First Principles

What is Cyberspace?

Cyberspace: The notional environment in which communication over computer networks occurs.

Alternative Definition:

What is Cybersecurity?

When you hear the word “cybersecurity”, what do you think of?

Cybersecurity: Protection of computer systems from theft, damage, disruption, or misdirection of hardware, software, information, or services.

CIA Triad

Foundational principles of security:

  1. Confidentiality: Protect information from unauthorized disclosure.
  2. Integrity: Ensure information isn’t altered accidentally or unauthorizedly.
  3. Availability: Ensure information can be used when and where needed.
Example: Confidentiality

Q: Suppose Alice is connected to JFK Airport WiFi.

Bob is listening-in on the public WiFi, what can he see?

A: Bob will be able to see the contents of unencrypted messages, and additional metadata such as sender and reciever.

Alice should avoid public WiFi, but if she needs to use it, she shouldn’t access anything sensitive.

WPA3 is the current standard of encrypted wireless channels.

Example: Integrity

Q: Suppose Bob made a fake JFK WiFi to trick Alice to connect.

What should Alice do?

A: Just don’t connect, and if you do, don’t access anything sensitive (but better to not connect).

Example: Availability

Q: Let’s say Alice can’t connect to the WiFi because Bob is jamming the WiFi with a denial of service attack.

A: Redundancy and whatnot.

More generally, backup stuff is important, like having backup power for a home security system.

Example: Applying CIA

Suppose your gradebook.

More Terms

Asset: What we care about

Threat: Potential for occurrence of undesirable effect on asset.

Safeguard: Control implemented to reduce risk posed by a threat.

Vulnerability: Absence or weakness of safeguards.

Exploit: Technique that takes advantage of a vulnerability to effect an asset.

Example: Threats and Safeguards
ThreatsSafeguards
C: Packet sniffing, file grabbingEncryption, access controls
I: Spoofed emails, disk drive corruptiondigital signatures, backups
A: DoS attacks, power failurefirewall, redundant capability, back-up generator

Remember: Threats don’t need malice (e.g., power failure, corruption)

Cost-Benefit and Risk

Principle: Do not devote more resources than potential loss.

On Risk: Different businesses have different acceptable risks

Security Fundamentals

  1. There are trade-offs between security and usability.
  2. Security is a process, not a product.
  3. Perfectly secure systems don’t exist, but we can make them more defensible.

Attacker Goals

Q: Why would you attack systems and networks?

A: Money, reputation, revenge, social change, etc.

Defensible Systems

Goal: Make our systems harder to attack and easier to defend.

Definition:

Four Main Elements of Defensibility

These four elements are from TAO Security

1. Controlled

Access Controls:

Example: Types of Access Control:

Don’t forget about physical security.

2. Minimized

Reduce the attack surface.

Example: Things that could be disabled

Basically, anything that is unused.

Least-Privilege: Subjects should only have privilege for stuff their job needs.

Example: Least privilege

A janitor doesn’t need to see stuff HR needs, HR doesn’t need to see the stuff the CEO sees, etc.

3. Monitored

Example: Things that can be logged

4. Current

Keep things up-to-date.

Example: Things that should be up-to-date
  1. Executables (OS, services, applications, drivers)
  2. Antivirus and intrusion detection systems (signature and engine)
  3. Software inventory and version checking (check for old/unused software)
  4. Backups (should be up-to-date and easy/routine/validated/secure)

Attack Phases (The Five P’s)

  1. Probe: Passive and active reconnaissance.
  2. Penetrate: Gain initial access.
  3. Persist: Maintain access and leave no trace.
  4. Propagate: Spread up and out.
  5. Profit: Achieve attack goals, whatever they may be.

Incident Prevention

Preventative measures can mitigate and lessen the impact of an incident and help the incident response process.

Non-Technical Prep:

Technical Prep:

Thought Process

Have an open mindset. Think like an attacker.