Design Principles Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least.

Slides:



Advertisements
Similar presentations
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Advertisements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
2-May-15 GUI Design. 2 HMI design There are entire college courses taught on HMI (Human-Machine Interface) design This is just a very brief presentation.
VM: Chapter 5 Guiding Principles for Software Security.
Secure Design Principles  secure the weakest link  reduce the attack surface  practice defense in depth  minimize privilege  compartmentalize  fail.
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
April 6, 2004ECS 235Slide #1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe Defaults –Economy of Mechanism –Complete Mediation.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
1 cs691 chow C. Edward Chow Design Principles for Secure Mechanisms CS591 – Chapter 5.4 Trusted OS Design CS691 – Chapter 13 of Matt Bishop.
Lecture 10: Security Design Principles CS 436/636/736 Spring 2012 Nitesh Saxena.
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
C. Edward Chow Presented by Mousa Alhazzazi C. Edward Chow Presented by Mousa Alhazzazi Design Principles for Secure.
Protection and Security An overview of basic principles CS5204 – Operating Systems1.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Secure Design Principles CSC 482/582: Computer SecuritySlide #1.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Software Security and Security Engineering (Part 2)
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
NFIRS Data Entry Browser Interface (DEBI)
Linux Security. Authors:- Advanced Linux Programming by Mark Mitchell, Jeffrey Oldham, and Alex Samuel, of CodeSourcery LLC published by New Riders Publishing.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IS2150/TEL2810: Introduction of Computer Security1 October 18, 2005 Introduction to Computer Security Lecture 6 Windows/Unix/Solaris 10 Design Principles.
Software Security II Karl Lieberherr. What is Security Enforcing a policy that describes rules for accessing resources. Policy may be explicit or implicit.
Jini Architecture Introduction System Overview An Example.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Privilege Management Chapter 22.
Design Principles and Common Security Related Programming Problems
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
Software Security II Karl Lieberherr. What is Security Enforcing a policy that describes rules for accessing resources. Policy may be explicit or implicit.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
Security Principles.
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
CS457 Introduction to Information Security Systems
Securing Network Servers
Access Control Model SAM-5.
Lecture 10: Security Design Principles
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Chapter3 Security Strategies.
Chapter 13: Design Principles
Chapter 1: Introduction
Chapter 13: Design Principles
How to Mitigate the Consequences What are the Countermeasures?
Protection and Security
Design Principles and Security related problem
Computer Security: Art and Science, 2nd Edition
Outline Chapter 2 (cont) OS Design OS structure
Chapter 29: Program Security
GUI Design 24-Feb-19.
Chapter 13: Design Principles
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Presentation transcript:

Design Principles Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability Introduction to Computer Security ©2004 Matt Bishop

Overview Simplicity Fewer components so less to go wrong Fewer interfaces and hence fewer possible inconsistencies Easy to understand Restriction Minimize access Fewer interfaces inhibit interactions Introduction to Computer Security ©2004 Matt Bishop

Least Privilege A subject should be given only those privileges necessary to complete its task Function determines rights, not role Rights added as needed, discarded after use Introduction to Computer Security ©2004 Matt Bishop

Fail-Safe Defaults Default action is to deny access If action fails, system should remain as secure as when action began Introduction to Computer Security ©2004 Matt Bishop

Economy of Mechanism Keep it as simple as possible KISS Principle Simpler means less can go wrong And when errors occur, they are easier to understand and fix Interfaces and interactions Introduction to Computer Security ©2004 Matt Bishop

Complete Mediation Check every access Usually done once, on first action Checking every access can slow down system If permissions change after, may get unauthorized access In a UNIX system, open a file for reading from a process change permissions for the file and remove read permission make process read from file – what will/should happen? Introduction to Computer Security ©2004 Matt Bishop

Open Design Security should not depend on secrecy of design or implementation Popularly misunderstood to mean that source code should be public People are good at finding out what secrets you have Reverse engineering, social engineering, dumpster diving Revealing the design should not result is lack of security Does not apply to information such as passwords or cryptographic keys Introduction to Computer Security ©2004 Matt Bishop

Separation of Privilege Require multiple conditions to grant privilege Separation of duty Specific entities can grant specific privileges Entity can’t grant itself privileges Defense in depth Multiple actions needs to take place to grant privilege Moat, walls, boiling oil Introduction to Computer Security ©2004 Matt Bishop

Least Common Mechanism Mechanisms should not be shared Information can flow along shared channels By examining the information flow, one process can determine what the other process is transmitting/processing/doing. Isolation Virtual machines Introduction to Computer Security ©2004 Matt Bishop

Psychological Acceptability Security mechanisms should not add to difficulty of accessing resource Hide complexity introduced by security mechanisms Ease of installation, configuration Human factors critical here Be clear in error messages Login/password wrong. Ease of use Data format Introduction to Computer Security ©2004 Matt Bishop

Key Points Principles of secure design underlie all security-related mechanisms Require: Good understanding of goal of mechanism and environment in which it is to be used Careful analysis and design Careful implementation Introduction to Computer Security ©2004 Matt Bishop