Introduction

Motivation

When talking about information security, we consider the following key concepts:

  • Confidentiality
    • Sensitive data must be protected from unauthorized (read) access
  • Integrity
    • Sensitive data must be protected from unauthorized (write) access
  • Availability
    • Sensitive data must be available to authorized users when it is needed

Terms and Definitions

  • Virus

    • A program that can copy itself and infect other programs
    • The executable programs or documents that are infected are called hosts
  • Worm

    • Similar to viruses, but are standalone programs that do not need to infect other programs to spread
    • Worms can spread by themselves
  • Trojan

    • A program that appears to be harmless, but actually has malicious intent
  • Security Bug

    • A security-relevant software problem introduced during implementation of the software
  • Security Design Flaw

    • A security-relevant software problem introduced during the design of the software
  • Security Defect

    • Both security bugs and security design flaws are called security defects
  • Vulnerability

    • A vulnerability is a defect (bug or design flaw) that can be exploited by an attacker
    • Not every security-relevant bug or flaw can be exploited, as there may for instance be other safeguards that compensate for the defect
  • Threat

    • A threat is a potential danger that might exploit a vulnerability (can be intentional (attacker) or unintentional (accident, e.g. fire in server room))
    • The attacker is often identified as threat agent, which the actual attack is the threat action
  • Exploit

    • The actual attack that takes advantage of a vulnerability
  • Asset

    • Anything (hardware, software, data,...) that is of value to an organization
  • Risk

    • Measure of criticality of a specific threat or vulnerability
  • Countermeasure

    • An action, device or process that reduces the risk of a specific threat or vulnerability
image

Problems of Penetrate and Patch:

  • If a vulnerability is found, it is often not possible to patch it immediately and the patch itself may introduce new vulnerabilities
  • The attacker may have already exploited the vulnerability before the patch is available