Week_1
Week_1
Security Engineering
CSEC5616
Dr. Suranga Seneviratne
Agenda
What is Engineering
Engineering is the application of science and maths to solve problems. While scientists and inventors
come up with innovations, it is engineers who apply these discoveries to the real world.
Security Engineering
• “Our task is to program a computer that gives answers which are subtly and
maliciously wrong at the most inconvenient possible moment.”
Policy Incentives
Mechanisms Assurances
Security Framework - Policy
• Assurance refers to how much reliance you can place on each particular
mechanism and how well they work together.
• E.g., How much time is required based on current computing capacities to break RSA encryption?
• E.g., How much time is required to brute-force a 10-character password?
• Note that some of the security mechanisms we conder secure under current
hardware may not be secure in future
• E.g. It would take trillions of years for a classical computer to break RSA-2048. However,
breaking RSA-2048 will take around 10 seconds in a quantum computer.
Security Framework - Incentives
• Incentives refer to
• The motive that the people guarding and maintaining the system have to do their job
• The motive that the attackers have to try to defeat your policy.
Source: https://www.darkreading.com/edge-articles/name-that-edge-toon-security-goals
3a. Security Goals
• Security goals are used to define the security policies we discussed earlier.
• Also, note that there is considerable overlap between some of the goals.
• In this class, we keep things simple by listing security goals as means for
articulating security policies.
Security Goals
• Refers to the effect that a verifier can determine whether an entity is allowed
to execute some action or access some data.
• Authorisation often makes use of authentication but does not imply it.
• When you enter a cinema, you only need to show authorisation, not who you are.
• Refers to the effect that a verifier can determine which entity (or which
category of authorised entities) is responsible for a certain action.
• Implies that one can trace the actions of an entity through the system.
• Implies authorisation and access control.
• May imply authentication.
• Is closely related to non-repudiation.
• Non-repudiation means that the entity who has caused an action cannot
successfully deny responsibility.
• In cryptography, it implies.
• Authenticity and integrity
• Secure timestamping of the action (extremely hard!)
Deniability
• Different aspects:
• Privacy of static data (released data sets)
• Privacy of dynamic data (DB queries)
• Privacy when moving through the network
Fundamental Security Design Principles
• Fail-safe defaults: Access decisions should be based on permission rather than exclusion
• Complete mediation: Every access must be checked against the access control mechanism
• Open design: The design of a security mechanism should be open than secret
• Separation of privilege: A practice in which multiple privilege attributes are required to achieve access
to a restricted resource
• Least privilege: Every process and user of the system should operate using the least set of privileges
necessary to perform the task
• Least common mechanism: The design should minimise the functions shared by different users,
providing mutual security
Fundamental security design principles
• Psychological acceptability: Security mechanisms should not interfere unduly with the work of users
while still meeting the needs of authorised access/user
• Isolation: For example, critical resources should be isolated from public access
• Modularity: Refers to the development of security functions as separate, protected modules and to the
use of a modular architecture for mechanism design and implementation
• Layering: Multiple, overlapping protection approaches address the people, technology, and operational
aspects of information systems.
• Least astonishment: means that a program or user interface should always respond in the way that is
least likely to astonish the user.
4. Security Attacks
Source: https://www.pinterest.com.au/pin/government-edition-the-weeks-five-great-reads-on-information-governance-and-ediscovery--51516644889364658/
Security Attacks
• Active attacks involve some modification of the data stream or the creation of a false
stream and can be subdivided into four categories: replay, masquerade, modification of
messages, and denial of service.
Passive and Active Attacks
• Examples:
1. Phishing: Using fraudulent emails or messages that appear to be from a trusted source to trick
individuals into revealing sensitive information or clicking on malicious links.
2. Malware: Software designed to harm or exploit any programmable device, service, or network.
Attackers can introduce malware through email attachments, software downloads, or operating
system vulnerabilities.
3. Person-in-the-Middle (PitM) Attacks: Interception of the communication between two parties
to steal or manipulate the data being exchanged.
Attack Surfaces
• Internal attacks
• Whistle-blowers
• Geeks
• And more!
5. Example: Bank security
Policy
• Overall goal: Correct account balances.
Mechanisms
• Strong bookkeeping procedures and access control, especially in the backend.
Incentives
• For attackers
− Get at the customer’s money without the risk of detection
− Involves a series of transfers so the trail of the money is lost or the money is
irrecoverable (paid out).
• The many facets of security mean that it is not enough to build (or
buy a product) and then ‘have security’.
We discussed:
• What security engineering is
• An overview of the preferred security framework
• Key security goals and their relationship to the framework
• The relationship between security goals, security services, and security
mechanisms
• The opponents, what attack surfaces and attack trees are
• Applying the discussed security framework in a practical scenario
• Why security is a process, not a product