L16: Security Engineering Flashcards
What is security engineering?
Security engineering is concerned with how to develop systems that can resist malicious attacks.
The tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks intended to damage a computer-based system or its data.
What is security?
A system property that reflects the system’s ability to protect itself from accidental or deliberate external attack.
Security is important. Most systems are networked so that external access to the system through the network is possible.
Security is an essential pre-requisite for availability, reliability and safety.
What is an asset?
Something of value which has to be protected. The asset may be the software system itself or data used by that system.
What is an attack?
An exploitation of a system’s vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage.
What is a control?
A protective measure that reduces a system’s vulnerability. Encryption is an example of a control that reduces a vulnerability of a weak access control system.
What is exposure?
Possible loss or harm to a computing system. This can be loss or damage to data, or can be a loss of time and effort if recovery is necessary after a security breach.
What is a threat?
Circumstances that have potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack.
What is vulnerability?
A weakness in a computer-based system that may be exploited to cause loss or harm.
What is confidentiality in security?
Information in a system may be disclosed or made accessible to people or programs that are not authorised to have access to that information
What is integrity in security?
Information in a system may be damaged or corrupted making it inconsistent or unreliable.
What is availability in security?
Access to a system or its data, which is normally available, may not be possible
What are the levels of security in an organisation?
- Infrastructure security
- Application security
- Operational security
What is infrastructure security?
Infrastructure security is concerned with maintaining the security of all systems and networks that provide an infrastructure and a set of shared services to the organisation.
Infrastructure security is a systems management problem where the infrastructure is configured to resist attacks.
What is application security?
Application security is concerned with the security of individual application systems or related groups of systems.
Application security is a software engineering problem where the system is designed to resist attacks.
What is operational security?
Operational security is concerned with the secure operation and use of the organisation’s systems.
Operational security is primarily a human and social issue
What are some types of security threats?
Interception threats allow an attacker to gain access to an asset. Threat to confidentiality.
Interruption threats allow an attacker to make part of the system unavailable. Threat to availability.
Modification threats allow an attacker to tamper with a system asset. Threat to integrity.
Fabrication threats allow an attacker to insert false information into a system. Threat to integrity.
What is vulnerability avoidance?
The system is designed so that vulnerabilities do not occur.
For example, if there is no external network connection then external attack is impossible
What is attack detection and elimination?
The system is designed so that attacks on vulnerabilities are detected and
neutralised before they result in an exposure.
For example, virus checkers find and remove viruses before they infect a system
What is exposure limitation and recovery?
The system is designed so that the adverse consequences of a successful attack are minimised.
For example, a backup policy allows damaged information to be restored.
What are 3 methods of security assurance?
- Vulnerability avoidance
- Attack detection and elimination
- Exposure limitation and recovery
How are threats to security and dependability linked?
Security and reliability
E.g. corrupted data
Security and availability
E.g. denial of service attack
Security and safety
Example problem: corrupted code or data
Security and resilience
Example problem: a cyberattack on a networked system
How should organisations view security?
- Security is expensive. It is important that security decisions are made in a cost-effective way.
- Organisations use a risk-based approach to support security decision making.
- Should have a defined security policy based on security risk analysis.
- Security risk analysis is a business rather than a technical process.
What should organisational security policies do?
- Security policies should set out information access strategies that should apply across the organisation
- The purpose of security policies is to inform everyone in an organisation about security
- So these should not be long and detailed technical documents
- The security policy defines, in broad terms, the security goals
of the organisation - The security engineering process is concerned with implementing these goals
What security policies should organisations have?
Organisations should have security policies on:
- the assets that must be protected
- the level of protection that is required for different types of asset
- the responsibilities of individual users, managers and the organisation
- existing security procedures and technologies that should be maintained