Introduction and Basic Concepts

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
Operating System Security
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
Attribute-Based Access Control Models and Beyond
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
Symmetric Cryptography
Executive Director and Endowed Chair
CS 450/650 Fundamentals of Integrated Computer Security
An Access Control Perspective on the Science of Security
Discretionary Access Control (DAC)
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Executive Director and Endowed Chair
Introduction to Cyber Security
Cryptography Basics and Symmetric Cryptography
Institute for Cyber Security: Research Vision
Authentication by Passwords
Executive Director and Endowed Chair
Executive Director and Endowed Chair
The Future of Access Control: Attributes, Automation and Adaptation
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
Institute for Cyber Security
Asymmetric Cryptography
Attribute-Based Access Control (ABAC)
Institute for Cyber Security: Research Vision
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Executive Director and Endowed Chair
Cyber Security and Privacy: An Optimist’s Perspective
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
Challenge-Response Authentication
Application-Centric Security
Assured Information Sharing
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Presentation transcript:

Introduction and Basic Concepts CS 5323 Introduction and Basic Concepts Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 1 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Prognosis Cyberspace will become orders of magnitude more complex and confused very quickly Cyber and physical distinction will blur Threats will go beyond money to physical harm and danger to life and body Overall this is a very positive development and will enrich human society It will be messy but need not be chaotic! Cyber security research and practice are loosing ground © Ravi Sandhu World-Leading Research with Real-World Impact! 2

Security Objectives INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Control of read and write is fundamental to all three Security Objectives Control of read and write is fundamental to all three INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Security Objectives INTEGRITY modification AVAILABILITY access Cannot have it all Need to compromise INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 5

with non-Security Objectives Security is Secondary Cost Convenience Growth Safety Cannot have it all Need to reconcile with non-Security Objectives CIA © Ravi Sandhu World-Leading Research with Real-World Impact! 6

Security Objectives USAGE purpose INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 7

Covers privacy and intellectual property protection Security Objectives USAGE purpose Covers privacy and intellectual property protection INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 8

Security Objectives USAGE purpose USAGE INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu World-Leading Research with Real-World Impact! 9

Security Objectives Single Enterprise owns all the information employs all the users Multiple Interacting Parties no one owns all the information no one can unilaterally impose policy on all the users © Ravi Sandhu World-Leading Research with Real-World Impact! 10

Cyber Security Scope Computer security Information security = Computer security + Communications security Information assurance Mission assurance Includes cyber physical © Ravi Sandhu World-Leading Research with Real-World Impact! 11

Cyber Security Goal Enable system designers and operators to say: This system is secure © Ravi Sandhu World-Leading Research with Real-World Impact! 12

Cyber Security Goal Enable system designers and operators to say: This system is secure © Ravi Sandhu World-Leading Research with Real-World Impact! 13

Cyber Security Goal Enable system designers and operators to say: This system is secure Conflicting objectives need political and social compromise There is an infinite and escalating supply of attacks Not attainable © Ravi Sandhu World-Leading Research with Real-World Impact! 14

Cyber Security Goal Enable system designers and operators to say: This system is secure enough Many successful examples © Ravi Sandhu World-Leading Research with Real-World Impact! 15

The ATM (Automatic Teller Machine) system is The ATM Paradox The ATM (Automatic Teller Machine) system is secure enough global in scope Not attainable via current cyber security science, engineering, doctrine not studied as a success story Similar paradoxes apply to on-line banking e-commerce payments © Ravi Sandhu World-Leading Research with Real-World Impact! 16

High Assurance Cyber Security US President’s nuclear football Secret formula for Coca-Cola © Ravi Sandhu World-Leading Research with Real-World Impact! 17

Security is Dynamic “My dear, here we must run as fast as we can, just to stay in place. And if you wish to go anywhere you must run twice as fast as that.” ― Lewis Carroll, Alice in Wonderland © Ravi Sandhu World-Leading Research with Real-World Impact! 18

Security Techniques Protect Detect (and Respond) Accept © Ravi Sandhu World-Leading Research with Real-World Impact!

Acquire privileged account Attack Process Attack 1 account Acquire privileged account Privilege escalation © Ravi Sandhu World-Leading Research with Real-World Impact!

Detection is impossible Protection is impossible ….. Limits on Security Analog hole Inference Side channels Insider threat Detection is impossible Protection is impossible ….. © Ravi Sandhu World-Leading Research with Real-World Impact! 21