Presented by, Sai Charan Obuladinne MYSEA Technology Demonstration.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

ICS 434 Advanced Database Systems
ITU-T SG13 futures session – July 25, D1 Present document contains informations proprietary to France Telecom. Accepting this document means for.
Operating System Security
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Technical Architectures
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Distributed Information Systems - The Client server model
13-1 Chapter 13 - Objectives Define an information system’s architecture in terms of the KNOWLEDGE, PROCESSES, and COMMUNICATION building blocks. Differentiate.
Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network Steven R. Balmer & Cynthia E. Irvine Department of Computer Science.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Client Server Security. Introduction Although client/server architecture is the most popular and widely used computing environment, it the most vulnerable.
Department Of Computer Engineering
Understanding Active Directory
Client Server Security DeSiaMorePowered by DeSiaMore1.
A Cloud-Oriented Cross-Domain Security Architecture Authors Thuy D.Nguyen, Mark A. Gondree, David J. Shifflett, Jean Khosalim, Timothy E. Levin, Cynthia.
Chapter 2 Database System Concepts and Architecture
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
A Cloud-Oriented Cross-Domain Security Architecture 단국대학교 컴퓨터 보안 및 OS 연구실 임경환 Thuy D. NguyenMark A. Gondree The 2010 Military.
A Multilevel Secure Testbed to Support Coalition Operations 12 December 2005 Cynthia Irvine, PhD Department of Computer Science Naval Postgraduate School.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
1 Welcome to CSC 301 Web Programming Charles Frank.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Secure Active Network Prototypes Sandra Murphy TIS Labs at Network Associates March 16,1999.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Chapter 2 Database System Concepts and Architecture Dr. Bernard Chen Ph.D. University of Central Arkansas.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
CPT 123 Internet Skills Class Notes Internet Security Session B.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Chapter 2 Database System Concepts and Architecture
Database System Concepts and Architecture
Security Engineering.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Presented by, Sai Charan Obuladinne MYSEA Technology Demonstration

References 1)Cynthia E.Irvine, David J. Shifflett, Paul C. Clark, Timothy, George “MYSEA Security Architecture” 2)Cynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy, George “MYSEA Technology Demonstration” 3)Cynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy, George “MYSEA: The Monetary Security Architecture” 4)

Contents Introduction MYSEA characteristics and capabilities MYSEA Domain Separation and Trusted Path Demo Quality of Security Service Demo Conclusion

Introduction Purpose- a) Trusted distributed operating environment for enforcing multi-domain security policies. b) To develop high assurance security services and integrated operating system mechanisms -protect distributed multi-domain computing environments from malicious code and other attacks. C) Capabilities- composing secure distributed systems using commercial off-the-shelf (COTS) components.

MYSEA characteristics and capabilities Use of add-on components in client-server systems which can magnify the impact of trusted open source systems. Protection of multiple protection domains, such that malicious code may neither ex-filtrate confidentially sensitive data, nor corrupt information of higher integrity(Malicious Software in PC- Multiple PC’s) Open source trusted path mechanism for assured and unambiguous user communication with the trusted computing base Vertical integration-dynamic security policy control functions in a QOSS framework

MYSEA Domain Separation and Trusted Path Demo MYSEA is a distributed client-server architecture, the major physical components 1) Security enhanced servers- For security policy enforcement and host various open source or commercial application protocol servers. 2) Security enhanced workstations-commercial-class PCs executing popular commercial software products(Trusted Path Extensions) thus permit server-enforced security policy to be distributed across the network.

MYSEA Server enforces the security policy and controls access to information. Its is a security enhanced version of the OpenBSD operating system (MYSEOS). MYSEOS + Untrusted Connection(Policy Constrained) = MYSEA MYSEOS is combined with untrusted, but policy constrained (and, in some instances, policy aware) application protocol servers, the result is the MYSEA Server MYSEOS Untrusted-3 rd Party Policy Contrained

MYSEA workstation each PC -Trusted Path Extension device that provides MYSEA policy support at the workstation. The MYSEA Server’s and the Trusted Path Extension’s connected directly to the physical network.

Demonstration of Concepts Trusted Path Extension- users can log on to the MYSEA system in a trusted path,Audit and Access controls- Invokes and establish Session Attributes like current sensitivity level. Similarly, the user can also log on to his own PC and use standard commercial client software (e.g., web browser or program) to access applications supported by the MYSEA Again to Modify any Session Attributes, again the Trusted Path Extension is invoked.(Sensitivity level, modify password, use name etc..)

Multi-Domain Policy Enforcement The MYSEOS kernel associates security attributes with active and passive. An important policy for the MYSEOS kernel to enforce is that malicious code may neither exfiltrate confidentially sensitive data nor corrupt information of higher integrity, to support this, the MYSEOS kernel provides multi-domain file system support,

Trusted path extension TPS Multiple Terminal PC’s Multiple Work Stations Maintains the State of User- MYSEA Interaction Ex: user may be logged in with default security attributes, but may not have started a session executing untrusted application code. Trusted Path Services provides an interface to the Security Support Services component to support identification and authentication

MYSEA SERVER Supports following services: Secure Attention Key Trusted Path Services Controlled LAN Access Communications and cryptographic services Negotiated Session Services Control of Security Critical Activities

MYSEA SERVER Supports following services: Secure Attention Key- Initiate unambiguous communication with MYSEOS, cause a state change in the Trusted Path Extension such that an unforgeable communications path (viz. a trusted path) to MYSEOS Trusted Path Services – When Invoked input security critical information(Password) Controlled LAN Access- Controlled access to the LAN. Malicious software cannot bypass the Trusted Path. Communications and cryptographic services- protected communication channels between Server and TPS(based upon protocols that supports establishment and maintenance TPS)

Negotiated Session Services- Ensure trusted object reuse, Change Domains(user), information associated with previous domain must be removed from the untrusted PC, Note: Previous session info cannot be reused by subsequent sessions(Violation of Distributed Security Policy). Control of Security Critical Activities- Controls client and resources at the time of boot and control security critical actions over the client session.

Quality of Security Service: MYSEA- Integrated with external resource or QoS manager to provide a means of dynamically managing its security and performance characteristics. MYSEA QoSS Manager -external QoSS interface to MYSEA, and governs security and performance factors of the various MYSEA components. QoSS manager on the MYSEA server- manages the QoSS security and connectivity database. MYSEA Component MYSEA QOSS Manager Security and Performa nce

Conclusion: MYSEA is a trusted distributed operating environment for enforcing multi-domain security policies. Supports critical applications: 1) A distributed trusted architecture that utilizes commercial and open source applications. 2) An open source trusted path mechanism. 3) Techniques for vertical integration of security policy control functions.

THANKS- ధన్యవాదాలు