Foundation Of Computer Security

Slides:



Advertisements
Similar presentations
Computer Security CIS326 Dr Rachel Shipsey.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Dieter Gollmann Microsoft Research
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Computer Security: Principles and Practice
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
An Introduction to Information Assurance COEN 150 Spring 2007.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Engineering Security Requirement
By Hafez Barghouthi. Agenda Today Terminology(What) Security strategies Prevention – detection – reaction Security objectives Fundamental dilemma of Computer.
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CSC 386 – Computer Security Scott Heggen. Agenda The Foundations of Computer Security.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Computer Security Introduction
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Auditing Concepts.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Information Security, Theory and Practice.
Design for Security Pepper.
Chapter 1: Introduction
Information System and Network Security
Database Security and Authorization
Controlling Computer-Based Information Systems, Part II
Introduction Of Information Security
Cryptography and Network Security
Database Security Transactions
Chapter 2: Operating-System Structures
IoTSec Taxonomy Proposal
Information Security: Terminology
Computer Security Introduction
Computer Security CIS326 Dr Rachel Shipsey.
Security.
Chapter 2: Operating-System Structures
Cryptography and Network Security
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Chapter 1: Introduction
Presentation transcript:

Foundation Of Computer Security

Foundation of computer security Reliability: accidental failures. Usability: operating mistakes. Security: intentional failures.

Security Security is about the protection of assets. Hence, computer security is about the protection of IT assets (i.e. hardware, software, data & information, and reputation). Protection measures can be classified as follows: Prevention: taking measures that prevent your assets from being damaged. Detection: taking measures that allow you to detect when an asset has been damaged, how it has been damaged, and who has caused the damage. Reaction: taking measures that allow you to recover your assets or to recover from damage to your assets.

Security Example#1: protection of valuable items kept in your private home. Prevention: locks at the door and windows bars. A wall round the property. Add another layer of protection. Detection: you will detect when something has been stolen if it is no longer there. A burglar alarm goes off when a break in occurs. Closed circuit television camera Reaction: call police. You may decide to replace the stolen item.

Security Prevention: Detection: Reaction: Example #2: Protecting Credit Card from being ‘stolen’ on the web. Prevention: Use encryption when placing an order. Relay on the merchant to perform some checks on the caller before accepting a credit card order. Don’t use your card number on the internet. Detection: Transaction that you didn’t authorize appears on your credit card statement. Reaction: Ask for new card number. The cost of the fraudulent transaction may have to be cover by the card holder, the merchant where the fraudster made the purchase, or the card issuer. There is not always a trade-off between prevention and detection; the more you spend on prevention the more you need to spend on detection to be certain that prevention works!

Computer security Computer Security aims to preserve: Confidentiality : prevention of unauthorized disclosure of information. Integrity : prevention of unauthorized modification of information. Availability : prevention of unauthorized withholding of information or resources. As lists are never complete you can add further points such as authenticity , Legitimate Use, accountability or nonrepudiation. Integrity Availability Confidentiality Computer security CIA model

Prevention of unauthorised disclosure of information Confidentiality Historically, security and secrecy were closely related (even today?!). Confidentiality (Privacy ,Secrecy). Hiding the content of a document OR hiding its very existence. Unlinkability: two or more items of interest (e.g. messages, actions, events, users, etc.) are unlinkableif an attacker cannot sufficiently distinguish whether they are related or not. Anonymity: A subject (e.g. user) is anonymous if it cannot be identified within a given anonymity set of subjects. Prevention of unauthorised disclosure of information May people still feel that the main objective of compute security is to stop unauthorized users to read sensitive information

prevention of unauthorized modification of information Integrity It is not easy to give a concise definition of integrity. Does prevention of unauthorized actions fall under integrity? Clark and Wilson : no user of the system , even if authorized, may be permitted to modify data items in such a way that assets or accounting records of the company are lost or corrupted. We have captured security by specifying the user actions that have to be controlled. External consistency : the data stored in a computer system should correctly reflect some reality outside the computer system. (DoD’sOrange book) prevention of unauthorized modification of information

Integrity Integrity in communication security: refers to the detection and correction of modifications to, insertion in, deletion , or replay of transmitted data. This include both intentional manipulations and random transmission errors. Integrity is often a prerequisite for other security properties (e.g. protecting OS access control data so an attacker cannot change it to gain unauthorized access to documents). Here we have to protect the integrity of access control to achieve confidentiality.

prevention of unauthorised withholding of information or resources Availability According to ISO 7498-2: Availability: the property of being accessible and usable upon demand by an authorized user. Denial of Service (DoS):the prevention of authorized access to resources or the delaying of time-critical operations. Although that availability is one of the most important aspects of computer security, there is a lack of security mechanisms effectively protecting against DoS attacks. Security mechanisms that are too restrictive or too expensive can themselves lead to DoS prevention of unauthorised withholding of information or resources

Accountability It is hard to prevent all improper actions: we may find that authorized actions can lead to a security violation. we may find a flaw in our security system that allow an attacker to find a way past our controls. Users should be hold responsible for their actions. Accountability : audit information must be selectively kept and protected so that actions affecting security can be traced to the responsible party. (the Orange book) In order to do this, the system should first identify and authenticate its users. It has to keep an audit trail (is a log of security-relevant events).

Non-repudiation Non-repudiation is related to accountability. Non-repudiation: services provide unforgeable evidence that a specific action occurred. Digital signatures provide non-repudiation. Non-repudiation of origin: providing evidence about the sender of a document. Non-repudiation delivery: providing evidence that a message was delivered to a specific recipient.

Reliability Reliability (accidental failures) & safety (impact of failures on the environment). Reliability only quantifies the frequency of failures, disregarding the consequences of a failure. From a safety point of view it is important to consider the consequences of failures, especially the failures that lead to hazards. Security and reliability are very much related and intersected. Dependability: the property of a computer system such that reliance can justifiably be placed on the service it delivers. (IFIP WG 10.4) *skip 3.1.9

The fundamental Dilemma of computer security Security-unaware users have specific security requirements but usually no security expertise. A security unaware user cannot make educated decisions about security products and will have to pick standard ‘best practice’ solutions. Standard solutions may not address the user’s specific requirements. There is a trade-off between security and ease-of-use since: Security mechanisms need additional computational resources. Security interferes with the working patterns users are accustomed to. Effort has to be put into managing security.

Data vs. Information Data represents information. Information is the interpretation of data. Data is physical phenomena chosen by convention to represent certain aspects of our conceptual and real world. The meanings we assign to data are called information. A covert channel is an information flow that is not controlled by a security mechanism.

Principles of Computer Security Fundamental design parameters of computer security. The figure above sketches the main dimensions in the design space for computer security. Horizontal axis represents the focus of the security policy, whilst the vertical axis represents the layer of the computer system where a protection mechanism is implemented. Application Software Hardware User (subject) Resource (object)

Focus of Control First Design Decision: In a given application (i.e. a cash machine), should the protection mechanism in a computer system focus on: data; Operations; and/or users (access control)? It is a fundamental design decision choosing which these options to take when applying security controls. Operating system have traditionally focused on protection data. In modern applications, it is often more relevant to control users’ actions.

The Man-Machine Scale Second Design Decision: Mechanisms towards the center tend to be more generic while mechanisms at the outside are more likely to address individual user requirements Second Design Decision: In which layer of the computer system should a security mechanism be placed? Applications Services OS OS Kernel Hardware more generic simple machine-oriented more specific complex man-oriented

Complexity vs. Assurance There is a trade-off between complexity and assurance. Third Design Decision: Simple with higher assurance OR complex with a feature-rich security environment? Feature-rich security and high assurance do not match easily

Centralized vs. Decentralized Centralized(If a single entity is in charge of security): Easy to achieve uniformity. Better control. BUT Performance bottleneck. Single Point of Failure (SPoF). Decentralized(Distributed): More efficient. No SPoF. More expensive and complicated (e.g. cost, management, etc.). Fourth Design Decision: Centralized OR decentralized?

The Layer Below Every protection mechanism defines a security perimeter (boundary). Attackers may bypass protection mechanisms at some layer. Fifth Design Decision: How can you prevent an attacker from getting access to a layer below the protection mechanism? The Layer Below – Examples: Recovery tools, like Norton Utilities, restore the data by reading memory directly and then restoring the file structure. Such a tool can be used to circumvent logical access control as it does not care for the logical memory structure

The Layer Below – Examples 2. Unix treats I/O devices and physical memory devices like files. If access permissions are defined badly, e.g. if read access is given to a disk containing read protected files, then an attacker can read the disk contents and reconstruct the files. 3. Object reuse: in a single processor system, when a new process becomes active, it gets access to memory positions used by the previous process. You have to avoid storage residues, i.e. data left behind in the memory area allocated to the new process. 4. Buffer Overruns: a value is assigned to a variable that is too large for the memory buffer allocated to that variable , so that memory allocated to other variables is overwritten.

The Layer Above It is not very wise design decision to spend much time and effort trying to protect a layer from the layer above it! The security services provided by a layer are mostly not sufficient to the layer above it which requires more complex man-oriented services.

Reading “Computer Security ”, 3rd edition by Dieter Gollmann. Wiley, March, 2011. Chapter 3