# 55 Security
###### tags: `dartmouth`
1. **Fundamentals** (Ch. 1)
- Confidentiality, Integrity, and Availability
- **Confidentiality**: the ability of a system to ensure that an asset is *viewed* only by authorized parties
- **Integrity**: the ability of a system to ensure that an asset is *modified* only by authorized parties
- **Availability**: the ability of a system to ensure that an asset *can be used* by any authorized parties
- Identification and Authentication
- **Identification**: the act of asserting who a person is
- **Authentication**: the act of proving that asserted identity: that the person is who she says she is
2. **Authorization and Access Control** (Ch. 2.0-2.2)
- Saltzer’s and Schroeder’s principles of secure design
- **Economy of mechanism**: Keep the design as simple and small as possible
- **Fail-safe defaults**: Base access decisions on permission rather than exclusion
- **Complete mediation**: Every access to every object must be checked for authority
- **Open design**: The design should not be secret
- **Separation of privilege**: Where feasible, a protection mechanism that requires two keys to unlock it is more robust and flexible than one that allows access to the presenter of only a single key
- **Least privilege**: Every program and every user of the system should operate using the least set of privileges necessary to complete the job
- **Least common mechanism**: Minimize the amount of mechanism common to more than one user and depended on by all users
- **Psychological acceptability**: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly
- **Work factor**: Compare the cost of circumventing the mechanism with the resources of a potential attacker
- **Compromise recording**: It is sometimes suggested that mechanisms that reliably record that a compromise of information has occurred can be used in place of more elaborate mechanisms that completely prevent loss
- Access control
- **Access control**: limiting who can access what in what ways
- **Effective Policy Implementation**:
- Check every access
- Enforce least privilege
- Verify acceptable usage
3. **Ciphers and cryptographic hashes** (Ch. 2.3 and appendix)
- Symmetric and asymmetric ciphers and their uses
- Symmetric cipher: DES, Triple-DES, AES
- Asymmetric cipher: RSA
- Cryptographic hash functions
- Easy to compute HASH(x)
- Hard to provide x given HASH(x)
- Infeasible to calculate two messages x and y such that HASH(x) = HASH(y)
- Small change in input x results in a large change in the output HASH(x)
- Digital signatures
- Certificates and public key infrastructure
- PKI Hierarchy
- Cross certification
- Bridge CA
4. **Malware** (Ch. 5)
- Viruses and worms in general
- **Virus**: code with malicious purpose; intended to spread
- **Worm**: program that spreads copies of itself through a network
- **Trojan horse**: program with benign apparent effect but second, hidden, malicious effect
5. **Networks** (Ch. 6, but not wireless)
- Network threats
- **interception**, or unauthorized viewing
- **modification**, or unauthorized change
- **fabrication**, or unauthorized creation
- **interruption**, or preventing authorized access
- Denial of service and distributed denial of service protections (**DoS/DDoS**)
- DoS attacks usually try to flood a victim with excessive demand.
- DDoS attacks change the balance between adversary and victim by marshalling many forces on the attack side.
- bot and botnet
- SSL (Secure Sockets Layer) and VPN
- **SSL**: encrypted communication between a browser and the remote web host (its websites)
- **VPN**: encrypted links within a network
- simulates the security of a dedicated, protected communication line on a shared network.
- Firewalls
- **Firewall**: a computer traffic cop that permits or blocks data flow between two parts of a network architecture. It is the only link between parts.
- Firewalls enforce predetermined rules governing what traffic can flow.
- 
- Intrusion detection and prevention systems (IDS) (Ch. 6.8)
- **IDS**: a device, typically another separate computer, that monitors activity to identify malicious or suspicious events.
- **Intrusion prevention systems**: extend IDS technology with built-in protective response.
6. **Cloud** (Ch. 8)
- What is a cloud service?
- On-demand self-service.
- Broad network access.
- Resource pooling.
- Rapid elasticity.
- Measured service.
- Risks to consider when choosing cloud services
- Identify assets
- Determine vulnerabilities
- Estimate likelihood of exploitation
- Compute expected loss
- Survey and select new controls
- Project savings
- Security tools for cloud environments (Ch. 8.3)
- Data Protection in the Cloud
- Cloud Storage
- Data Loss Prevention (DLP)
- Cloud Application Security
- Logging and Incident Response
7. **Security management**(Ch. 10)
- Security & Incident response
- **Incident Response Plans**: tells whom to contact in the event of an incident, which may be just an unconfirmed, unusual situation
- define what constitutes an *incident*
- identify who is responsible for *taking charge* of the situation
- describe the plan of *action*
- Advance Planning
- Responding: Incident Response Teams
- “*Is this really an incident?*” is the most important question.
- After the Incident Is Resolved:
- *Is any security control action to be taken?*
- *Did the incident response plan work?*
- Business continuity planning (Ch. 10.2)
- **Business continuity planning**: guides response to a crisis that threatens a business’s existence.
- focuses on business needs
- Assess the business impact of a crisis.
- Develop a strategy to control impact.
- Develop and implement a plan for the strategy
- who in charge? what to do? who does it?
- Handling natural and human-caused disasters
8. **Privacy** (Ch. 9)
- Privacy: what is it?
- **Privacy**: the right to control who knows certain things about you.
- sensitive data (object)
- affected parties (subject)
- controlled disclosure (access right)
- **Privacy** as an aspect of **security**

- **Authentication** effects on privacy (Ch. 9.3)
- Authentication is confirming an asserted identity. Inferring an identity from authentication data is far harder and less certain.
- 
- Privacy and the Internet (Ch. 9.5)
- Privacy enhancing technology (e.g., Zero Knowledge)
9. **Legal and ethics** (Ch. 11.0-11.6)
- Value of information
- Information has value unrelated to whatever medium contains it
- Information Can Be Replicated
- Information Has a Minimal Marginal Cost
- The Value of Information Is Often Time Dependent
- Information Is Often Transferred Intangibly
- legal and ethical issues/challenges
- Computer crime is a multinational activity.
- Computer attacks affecting many people tend to be complex, involving people and facilities in several countries, thus complicating prosecution.
- Even with the definitions included in the statutes, the courts must interpret what a computer is.
10. **IoT** (Ch. 13.1)
- **IoT**: A world of interconnected smart devices not ordinarily thought of as computers.
- Security and privacy issues of the IoT
11. **Voting** (Ch. 13.3)
- Goals of elections
- Constraints on elections
- Pros and Cons of election/ballot technology options
12. **Cyberwar** (Ch. 13.4)
- What is cyberwar?
- Attribution
- Asymmetry
- Defense and deterrence
13. **AI Risks** (notes and slides)