6/20/2015 7:37 PM Lecture 5: Integrity Models James Hook CS 591: Introduction to Computer Security.

Slides:



Advertisements
Similar presentations
Information Flow and Covert Channels November, 2006.
Advertisements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
T T Some Fancy Technology (3 ECTS) Introduction See notes for comments.
ISA 562 Information System Security
Projects Co-ordinator
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Access Control Intro, DAC and MAC System Security.
CS 581: Introduction to the Theory of Computation Lecture 1 James Hook Portland State University
Today we will: Draft individual reflection papers; Have brief group conferences. Reminder: We are meeting in the RENCI Social Computing Room on Manning.
COMS W1004 Introduction to Computer Science June 10, 2009.
MA 102 Statistical Controversies Monday, January 28, 2002 Today: Discussion of Statistical Thought, First Ideas About Data, and Exercises. Introduction.
COMS W1004 Introduction to Computer Science June 15, 2009.
COMS W1004 Introduction to Computer Science June 25, 2008.
CS 232 Geometric Algorithms: Lecture 1 Shang-Hua Teng Department of Computer Science, Boston University.
COMS W1004 Introduction to Computer Science May 28, 2008.
COMS W1004 Introduction to Computer Science June 11, 2008.
CS 232 Geometric Algorithms: Lecture 1 Shang-Hua Teng Department of Computer Science, Boston University.
ME 221Lecture 151 ME 221 Statics Lecture #15 Section 4.3.
COMS W1004 Introduction to Computer Science June 4, 2008.
ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6
COMS W1004 Introduction to Computer Science May 29, 2009.
COMS W1004 Introduction to Computer Science May 27, 2009.
MEASURE Evaluation MEASURE Evaluation’s Monitoring and Evaluation Workshop for Tuberculosis Programs.
MA 102 Statistical Controversies Monday, February 18, 2002 Today: Discuss Chapter 9 concepts and exercises Review Part 1 of the text Test 1 question types.
7/15/2015 7:56 AM Lecture 3: Policy James Hook CS 591: Introduction to Computer Security.
7/15/2015 5:04 PM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
CS 581: Introduction to the Theory of Computation Lecture 1 James Hook Portland State University
7/16/2015 3:58 AM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
Computer Network Fundamentals CNT4007C
Lecture 0 Digital Electronics Fundamentals Computer Architecture and System Software There are 10 kinds of people in this world – those who understand.
MATH 310, FALL 2003 (Combinatorial Problem Solving) MoWeFr 1:20 McGregory 214.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for the Final Exam December 8, 2008.
Course Introduction Bryce Boe 2013/09/30 CS24, Fall 2013.
1 CSCI 3120: Operating Systems Summer 2003 Instructor: Kirstie Hawkey Office hours (outside Room 311): Mon: 2:30-3:30, Fri: 10:30-11:30.
CSCE 496/896 Self-Managing Computer Systems Ying Lu 106 Schorr Center
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CS511: Artificial Intelligence II
What is the least common denominator for 7, and 3 ? A.36 B.12 C.48 D.3 What is the least common denominator for, and ? A.21 B.16 C.18 D.42 Monday Top half.
Confidentiality Policies and Integrity Policies by Stefanie Wilcox.
11/26/2015 9:14 AM Midterm Grading Comments James Hook CS 591: Introduction to Computer Security.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
Computer Information Technology. I need you to submit your project electronically to the Hancock website. Before you can submit your project you will.
Introduction to Software Engineering Lab Instructor: Jacob.
1 10/15/04CS150 Introduction to Computer Science 1 Reading from and Writing to Files Part 2.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Computer Networks CNT5106C
Access Control. Assignment Review  Current  Next 6/23/2016 Access Control 2.
Access Control. Assignment Review  Current –You decide what categories you want to include. Just provide the required justification.  Next  Detailed.
Computer Network Fundamentals CNT4007C
Computer Networks CNT5106C
ACCOUNTING II Chapter 26 Assignment Sheet
Introduction to Company Accounting
Computer Networks CNT5106C
Understanding Security Layers
Chapter 1: Introduction
Advanced System Security
System state models.
Introduction to Computer Security
Computer Networks CNT5106C
COMS W1004 Introduction to Computer Science
Chapter 6: Integrity Policies
Chapter 5: Confidentiality Policies
This session is being recorded
Advanced System Security
Lesson Plan for October 16, 2008
Presentation transcript:

6/20/2015 7:37 PM Lecture 5: Integrity Models James Hook CS 591: Introduction to Computer Security

6/20/2015 7:37 PM Objectives Integrity models in context Introduce integrity models Begin hybrid models

6/20/2015 7:37 PM Last Lecture Bell LaPadula Confidentiality Lattice of security levels –No read up –No write down DG/UX realization of Bell LaPadula

6/20/2015 7:37 PM Integrity Extrinsic: A system has integrity if it is trusted Integrity is not just a property of the information system A perfect information system could lose integrity in a corrupt organization

6/20/2015 7:37 PM Integrity Principles Separation of Duty: –If two or more steps are required to perform a critical function, at least two different people should perform the steps

6/20/2015 7:37 PM Integrity Principles Separation of Duty Separation of Function –Develops do not develop new programs on productions systems

6/20/2015 7:37 PM Integrity Principles Separation of Duty Separation of Function Auditing –Record what actions took place and who performed them –Contributes to both recovery and accountability

6/20/2015 7:37 PM Presentation Bishop Chapter 6 slidesslides Bishop Chapter 7 slidesslides

6/20/2015 7:37 PM Exercises Due –Monday 17 October beginning of class –I prefer paper submissions, but you may submit electronically by to Please include “InfoSec Exercises” in the From Bishop:

6/20/2015 7:37 PM Looking Forward – Today: 6 & 7 – Wednesday: 15 (Information flow) – Monday (10/17): 17 (Assurance) – Wednesday (10/19): 8 (Basic Crypto; Binkley) – Monday, Wednesday (10/24,26): 9 and 10 (More crypto; midterm review) – Monday 10/31 Midterm