Learning Library

← Back to Library

Confidentiality: Access Control & Encryption

Key Points

  • The video introduces the CIA triad (Confidentiality, Integrity, Availability) and focuses on how to achieve confidentiality in cybersecurity.
  • Confidentiality is primarily enforced through access control mechanisms, which include authentication (verifying identity) and authorization (ensuring the user has the right privileges), often implemented with multi‑factor authentication and role‑based access control.
  • The presenter illustrates both positive (authorized user passes authentication and authorization) and negative (unauthorized user is blocked or lacks privileges) scenarios to show how access control protects data.
  • Encryption is presented as the second key pillar of confidentiality: data is encrypted with cryptographic keys before transmission so that only intended, authorized recipients can decode and read the information.

Full Transcript

# Confidentiality: Access Control & Encryption **Source:** [https://www.youtube.com/watch?v=EqNe55IzjAw](https://www.youtube.com/watch?v=EqNe55IzjAw) **Duration:** 00:12:29 ## Summary - The video introduces the CIA triad (Confidentiality, Integrity, Availability) and focuses on how to achieve confidentiality in cybersecurity. - Confidentiality is primarily enforced through access control mechanisms, which include authentication (verifying identity) and authorization (ensuring the user has the right privileges), often implemented with multi‑factor authentication and role‑based access control. - The presenter illustrates both positive (authorized user passes authentication and authorization) and negative (unauthorized user is blocked or lacks privileges) scenarios to show how access control protects data. - Encryption is presented as the second key pillar of confidentiality: data is encrypted with cryptographic keys before transmission so that only intended, authorized recipients can decode and read the information. ## Sections - [00:00:00](https://www.youtube.com/watch?v=EqNe55IzjAw&t=0s) **Confidentiality: Authentication and Authorization** - The presenter defines confidentiality within the CIA triad and explains how authentication (verifying identity) paired with authorization, using multifactor authentication and role‑based access control, enforces who may access which resources. - [00:03:07](https://www.youtube.com/watch?v=EqNe55IzjAw&t=187s) **Symmetric Encryption and Integrity Basics** - The speaker outlines how pre‑shared‑key symmetric encryption ensures confidentiality through access control, then transitions to integrity by describing how detecting modifications (e.g., via system logs) allows trusted verification of transactions. - [00:06:10](https://www.youtube.com/watch?v=EqNe55IzjAw&t=370s) **Ensuring Integrity and Availability** - The speaker explains using cryptographic measures to detect and block unauthorized data modifications while illustrating how flooding attacks can jeopardize system availability, completing the discussion of the CIA security triad. - [00:09:20](https://www.youtube.com/watch?v=EqNe55IzjAw&t=560s) **SYN Flood Attack Explained** - The speaker explains how a SYN flood exhausts server resources by repeatedly initiating TCP handshakes without completing them, and suggests using connection timeouts to mitigate the issue. - [00:12:22](https://www.youtube.com/watch?v=EqNe55IzjAw&t=742s) **Subscribe for Next Cybersecurity Episode** - The speaker reminds viewers to subscribe so they won’t miss upcoming episodes of the Cybersecurity Architecture series. ## Full Transcript
0:00Welcome back to our Cybersecurity Architecture Series. 0:03In the last video, I talked about five security principles you should always follow and one you should never follow. 0:10In today's video, we're going to talk about the CIA. 0:13No, not the spy guy: Confidentiality, Integrity and Availability. 0:17So let's get started with the first of these, Confidentiality. 0:21So, confidentiality, we basically accomplish with two main types of technologies: 0:26One is access control, which consists of authentication and authorization. 0:37So authentication is answering the question, "Who are you?" In authorization, "Are you allowed to do this or not?" 0:43And let's take an example of how this might work. 0:47So let's say we've got a guy here who is an authorized user and he is going to try to come into access something down here. 0:56Could be some IoT device, could be a database, could be a server. 1:00He's going to access those things. 1:01He comes in and we're going to check him to see if he is, in fact, who he claims to be. 1:06We're going to do the authentication step. 1:08And in doing that, we might use a technology like multifactor authentication-- 1:12some way where he proves who he is by something he knows, something he has, something he is --and use them in combination. 1:20And if he's able to do that, then we allow him in. 1:23And another thing we might add to this is a role-based access control where I look and say, 1:29just because I know who you are doesn't necessarily mean I know what you're allowed to do. 1:33So I need to check now your privileges and see if they match what it is that you're asking for. 1:39If we pass both of these checks-- you're who you claim to be and you have the privileges --then I'm going to allow you through. 1:46So that's the positive case. 1:49In the negative case, here we have an unauthorized user who comes in and they try to authenticate to the system. 1:55And let's say, for instance, they're not able to; they don't have the right credentials. 1:59So we block them. 2:00Or, they come into the system and they're able to authenticate, 2:04but they don't have the privileges and therefore they're not allowed access any further. 2:10So that's how we're basically controlling confidentiality. 2:13Only the authorized user can see this, and we're using access control capabilities in order to enforce that. 2:20Now, what's another piece that we can do here? 2:22Encryption is the other component that is involved in ensuring confidentiality. 2:28Let's take an example here. 2:30Here we have a guy who is going to send a message to an authorized user. 2:35And we want to make sure that the person that is not authorized cannot read the message. 2:40How do we do that? 2:41Well, he takes his message and he encrypts it. 2:43So he encrypts it with a key and a cryptographic key we've shown here to look like an actual house key, 2:49but really, it's a string of bits and he's going to encrypt his message with that. 2:55The message then is going to go in an encrypted envelope, if you think of it that way, it's obscured. 3:01Somebody who is observing from the outside won't be able to read what it is, it looks scrambled. And then the message comes over here. 3:08This guy, who uses the very same key, because we call this symmetric encryption, because we're using the same key on both sides. 3:17In other words, it's a pre-shared key. 3:18Both of them have that knowledge in advance. 3:20How they get there is a whole other matter. 3:22But to keep this example simple we'll assume that they both know the key. 3:27He knows the key, so he's able to decrypt the message and therefore he can read it. 3:31So we get success. 3:33Now, this other guy here, however, does not have the key and therefore all he gets is an encrypted message, which he can't read. 3:41So these are two main things then that we're doing. 3:44We're using access control and encryption as ways to ensure confidentiality. 3:51Okay, we just covered Confidentiality. 3:54Now we're going to move on to cover Integrity. 3:58Integrity is the quality that says a message is true to itself. 4:03A transaction is true to itself. 4:05If it gets modified, then we can detect it. 4:08And if it's detected, then we can know not to trust that and we can take the appropriate countermeasures. 4:14So let's take a look at a couple of examples of this. 4:17Let's say we've got a good guy here and he goes on to a system and he logs in. 4:22Well, we log a record in the syslog to indicate that that occurred. 4:26Then he goes and does some transaction, and then maybe he logs off. 4:30So we're logging those activities as they occur. 4:33Now, let's say there's another guy here who-- the bad guy --he comes in and logs in and then he makes a copy of the database and exfiltrate it. 4:44Then he says, "You know, I don't want anybody to see that. 4:47So what I'm going to do is go back here, elevate my privileged level to superuser, 4:51and I'm going to delete these log records so nobody sees what happened." 4:57Well, that's a big problem. 4:59What we need are technologies that allow us to know that this syslog is no longer trustworthy, that someone has tampered with it. 5:06And those technologies are these things right here. 5:08They are cryptographic functions-- digital signatures and message authentication codes that are used as ways to to tell if, 5:17when I compare one set of records to another, that there's been a change. 5:21So this is the way we can detect that and then take the appropriate countermeasures. 5:28Another example. 5:29Let's take a look at a blockchain, which is a distributed ledger that everyone would have access to. 5:36And as a result, we can all verify whether the results and the information in it is true or not. 5:42Here's this same good guy, and he has appended to the blockchain a few different records and done things like this. 5:51And in fact, in this middle record, let's say he's putting a transaction where he says, "I want to order 100 widgets." And there we see that. 5:59Now what we want is for this thing to be immutable, for it to be unchangeable. 6:02You can add new entries, but you can't change the ones that are on and you can't delete ones that are on there. 6:08Let's say a bad guy wants to violate that. 6:10So his intention is to come along and say, "Let's have some fun here and make this 400-- no more fun --400,000 widgets" and really mess with this guy. 6:20That's what he wants to do. 6:23He may also want to come along and say, "You know what? 6:25I'm just really like to just get rid of that one entirely." So those are the things that we are going to not allow to happen. 6:32And how do we keep those from not happening? 6:35Again, we're going to use these kinds of technologies, these cryptographic technologies that allow us 6:40to see that a record in either of these cases, if someone attempts to modify that, we can see that attempt and we can block it. 6:49Okay, now we've covered Confidentiality and Integrity. 6:53Let's do the last part of the triangle, Availability. 6:57Availability means that the system should be available, the resources should be available to authorized users--that they can get access when they need it. 7:06Well, let's take an example of what this would look like. 7:09Let's say we've got an authorized user here and he comes in and hits a web server, looks up his transaction balance and gets the results back. 7:18That's what we want to see occur. 7:20Well, there's always going to be somebody who's going to try to mess with this. 7:23And so we've got a bad guy and he's going to come in here and send a transaction and another and another and another. 7:31And he's just going to be flooding this system with all of these transaction requests, faster than the system can respond to them. 7:38And if it can't keep up, we end up with what's known as a "denial of service" because 7:44it now can't service other legitimate users for all the illegitimate traffic that's come in. 7:50So that's a basic denial of service case. 7:52How about a more complex case where we amplify the effect of one user and therefore have an even more devastating attack? 8:01Well, in this case, let's say this guy takes over control of his system. 8:07So this user is unsuspecting--Ignorance is bliss, he's happy as can be. 8:11Has no idea that this guy is controlling his system remotely. 8:15And he takes over a bunch of these systems, in fact. 8:19Now, all of these are under his control, 8:21and at any point he can send the command to marshal all of these systems and have them do the same thing. 8:28All of them now are going to start flooding this web server with traffic. 8:33And this thing then goes down even faster because of the the multiplier-- the force multiplier --that's been added in this case. 8:42And that's something we call a "distributed denial of service" attack. 8:46So it's been distributed across a number of different attackers. 8:50Now, in this case, unsuspecting. 8:52We call this thing a botnet because they're sitting out there under his control. 8:57Now, there's a lot of different variations on this. 8:59I just gave you the simple ones where it's just overwhelming amounts of traffic. 9:04In some cases we use other techniques. 9:06Like one of the original of these was called a SYN flood. 9:10And in a SYN flood, what occurs is we have-- in a normal TCP session setup, we have what's known as a three-way handshake. 9:21What occurs is you have someone who sends a SYN message. 9:26They get back from the server an acknowledgment (ACK). 9:30And then they're supposed to respond with a SYNACK. 9:33That's the three-way handshake. In between these two, the server is going to reserve some resources for that session. 9:43So it's sort of like knocking on your door, and then you go to the door, and you wait for someone to be there-- to come in to the door. 9:50If someone knocks on the door, you open the door and then you wait, 9:53and you wait forever, then there's eventually going to be no more doors and all of these things get used up. 10:00That's what happens in a SYN flood case. 10:03Someone in this case, the bad guy, sends the SYN. 10:07And so he sends a SYN down here, and when that comes in, this guy is going to reserve a resource for him to come in and use--a session. 10:17Then he sends back the acknowledgment and then this guy just goes quiet, just goes dark, doesn't answer. 10:24In fact, what he does is he starts another one, another SYN message. 10:28He gets an acknowledgment back, this guy holds a resource for him. 10:32And again, no answer. 10:34He does it again. 10:35Starts another-- ring, the doorbell --we reserve resources and send the acknowledgment. 10:40And again, he doesn't respond. 10:42Now what happens? 10:44We're out of resources. 10:46Nobody else, legitimate or otherwise, can get into this system. 10:50So obviously, the way we would have to guard against something like this 10:53is maybe put in a timeout that says, I'm only going to hold this for so long. 10:56I'm only going to stand at the front door so long waiting for you to come in. 10:59And after that, you know, I'm closing the door and letting somebody else try to come in. 11:04So that's an example of a SYN flood. 11:05There's a lot of other examples of denial of service attacks, where we do a reflection attacks, 11:12where we send information to someone else and then spoof the source address so that it comes back to where our intended target is. 11:20There are, in addition to reflection attacks, there are other types of force multipliers that we can do in these cases. 11:26But what we're trying to do is guard against these cases. 11:29We need to make sure that the system is up and available to the authorized users when they need it. 11:35So, if I'm working on an IT project, one of the things I want to be able to do is make sure that I've covered all the bases. 11:43And in covering all those bases, this is the checklist you should use. 11:47Have I met the confidentiality requirements of the project? 11:52Is the sensitive data only available to those who are authorized to see it? 11:57Is this system true to itself? 12:00Do I have integrity checking so that if someone modifies it or tampers with it, I can be aware of that and know to adjust my trust level? 12:08And do I have the system available all the time that it's supposed to be available? 12:14This is the CIA triad. 12:16If I've covered all of these three bases, then it's job done. 12:21Thanks for watching. 12:23Before you leave, don't forget to hit subscribe. 12:25That way you won't miss the next installment of the Cybersecurity Architecture series.