1 Privacy Enhancing Technologies Elaine Shi Lecture 4 Principles of System Security slides partially borrowed from Jonathan Katz.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

Operating System Security
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
VM: Chapter 5 Guiding Principles for Software Security.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
C. Edward Chow Presented by Mousa Alhazzazi C. Edward Chow Presented by Mousa Alhazzazi Design Principles for Secure.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Lecture 7 Access Control
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Computer Network By Tahir Saad. Introduction to computer networking Content : The definitions of networking Use of network Network classification.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Software Licensing, Made Simple SELECT Server XM Edition
FMEA-technique of Web Services Analysis and Dependability Ensuring Anatoliy Gorbenko Vyacheslav Kharchenko Olga Tarasyuk National Aerospace University.
Systems Security & Audit Operating Systems security.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Database Design – Lecture 16
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Transaction Management: Concurrency Control CS634 Class 16, Apr 2, 2014 Slides based on “Database Management Systems” 3 rd ed, Ramakrishnan and Gehrke.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Protecting e -Government Against Attacks Gernot Heiser NICTA and University of New South Wales.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Privilege separation in Condor Bruce Beckles University of Cambridge Computing Service.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Operating Systems Lecture November 2015© Copyright Virtual University of Pakistan 2 Agenda for Today Review of previous lecture Hardware (I/O, memory,
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Topic 5a Operating System Fundamentals. What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O,
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Security Vulnerabilities in A Virtual Environment
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Operating Systems Morrison / WellsCLB: A Comp Guide to IC 3 3E 1 Morrison / Wells.
The Protection of Information in Computer Systems Jerome H. Saltzer and Michael D. Schroeder Presented by Derek Davis and Michael Deighan.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
Operating Systems CMPSC 473 Introduction and Overview August 24, Lecture 1 Instructor: Bhuvan Urgaonkar.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 Lesson 8 Operating Systems Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Security Principles.
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
Chapter 1 : Computer Networks. Lecture 1. Introduction to computer networks: Network definition : A network is a collection of computers and other devices.
Overview of Virtualization The magic of virtual machines Borislav Varadinov Telerik Software Academy System Administrator Marian.
Introduction to Operating Systems
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Computer Data Security & Privacy
Two-factor authentication
VMPCS-OGC Virtual Machine Protection and Checking System using Out-of-Guest Control ferify.
Introduction to Operating Systems
Virtual machines benefits
Operating Systems Lecture 3.
Delegation of Control Manage Active Directory Objects 3.7
Presentation transcript:

1 Privacy Enhancing Technologies Elaine Shi Lecture 4 Principles of System Security slides partially borrowed from Jonathan Katz

2 Roadmap Privacy and System Security Principle of least privilege Principle of Privilege Separation

3 Why System Security? System security is necessary for privacy. –e.g. If OS is cpmpromised, data can be breached.

4 System security Several meanings of “system security” here: –Security of the entirety of what is being protected –Operating-system security –Host security

5 Principle of least privilege A subject should be given only the privileges it needs to accomplish its task –E.g., only allow access to information it needs –E.g., only allow necessary communication The function of a subject (not its identity) should determine this –I.e., if a subject needs some privileges to complete a specific task, it should relinquish those privileges upon completion –If reduced privileges are sufficient for a given task, the subject should request only those privileges

6 Principle of least privilege Every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job.[Jerome Saltzer 74]

7 Example User account management: normal user does not have administrator's privilege. A CEO share his office key only with his assistant, but not anyone else.

8 More example A web server should not run with root privilege if root privilege is not needed.

9 Privilege Separation Divided system into parts which are limited to the specific privileges they require in order to perform a specific task. E.g., –OS ensures isolation between apps –Hypervisor ensures isolation between OS

10 OS ensures isolation between apps If one of the application is buggy and thus is compromised or crashed, it will not affect the behavior of other applications OS App

11 Hypervisor ensures isolation between OS Hardware OS Hypervisor OS

12 Homework Can you give some more examples in real life that indicate principle of least privilege and privilege separation?

13 Reading list [Saltzer and Schroeder 1975] The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems