ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.

Slides:



Advertisements
Similar presentations
George Mason University
Advertisements

Information Flow and Covert Channels November, 2006.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Lecture 8 Access Control (cont)
Access Control Methodologies
I NFORMATION S ECURITY : C ONFIDENTIALITY P OLICIES (C HAPTER 4) Dr. Shahriar Bijani Shahed University.
Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula Model –General idea –Informal description of rules.
Database Security - Farkas 1 Database Security and Privacy.
Access Control Intro, DAC and MAC System Security.
1 Confidentiality Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 18, 2004.
Confidentiality Policies  Overview  What is a confidentiality model  Bell-LaPadula Model  General idea  Informal description of rules  Formal description.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Verifiable Security Goals
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Sicurezza Informatica Prof. Stefano Bistarelli
User Domain Policies.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Mandatory Flow Control Bismita Srichandan. Outline Mandatory Flow Control Models Information Flow Control Lattice Model Multilevel Models –The Bell-LaPadula.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 5 September 27, 2007 Security Policies Confidentiality Policies.
MANDATORY FLOW CONTROL Xiao Chen Fall2009 CSc 8320.
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
1 Confidentiality Policies September 21, 2006 Lecture 4 IS 2150 / TEL 2810 Introduction to Security.
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 6 Oct 2-9, 2013 Security Policies Confidentiality Policies.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
1 Announcement: End of Campaign Celebration When: Wednesday, October 1, 15:30 Where: New building site (NW corner 3 rd & University) Please attend and.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Chapter 5 Network Security
Slide #5-1 Confidentiality Policies CS461/ECE422 Computer Security I Fall 2010 Based on slides provided by Matt Bishop for use with Computer Security:
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Information Security CS 526 Topic 17
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 5 September 29, 2009 Security Policies Confidentiality Policies.
1/15/20161 Computer Security Confidentiality Policies.
Mandatory Access Control and SE Linux CS 460 Cyber Security Lab Spring ‘10.
Access Control: Policies and Mechanisms Vinod Ganapathy.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Security Models Xinming Ou. Security Policy vs. Security Goals In a mandatory access control system, the system defines security policy to achieve security.
IS 2150/TEL 2810: Introduction of Computer Security1 September 27, 2003 Introduction to Computer Security Lecture 4 Security Policies, Confidentiality.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Database System Implementation CSE 507
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Verifiable Security Goals
Computer Data Security & Privacy
Chapter 5: Confidentiality Policies
Advanced System Security
Computer Security Confidentiality Policies
IS 2150 / TEL 2810 Introduction to Security
Advanced System Security
Confidentiality Models
DATABASE SECURITY For CSCL (BIM).
Trust Models CS461/ECE422.
Chapter 5: Confidentiality Policies
Computer Security Confidentiality Policies
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 5: Confidentiality Policies
Advanced System Security
Presentation transcript:

ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang

2 More details about two types of policies –In previous chapter, we say that there are two types of policies: confidentiality and integrity policies. Here we will provide more details for each type –Confidentiality policies: emphasize the protection of confidentiality. Also called information flow policy Prevent unauthorized disclosure of information Example: Bell-LaPadula model

3 Bell-LaPadula model: –One sentence description: no read up and no write down –Informal description The simplest type of confidentiality classification is a set of security clearances arranged in ordering A subject has a “security clearance” An object has a “security classification” Goal: prevent a subject with low clearance from reading objects at high classification

4 The Bell-LaPadula model combine mandatory and discretionary AC –Simple security condition (in plain English): S can read O if and only if the classification of O is NOT higher than clearance of S, and S has discretionary read access to O. –Why do we need another rule? –Star-property (*-property in plain English): S can write O if and only if the classification of O is NOT lower than clearance of S, and S has discretionary write access to O.

5 Look at the example we provide: –Claire cannot read personnel file –Tamara can read anything if she has the discretionary read right –Tamara cannot write an activity log file Basic security theorem (in plain English): A system has a secure initial state σ 0, and a set of state transformations. If every transformation preserves the simple security condition and the star property, then every state σ i is secure.

6 Security clearance and classification provide one dimensional control for access, how can we control access to information at the same level? –Discretionary (it works, too much overhead) –Introduce a second dimension: category Each category describes a kind of information. Both subjects and objects can be in multiple categories.

7 Now every subject and object needs to be described by a two dimensional entry –Captain John Wayne: (Confidential, {army}) –Pres. Obama: (TS, {army, navy, air force}) –Lunch menu for Easy Company: (c, {army}) –Plan to attack xxxx: (TS, {army, navy, air}) –If S has the categories {army, navy}, she can read objects with {}, {army}, {navy}, and {army, navy} if the clearance and discretionary rights allow him/her to do so.

8 Now we have to redefine the confidentiality policies Definition: a security level (l, c) dominates the security level (l’, c’) if and only if l’ ≤ l and c’ is a subset of c. Example: –George (s, {army, navy}), doc A (c, {army}), doc B (s, {army, air}), doc C (s, {navy}) –George dominates doc A and C, but not doc B

9 Now we can rewrite the simple security condition and *-property –Simple security condition: s can read o if and only if s dominates o and s has the discretionary read access to o. –*-property: s can write to o if and only if o dominates s and s has the discretionary write access to o. –Now we see what we mean by “no read up” and “no write down”

10 We can redefine basic security theorem as well –A system has a secure initial state σ 0, and a set of state transformations. If every transformation preserves the simple security condition and the star property, then every state σ i is secure.

11 Now our system is safe from the view of confidentiality, but does it works –How can a General send a file to a captain? The model introduces a mechanism to solve the problem –A subject has a maximum security level (msl) and current security level (csl) msl must dominate csl A subject can decrease to the level of csl for communication reasons

12 Example: General Alice (s, {army, navy}), captain Bob (c, {army}). Alice changes her security level to (c, {army}) and talks to Bob.

13 An example: Data General’s B2 Unix system –Enforce mandatory access control (MAC) –Use an updated version of Bell-LaPadula Read down is permitted Write has to be at the same level To allow communication, B2 Unix provides processes and objects a range of labels, where the upper bound must dominate the lower bound

14 Example: we have s and ts security classification; army, navy, and air force categories –(s, {army}), (ts, {army}) is a range –(s, {}), (ts, {army, air, navy}) is a range –(s, {army}), (ts, {navy, air}) is not a range

15 A process –Can read an object if its MAC label grants read access to the upper bound of the range –Has write access if its MAC label grants write access to any label in the range Example: an object (s, {army}), (ts, {army, navy}) –A process with (s, {army}): can write but not read –A process with (ts, {army, navy, air}): can read but not write –A process with (ts, {army, navy}): both read and write