[1] Computer Security Overview
Security Requirements (hardware, software, information)
- confidentiality : not disclosed to unautorized
기밀성
- integrity : changed only by authorized
무결성
- availability : not denied to authorized
가용성
- authenticity : verify and trust one
확실성
- accountability : able to trace back uniquely
책임 누적성, 부인방지
Security Concepts and Relationships
- adversary : 공격자
- attack : 시도/행동
- countermeasure
- risk : 가능성/기대치 (제어o)
- security policy
- system resource : asset (자산)
- vulnerability
- threat : 위협/포텐셜 (제어x)
Threat Consequences
- unauthorized disclosure : exposure, interception, inference, intrusion
- deception : masquerade, fallsification, repudiation
- disruption : incapcitation, corruption, obstruction
- usurpation : misappropriation, misuse
Security Design principle
- Seperation of previlege : 권한은 여러개로 나누어져야 한다
- Least Privilege : 최소한의 권한만 할당
- Least Common Mechanism : 공유되는 함수 개수 최소화
- Psychological Acceptability : 그래도 너무 지나치면 불편
Attack Surface vs. Attack Trees
Attack surface : rechable vulnerabilities
- network attack surface (open ports)
- software attack surface (memory safety violation)
- human attack surface (employee kidnap)
Attack tree: diagram of how might be attacked
- asset
- target
Security Taxonomy (Event, Attack, incident)
- Attack : incident (hackers, spies, terrorists)
- Tool : attack (physical attack, information exchange, user command)
- Vulnerability : attack (design, implementation, configuration)
- Action : event (probe, scan, flood, read, copy, modify)
- Target : event (account, process, data, network)
- Unauthorized result : attack (increased access, disclosure, corruption, denial)
- Objectives : incident (challenge, politician gain, finicial gain, damage)
'CS > 정보 보안' 카테고리의 다른 글
[정보 보안] Malicious Software (6) (0) | 2024.06.22 |
---|---|
[정보 보안] 운영체제 보안 (5) (0) | 2024.06.22 |
[정보 보안] 데이터 베이스 보안 (4) (0) | 2024.06.22 |
[정보 보안] User Authentication (3) (0) | 2024.06.22 |
[정보 보안] Cryptographic Tools (2) (0) | 2024.06.22 |