Security Mechanisms University of Sunderland CSEM02 Harry R. Erwin, PhD.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security Policies and Standards
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Engineering Security Requirement
Securing Information Systems
Chapter 20 Firewalls.
At the Scene CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Identification and Authentication University of Sunderland COM380 Harry R. Erwin, PhD.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security Operations Security Domain #9.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Note1 (Admi1) Overview of administering security.
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
In Depth Security Review Martin Rogers Computer Horizons Corp. © Copyright eB Networks All rights reserved. No part of this presentation may be reproduced,
Assumptions of Secure Operation University of Sunderland CIT304 Harry R. Erwin, PhD.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer Security By Duncan Hall.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Assumptions of Secure Operation University of Sunderland CSEM02 Harry R. Erwin, PhD.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Securing Information Systems
Lesson Objectives Aims You should be able to:
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Firewalls.
Security in Networking
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Security Mechanisms University of Sunderland CSEM02 Harry R. Erwin, PhD

Resources The Common Criteria The ‘Orange Book’ CCTool See the Multics paper.

Basic Rules of Security Concentrate valuable assets Defense in depth Coordinate all aspects of security –Software –Hardware –Physical –Procedural We will examine software security mechanisms first and then survey the other areas.

Definition A security mechanism is ‘a hardware or software component, system, or product that supports one or more security objectives.’ Another term that might be applied is a ‘security service.’ “The function of a security mechanism is to detect, prevent, or recover from a security attack (William Stallings).”

Typical Security Mechanisms Identification and Authentication Access Control Audit Firewalls Intrusion Detection Cryptography and Public Key Infrastructure (PKI) Virus Protection Object Reuse/Media Sanitizing Electronic Signatures

Identification and Authentication Identifies someone to the system. At least one of the following must be supplied: –Something known (user name and password) –Something owned (password token) –Some physical characteristic (fingerprint, retinal scan, voice scan) Authentication is ‘weak’ if only one is supplied. Two required for ‘strong’ authentication.

Access Control Based on what the user is authorized to do. ‘Discretionary access control (DAC)’ is where the document owner controls who has access to it. This is designed for benign environments. ‘Mandatory access control (MAC)’ defines a security level for documents and resources. A potential user or process has to have that level. Commercial organizations may go further—time of day, location, task being performed. Should be enforced by operating system kernel.

Audit Tracks who did what and when. Done right, can stand up in court as evidence. Usually must be turned on (selectively). May result in large audit files. Audit trails are extremely interesting to hackers—show what can and cannot be seen.

Firewalls Control access to protected assets. Workstation firewalls are the minimum. Bridge/router/switch firewalls should: –Control access to TCP/IP ports selectively. –Track outgoing as well as incoming packets. –Monitor packet contents if possible. SOAP “bypasses corporate firewalls.” (M$)

Intrusion Detection Must be based on documented policies for use of the system. Uses expertise. Can detect evidence of –Break-ins –Remote exploitation –Application-level exploitation Generates log files of great interest to hackers. Does not detect one-time events

Cryptography and Public Key Infrastructure (PKI) May support virtual private networks (VPNs) and closed user groups (CUGs) where information is sent using encrypted tunneling. Usually peer-to-peer. May support strong authentication. ssh, sftp, ssl, Kerberos, PGP, etc. Functional infrastructure required is extensive. Distribution of keys is extremely manpower- intensive and expensive. PKI allows the distribution of keys ‘in-band’ (over the network).

Virus Protection Viruses (and other malware) are the most serious vulnerability of modern computer systems. They are usually malicious. Many websites upload ‘malware’ when you visit them. Consider using adaware to detect these programs. Virus protection depends on: –Careful procedures for dealing with untrusted programs and data. –Programs to detect the ‘signatures’ of viruses that manage to penetrate the installation procedures.

Object Reuse/Media Sanitizing The random bits in memory or on the disk contain information. Most operating systems do not zero these bits when they reallocate resources. A secure operating system zeros memory and other resources before allocating them (and often when the resources are released).

Electronic Signatures Provide –Authentication –Data integrity –Non-repudiation The same legal status as a hand-written signature (Electronic Communications Act 2000)

Rules for Writing Secure Software Least privilege—limit access rights to those necessary for the function Economy—keep the design simple Complete mediation—check all accesses for authorization Open design—don’t hide your code! Separation of privilege—no single key for access Least common mechanism—isolate users Psychological acceptability—make security easy to use

Non-Software Security Mechanisms Physical Security Environmental Security Personnel Security Training and Security Awareness Guidance and Policy Documentation Configuration Management (based on Qinetiq recommendations, Spafford et al., 2003, are similar)

Physical Security To deny unauthorized access: –Perimeter defense –Building security –Inner protection of the office and server rooms –Workstation protection

Perimeter defense Defined security perimeter Controlled access points Pass system and visitor control Guards during quiet hours

Office Security Office layout and design Anonymity Location of support services Inventory sensitive assets

Workstation Security Control unauthorized access Removable media Peripherals protected Regular inspections to verify user configuration modification has not subverted security.

Environmental Security Natural disasters –Fire –Flood –Storm –Earthquake Utilities Communications Hardware failure

Personnel Security To ensure you can trust people with access to sensitive information and other assets. Tasks include: –Establishing identity –Verification of details –Credit checks –Maintenance of records

Training and Security Awareness Important vulnerabilities are to –Social engineering and –Non-malicious actions by insiders To mitigate these vulnerabilities, the most effective approach is a training program. –Trust your people, but –Make sure they understand these vulnerabilities and what they should do to mitigate them.

Guidance and Policy Documentation Provide: Administrator guidance documentation User guidance documentation Defined security policies Defined security procedures

Configuration Management It is difficult to secure a system whose configuration is not defined and managed. –User software and hardware modifications to workstations may occur. (e.g., personal modems) –Security may not be enabled. –Security may not be managed and configured. –Threats may not be addressed in a timely fashion. Keep track of your configuration!

Conclusions General Principles of Security: –Concentrate valuable assets –Defense in depth –Coordinate all aspects of security Software Hardware Physical Procedural