CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.

Slides:



Advertisements
Similar presentations
Trusted System Elements and Examples CS461/ECE422 Fall 2011.
Advertisements

Information Flow and Covert Channels November, 2006.
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Lecture 8 Access Control (cont)
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Access Control Chapter 3 Part 3 Pages 209 to 227.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Security Controls – What Works
Chapter 17 Controls and Security Measures
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
CSE331: Introduction to Networks and Security Lecture 35 Fall 2002.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
1 Clark Wilson Implementation Shilpa Venkataramana.
Applied Cryptography for Network Security
Information Systems Security Security Architecture Domain #5.
User Domain Policies.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
Risk Management.
CSE331: Introduction to Networks and Security Lecture 33 Fall 2002.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SEC835 Database and Web application security Information Security Architecture.
Cryptography and Network Security
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
ISA 562 Internet Security Theory & Practice
4-th International Conference for Confidence and Security in the Information Society Mikhail Senatorov Andrey Shcherbakov Trusted information and telecommunication.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
OS Security Access Control & Authentication. OS System vulnerabilities Operational fault Environmental fault Coding fault.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
10/17/20151 Computer Security Introduction. 10/17/20152 Introduction What is the goal of Computer Security? A first definition: To prevent or detect unauthorized.
Chapter 5 Network Security
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
CSCE 548 Secure Software Development Security Operations.
ISA 400 Management of Information Security
Privilege Management Chapter 22.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Database System Implementation CSE 507
TCSEC: The Orange Book.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Computer Data Security & Privacy
Official levels of Computer Security
THE ORANGE BOOK Ravi Sandhu
Microsoft Data Insights Summit
Presentation transcript:

CSE331: Introduction to Networks and Security Lecture 34 Fall 2002

CSE331 Fall Announcements Project 4 Deadline Extended –Due: Monday, December 9 th December 9 th Review Session Final Exam Location –Moore 212 –Tues. 17 Dec. –8:30 – 10:30 AM

CSE331 Fall Recap Malicious Programs –Trapdoors –Trojan horses –Salami attacks –Information leaks from covert channels Today –Multilevel security –Course Evaluations

CSE331 Fall Classic Security Research The Protection of Information in Computer Systems –Jerome H. Saltzer and Michael D. Schroeder –1975 Proceedings of the IEEE –

CSE331 Fall Access Control Discretionary: The individual user may, at his own discretion, determine who is authorized to access the objects he creates. Mandatory: The creator of an object does not necessarily have the ability to determine who has authorized access to it.

CSE331 Fall Trusted Computing Base TCB: The set of hardware and software components that must be trusted in order for a security policy to be enforced. Minimize the trusted computing base. –Fewer trusted components means less complex implementation, less likely to have errors. –Does fewer components mean more susceptible to attack?

CSE331 Fall Multilevel Security Multiple levels of confidentiality ratings –Used by military and government –Public < Classified < Secret < Top Secret Information flow –Regulate how information is used throughout entire system –A document generated from Classified and Secret information must be rated Secret. –Label creep: Information levels tend to get higher as computation proceeds.

CSE331 Fall Information Flow Security “No read up, no write down.” –Principals are assigned clearance levels drawn from the lattice of security labels. –A principal may read items with lower (or equal) security label. –A principal may write items with higher (or equal) security label.

CSE331 Fall Implementing Multilevel Security Dynamic: –Tag all values in memory with their security level –Operations propagate security levels –Must be sure that tags can’t be modified –Expensive, and approximate Static: –Program analysis

CSE331 Fall Information Flow int{Secret} X; … if (X > 0) then { Y = 1; } else { Y = 0; } //… This computation doesn’t depend on X

CSE331 Fall Government Standards Department of Defense Trusted Computer System Evaluation Criteria (TCSEC) –Known as the Orange Book –Circa 1985

CSE331 Fall TCSEC Ratings Division (D): Minimal Protection –This division contains only one class. It is reserved for those systems that have been evaluated but that fail to meet the requirements for a higher evaluation class. Division (C): Discretionary Protection –Classes in this division provide for discretionary (need-to-know) protection and, through the inclusion of audit capabilities, for accountability of subjects and the actions they initiate.

CSE331 Fall TCSEC Ratings Division (B): Mandatory Protection –The notion of a TCB that preserves the integrity of sensitivity labels and uses them to enforce a set of mandatory access control rules is a major requirement in this division. Systems in this division must carry the sensitivity labels with major data structures in the system. The system developer also provides the security policy model on which the TCB is based and furnishes a specification of the TCB. Evidence must be provided to demonstrate that the reference monitor concept has been implemented.

CSE331 Fall TCSEC Ratings Division (A): Verified Protection –This division is characterized by the use of formal security verification methods to assure that the mandatory and discretionary security controls employed in the system can effectively protect classified or other sensitive information stored or processed by the system. Extensive documentation is required to demonstrate that the TCB meets the security requirements in all aspects of design, development and implementation.

CSE331 Fall Example Rated Software Oracle Corporation Trusted Oracle7 (B1)Trusted Oracle7 Novell, Incorporated NetWare 4.11 (C2)NetWare 4.11 Microsoft Corporation Windows NT, Version 3.5 (C2)Windows NT, Version 3.5

CSE331 Fall TEMPEST Security Transient Electromagnetic Pulse Emanation Standard –(Or?) Temporary Emanation and Spurious Transmission –Emission security (Van Eck phreaking) –computer monitors and other devices give off electromagnetic radiation –With the right antenna and receiver, these emanations can be intercepted from a remote location, and then be redisplayed (in the case of a monitor screen) or recorded and replayed (such as with a printer or keyboard).

CSE331 Fall TEMPEST Policy is set in National Communications Security Committee Directive 4 Guidelines for preventing EM reception –Shield the device (expensive) –Shield a location (inconvenient?) Not a risk? –Most of the guidelines are classified!