A Survivability Validation Framework for OASIS Program Technologies.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001Slide 1 Aegis Research Corporation Not for Public Release Survivability Validation Framework for Intrusion.
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
1 An Overview of Computer Security computer security.
Introducing Computer and Network Security
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Information Assurance and Security: Overview. Information Assurance “Measures that protect and defend information and information systems by ensuring.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Information Systems Security Computer System Life Cycle Security.
Cryptography and Network Security
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 1: Overview modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Alaa Mubaied Risk Management Alaa Mubaied
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
1 INTRUSION TOLERANT SYSTEMS WORKSHOP Phoenix, AZ 4 August 1999 Jaynarayan H. Lala ITS Program Manager.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Network Security Overview
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Computer Security Introduction
CS457 Introduction to Information Security Systems
Secure Software Confidentiality Integrity Data Security Authentication
Data & Network Security
CNET334 - Network Security
INFORMATION SYSTEMS SECURITY and CONTROL
Cryptography and Network Security
Confidentiality, Integrity, Nonrepudiation
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

A Survivability Validation Framework for OASIS Program Technologies

2 Framework Objective Continue to organize projects in the OASIS program so that it is possible to – Identify to DoD users and DARPA Management where particular technologies and projects can help improve system survivability – Identify overall coverage of the set of OASIS projects as a whole, so that we can identify threats/vulnerabilities that are not being addressed Create a survivability validation framework that will allow PIs to validate their proposed means for achieving survivability Use terminology established in the DoD and in the dependable computing and fault tolerance community (IFIP WG 10.4) for better and wider understanding

3 Background At summer 2000 PI meeting, PIs were asked to answer three questions: – 1. What threats/attacks is your project considering? – 2. What assumptions does your project make? – 3. What policies can your project enforce? A fourth question that covered the set of projects was also asked: – 4. What policies can the collection of projects enforce? Capsule summaries of the projects were developed from answers to these questions during the winter 2001 PI Meeting To characterize the nature of the survivability provided by particular OASIS technology development projects and by the collection of all OASIS projects, a survivability validation framework has been developed Some of the framework originated in the DARPA IA Program

4 Developing a Characterization under the Framework (1 of 3) 1. A system or more generally a technology has certain functional goals over a domain of application along with certain supporting survivability and security attributes for protection – Examples of functional goals are to provide an application, a database, a mobile code platform, an operating system – Domains of application are where the technology applies, i.e., to clients, servers, networks, storage, database, middleware, firmware, hardware, etc. and when the technology applies, i.e., at design phase, implementation phase, operational phase – Survivability and security attributes are standard in the DoD: system availability*, integrity*, confidentiality*, authentication*, and non- repudiation* [ * See definitions on later slides]

5 Developing a Characterization under the Framework (2 of 3) 2. The system may not be able to achieve its functional goals because of certain impairments*, i.e., threats/attacks/vulnerabilities* (TAVs), from threat agents*

6 Developing a Characterization under the Framework (3 of 3) 3. However, the system may counter the impairments or TAVs by protection mechanisms/means that are intended to provide for its particular attributes and assure that it achieves its functional goals

7 Relations among Concepts System or Technology Functional Goals Survivability and Security Attributes Impairments or Threats Mechanisms/Means Domain of Application

8 Comments (1 of 2) While survivability and security attributes have standard definitions, they may have different senses – Availability has different aspects, e.g., availability over a system or specific system availability for special functions of a system TAVs – Form a very large class, potentially infinite, which is growing daily – Can be viewed according to when they arise: at design phase, at implementation phase, or at operational phase – May be considered according to where they impair a system, how they impair a system, or what they impair in a system

9 Comments (2 of 2) TAVs – Have been considered according to various taxonomies Krsul’s Thesis at ssl/public/97-05.pdf Howard’s Thesis at Lough’s Thesis at / – Have been enumerated in databases Common Vulnerabilities and Exposures at ICAT Metabase at CERIAS Cooperative Vulnerability Database at

10 OASIS 3-Space: Attributes x Domain x Impairments Attributes Impairments Domain ConfInt Avail Auth NR Impairments (threats/attacks/vulnerabilities) Domain of appl. (when/where) Attributes (properties desired) Design Implement. Operate Malicious Code DDoS Spoof/MITM ???

11 Outline of a Characterization Characterizations consist of 9 parts: 1. Technology Description and Survivability/Security Problem Addressed 2. Assumptions 3. TAVs 4. Survivability and Security Attributes 5. Comparison with other Systems (Optional) 6. Survivability and Security Mechanisms 7. Rationale 8. Residual risks, limitations, and caveats 9. Cost and benefit analysis

12 Building Characterizations (1 of 6) 1. Technology Description and Survivability/Security Problem Addressed – What functionality is the technology trying to provide and what in brief are its survivability and security objectives? What is its domain of application? – Can be extracted from project information: PI briefings, papers, discussions with PI, etc. – Aims to provide a brief high-level description of functionality and survivability and security objectives – Should provide the domain of application and explain limitations 2. Assumptions – What are the assumptions upon which the technology depends? – Provided in the project literature or from PI – Can be divided into assumptions about system, user, network, environment, etc.

13 Building Characterizations (2 of 6) 3. Impairments = TAVs – What are the impairments = threats/attacks/vulnerabilities that the technology is trying to address? – Defined to include any circumstances with potential harm to the system in the form of destruction, disclosure, adverse data modification, and/or denial of service – Provided in the project literature or from PI – Can be grouped systematically according to design, implementation, and operation ( when the TAV may have its effect) 4. Survivability and Security Attributes – What attributes is the technology trying to support among system availability (AV), integrity (I), confidentiality (C), authentication (AU), and non-repudiation (NR)

14 Building Characterizations (3 of 6) 5. Comparison with other Systems (Optional) – How does this technology compare with others? – Compare the OASIS technology to existing commercial systems/practices – Provide rationale matrices and explanations for the commercial systems 6. Survivability and Security Mechanisms – What techniques are used to mitigate given TAVs? Examples are: Damage assessment Containment Reconfiguration Repair Fault treatment – Intended as support for the high-level survivability and security attributes

15 Building Characterizations (4 of 6) 7. Rationale – How do the elements fit together? Provide a rationale matrix (later slide) – Footnote for each mechanism/assumption cell of the matrix Descriptive paragraph showing that the assumptions and mechanisms counter the TAVs and thus supporting claims about achieving the high-level attributes – Rationale matrix plus footnotes only outline the beginning of validation; a validation plan is needed

16 Building Characterizations (5 of 6) – Recommended techniques for goal accomplishment verification and validation Red team testing and analysis Formal assurance argument Formal methods of proof Modeling and simulation Code inspection Cryptanalysis Other techniques – Independent peer review – Summary

17 Example of a Rationale Matrix

18 Building Characterizations (6 of 6) 8. Residual risks, limitations, and caveats – What are the residual risks or gaps? – These may be determined from the arguments 9. Cost and benefit analysis – What are the costs with respect to the benefits? – Cost metrics (quantified if possible) Performance degradation Functionality change Storage needs Network bandwidth requirements Cost as $ – Benefit metrics (quantified if possible) Probability of surviving an attack, loss of data, loss of confidentiality Length of time in successfully defending against attacker – One-to-one correspondence of mechanisms to goals

Definitions

20 Terminology and Definitions (1 of 2) NSA and IFIP WG 10.4 Attack – An attempt to bypass security controls on a computer. The attack may alter, release, or deny data. Whether an attack will succeed depends on the vulnerability of the computer system and the effectiveness of existing countermeasures. Authentication – To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system. Availability – Assuring information and communications services will be ready for use when expected. Confidentiality – Assuring information will be kept secret, with access limited to appropriate persons. Impairment – [IFIP WG 10.4 definition]. Regarded in this program as TAV. Integrity – Assuring information will not be accidentally or maliciously altered or destroyed.

21 Terminology and Definitions (2 of 2) NSA and IFIP WG 10.4 Non-repudiation – Method by which the sender of data is provided with proof of delivery and the recipient is assured of the sender’s identity, so that neither can later deny having processed the data. Threat – The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. A potential violation of security. Threat agent – Methods and things used to exploit a vulnerability in an information system, operation, or facility; fire, natural disaster, and so forth. Vulnerability – Hardware, firmware, or software flow that leaves an automated information system (AIS) open for potential exploitation. A weakness in automated system security procedures, administrative controls, physical layout, internal controls, and so forth, that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing.