Unit 1 - Notes

INT242

Unit 1: Fundamental Security Concepts, Threat Types, and Cryptographic Solutions

1. Security Concepts

The foundation of cybersecurity relies on understanding what we are trying to protect and how we identify users.

The CIA Triad

The Confidentiality, Integrity, and Availability (CIA) triad is a model designed to guide policies for information security within an organization.

  • Confidentiality: Ensures that sensitive information is accessed only by an authorized person and kept away from those not authorized to possess it.
    • Methods: Encryption, Access Control Lists (ACLs), Two-Factor Authentication (2FA).
    • Breach Example: A laptop theft resulting in exposed passwords.
  • Integrity: Assures that data is consistent, accurate, and trustworthy over its entire lifecycle. It must not be changed in transit or altered by unauthorized people.
    • Methods: Hashing, Checksums, Digital Signatures, Version Control.
    • Breach Example: An attacker injecting false data into a database or modifying a log file.
  • Availability: Ensures that information and resources are available to authorized users when needed.
    • Methods: Redundancy (RAID), Backups, Load Balancing, Disaster Recovery Plans.
    • Breach Example: A Distributed Denial of Service (DDoS) attack taking down a web server.

A detailed conceptual diagram illustrating the CIA Triad. The image should feature an equilateral tr...
AI-generated image — may contain inaccuracies

The AAA Framework

AAA is a framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage.

  1. Authentication (Who are you?): Verifying the identity of a user or system (e.g., passwords, biometrics, tokens).
  2. Authorization (What can you do?): Determining what actions the authenticated user is allowed to perform (e.g., read-only access vs. admin rights).
  3. Accounting (What did you do?): Tracking user activities and resource usage (e.g., log files, session times).

2. Security Controls

Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks.

Categorization by Function

  • Preventive: Stops an incident before it occurs (e.g., Firewalls, Encryption, Security Guards).
  • Detective: Identifies an incident's occurrence (e.g., IDS, CCTV, Log Audits).
  • Corrective: Fixes systems after an incident (e.g., Backups, Patching).
  • Deterrent: Discourages potential attackers (e.g., "Warning" signs, Hardware locks).
  • Compensating: Alternative controls when primary controls are not feasible (e.g., dual-authorized keys).

Categorization by Implementation

  • Technical (Logical): Hardware or software mechanisms (Firewalls, Anti-virus).
  • Administrative (Managerial): Policies, procedures, and training (Acceptable Use Policy, Background Checks).
  • Physical: Tangible protection measures (Fences, Locks, Biometric Scanners).

3. Threat Actors

Understanding who attacks systems helps in designing defense strategies.

Threat Actor Motivation Skill Level Characteristics
Script Kiddie Notoriety/Fun Low Uses pre-made tools/scripts; little understanding of underlying mechanics.
Hacktivist Political/Social Medium-High Attacks targets to promote a cause (e.g., Anonymous).
Organized Crime Financial Gain High Structured groups; utilize ransomware, phishing, and credit card theft.
Nation-State (APT) Espionage/Warfare Very High Advanced Persistent Threats (APT); government-sponsored; unlimited resources.
Insider Threat Revenge/Greed Varies Current/former employees; dangerous because they have legitimate access.
Competitors Industrial Espionage High Stealing trade secrets or intellectual property.

4. Attack Surfaces

The attack surface is the total sum of vulnerabilities that an attacker can exploit to carry out a security attack.

  • Network Attack Surface: Open ports, unpatched protocols, wireless entry points.
  • Software Attack Surface: Application code, APIs, user input fields (SQL Injection points).
  • Physical Attack Surface: USB ports, server rooms, discarded hardware.
  • Human Attack Surface: Employees vulnerable to social engineering.

Hardening is the process of reducing the attack surface (e.g., closing unused ports, disabling default accounts).


5. Social Engineering

Social engineering exploits human psychology rather than technical hacking techniques to gain access to buildings, systems, or data.

Common Techniques

  • Phishing: Sending fraudulent emails appearing to be from reputable sources to induce individuals to reveal personal information.
  • Spear Phishing: Highly targeted phishing aimed at specific individuals or companies.
  • Whaling: Phishing attacks targeting high-profile executives (CEOs, CFOs).
  • Vishing (Voice Phishing): Using the telephone to scam the user.
  • Smishing (SMS Phishing): Using text messages to deliver malicious links.
  • Tailgating/Piggybacking: Following an authorized person into a secure area.
  • Dumpster Diving: Looking through trash to find sensitive information (requires shredding policies).
  • Watering Hole Attack: Infecting a website known to be visited by the target group.

6. Cryptographic Algorithms

Cryptography is the science of securing communication.

1. Symmetric Encryption

Uses the same key for both encryption and decryption.

  • Pros: Fast, efficient for large data.
  • Cons: Key exchange is difficult (securely sharing the key).
  • Algorithms:
    • AES (Advanced Encryption Standard): Current standard (128, 192, 256-bit keys).
    • DES/3DES: Legacy, considered insecure.
    • Blowfish/Twofish: Alternatives to AES.

2. Asymmetric Encryption (Public Key Cryptography)

Uses a key pair: A Public Key (shared with everyone) and a Private Key (kept secret).

  • Encryption Mode: Encrypt with Public Key Decrypt with Private Key (Confidentiality).
  • Signing Mode: Encrypt with Private Key Verify with Public Key (Authenticity/Non-repudiation).
  • Pros: Solves key exchange problem.
  • Cons: Slower than symmetric.
  • Algorithms:
    • RSA: Based on factoring large prime numbers.
    • ECC (Elliptic Curve Cryptography): Efficient, strong security with smaller key sizes (used in mobile).
    • Diffie-Hellman: Used primarily for secure key exchange, not encryption itself.

A comparison diagram split into two panels illustrating Symmetric vs. Asymmetric encryption. Panel 1...
AI-generated image — may contain inaccuracies

3. Hashing

A one-way mathematical function that converts data of any length into a fixed-length string (digest/hash).

  • Characteristics: One-way (cannot reverse), Deterministic (same input = same output), Collision-resistant.
  • Use Cases: Verifying file integrity, storing passwords.
  • Algorithms:
    • MD5: 128-bit (Legacy, vulnerable to collisions).
    • SHA-1: 160-bit (Legacy, deprecated).
    • SHA-2 (SHA-256): Current standard.
    • SHA-3: Newest standard.

7. Public Key Infrastructure (PKI)

PKI is the set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Core Components

  1. Digital Certificate (X.509): An electronic document attempting to prove the ownership of a public key. It includes the Public Key, Identity of the owner, and Signature of the CA.
  2. Certificate Authority (CA): A trusted entity that issues digital certificates (e.g., Verisign, Let's Encrypt).
  3. Registration Authority (RA): Verifies the identity of a certificate requestor before the CA issues the cert.
  4. CRL (Certificate Revocation List): A list of certificates that have been revoked before their expiration date (e.g., due to key compromise).
  5. OCSP (Online Certificate Status Protocol): A real-time alternative to CRL for checking certificate status.

Chain of Trust

Browsers trust a "Root CA." The Root CA signs "Intermediate CAs." Intermediate CAs sign "End-Entity Certificates" (Websites). If the chain is broken, the browser displays a security warning.

A vertical hierarchical block diagram showing the "Chain of Trust" in PKI. At the very top, a gold b...
AI-generated image — may contain inaccuracies


8. Cryptographic Solutions

How cryptography is applied in real-world scenarios.

Digital Signatures

Ensures Integrity, Authentication, and Non-repudiation.

  1. Sender hashes the data.
  2. Sender encrypts the hash with their Private Key.
  3. Receiver decrypts the hash with Sender's Public Key.
  4. Receiver computes their own hash of the data.
  5. If the hashes match, the signature is valid.

Data States and Protection

  1. Data at Rest: Data stored on hard drives, USBs, backup tapes.
    • Solution: Full Disk Encryption (FDE) like BitLocker, File-level encryption (AES).
  2. Data in Transit (Motion): Data moving over a network (Internet, LAN).
    • Solution: TLS/SSL (HTTPS), IPsec VPNs, SSH.
  3. Data in Use: Data currently in memory (RAM) or being processed by the CPU.
    • Solution: Secure Enclaves (Intel SGX), Homomorphic Encryption (theoretical/emerging).

Steganography

The practice of concealing a file, message, image, or video within another file, message, image, or video. Unlike encryption, which hides the content, steganography hides the existence of the message (e.g., hiding text inside the Least Significant Bits of an image file).

A step-by-step diagram showing the Digital Signature creation and verification process. The diagram ...
AI-generated image — may contain inaccuracies