 / 53

● Note the use of term improper rather than unauthorized

✦ Authorized users are accountable for their actions

✦ Proper authorization is difficult to achieve when the system

spans multiple administrative domains

Page 16: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Objectives (cont’d)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 16 / 53

● Prevention is more fundamental

✦ Detection seeks to prevent by threat of punitive action

✦ Detection requires an audit trail to be maintained that must

be prevented from alteration

● Sometimes detection is the only option

✦ Modification of message on a network

✦ Accountability in the proper use of privileges

Page 17: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Examples of Confidentiality

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 17 / 53

● Military

✦ The target coordinates of a missile should not be improperly

disclosed

● Commercial

✦ An employee should not come to know the salary of his

manager

Page 18: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Examples of Integrity

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 18 / 53

● Military

✦ The target coordinates of a missile should not be improperly

modified

● Commercial

✦ An employee should not be able to modify the employee’s

own salary

Page 19: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Examples of Availability

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 19 / 53

● Military

✦ When the proper command for missile launch is issued, the

missile should fire

● Commercial

✦ Paychecks should be printed on time as stipulated by the law

Page 20: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Objectives (cont’d)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 20 / 53

● Authenticity

✦ The property of being genuine and being able to be verified

and trusted

● Accountability

✦ Requirement that the actions of an entity should be

attributable to that entity.

● Non-repudiation

✦ Requirement that an entity is not able to deny or reject the

validity of its pat actions.

Page 21: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Seventh Objective?

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 21 / 53

● Prevent / detect / deter improper use of computing resources

✦ hardware resources

✦ software resources

✦ network resources

✦ data resources

Page 22: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Achieving Security

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 22 / 53

● Security Policy

✦ What needs to be secured?

● Security Mechanism

✦ How can it be secured?

● Security Assurance

✦ How well is it secured?

Page 23: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Policy

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 23 / 53

��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

������������������������������������������������������������������������������������������������������������������������

������������������������������������������������������������������������������������������������������������������������

OrganizationalPolicy

Automated InformationSystems Policy

● Specified mostly in terms of access control policies

● Need to include information about security management and

incident reporting

● Need to be pragmatic

Page 24: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Mechanisms

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 24 / 53

● Prevention

✦ Authentication

✦ Access control

✦ Encryption

● Detection

✦ Auditing

✦ Intrusion detection

● Tolerance

✦ Practicality

Page 25: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security by Obscurity

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 25 / 53

● If we hide the inner working of a system, it will be secure

✦ It’s a bad idea

✦ Less and less applicable in the emerging world of vendor

independent open standards

✦ Less and less applicable in a world of widespread computer

knowledge and expertise

Page 26: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security by Legislation

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 26 / 53

● If we instruct our users on how to behave, we can secure a

system

● For example

✦ Users should not share passwords

✦ Users should not type in their passwords when someone is

looking over their shoulders

✦ Users should not try to reverse engineer CSS

Page 27: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security by Legislation (cont’d)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 27 / 53

● It’s a bad idea

✦ User awareness and cooperation is important but cannot be

the principal focus for achieving security

✦ Human beings tend to defy authority

Page 28: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Incident Information Reporting

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 28 / 53

Professional

Hackers /Crackers

Spies

Terrorists

CorporateRaiders

Criminals

Vandals

Voyeurs

PhysicalAttack

InformationExchange

UserCommand

Script /Program

AutonomousAgent

Toolkit

DistributedTool

Data Tap

ToolAttackers Vulnerability

Design

Configuration

Implemen--tation

Action

Probe

Scan

Flood

Authenticate

Bypass

Spoof

Read

Copy

Steal

Modify

Delete

ResultTarget

UnauthorizedObjectives

Account

Process

Data

Component

Computer

Network

Internetwork

IncreasedAccess

Disclosure ofInformation

Corruption ofInformation

Denial ofService

Theft ofResources

Challenge,Status, Thrill

PoliticalGain

FinancialGain

Damage

attack(s)

incident

event

Page 29: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Tradeoffs

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 29 / 53

������������������������������������������������������������������������������

������������������������������������������������������������������������������

Security Functionality

Ease of Use

Cost

Page 30: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Threat – Vulnerability – Risk

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 30 / 53

● Threats – Possible attacks on the system

● Vulnerabilities – Weaknesses that may be exploited to cause

loss or harm

● Risk – A measure of the possibility of security breaches and the

severity of the resulting damage

✦ Requires assessment of threats and vulnerabilities

Page 31: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Classes of Security Threats

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 31 / 53

● Errors and omissions by insiders

● Natural / man-made / machine disasters

● Dishonest insiders

● Disgruntled insiders

● Outsiders

Page 32: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Measuring Risk

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 32 / 53

● “I often say that when you can measure what you are speaking

about, and express it in numbers, you know something about it;

but when you cannot express it in numbers, your knowledge is of

a meagre and unsatisfactory kind; it may be the beginning of

knowledge, but you have scarcely, in your thoughts, advanced to

the stage of science, whatever the matter may be.” – William

Thomson, 1st Baron Kelvin

✦ Lecture on “Electrical Units of Measurement” (3 May 1883),

published in Popular Lectures Vol. I, p. 73

✦ Source - http://en.wikiquote.org/wiki/William Thomson

Page 33: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Security Risk Management

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 33 / 53

● Risk analysis

● Risk reduction

● Risk acceptance

Page 34: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Risk Analysis

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 34 / 53

● Mathematical formulae and computer models can be developed

but the underlying parameters are difficult to quantify and / or

estimate

● There is precious little historical data and whatever exists may

be of little use

✦ Do not forget – Garbage In Garbage Out

Page 35: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Risk Measures

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 35 / 53

● Probability based quantitative

● Qualitative

● Fuzzy mathematics

Page 36: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Assets - Threat Model

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 36 / 53

● Threats compromise our assets

● Threats have a probability of occurrence and a severity of effect

● Assets have value

● Assets are vulnerable to threats

● Risk is the expected loss from the possible action of a threat

against an asset

Page 37: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Assets - Threat Model

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 37 / 53

● R = V × P × S

✦ R is the risk

✦ V is the value of an asset

✦ P is the probability of the occurrence of threat

✦ S is the vulnerability of the asset to the threat, that is, the

severity of the effect of the threat

Page 38: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

System - Failure Model

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 38 / 53

● Threat events cause undesirable outcomes

● Estimate the probability of highly undesirable events

● Risk is the likelihood of an undesirable outcome within a given

period of time

● State space of complex systems is very large and makes this

approach difficult

Page 39: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Risk Acceptance

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 39 / 53

● Certification

✦ Technical evaluation of a system’s security features with

respect to how well they meet a set of specified security

requirements

● Accreditation

✦ The management’s action of approving an automated

system, perhaps with prescribed administratible safeguards,

for use in a particular environment

Page 40: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Resilient Cyber Systems – Beyond Security (1)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 40 / 53

● Cyber defense is an asymmetric warfare

✦ Defender has to try to close all vulnerabilities; attacker has

to exploit just one vulnerability

✦ Attack detection tools are slow to evolve with emerging

attacks

✦ Attacks spread at a much faster pace than deployment rate

of mitigation techniques

● End user interactions affect security in unforeseen manner

● Cyber defense is expensive

✦ Real dollar needed to deploy defenses

✦ Costly in terms of system downtime, system upgrades,

service level degradation, training, etc.

✦ Possibility of unprepared-for interactions with existing

system

Page 41: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Resilient Cyber Systems – Beyond Security (2)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 41 / 53

● Cyber system that has the ability to

✦ Provide full level of services in a benign environment

✦ Withstand known and predictable cyber attacks

✦ Continue to provide reduced but critical services in an

adverse (unknown, unpredictable, and unforeseen)

environment

✦ Recover services quickly after an attack

✦ Adapt and evolve to reduce the effectiveness of future

attacks

Page 42: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Measuring Resilience – What We Need

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 42 / 53

● Measuring level of service

✦ Percentage, average

● Measuring how well system is able to withstand attacks

✦ Assess risks to cyber assets

✦ Assess potential damage

✦ Assess security control cost

✦ Assess best use of resources and capabilities to protect

system

● Measuring how quickly system has responded to and recovered

from attack

✦ Time

Page 43: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Measuring System Resilience

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 43 / 53

● Need to assess potential effects of a cyber attack on the

organizations mission

● Identify & measure dependencies between

✦ Mission objectives

✦ Cyber assets involved

✦ Activities that affect security

● Assess attackers potential objectives / intentions

✦ Attacker may not have a specific damage to mission in mind

but may just want to cause some damage

Page 44: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Measuring System Resilience

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 44 / 53

● Assess cost to defender to protect

✦ Real dollar needed to deploy defenses

✦ Costly in terms of system downtime, system upgrades,

service level degradation, training, etc.

✦ Possibility of unprepared-for interactions with existing

system

● Assess tradeoffs for practical, achievable security

● End user interactions affect security / resilience in unforeseen

manner

✦ Difficult to measure and often neglected

Page 45: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Modeling System Risk Profile (1)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 45 / 53

Page 46: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Modeling System Risk Profile (2)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 46 / 53

Page 47: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Modeling System Risk Profile (3)

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 47 / 53

Page 48: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Resilient System 201 - Statically Adaptive

Security

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 48 / 53

● Identify best way to deploy security controls so as to

✦ Minimize cost of security deployment (SCC) without going

over an upper bound while covering as many weak spots as

possible

✦ Minimize residual damage (RDD) resulting from not being

able to cover some weak spots

● Identify optimal solutions that are also robust against certain

levels of compromise

✦ To protect against unforeseen interactions

✦ To protect against compromise of security controls from zero

day attacks

Page 49: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Resilient System 301 - Attacker against

Defender

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 49 / 53

● Attackers optimization problem

✦ Attacker strategy may be just to cause some damage to a

system and not just effectuate one specific compromise

✦ Attacker adopts strategy that maximizes damage

● Defenders optimization problem

✦ Defender adopts strategy that minimizes cost of

implementing security controls, minimizes residual damage

and identifies robust solutions

Page 50: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Resilient System 401 - Dynamically Adaptive

Security

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 50 / 53

● For every attack there is a certain probability of occurrence

● Probability can change depending on

✦ What the contributing factors are for the attack

✦ How those factors are changing

● Output of intrusion detection and/or system monitoring tools can

be incorporated to provide near real-time situational awareness

Page 51: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Modeling Dynamically Adaptive Security

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 51 / 53

Page 52: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Challenges for Emerging Systems

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 52 / 53

Page 53: CS 556 – Computer Securitycs556/lecture-notes/basic-concepts.pdf · Contributing Factors BASIC SECURITY CONCEPTS CS 556 - Computer Security - c 2012 Colorado State University –

Mesuring Risk for Emerging System

BASIC SECURITY

CONCEPTS

CS 556 - Computer Security - c© 2012 Colorado State University – 53 / 53

● Be able to predict the security posture of a complex network

● Requires characterization of network at different scales

particularly spatial and temporal

✦ What are the critical points in the network of networks?

✦ How robust is the complex system to attacks?

✦ Can security breach cascade across different networks?

✦ How does the system risk profile evolve over time?

● Requires ability to anticipate user activities