Chapter 1 Notes
1.1 What Is Computer Security?
Assets to protect: hardware, software, data (and combinations), including device components, operating systems, utilities, applications, and content (documents, photos, media, emails, etc.). Data items are often the most valuable and hardest to replace.
Embedded/varied assets: devices with processors (including non-traditional ones like pacemakers, cars, appliances) are assets due to their computing capability.
Values of assets: owner perspective matters; value can be monetary, emotional, or contextual (replacement cost, timeliness, etc.).
Threat–vulnerability–control paradigm:
vulnerability: a weakness in procedures, design, or implementation that could be exploited.
threat: a set of circumstances that could cause harm.
control: action/device/procedure that removes or reduces a vulnerability.
C-I-A triad (foundation of security):
confidentiality: only authorized parties view an asset; C
integrity: assets are modified only by authorized parties; I
availability: assets usable by authorized parties when needed; A
Extensions to C-I-A (not always considered core in this book):
authentication: confirming sender identity; ext{authentication}
nonrepudiation/accountability: sender cannot deny sending; ext{nonrepudiation}
auditability: trace actions related to an asset; ext{auditability}
Access control and policy:
policy = who + what + how → yes/no access; ext{Policy: Who + What + How = Yes/No}
Interplay of C-I-A concepts with harm: theft or tampering harms all three properties; single weaknesses can affect confidentiality, integrity, and availability.
Threats can be categorized as acts (interception, modification, interruption) that harm C-I-A; threats can be human-initiated, natural, accidental, or organizational.
Availability considerations:
data/services must be present, capable, timely, and usable; monitored via access controls to maintain availability.
Summary: security aims to protect the computer system (hardware, software, data) from threats by applying appropriate controls to preserve the C-I-A properties.
1.2 Threats
Two ways to analyze harm: (1) what can happen to assets; (2) who/what can cause or allow the harm.
Threats to confidentiality, integrity, and availability constitute the core security threats; terminology extended for network contexts (authentication, nonrepudiation, auditability).
Cyber terminology:
cyberthreat: threat against networks of computers; cyberspace = online world; cybercrime = illegal attacks on networks/users/data/infrastructure.
Threat sources and types:
threats can be random (opportunistic) or directed (targeted).
human threats: insiders, programmers, maintenance staff; nonhuman threats: natural disasters, hardware failures, power loss.
threat categories include: random attacks vs directed campaigns; organized crime; terrorism.
Advanced Persistent Threats (APTs): organized, well-funded, long-term campaigns often tied to government or quasi-government actors; targeted via spear phishing and other stealth techniques; long dwell times.
Attackers vary from individuals to organized crime to terrorists; attackers often resemble ordinary people and can be difficult to profile; malware-enabled attacks increasingly collaborative and multinational.
Organized crime model in cybercrime: virtual shops, creative/marketing/analytics/data/finance teams, managerial layer, ringleaders; cybercrime rings behave like legitimate enterprises with specialization and long-duration campaigns.
Terrorism and cyber interplay: computers used as targets, methods of attack, enablers (coordination/propagation), or enhancers (propaganda, recruitment).
Risk metrics and measurement aids:
CVE: common vulnerabilities and exposures; CVSS: common vulnerability scoring system.
Cybersecurity vs computer security: broadening scope from single devices to networks and cyberspace; both terms used in practice.
MOM (Method–Opportunity–Motive): attacker needs all three to succeed; removing any one via defense reduces risk; ext{MOM} = ext{Method} \u2227 ext{Opportunity} \u2227 ext{Motive}
Threat landscape also includes Advanced threats from organized groups and geopolitical factors; attackers’ motives range from profit to politics to notoriety.
Kinds of attackers and attacker profiles: no single profile; attackers can be individuals, organized groups, or nation-state actors; motives shift toward financial gain in recent years.
Threats are not confined to one device; cyberspace scale requires broader protections and coordination across institutions.
1.3 Harm
Harm is the negative outcome of realized threats; risk is the potential for harm given threats and vulnerabilities.
Risk management: prioritize protections due to limited resources; focus on serious or controllable threats; residual risk remains after controls.
Risk concepts:
impact: severity of harm if a threat exploits a vulnerability.
likelihood: probability that the threat will occur.
residual risk: risk remaining after applying controls.
Risk-focused decision making is influenced by perception of extreme events (dread, unknown) and the feasibility of attacks (MOM factors).
Sidebar concepts summarize how organizations assess risk perception and long-term financial impacts of breaches; empirical studies show mixed long-term effects and difficulty in quantifying risk precisely.
Practical takeaway: prioritize threats that are most likely or most damaging and implement reasonable controls; risk is dynamic and context-dependent.
1.4 Vulnerabilities
Vulnerability = a weakness in procedures, design, or implementation that could be exploited.
Attack surface = full set of actual and potential vulnerabilities; includes physical, software, network, and human factors.
Attack vectors exploit specific vulnerabilities to harm confidentiality, integrity, or availability.
Blocking threats involves neutralizing vulnerabilities or hardening the attack surface.
1.5 Controls
Definition: a control or countermeasure is a means to counter threats by blocking threats, closing vulnerabilities, or both.
Types of controls (three classes):
Physical controls: walls, locks, guards, fences, alarms, etc.
Procedural/administrative controls: laws, policies, procedures, guidelines, contracts.
Technical controls: passwords, access controls, firewalls, IDS, encryption, network regulation.
Defense in depth: use overlapping controls from multiple classes to increase protection.
Decision factors: control type chosen based on what is being protected, threat type, cost, and attacker effort.
Figure 1-12 (controls) and Figure 1-13 (types of countermeasures by threat) illustrate multi-layered protection.
1.6 Conclusion
Computer security aims to protect confidentiality, integrity, and availability of computing systems.
Core components at risk: hardware, software, and data; threats exploit vulnerabilities in these components.
Key takeaways:
Perfect security is rarely achievable; focus on mitigating likely or damaging threats and reducing vulnerabilities.
Attacker could have method, opportunity, and motive; defenders counter by eliminating vulnerabilities and reducing attack opportunities.
Controls can be applied to data, programs, systems, physical devices, communications, environment, and personnel; layered defenses are common.
1.7 What’s Next?
Security toolkit (core tools):
identification and authentication
access control
encryption
Chapter roadmap (from user-focused to system-focused):
Chapter 2: security toolkit
Chapter 3: code and software vulnerabilities
Chapter 4–5: networks, operating systems
Chapter 6–8: networks, cloud, IoT
Chapter 9: privacy
Chapter 10–11: risk management, laws/ethics
Chapter 12: cryptography; Chapter 13: emerging topics (AI, blockchains, quantum)
1.8 Exercises (high-level themes)
Distinguish vulnerability, threat, and control; assess harm from theft or data loss.
Identify possible harms from electronic espionage, data integrity compromise, or loss of service.
Analyze how controls mitigate specific harms in different contexts (e.g., hospital vs. restaurant).
Consider risk management, residual risk, and the cost–benefit balance of protections.
Reflect on real-world security incidents and how you would apply the three MOM factors and controls.
Explore privacy, ethics, and legal considerations in computer security.
Notes and key formulas
C-I-A triad: {Confidentiality},{Integrity},{Availability}
Policy equation: ext{Policy: Who + What + How} = ext{Yes/No}
MOM: ext{MOM}={Method}\,-{Opportunity}\,-{Motive}
Security toolkit: ext{Toolkit} = ext{Identification/Authentication}, \, ext{Access Control}, \, ext{Encryption}
Attack surface: full set of vulnerabilities (actual and potential) across hardware, software, data, networks, and people