╱╱╭╮╱╱╱╱╱╱╭━━━╮╱╱╱╭╮╱╭╮╱╱╱╱╱╱ ╱╱┃┃╱╱╱╱╱╱┃╭━╮┃╱╱╱┃┃╱┃┃╱╱╱╱╱╱ ╱╱┃┣━━┳━━╮┃┃╱┃┣━╮╱┃╰━╯┣━━┳━╮╱ ╭╮┃┃╭╮┃┃━┫┃╰━╯┃╭╮╮┃╭━╮┃╭╮┃╭╮╮ ┃╰╯┃╭╮┃┃━┫┃╭━╮┃┃┃┃┃┃╱┃┃╭╮┃┃┃┃ ╰━━┻╯╰┻━━╯╰╯╱╰┻╯╰╯╰╯╱╰┻╯╰┻╯╰╯

CS/정보 보안

[정보 보안] Computer Security Overview (1)

재안안 2024. 6. 22. 19:25

 

[1] Computer Security Overview 

Security Requirements (hardware, software, information)
- confidentiality : not disclosed to unautorized
기밀성
- integrity : changed only by authorized
무결성
- availability : not denied to authorized
가용성

- authenticity : verify and trust one
확실성
- accountability : able to trace back uniquely
책임 누적성, 부인방지

Security Concepts and Relationships
- adversary : 공격자
- attack : 시도/행동
- countermeasure
- risk : 가능성/기대치 (제어o)
- security policy
- system resource : asset (자산)
- vulnerability
- threat : 위협/포텐셜 (제어x)

Threat Consequences
- unauthorized disclosure : exposure, interception, inference, intrusion
- deception : masquerade, fallsification, repudiation
- disruption : incapcitation, corruption, obstruction
- usurpation : misappropriation, misuse

Security Design principle
- Seperation of previlege : 권한은 여러개로 나누어져야 한다
- Least Privilege : 최소한의 권한만 할당
- Least Common Mechanism : 공유되는 함수 개수 최소화
- Psychological Acceptability : 그래도 너무 지나치면 불편

Attack Surface vs. Attack Trees


Attack surface : rechable vulnerabilities
- network attack surface (open ports)
- software attack surface (memory safety violation)
- human attack surface (employee kidnap)

Attack tree: diagram of how might be attacked
- asset
- target

Security Taxonomy (Event, Attack, incident)
-  Attack : incident (hackers, spies, terrorists)
-  Tool : attack (physical attack, information exchange, user command)
-  Vulnerability : attack (design, implementation, configuration)
-  Action : event (probe, scan, flood, read, copy, modify)
-  Target : event (account, process, data, network)
-  Unauthorized result : attack (increased access, disclosure, corruption, denial)
-  Objectives : incident (challenge, politician gain, finicial gain, damage)