Introduction to Assurance

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 المحاضرة الثانية.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
The software process A software process is a set of activities and associated results which lead to the production of a software product. This may involve.
Chapter 4 Quality Assurance in Context
Chapter 2 – Software Processes
ITIL: Service Transition
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #18-1 Chapter 18: Introduction to Assurance Overview Why assurance? Trust and.
6/17/2015 5:35 PM Lecture 11: Assurance James Hook CS 591: Introduction to Computer Security.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
May 25, 2004ECS 235Slide #1 Amplifying Allows temporary increase of privileges Needed for modular programming –Module pushes, pops data onto stack module.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Michael Solomon Tugboat Software Managing the Software Development Process.
Evolutionary Development and Rapid Prototyping By: Shelone Reid Amanda Smith.
CSI315 Web Applications and Technology Overview of Systems Development (342)
Chapter 2 The process Process, Methods, and Tools
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
IS2150/TEL2910: Introduction of Computer Security1 Nov 15, 2005 Assurance.
ISA 562 Internet Security Theory & Practice
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
Topic (1)Software Engineering (601321)1 Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
An Introduction to Software Engineering. What is Software?
1 Software Engineering Ian Sommerville th edition Instructor: Mrs. Eman ElAjrami University Of Palestine.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
G53SEC 1 Reference Monitors Enforcement of Access Control.
Chapter 2 – Software Processes Lecture 1 Chapter 2 Software Processes1.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Design Principles and Common Security Related Programming Problems
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Slide #18-1 Introduction to Assurance CS461/ECE422 Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and Science.
Design Completion A Major Milestone
CS457 Introduction to Information Security Systems
CompSci 280 S Introduction to Software Development
ITIL: Service Transition
INTRODUCTION TO SOFTWARE ENGINEERING
Chapter 17 Building Secure and Trusted Systems
Introduction to Assurance
Software Quality Control and Quality Assurance: Introduction
An Introduction to Software Engineering
MISY 301 Mr.Mohammed Rafeeque.
Introduction to Assurance
The Development Process of Web Applications
Software Configuration Management
Chapter 18 Maintaining Information Systems
Chapter 1- Introduction
IEEE Std 1074: Standard for Software Lifecycle
Software Processes (a)
Software Myths Software is easy to change
Chapter 18: Introduction to Assurance
Object oriented system development life cycle
Level 1 Level 1 – Initial: The software process is characterized as ad hoc and occasionally even chaotic. Few processes are defined, and success depends.
Frequently asked questions about software engineering
Chapter 19: Building Systems with Assurance
Chapter 2 Software Processes
Chapter 2 – Software Processes
How to Mitigate the Consequences What are the Countermeasures?
CS385T Software Engineering Dr.Doaa Sami
CS310 Software Engineering Lecturer Dr.Doaa Sami
Introduction to Assurance
Presentation transcript:

Introduction to Assurance Computer Security Seminar Introduction to Assurance Sogang University Bum-ho. Baek darkzest@sogang.ac.kr

Agenda What is Assurance and Trust? Building Secure and Trusted Systems Comparison with Building Security Early or Adding Security Later Conclusion

What is Assurance and Trust? Trust & Assurance Role of Assurance Need for Assurance Types of Assurance

Trust & Assurance Trustworthy entity : Trust : (Security) Assurance : has sufficient credible evidence leading one to believe that the system will meet a set of requirements Trust : is a measure of trustworthiness relying on the evidence (Security) Assurance : is confidence that an entity meets its (security) requirements based on evidence provided by applying assurance techniques

Role of Assurance For Making Trusted System Policy Requirements Are created to meet requirements Requirements Is statements of goals that must be met Vary from high-level, generic issues to low-level, concrete issues

Need for Assurance Problem sources Neumann described nine types of problem sources of computer System This list not only address security, but also safety, reliability, privacy Requirements definitions, omissions, and mistakes System design flaws Hardware implementation flaws, such as wiring and chip flaws Software implementation errors, program bugs, and compiler bugs System use and operation errors and inadvertent mistakes Willful system misuse Hardware, communication, or other equipment malfunction Environmental problems, natural causes, and acts of God Evolution, maintenance, faulty upgrades, and decommissions

Need for Assurance (cont’d) Examples Challenger explosion Sensors removed from booster rockets to meet accelerated launch schedule Deaths from faulty radiation therapy system Hardware safety interlock removed Flaws in software design Bell V22 Osprey crashes Failure to correct for malfunctioning components; two faulty ones could outvote a third Intel 486 chip Bug in trigonometric functions

Types of Assurance Policy assurance : Design assurance : is evidence establishing security requirements in policy is complete, consistent, technically sound Design assurance : is evidence establishing design sufficient to meet requirements of security policy

Types of Assurance (cont’d) Implementation assurance : is evidence establishing implementation consistent with security requirements of security policy Operational assurance : is evidence establishing system sustains the security policy requirements during installation, configuration, and day-to-day operation also called administrative assurance

Building Secure and Trusted Systems Life Cycle Meta Model Conception Manufacture Deployment Fielded Product Life Waterfall Life Cycle Model Other Models

Life Cycle Building secure and trusted systems Depend on standard software engineering Select a appropriate model and process According to size and complexity of project and others

Meta Model Conception Manufacture Deployment Fielded Product Life

Conception Start with and idea Making decision Proof of concept pursue Idea or not Proof of concept Is to demonstrate that the idea has merit Question for security What does “secure” mean for this concept? Is it possible for this concept to meet this meaning of security? Is the organization willing to support the additional resources required to make this concept meet this meaning of security?

Manufacture Develop detailed plans for each group involved May depend on use internal product requires no sales Implement the plans to create entity Includes decisions whether to proceed for example due to market needs

Deployment Delivery Installation and configuration Assure that correct masters are delivered to production and protected Distribute to customers, sales organizations Installation and configuration Ensure product works appropriately for specific environment into which it is installed For Security Service people must know appropriate security procedures

Fielded Product Life Routine maintenance, patching Responsibility of engineering in small organizations Responsibility may be in different group than one that manufactures product Customer service, support organizations Retirement or decommission of product

Waterfall Life Cycle Model Process Requirements definition and analysis System and software design Implementation and unit testing Integration and system testing Operation and maintenance

Waterfall Life Cycle Model (cont’d) Real Process

Other Models Exploratory programming Prototyping Formal transformation System assembly from reusable components Extreme programming

Comparison with Building Security Early or Adding Security Later Basic Concept of Security Computer System Examples of RVM Problem of Adding Security Comparison Example

Building Security Security should be integrated into the system from the beginning Like Performance Think of security as you do performance Imagine trying to create high performance product from poor performance product Need to redesign fundamental structure, design, style

Basic Concept of Security Computer System Reference monitor Is access control concept of an abstract machine that mediates all accesses to objects by subjects. Reference Validation Mechanism (RVM) Is an implementation of the reference monitor concept. Is tamperproof, complete, simple. Analysis and Testing Provides evidence of assurance.

Examples of RVM Security kernel Trusted Computing Base (TCB) combines hardware and software to implement reference monitor Trusted Computing Base (TCB) Consists of all protection mechanisms within a system responsible for enforcing security policy Includes hardware and software Generalizes notion of security kernel

Problem of Adding Security Key problem analysis and testing is hard and limited Designing in mechanisms allow assurance at all levels Too many features adds complexity, complicates analysis Adding in mechanisms makes assurance hard Gap in abstraction from requirements to design may prevent complete requirements testing May be spread throughout system (analysis hard) Assurance may be limited to test results

Comparison Example AT&T‘s Two Products for security Add mandatory access controls(MAC) to UNIX system SV/MLS Add MAC to UNIX System V Release 3.2 Focus on market-driven requirement quick time to market in response to requirement of customer minimal impact to system Used existing kernel modular structure no implementation of least privilege SVR4.1ES Re-architect UNIX system to support MAC Focus on providing a medium-to-high level of trust Restructured kernel to make it highly modular and incorporated least privilege

Comparison Example (Cont’d) File Attributes (inodes) UNIX inodes have no space for labels SV/MLS Added separate table for MAC labels, DAC permissions Problem 2 accesses needed to check permissions possible inconsistency when permissions changed Corrupted table causes corrupted permissions SVR4.1ES Redefined new inode structure Included MAC labels Only 1 access needed to check permissions

Conclusion Assurance is critical for determining trustworthiness of systems Assurance needed at all stages of system life cycle However, assurance techniques cannot guarantee system security Building security in is more effective than adding it later