Chapter 5 Network Security

Slides:



Advertisements
Similar presentations
Trusted System Elements and Examples CS461/ECE422 Fall 2011.
Advertisements

Information Flow and Covert Channels November, 2006.
Lecture 8 Access Control (cont)
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
Access Control Methodologies
Trusted vs. secure software
Access Control Intro, DAC and MAC System Security.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Information Systems Security Security Architecture Domain #5.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Policy, Models, and Trust 1. Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Trusted System? What are the characteristics of a trusted system?
J Carpenter & lecture & Information Security 2008 Lecture 5 Access Control, Security Models.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Week 8 - Wednesday.  What did we talk about last time?  Authentication  Challenge response  Biometrics  Started Bell-La Padula model.
Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Policy, Models, and Trust
Information Security CS 526 Topic 17
Mandatory Access Control
Chapter 5 – Designing Trusted Operating Systems
Materials credits: M. Bishop, UC Davis T. Jaeger, Penn State U.
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Chapter 8: Principles of Security Models, Design, and Capabilities
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
9- 1 Last time ● User Authentication ● Beyond passwords ● Biometrics ● Security Policies and Models ● Trusted Operating Systems and Software ● Military.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TOPIC: Web Security Models
Security Models and Designing a Trusted Operating System
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Operating Systems Security
Advanced System Security
System state models.
Security Modeling Jagdish S. Gangolly School of Business
Confidentiality Models
DATABASE SECURITY For CSCL (BIM).
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
CS703 - Advanced Operating Systems
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Advanced System Security
Presentation transcript:

Chapter 5 Network Security Chapter 5 – Designing Trusted Operating Systems

In this section What is a trusted system? Security Policy Models Military Commercial Clark-Wilson Separation of Duty Chinese Wall Models Lattice Model Bell-La Padula Biba Graham-Denning Take-Grant

Designing Trusted OS Primary security in computing systems Memory File Objects/Access Control User Authentication Trusted – We are confident that services are provided consistently and effectively

Making of a trusted OS Policy – requirements statement of what is should do Model – model of the environment to be secured; represents the policy to be enforced Design – the means of implementation; functionality and construction Trust – assurance of meeting expectation through the features offered

What is a trusted system? What makes something secure? For how long? Trusted Software – rigorously developed and analyzed Key Characteristics of Trusted Software: Functional Correctness Enforcement of Integrity Limited Privilege Appropriate Confidence Level We speak in terms of trusted and not secure

Many types of Trust: Through: Trusted Process Trusted Product Trusted Software Trusted Computing Base Trusted System Through: Enforcement of Security Policy Sufficiency of Measures and Mechanism Evaluation

Security Policy Security Policy – statement of the security we expect the system to enforce A trusted system can be trusted only in relation to its security policy…. To the security needs the system expected to satisfy

Military Security Policy Basis of many OS security policies Based on protecting classified information Top Secret (most sensitive), Secret, Confidential, Restricted, Unclassified (least sensitive) Limited by the Need-to-Know rule: Access is allowed only to subjects who need to know data to perform job. Compartments- classification information may be associated with one or more projects describing the subject matter of the information

Classification - <rank; compartments> This enforces need-to-know both by security level and by topic Clearance – person is trusted to access information up to a given level of sensitivity with need-to-know Dominance, on a set of Objects (0) and Subjects (s) s ≤ o if and only if rank(s) ≤ rank (0) and compartments (s) ⊆ compartments(0) We say 0 dominates s (or s is dominated by o) Dominance is used to limit the sensitivity and content of information a subject can access As subject can read an object only if: clearance level of the subject is at least as high as the information Subject has a need-to-know about all compartments for which the information is classified

Commercial Security Policies Worried about espionage Degrees of sensitivity: Public Proprietary Internal No dominance function for most commercial policies since no formal clearance is needed Integrity and availability are just, not if more, important than confidentiality

Clark-Wilson Commercial Security Policy This is based on Integrity Policy on well-formed transactions Sequence of activities Performing steps in order, performing exactly the steps listed, and authentication of individuals in the steps (well-formed transactions) Goal: maintain consistency between internal data and external (users’) expectation of data Constrained data items which are processed by transformation procedures

Separation of Duty The required division of responsibilities is called separation of duty Accomplished manually by means of dual signatures

Chinese Wall Security Policy Used in legal, medical, investment and accounting firms Addresses the conflict of interest Security Policy Builds on: Objects – low level Company Groups – mid level Conflict Classes – high level, groups of objects of competing companies are clusterd

Models of Security Security Models are used to: Test a particular policy for completeness and consistency Document policy Help conceptualize and design an implementation Check whether an implementation meets its requirements Policy is established outside any model Model is only a mechanism that enforces the policy

Multilevel Security Build a model to represent a range of sensitivities and to reflect the need to separate subjects rigorously from objects to which they should not have access The generalized model is called the Lattice Model of Security

Bell-La Padula Confidentiality Model Formal description of allowable paths of flow in a secure system Formalization of the military security policy Two properties: Simple Security Property – A subject s may have read access to object o only if C(o) ≤ C(s) *-Property – A subject s who has read access to an object o may have write access to an object p only if C(o) ≤ C(p) C(s) – clearance; c(0) classification Write-down – high level subjects transfers high level data to a low level object (prevented by star property)

Figure 5-7  Secure Flow of Information.

Biba Integrity Model Bell-La Padula model applies only to secrecy Biba is about Integrity and defines integrity levels Properties: Simple Integrity Property – Subject s can modify (have write access to) object o only if I(s) ≥ I(o) *-Property – if subject s has read access to object o with integrity level I(0), s can have write access to object p only if I(o) ≥ I(p) [write-down] Totally ignores secrecy

Graham-Denning Model Formal System of Protection Rules Access Control Mechanism (matrix) of a protection system Eight Privative Protection Rights Create object, Create subject, Delete object and Delete subject Read Access Grant Access Delete Access Right Transfer Access Right Matrix: A[s,o]

Take-Grant Systems Four primitives: create, revoke, take and grant