What’re the fundamentals?
CIA is the core 3. Similar (but different) to CAP:
- Confidentiality: Information should only be accessible to authorised entities (links to Authenticity).
- Integrity:
- Data is untampered and uncorrupted
- Availability:
- Accessible when you need it.
- Authentication
- Anonymity
- Unlinkability: An attacker should not be able to deduce whether different services are delivered to the same user.
- Non-repudiation: The author of an action should not be able to deny doing said action.
Security Threat Categories
- Interception
- Interruption
- Modification
- Fabrication
- Repudiation
- Epistemic
Security Principals:
- Defence in Depth: Like a castle, build multiple layers of the of security. If one fails, another acts as redundancy / reduces impacts.
- EG: Firewalls, intrusion detection, network segmentation, antivirus, least privilege etc.
- Least Privilege: Users / programs should only have access to what’s required.
- Privilege Separation: Segment the system into components which can be accessed. EG apps need distinct permissions.
- Open Design: Avoiding security through obscurity.
- Economy of Mechanism: Keep a security mechanism simple.
- Fail-Safe Defaults: The default should be conservative. Eg New users should have least privileges.
- Complete Mediation: Every access to a resource should be checked for compliance with security policy.
Security Goals in Web Browsers:
- Web apps should provide the same security guarantees as normal apps.
evil.comshouldn’t infect the rest of my computerevil.comshouldn’t compromise mygmail.comsession- Sensitive info on
gmail.comshould be kept that way.
Related Topics:
- 3 Dining Cryptographers
- Anonymity
- Anonymous Communication
- Asymmetric Encryption
- Block Ciphers
- Blockchain
- Blockchain Miners
- Buffer Overflow Attack
- Certificate Authority
- Computer Security
- Consensus Problem in Blockchain
- Consensus Protocol
- Cryptographic Hash Functions
- Cryptography
- Digital Signature
- Diffie-Hellman
- DNS Cache Poisoning
- Encryption
- Firewall
- Format Strings Exploit
- Forward Secrecy
- Internet Censorship
- Injection Attacks
- Intrusion Detection System (IDS)
- Kernel Vs User Mode
- Live CD Attacks on Memory
- LLM Jailbreaking
- Merkle Tree
- Needham-Schroeder Public-Key Protocol (NSPK)
- One Time Pad (OTP)
- Passkeys
- Password Authentication
- Perfect Secrecy
- Permissioned Ledgers
- Proof of Stake
- Proof of Work
- Pseudorandom
- Public Key Infrastructure (PKI)
- RSA Algorithm
- Safety Vs. Liveness in Blockchain
- Same Origin Policy (SOP)
- Smart Contract Phishing Attack
- Smart Contract Safety (Attacks)
- Smurfing Attack
- SSL - TLS
- Stream Cipher
- Symmetric Encryption
- Threat Model
- Tor 🧅
- Web Security
- Zero Knowledge