Nothing Special   »   [go: up one dir, main page]

15 Aspects of Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Aspects of Security

Aspects of Security
Aspects of Security

Often, computer security is defined to encompass:


Confidentiality: (Disclosure Threat)
(also called secrecy/privacy) who can read information?

Integrity: (Alteration Threat)


Who can write, modify or generate information?

Availability: (Denial of Service)


Are resources available when needed?

CIA Traid or Triangle

Aspects of Security
What About ...?

Many other topics relate to computer Security


Cryptography,
Digital signatures,
Access control, Firewalls,
Passwords,
Certificates,
Many others.

These are mechanisms for protecting one or more


of the major aspects such as confidentiality or
integrity.

Aspects of Security
Which Is Most Important?

Question: Of confidentiality, integrity, and availability, which is


the most important?

Answer: It all depends on the context.

• For a DoD system protecting the national war plan,


confidentiality may be paramount.
• For a bank protecting financial data, integrity may count most.
• For an online retailer, availability may be a matter of survival.

Aspects of Security
What is Confidentiality About?

How do I protect my information from unauthorized


disclosure?
Historically, this was the first computer security concern, and
remains extremely important in military and commercial settings.
Is all of my data equally sensitive? If not, how do I group and
categorize data?
How do I characterize who is authorized to see what? How are the
permissions administered and checked?
According to what rules?
Can authorizations change over time?

Aspects of Security
What is Integrity About?

How do I protect my information from unauthorized


modification?
Integrity is a fuzzier notion than confidentiality and more context
dependent. But for many commercial applications it is more
important than confidentiality.
Who is authorized to modify my data? How do I separate and
protect assets?
Can I detect and/or correct erroneous or unauthorized changes to
data?
Can authorizations change over time?

Aspects of Security
What is Availability About?

How do I ensure that my information/system resources are


available when I need them?
Threats to availability are often called denial of service (DoS)
attacks.
Are resources provided in a timely fashion?
Are resources allocated fairly by the system?
Is the system so difficult/tedius to use as to be useless?
If faults occur, can the system compensate/recover?
How is concurrency controlled by the system?
Many virus and worm attacks are DoS attacks. The MyDoom
worm cost businesses an estimated $38.5 billion, according to
some estimates.
Aspects of Security
Lessons

Much of computer security is about protecting confidentiality,


integrity and availability.
Authentication and non-repudiation may also be important in
many contexts.
Which of these is most important is highly dependent on the
context.
Many other topics in security involve mechanisms for
protecting one of the “big three” (or five).

Aspects of Security

You might also like