Information Assurance

Description

Computer Security Overview and Basic Encryption
vossashley56
Mind Map by vossashley56, updated more than 1 year ago
vossashley56
Created by vossashley56 over 11 years ago
11
0

Resource summary

Information Assurance
  1. Computer Security Overview
    1. Security Problems in Computing
      1. Computer System
        1. Hardware
          1. Software
            1. Storage Media
              1. Data
                1. Networks
                2. Principle of Easiest Penetration
                  1. any available means
                    1. not obvious
                      1. not where defended
                        1. not how we expected
                        2. Threat
                          1. Set of circumstances that can lead to loss or harm
                            1. block threats by controlling vunerabilities
                              1. Types
                                1. interception
                                  1. interruption
                                    1. modification
                                      1. fabrication
                                    2. Vulnerability
                                      1. Weakness in the security system
                                        1. Hardware Vulerablilites
                                          1. Interruption
                                            1. Interception
                                              1. modification
                                                1. fabrication
                                                  1. destruction
                                                  2. Software Vunerability
                                                    1. Factional Rounding
                                                      1. Deletion
                                                        1. modification
                                                          1. logic bombs
                                                            1. viruses
                                                              1. Trojan Horses
                                                                1. back door
                                                                  1. keyloggers
                                                                  2. theft
                                                                  3. Data Vulerabilities
                                                                    1. Interception
                                                                      1. destruction
                                                                        1. CIA
                                                                      2. Attack
                                                                        1. Exploiting a vulnerability
                                                                          1. 3 things needed
                                                                            1. Method
                                                                              1. Opportunity
                                                                                1. Motive
                                                                              2. Control
                                                                                1. counters a vunerability
                                                                                  1. never use just one control
                                                                                    1. Encryption
                                                                                      1. Different Types of Controls

                                                                                        Attachments:

                                                                                        1. Policy
                                                                                          1. Broad Statement
                                                                                          2. Procedures
                                                                                            1. Specific actions to be taken
                                                                                        2. Principle of Adequate Protection
                                                                                          1. protection = value
                                                                                        3. Security Goals-CIA
                                                                                          1. C-Confidentiality
                                                                                            1. Secrecy, Privacy
                                                                                              1. who should access what?
                                                                                                1. Under what Conditions?
                                                                                                2. I-Intergrity
                                                                                                  1. precise, accurate, consistent
                                                                                                    1. unmodified, or only modified by authorized users
                                                                                                      1. meaningful and usable
                                                                                                      2. A- Availability
                                                                                                        1. data and services
                                                                                                          1. can you get what we need, when we need it, in a timely fasion
                                                                                                            1. Fault Tolerance, concurrency issues
                                                                                                            2. Extra
                                                                                                              1. Authenticity
                                                                                                                1. Non-Repudiation
                                                                                                                  1. Essential for E-Commerce
                                                                                                                2. Computer Criminals
                                                                                                                  1. any crime involving a computer
                                                                                                                    1. amateurs- disgruntled employees
                                                                                                                      1. Pros- Hackers
                                                                                                                      2. Defense
                                                                                                                        1. Risk
                                                                                                                          1. The possibility for harm to occur
                                                                                                                            1. Prevent
                                                                                                                              1. Deter
                                                                                                                                1. Deflect
                                                                                                                                  1. Detect
                                                                                                                                    1. Recover
                                                                                                                                2. Effectiveness
                                                                                                                                  1. Awareness of the problem
                                                                                                                                    1. Likelihood of use
                                                                                                                                      1. Principle of Effectiveness
                                                                                                                                        1. Controls that are not used are not controls
                                                                                                                                        2. Principle of Weakest Link
                                                                                                                                          1. Security is as strong as the weakest control
                                                                                                                                      2. Basic Encryption
                                                                                                                                        1. Terms
                                                                                                                                          1. S-Sender
                                                                                                                                            1. T- Transmission Medium
                                                                                                                                              1. R-Rcipient
                                                                                                                                                1. O-Outsider (interceptor)
                                                                                                                                                  1. Encryption
                                                                                                                                                    1. Encoding a message so its meaning is not obvious
                                                                                                                                                    2. Decryption
                                                                                                                                                      1. transforming an encrypted message to plaintext (deciphering)
                                                                                                                                                      2. Cryptosystem
                                                                                                                                                        1. encrypts and decrypts
                                                                                                                                                        2. Crytography
                                                                                                                                                          1. from Krytos, meaning hidden and Graphos, meaning written
                                                                                                                                                          2. Cryptanalyst
                                                                                                                                                            1. studies encryption and encrypted messages
                                                                                                                                                            2. Cryptographer
                                                                                                                                                              1. works for a legitimate sender
                                                                                                                                                              2. Cryptology
                                                                                                                                                                1. research into and study of encryption and decryption
                                                                                                                                                                  1. includes cryptography and cryptanalysis
                                                                                                                                                                2. Threats by O
                                                                                                                                                                  1. Block
                                                                                                                                                                    1. Intercept
                                                                                                                                                                      1. Modify
                                                                                                                                                                        1. Fabricate
                                                                                                                                                                        2. Symmetric Encryption
                                                                                                                                                                          1. Keys are the same for encryption and decryption
                                                                                                                                                                          2. Asymmetric Encryption
                                                                                                                                                                            1. Encryption and Decryption keys are different
                                                                                                                                                                            2. Keyless Cipher
                                                                                                                                                                              1. security through obsecurity
                                                                                                                                                                              2. Cryptanalysis
                                                                                                                                                                                1. break a single message
                                                                                                                                                                                  1. find patterns to develop a decryption algorithm
                                                                                                                                                                                    1. infer meaning w/o breaking the encryption
                                                                                                                                                                                      1. Deduce the Key
                                                                                                                                                                                        1. find weakness in the implementation
                                                                                                                                                                                          1. find general weakness in the algorithm
                                                                                                                                                                                        Show full summary Hide full summary

                                                                                                                                                                                        Similar