This lesson is about cybersecurity first principles. So all of them will be discussed.
Building a secure system is a design problem. Which means that there is no de-facto recipe to do so. In the absence of methodical techniques, experience has contributed to a set of first principles. The principles are basic, foundational propositions regarding what qualities of a system contribute to cybersecurity. These principles guide system design decisions and tradeoffs that contribute to cybersecurity.
We now examine 10 cybersecurity first principles. This discussion is adapted from NSA guidance on this topic.
Domain
?
supervisor domain
and the user domain
. The processor, when in the supervisor domain, can directly access memory (i.e. RAM) or manipulate access control tables in a primitive file system. When in the user domain, the processor cannot access memory that belongs to other programs or the operating system.process
is a program or code running on a computer. Each process has a region of the memory (a collection of memory addresses often referred to as an address space
), which only it can access.resource
can be the memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure.Encapsulation
finds its origin in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The goal is to allow access or manipulation of the class data in only the ways the designer intended.privilege
is a right for the user to act on managed computer resources.layer
is a separate level that must be conquered by an attacker to breach a system.Abstraction
is the concept that something complicated can be thought of and represented more simply. All models are abstractions - since they reduce the complexity of an object into something that is understandable.
Hide
the rest of the data
and log all access attempts.Modularity
is a design technique that separates the functionality of a program into independent, interchangeable components.Simplicity
may allow system designers and programmers to better identify unwanted access paths.minimal
viable product with rigorous verification of security requirements.Think of the first four principles as the necessary elements of building a protection mechanism, like a Castle: Wall, Door, Guard and Check. They help you answer the question, how to build a protection mechanism. The rest of the principles that follow, contribute to the quality of the protection mechanism. They help you answer the question, how good is the protection mechanism.
It is an expectation for the entity entrusted with data (or code) to keep it a secret. For example, if a healthcare provider is entrusted with patient data, the user expects the health care provider to keep it secret.
It is an expectation for the entity entrusted with data (or code) to only allow authorized modifications to it. For example, only authorized individuals are allowed to make changes to an employee’s salary.
It is an expectation for the entity entrusted with data (or code) to allow access to it when needed. For example, the personnel records in a database are available when needed.
The Cyber Realm card game helps teach the 10 principles of cybersecurity. The cards reinforce the 10 principles using hand gestures, or by playing single person or group games.
Split in groups of 4 or less. Hand two cards decks to each group.
Dark Blue
cards with first principles on it. There should be 10 such cards.Light Blue
question cards (cards 1-20) of the one of the sub-group’s decks as the question stack.
Shuffle these cards and place them face down in a stack to the left of sub-group 1.
- If both sub-groups picked the same principle they will put that question card face up to the right of the turned up question card area.
- If the principles don’t match, the two sub-groups discuss and reach consensus. The sub-groups may invite the instructor if the mismatch cannot be resolved.
Repeat steps 3 – 6 for all question cards
Now we use the Dark Green
and Green
cards. In the Dark Green
set of cards, find card # 21 - Information. This card introduces users to the expectations for information, information states and ways to safeguard information.
Cards 22, 23, 24 are the expectations of information
Cards 25, 26, 27 are the information states
STEP 2: Arrange these two sets of cards into a matrix. For example, cards 22, 23, and 24 form column headers, and cards 25, 26, and 27 form rows.
Cards 31 – 39
Ask students to place cards in a Round Robin fashion. Internally discuss and resolve any disagreements. Each team must put all 9 cards down in the matrix within 5 minutes.
STEP 5: Ask the sub-groups to share their solution. Discuss and resolve any disagreements raised by between the sub-groups using your answer key.
states of information
cards with the following cards that represent information countermeasures
Cards 28, 29, 30 are information countermeasures
Repeat above steps
Now create a matrix for characteristics of information vs. information countermeasures
Combo 1: States vs Characteristics
Game 1 | 22 Confidentiality (C) | 23 Integrity (I) | 24 Availability (A) |
---|---|---|---|
25 Storage (S) | 31 Encryption (C) Hard Drive (S) |
36 altered by anyone (I) backups (S) |
38 files (S) finding files (A) |
26 Transmission (T) | 32 send email (T) no one can read (C) |
34 digital signature (I) email (T) |
39 email (T) disaster recovery (A) |
27 Processing (P) | 33 compute (P) secrecy (C) |
35 CPU calculations (P) incorrect values (I) |
37 slow and freezes (A) run application (P) |
Combo 2: States vs. Countermeasures
Game 2 | 28 Education (E) | 29 Policy (Po) | 30 Technology (Te) |
---|---|---|---|
25 Storage (S) | 38 files (S) training (E) |
36 rules (Po) backups (S) |
31 hard drive (S) AES encryption (Te) |
26 Transmission (T) | 32 send email (T) unsure (E) |
39 recovery plan (Po) email (T) |
34 email (T) digital signature (Te) |
27 Processing (P) | 35 compute (P) reads article (E) |
33 compute (P) rule (Po) |
37 powerful device (Te) run application (P) |
Combo 3: Characteristics vs. Countermeasures
Game 3 | 28 Education (E) | 29 Policy (Po) | 30 Technology (Te) |
---|---|---|---|
22 Confidentiality (C) | 32 unsure (E) no one can read (C) |
33 secrecy (C) rules (Po) |
31 sensitive data (C) AES encryption (Te) |
23 Integrity (I) | 35 incorrect (I) reads article (E) |
36 not altered (I) rules (Po) |
34 digitally signed (Te) digital signature (I) |
24 Availability (A) | 38 find files (A) training (E) |
39 constant email communications (A) recovery plan (Po) |
37 powerful device (Te) slow and freezes (A) |
If there is a question as to where the card should be placed the answer is on the card – encrypted. For example on card 31 the lower right hand has the code XON21. This code is a simple rotation cipher and it rotated by 21. You will get a three letter answer. In this case it will be CTS. The first letter will be either C, I, or A for Confidentiality, Integrity, Availability. The second letter will be P, E, or T for safeguards – Policy, Education or Technology. The third letter will be S, T or P for states – Storage, Transmission or Processing. In this case the answer is C for Confidentiality, and S for Storage.
Now we use the Dark Red
(41-48) and Red
(49-56) cards.
STEP 1 - Examine the five phases of a cyberattack using the Dark Red
cards.
STEP 2 - Research the terms on the Red
cards and place them along the five phases of a cyberattack. Defense in Depth
cards are the safeguards and Tool, Techniques and Procedures
are used by attackers in a particular phase.
If there is a question as to where the card should be placed the answer is on the card – encrypted. For example on card 52 the lower right hand has the code MYF10
. This code is a simple rotation cipher and it rotated by 10. You will get a three letter answer. In this case it will be COV
- which stands for the Covering Tracks
phase of a cyberattack.
Nebraska GenCyber
is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Overall content: Copyright (C) 2017-2021 Dr. Matthew L. Hale, Dr. Robin Gandhi, and Dr. Briana B. Morrison.
Lesson content: Copyright (C) Robin Gandhi 2018-2021.
This lesson is licensed by the author under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.