Introduction to Security Brad Karp UCL Computer Science CS GZ03 / 4030 15 th November, 2007.

Slides:



Advertisements
Similar presentations
Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
Advertisements

Operating System Security
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Access Control Methodologies
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Class on Security Raghu. Current state of Security Cracks appear all the time Band Aid solutions Applications are not designed properly OS designs are.
CSE331: Introduction to Networks and Security Lecture 15 Fall 2002.
FIT3105 Security and Identity Management Lecture 1.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Web server security Dr Jim Briggs WEBP security1.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
CS CS 5150 Software Engineering Lecture 18 Security.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Least-Privilege Isolation: The OKWS Web Server Brad Karp UCL Computer Science CS GZ03 / M th December, 2008.
Chapter 21 Distributed System Security Copyright © 2008.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
(a) What is the output generated by this program? In fact the output is not uniquely defined, i.e., it is not always the same. So please give three examples.
Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Security CS Introduction to Operating Systems.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Security: The Goal Computers are as secure as real world systems, and people believe it. This is hard because: Computers can do a lot of damage fast. There.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Chap1: Is there a Security Problem in Computing?.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Computer Security By Duncan Hall.
Lecture 16 Page 1 CS 236 Online Exploiting Statelessness HTTP is designed to be stateless But many useful web interactions are stateful Various tricks.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Electronic Banking & Security Electronic Banking & Security.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Outline What does the OS protect? Authentication for operating systems
Answer the questions to reveal the blocks and guess the picture.
Outline What does the OS protect? Authentication for operating systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
CS703 - Advanced Operating Systems
Least-Privilege Isolation: The OKWS Web Server
Presentation transcript:

Introduction to Security Brad Karp UCL Computer Science CS GZ03 / th November, 2007

2 Topics We’ll Cover User login authentication (local and remote) Cryptographic primitives, how to use them, and how not to use them Kerberos distributed authentication system Secure Sockets Layer (SSL)/Transport Layer Security (TLS) authentication and encryption system TAOS: logic for reasoning formally about authentication Software vulnerabilities and exploits Worms Automated worm defenses Software Fault Isolation (SFI): containing buggy code OKWS: a least-privilege isolated web server for UNIX

3 A Simple Example Suppose you place an order with Amazon Goals: –You get the item you ordered –Amazon gets payment in the amount you agreed to pay on the payment page You Internet Amazon Credit card number How might this go wrong? Let us count the ways…

4 Worries for Amazon Order What if an eavesdropper taps Internet link? –Network cables usually not physically secure What if someone has broken into Internet router? (They’re just computers…) How do you know you’re communicating with Amazon? How does Amazon know you are authorized to use the credit card number you provide? What if a dishonest Amazon employee learns my credit card number? What if Amazon sends me wrong book, in error

5 Worries for Amazon Order (2) What if someone has broken into my desktop PC? Or my file server? Where did my web browser come from? How about my OS? What if my display or keyboard radiates a signal that can be detected at some distance? Fundamental security question: “Whom or what am I trusting?” Weakest item on list of answers determines system security!

6 Whom or What Am I Trusting? “They showed me a telephone, and said they were worried about ‘the microphone.’ When I look at a telephone, I see one high-fidelity microphone and one ‘low- fidelity microphone.” “Most people call this a telephone cord. I call it an antenna.” –Bob Morris, Sr., former Chief Scientist of the National Computer Security Center, NSA

7 Whom or What Am I Trusting? (2) Old Dilbert comic: –Dilbert is on a date in a fancy restaurant. –He’s telling his companion, “I can’t believe how stupid so many people are, using their credit cards over the Internet.” –As he’s speaking, the bill comes, and he pays it by credit card. –The waitress returns with the receipt for him to sign. She’s wearing a new fur coat.

8 Example Secure System Design Secure telephone line between FBI and CIA Goal: only people in FBI and CIA buildings can learn what’s said in calls Plan: –Radiation-proof buildings –One entrance/exit per building –Armed guards at entrances –Guards check ID cards, record all people in/out –Pressurized, shielded cable between two buildings –No other cables allowed to leave buildings –Pass laws to punish people who reveal government secrets –Invite NSA to try to steal content of calls –Send dummy information, spy on KGB, see if they learn it

9 Perfect Security: An Unattainable Goal Merely a question of how motivated adversary is, and how much money he has No individual technique perfect –Pressurized cable only raises cost for attacker –Can’t completely shield a building –People can be bribed, blackmailed Could meet stated goal, but it could be inappropriate –What if FBI, CIA allow in uncleared visitors? –What if employees go home and talk in sleep? Solution: forbid employees from leaving the building…

10 Definitions Security: techniques to control who can access/modify system Principal: unit of accountability in a system (e.g., user) Access control: techniques to restrict operations to particular principals Authentication: verification of identity of principal making request Authorization: granting of request to principal

11 Attacks on Security Violation of secrecy –Attacker reads data without authorization Violation of integrity –Attacker modifies data without authorization –e.g., attacker modifies data on disk –e.g., attacker modifies network reply to “read file” request Denial of service –Attacker makes system unavailable to legitimate users –e.g., overload the system, or cause a deadlock –e.g., trigger security mechanism (wrong ATM PIN 3 times)

12 Building Secure Systems: General Approach Figure out what you want to protect, what it’s worth Figure out which attacks you want to defend against State goals and desired properties clearly –Not “impossible to break” –Better: “attack X on resource Y should cost $Z” Structure system with two types of components: –Trusted: must operate as expected, or breach –Untrusted: subverted operation doesn’t lead to breach Minimize size of trusted components –Maybe we should have built secure room, not building… Analyze resulting system, monitor success

13 Security Is a Negative Goal Ensure nothing happens without authorization –How do you reason about what a system will not do? First step: specify who authorized to do what –In other words, specify a policy

14 Policy Policy: goal security must achieve –Human intent—originates from outside system Often talked about in terms of subjects and objects –Subject: principal –Object: abstraction to which access requested (e.g., file, memory page, serial port) –Each object supports different kinds of access (e.g., read or write file, change permissions, …) Access control: should operation be allowed? –What principal making request? (Authentication) –Is operation permitted to principal? (Authorization)

15 Access Control: Examples Machine in locked room, not on network –Policy: only users with keys can access computer Bank ATM card –Policy: only allowed to withdraw money present in your account –Authentication: must have card and know PIN –Authorization: database tracks account balances Private UNIX file (only owner can read) –Authentication: password to run software as user –Authorization: kernel checks file’s permission bits Military classified data –If process reads “top-secret” data, cannot write “secret” data

16 Next Lecture: Login Authentication How to use passwords to authenticate users: at the console, and remotely, over a network Attacks against password-based authentication schemes Designing robust password-based authentication schemes