---
title: 'Lecture 01 Intro to Security'
disqus: hackmd
---
Lecture 01 Intro to Security & Challenges
===
<style>
img{
/* border: 2px solid red; */
margin-left: auto;
margin-right: auto;
width: 80%;
display: block;
}
</style>
## Table of Contents
[TOC]
Attacks
---
### Examples of recent attacks
- USB flash drive malware/USB killer
- WINVote voting machine tampering
- Vtech security breach
- stolen data from European Space Agency
- IRS fraud
- Hyatt Hotels Corporation hacked
- etc.
### Reasons for successful attacks
- widespread vulnerabilities
- configuration issues
- poorly designed software
- hardware limitations
- enterprice-based issues
### Difficulties in defending against attacks

Defining Information Security
---
### Information Security
- tasks of securing info in digital format
- manipulated by microprocessor
- preserved on storage device
- transmitted over network
- goal: to ensure that protective measures properly implemented to ward off attacks & prevent total collapse of system when attacked
- as security ↑, convenience ↓
### 3 types of info protection (CIA)
- confidentiality: only approved individuals may access info
- integrity: info is correct & unaltered
- availability: info accessible to authorised users
### Info security layers

- products layer
- form security around data
- Eg. door locks, net sec eq, etc
- people layer
- those who implement & use sec products to protect data
- policies & procedures layer
- plans & policies etablished by enterprise to ensure that people crrectly use the products
### Terminologies
- asset: item with value
- threat: action that may cause harm
- threat actor: person/element who can cause threat
- vulnerability
- flaw/weakness that allows threat agent to bypass security
- threat vector
- means which attack can occur
- risk
- situation that involves exposure to some danger
- risk response techniques
- accept: risk acknowledged but no steps taken to address yet
- transfer: transfer risk to 3rd party
- avoid: identify risk but make decision not to engage in activity
- mitigate: address risk by making risk less serious
- Identity Theft
- stealing another person's personal info, usually for financial gain
- Eg.
- steal person's SSN
- create new credit card acc to charge purchases & leave unpaid
- file fradulent tax returns
### Understanding the Importance of InfoSec
- Infosec can be helpful in
- preventing data theft
- thwarting identity theft
- avoiding legal consequences of not securing info
- maintaining productivity
- foiling cyberterrorism
During Attacks
---
### Avoiding Legal Consequences
- laws protecting electronic data privacy
- Health Insurance Portability & Accountability Act of 1996 (HIPAA)
- Sarbanes-Oxley Act of 2002 (Sarbox)
- Gramm-Leach-Billey Act (GLBA)
- Payment Card Industry Data Security Standard (PCI DSS)
- state notification & security laws
- California's Database Security Breach Notification Act (2003)
- Singapore laws
- data privacy - personal data protection act 2012
- cybersecurity - cybersecurity act 2018
- cybercrime - computer misuse act (Cap. 50A)
### Maintaining Productivity
- post-attack clean up diverts resources away from normal activities
- time, money etc
- cost of attacks

Cyberterrorism
---
### Foiling Cyberterrorism
- cyberterrorism
- any premeditated, politically motivated attack aginst info, pc systems, programs & data
- designed to
- cause panic
- provoke violence
- result in financial catastrophe
- may be directed at targets
- Eg. banking industry, military installations, power plants, air traffic control centers & water systems
Types of Attackers
---
### Threat Actors
- threat actor - individuals who launch attacks against other users & their pcs
- mostly for financial gain
- financial cybercrime - divided into 2 categories
- 1st category focuses on individuals as victims
- 2nd category focuses on enterprises & gov
- diff threat actors varies widely, based on
- attributes
- funding & resources
- whether internal/external to enterprise/org
- intent & motivation
### Script Kiddies
- individuals who want to attack computers yet lack the knowledge of computers & network needed to do so
- download automated hacking software (scripts) from websites
- > 40% of attacks require low/no skills
### Hactivists
- attackers who attack for idealogical reasons generally not as well-defined as cyberterrorist's motivation
- Eg.
- breaking into website & changing contents on site to make political statement
- disabling website belonging to bank as bank stopped accepting payments deposited into accounts belonging to hactivists
### Nation State Actor
- attacker commisioned by govs to attack enemies' info systems
- may target foreign govs/citizens of gov considered hostile/threatening
- known for being well-resourced & highly trained
### Advanced Persistent Threat
- multiyear intrusion campaign that targets highly sensitive economic, proprietary or national security info
### Insiders
- employees, contractors & business partners
- over 58% of breaches attributed to insiders
- Eg. attacks
- healthcare workers publicise celebrities' health records
- disgruntled over upcoming job terminations
- stock trader conceal losses through fake transactions
- employees bribed/coerced into stealing data before moving to new job
### Others

Defending Against Attacks
---
### Layering
- info sec created in layers
- single def mechanism easy to circumvent
- hence unlikely that attacker can break through all def layers
- layered sec approach (AKA def-in-depth)
- useful in resisting variety of attacks
- provides most comprehensive protection
### Limiting
- limiting access to info
- reduce threat aginst it
- only those who use data be granted access
- limited to only what they need
- methods of limiting access
- tech-based
- Eg. file permissions
- procedural
- Eg. prohibiting document removal from premises
### Diversity
- closely related to layering
- layers must be diff (diverse)
- if attackers penetrate 1 layer
- same technques will be unsuccessful in breaking through other layers
- breaching 1 sec layer does not compromise whole system
- Eg. diversity
- using sec products from diff manufacturers
- grps responsible for regulating access (control diversity) are diff
### Obscurity
- obscuring inside details to outsiders
- Eg. not revealing details
- type of computer
- OS version
- brand of software used
- difficult for attacker to devise attack if system details unknown
### Simplicity
- nature of info sec complex
- complex sec systems
- difficult to understand & troubleshoot
- often compromised for ease of use by trusted users
- secure system should be simple from the inside
- but complex from outside
Frameworks & Reference Architectures
---
- industry-standard frameworks & ref architectures
- provide resources of how to create secure IT env
- give overall program structure & sec management guidance to implement & maintain effective sec program
- various frameworks/arhictectures specific to particular sector (industry-specific frameworks)
- Eg. financial industry
- some frameworks/arch domestic
- others worldwide
Summary
---


###### tags: `ISEC` `DISM` `School` `Notes`