Security Modeling Jagdish S. Gangolly School of Business

Slides:



Advertisements
Similar presentations
Information Flow and Covert Channels November, 2006.
Advertisements

Access Control Methodologies
Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula Model –General idea –Informal description of rules.
1 Confidentiality Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 18, 2004.
Confidentiality Policies  Overview  What is a confidentiality model  Bell-LaPadula Model  General idea  Informal description of rules  Formal description.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Verifiable Security Goals
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Information Systems Security Security Architecture Domain #5.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 September 14, 2006 Lecture 3 IS 2150 / TEL 2810 Introduction to Security.
Trusted System? What are the characteristics of a trusted system?
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Chapter 5 Network Security
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Confidentiality Policies and Integrity Policies by Stefanie Wilcox.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
12/4/20151 Computer Security Security models – an overview.
12/13/20151 Computer Security Security Policies...
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 19 October 26, 2004.
Information Security CS 526 Topic 17
Chapter 5 – Designing Trusted Operating Systems
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Access Control: Policies and Mechanisms Vinod Ganapathy.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
9- 1 Last time ● User Authentication ● Beyond passwords ● Biometrics ● Security Policies and Models ● Trusted Operating Systems and Software ● Military.
TOPIC: Web Security Models
TCSEC: The Orange Book.
Verifiable Security Goals
Mandatory Access Control (MAC)
Security Models and Designing a Trusted Operating System
IS 2150 / TEL 2810 Introduction to Security
Overview of Unix Jagdish S. Gangolly School of Business
Overview of Networking & Operating System Security
Operating Systems Security
Official levels of Computer Security
Chapter 5: Confidentiality Policies
Basic Security Theorem
CP3397 Design of Networks and Security
THE ORANGE BOOK Ravi Sandhu
Database Security Jagdish S. Gangolly School of Business
Information Security CS 526 Topic 17
Advanced System Security
System state models.
Threats in Networks Jagdish S. Gangolly School of Business
Confidentiality Models
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Chapter 5: Confidentiality Policies
Advanced System Security
Presentation transcript:

Security Modeling Jagdish S. Gangolly School of Business State University of New York at Albany NOTE: These notes are based on the book Counter Hack, by Ed Skoudis and are prepared solely for the students in the course Acc 661 at SUNY Albany. They are not to be used by others without the permission of the instructor. 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Security Modeling I Models of Confidentiality Bell- La Padula Model Subjects, Objects, set of access operations, a Set of security levels, Security clearance for subjects, Security classification for objects, Access control matrix. Ss-property (no read-up policy) *-property (no write-down policy) ds-property (discretionary security property) (Orangebook) A state is secure if the three security properties are satisfied. Basic security theorem: If the initial state is secure and all state transitions are secure, then all subsequent states are secure, no matter what inputs occur. 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Security Modeling II Biba Integrity Model: Simple integrity property: a subject can modify a, object only if its integrity classification dominates that of the object Integrity *-property: If a subject has read access to object o, then it can have write access right to an object p only if the integrity classification of o dominates that of p. 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Security Modeling III Harrison-Ruzzo-Ullman Model: Commands, conditions, primitive operations. Protection system: subjects, objects, rights, commands If commands are restricted to a single operation each, it is possible to decide if a given subject can ever obtain right to an object. If commands are not restricted to one operations each, it is not always decidable whether a given protection system can confer a given right. 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Security Modeling III Clark-Wilson Commercial Security Policy: Well-formed transaction Separation of duty 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems

Security Features of Trusted Operating Systems User identification & authentication Mandatory access control Discretionary access control Object reuse protection (leakage) Complete mediation Trusted path Audit Audit log reduction Intrusion detection 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems

Acc 661 Auditing of Adv Acctg Info Systems Orange Book D: Minimal protection C1/C2/B1: requiring security features common to commercial operating systems B2: precise proof of security of the underlying model and a narrative specification of the trusted computing base B3/A1: requiring more precisely proven descriptive and formal designs of the trusted computing base 1/13/2019 Acc 661 Auditing of Adv Acctg Info Systems