Introduction to Cybersecurity First Principles

Cybersecurity First Principles in this lesson

This lesson is about cybersecurity first principles. So all of them will be discussed.

Lesson goals

  1. Understand and apply cybersecurity first principles
  2. Explain cybersecurity first principles

Materials required

Prerequisite lessons

Table of Contents

Cybersecurity First Principles

What are first principles?

Building a secure system is a design problem. Which means that there is no de-facto recipe to do so. In the absence of methodical techniques, experience has contributed to a set of first principles. The principles are basic, foundational propositions regarding what qualities of a system contribute to cybersecurity. These principles guide tradeoffs during system design that contribute to security.

Stepping through the principles

We now examine 10 cybersecurity first principles. This discussion is adapted from NSA guidance on this topic.

1. Domain Separation

2. Process Isolation

3. Resource Encapsulation

4. Least Privilege

5. Layering

6. Abstraction

7. Data Hiding

8. Modularity

9. Simplicity

10. Minimization

CIA Triad - Expectations of Information

Confidentiality

It is an expectation for the entity entrusted with data (or code) to keep it a secret. For example, if a healthcare provider is entrusted with patient data, the user expects the health care provider to keep it secret.

Integrity

It is an expectation for the entity entrusted with data (or code) to only allow authorized modifications to it. For example, only authorized individuals are allowed to make changes to an employee’s salary.

Availability

It is an expectation for the entity entrusted with data (or code) to allow access to it when needed. For example, the personnel records in a database are available when needed.

Card Game

The Cyber Realm card game helps teach the 10 principles of cybersecurity. The cards reinforce the 10 principles using hand gestures, or by playing single person or group games.

Split in groups of 4 or less. Hand two cards decks to each group.

Game 1: Question Cards

Game 2: Cybersecurity Matrix

Now we use the Dark Green and Green cards. In the Dark Green set of cards, find card # 21 - Information. This card introduces users to the expectatations for information, information states and ways to safeguard information.

array

Game 2 Solution

Combo 1: States vs Characteristics

Game 1 22 Confidentiality (C) 23 Integrity (I) 24 Availability (A)
25 Storage (S) 31 Encryption (C) Hard Drive (S) 36 altered by anyone (I) backups (S) 38 files (S) finding files (A)
26 Transmission (T) 32 send email (T) no one can read (C) 34 digital signature (I) email (T) 39 email (T) disaster recovery (A)
27 Processing (P) 33 compute (P) secrecy (C) 35 CPU calculations (P) incorrect values (I) 37 slow and freezes (A) run application (P)

Combo 2: States vs. Countermeasures

Game 2 28 Education (E) 29 Policy (Po) 30 Technology (Te)
25 Storage (S) 38 files (S) training (E) 36 rules (Po) backups (S) 31 hard drive (S) AES encryption (Te)
26 Transmission (T) 32 send email (T) unsure (E) 39 recovery plan (Po) email (T) 34 email (T) digital signature (Te)
27 Processing (P) 35 compute (P) reads article (E) 33 compute (P) rule (Po) 37 powerful device (Te) run application (P)

Combo 3: Characteristics vs. Countermeasures

Game 3 28 Education (E) 29 Policy (Po) 30 Technology (Te)
22 Confidentiality (C) 32 unsure (E) no one can read (C) 33 secrecy (C) rules (Po) 31 sensitive data (C) AES encryption (Te)
23 Integrity (I) 35 incorrect (I) reads article (E) 36 not altered (I) rules (Po) 34 digitally signed (Te) digital signature (I)
24 Availability (A) 38 find files (A) training (E) 39 constant email communications (A) recovery plan (Po) 37 powerful device (Te) slow and freezes (A)

If there is a question as to where the card should be placed the answer is on the card – encrypted. For example on card 31 the lower right hand has the code XON21. This code is a simple rotation cipher and it rotated by 21. You will get a three letter answer. In this case it will be CTS. The first letter will be either C, I, or A for Confidentiality, Integrity, Availability. The second letter will be P, E, or T for safeguards – Policy, Education or Technology. The third letter will be S, T or P for states – Storage, Transmission or Processing. In this case the answer is C for Confidentiality, and S for Storage.

Game 3: Thinking like the Adversary

Now we use the Dark Red (41-48) and Red (49-56) cards.

STEP 1 - Examine the five phases of a cyberattack using the Dark Red cards.

STEP 2 - Research the terms on the Red cards and place them along the five phases of a cyberattack. Defense in Depth cards are the safeguards and Tool, Techniques and Procedures are used by attackers in a particular phase.

If there is a question as to where the card should be placed the answer is on the card – encrypted. For example on card 52 the lower right hand has the code MYF10. This code is a simple rotation cipher and it rotated by 10. You will get a three letter answer. In this case it will be COV - which stands for the Covering Tracks phase of a cyberattack.

A test of your principles…

Quiz

Additional Resources

Top

Lead Author

Acknowledgements

Top

License

Nebraska GenCyber Creative Commons License
is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Overall content: Copyright (C) 2017-2018 Dr. Matthew L. Hale, Dr. Robin Gandhi, Dr. Briana B. Morrison, and Doug Rausch.

Lesson content: Copyright (C) Robin Gandhi 2018.
Creative Commons License
This lesson is licensed by the author under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.