Podcast
Questions and Answers
What is the primary focus of security engineering in the context of system development?
What is the primary focus of security engineering in the context of system development?
- Monitoring system performance
- Managing infrastructure security
- Implementing user permission protocols
- Designing systems to resist malicious attacks (correct)
In the context of security, how does application security differ from infrastructure security?
In the context of security, how does application security differ from infrastructure security?
- Application security focuses on hardware, while infrastructure security focuses on software.
- There is no practical difference between application and infrastructure security.
- Application security is a software engineering concern focused on design, while infrastructure security is a systems management concern focused on configuration. (correct)
- Application security involves configuring the system, while infrastructure security involves designing the system.
Which of the following is a key aspect of system security management?
Which of the following is a key aspect of system security management?
- Network cabling maintenance
- Hardware optimization
- Developing new programming languages
- User permission management (correct)
What is the main objective of security risk management?
What is the main objective of security risk management?
Which of the following best describes a 'misuse case' in the context of system security?
Which of the following best describes a 'misuse case' in the context of system security?
In security engineering, what does 'threat and control analysis' primarily involve?
In security engineering, what does 'threat and control analysis' primarily involve?
Which security design guideline emphasizes the importance of ensuring that a security failure requires multiple points of failure?
Which security design guideline emphasizes the importance of ensuring that a security failure requires multiple points of failure?
What does the security design guideline 'Fail securely' primarily aim to achieve?
What does the security design guideline 'Fail securely' primarily aim to achieve?
Why is it important to 'Balance security and usability' in system design?
Why is it important to 'Balance security and usability' in system design?
What is the primary purpose of 'logging user actions' as a security design guideline?
What is the primary purpose of 'logging user actions' as a security design guideline?
In the context of security engineering, what does 'System Survivability' refer to?
In the context of security engineering, what does 'System Survivability' refer to?
Why is 'Survivability' considered important for computer systems in today's world?
Why is 'Survivability' considered important for computer systems in today's world?
What is the main goal of the 'Resistance' strategy in System Survivability?
What is the main goal of the 'Resistance' strategy in System Survivability?
Which strategy focuses on identifying attacks and assessing their impact?
Which strategy focuses on identifying attacks and assessing their impact?
In the context of system survivability, what does the 'Recovery' strategy involve?
In the context of system survivability, what does the 'Recovery' strategy involve?
Which layer of a system is commonly a point where security can be compromised?
Which layer of a system is commonly a point where security can be compromised?
Why is it crucial to 'validate all inputs' as a design guideline for security engineering?
Why is it crucial to 'validate all inputs' as a design guideline for security engineering?
What does it mean to 'Compartmentalize your assets' in security design?
What does it mean to 'Compartmentalize your assets' in security design?
In security engineering, why should a system be designed considering its deployment environment?
In security engineering, why should a system be designed considering its deployment environment?
Why is 'designing for recoverability' an important aspect of secure system design?
Why is 'designing for recoverability' an important aspect of secure system design?
Flashcards
Security Engineering
Security Engineering
Tools, techniques, and methods to support the development and maintenance of systems that can resist malicious attacks intended to damage a computer-based system or its data.
Application Security
Application Security
A software engineering concern where the system is designed to resist attacks.
Infrastructure Security
Infrastructure Security
A systems management area where the infrastructure is configured to resist attacks.
User and Permission Management
User and Permission Management
Signup and view all the flashcards
Software Deployment and Maintenance
Software Deployment and Maintenance
Signup and view all the flashcards
Attack Monitoring, Detection, and Recovery
Attack Monitoring, Detection, and Recovery
Signup and view all the flashcards
Misuse Cases
Misuse Cases
Signup and view all the flashcards
Interception Threats
Interception Threats
Signup and view all the flashcards
Interruption Threats
Interruption Threats
Signup and view all the flashcards
Modification Threats
Modification Threats
Signup and view all the flashcards
Fabrication Threats
Fabrication Threats
Signup and view all the flashcards
Security Risk Management
Security Risk Management
Signup and view all the flashcards
Security Design Guidelines
Security Design Guidelines
Signup and view all the flashcards
Key Design Guidelines
Key Design Guidelines
Signup and view all the flashcards
Base decisions on an explicit security policy
Base decisions on an explicit security policy
Signup and view all the flashcards
Avoid a single point of failure
Avoid a single point of failure
Signup and view all the flashcards
Fail securely
Fail securely
Signup and view all the flashcards
System Survivability
System Survivability
Signup and view all the flashcards
Resistance
Resistance
Signup and view all the flashcards
Recognition
Recognition
Signup and view all the flashcards
Study Notes
Topics Covered
- Security engineering and management focus on applications, while security management focuses on the underlying infrastructure
- Security risk assessment involves creating a system based on assessing those risks
- System architectures must be designed with security in mind
Security Engineering
- Security engineering uses tools, techniques, and methods to develop and maintain systems resistant to malicious attacks intended to damage computer-based systems or data
- Security engineering is a sub-field of computer security
Application and Infrastructure Security
- Application security relies on software engineering to design systems to resist attacks
- Infrastructure security relies on systems management to configure infrastructure to resist attacks
- Application security is the primary focus
System Security Management
- User and permission management consists of adding/removing users and setting appropriate permissions
- Software deployment and maintenance involves installing and configuring application software and middleware to avoid vulnerabilities
- Attack monitoring, detection, and recovery includes monitoring for unauthorized access, designing resistance strategies, and developing backup and recovery plans
Security Risk Management
- Risk management involves assessing potential losses from attacks and balancing those losses against the cost of security procedures
- Risk management should be driven by organizational security policy
- Risk management contains:
- Preliminary risk assessment
- Life cycle risk assessment
- Operational risk assessment
Misuse Cases
- Misuse cases are instances of threats to a system
- Interception threats include attackers gaining access to system assets
- Interruption threats include attackers making part of a system unavailable
- Modification threats include system assets being tampered with
- Fabrication threats include false information being added to a system
Asset Analysis
- The information system has a high value as it is required to support all clinical consultations and is potentially safety-critical, and is marked as a high exposure because the financial loss associated with clinics being canceled and the resulting cost of restoring the system
- The patient database has a high value because it's required to support all clinical consultations and is potentially safety-critical, and has a high exposure because of financial loss caused by the possibility of cancellations and harm due to treatments not prescribed
- An individual patient record typically has a low value, except for high-profile patients, resulting in a low exposure due to direct losses and a potential loss of reputation
Threat and Control Analysis
- Low probability of system manager account unauthorized use, so control by allowing managers from physically secure locations to perform system management, this has low cost
- High probability of system user account unauthorized use, counter by requiring user authentication, and logging all patient information changes. This has technically high cost and possible user resistance.
Design Guidelines for Security Engineering
- Design guidelines should encapsulate good practice in secure systems design
- Design guidelines are applicable during software specification and design
Security Guideline List
- Base security decisions on an explicit security policy
- Avoid a single point of failure
- Fail securely
- Balance security and usability
- Log user actions
- Use redundancy and diversity to reduce risk
- Validate all inputs
- Compartmentalize assets
- Design for deployment
- Design for recoverability
Design Guidelines 1-3
- Base decisions on security policy: Define a security policy for the organization, setting out fundamental security requirements for all organizational systems
- Avoid single point of failure: Ensure security failure results from multiple security procedure failures, and use password and question-based authentication
- Fail securely: Ensure sensitive information inaccessible to unauthorized users when systems fail, even when normal security procedures are unavailable
Design Guidelines 4-6
- Balance security and usability: Avoid security procedures that complicate system use, and accept weaker security for usability
- Log user actions: Maintain a log of user actions for analysis, deterring irresponsible behavior if users are aware of the log
- Use redundancy and diversity to reduce risk: Keep multiple copies of data and use diverse infrastructure to avoid a single point of failure
Design Guidelines 7-10
- Validate all inputs: Check if the inputs are within acceptable ranges
- Compartmentalize assets: Organize the system so that assets are in separate areas and users only have access to the information they need rather than all system information
- Design for deployment: Design the system to avoid deployment problems
- Design for recoverability: Design the system to simplify recovery after a successful attack
System Survivability
- Survivability is an emergent system property that shows the system's ability to deliver essential services while under attack or after damage
- Survivability analysis and design should be within the security engineering process
Importance of Survivability
- Economic and social lives rely on computer systems, specifically:
- Critical infrastructure (electricity, gas, telecommunications, transport)
- Healthcare
- Government
- The loss of business systems has very severe economic effects, like:
- Airline reservation systems
- E-commerce systems
- Payment systems
Survivability Strategies
- Resistance: Building capabilities into the system to resist attacks
- Recognition: Detecting problems by building capabilities into the system to detect attacks and failures and assess the resultant damage
- Recovery: Tolerating problems by building capabilities into the system to deliver services whilst under attack
Key Points
- General security guidelines sensitize designers to security issues and serve as review checklists
- Configuration visualization, setting localization, and minimization of default privileges help reduce deployment errors
- System survivability reflects the ability of a system to deliver services whilst under attack or after damage
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.