Security: The Goal Computers are as secure as real world systems, and people believe it. This is hard because: Computers can do a lot of damage fast. There.

Slides:



Advertisements
Similar presentations
Building Secure Mashups D. K. Smetters PARC Usable.
Advertisements

Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
1 Computer Security in the Real World Butler Lampson Microsoft August 2005.
1 Accountability and Freedom Butler Lampson Microsoft September 26, 2005.
1 Computer Security in the Real World Butler Lampson Microsoft.
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Ethics, Privacy and Information Security
1 Operating System vs. Network Security Butler Lampson Microsoft Outline What security is about Operating systems security Network security How they fit.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 Accountability and Freedom Butler Lampson Microsoft October 27, 2005.
Security Issues and Challenges in Cloud Computing
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Web Services, SOA and Security May 11, 2009 Michael Burnett.
Chapter 7 HARDENING SERVERS.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
CSE331: Introduction to Networks and Security Lecture 15 Fall 2002.
Administrivia Final exam: Wed, May 12, 3:00-5:00, in this room Q&A on it today Playoffs: Fri, May 14, noon-2:00, FEC 141 Post-class survey (anonymous)
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Introduction To Windows NT ® Server And Internet Information Server.
Chapter 4 Access Control Manage Principals operations in system.
1 Computer Security in the Real World Butler Lampson Microsoft Annual Computer Security Applications Conference, Edited.
1 Software and Security Butler Lampson Microsoft.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Protection and Security An overview of basic principles CS5204 – Operating Systems1.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Chapter 5 Security Threats to Electronic Commerce
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 Computer Security in the Real World Butler Lampson What people want from computer security is to be as secure with computers as they are in the real.
Protecting Memory What is there to protect in memory?
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
POPULAR POWER Security Issues of Peer-to-Peer Systems
VCE Dumps
Official levels of Computer Security
IT Vocab IT = information technology Server Client or host
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Protection and Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Mohammad Alauthman Computer Security Mohammad Alauthman
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Security: The Goal Computers are as secure as real world systems, and people believe it. This is hard because: Computers can do a lot of damage fast. There are many places for things to go wrong. Networks enable Anonymous attacks from anywhere Automated infection Hostile code and hostile hosts People don’t trust new things.

Real-World Security It’s about value, locks, and punishment. Locks good enough that bad guys don’t break in very often. Police and courts good enough that bad guys that do break in get caught and punished often enough. Less interference with daily life than value of loss. Security is expensive—buy only what you need.

Elements of Security Policy: Specifying security What is it supposed to do? Mechanism: Implementing security How does it do it? Assurance: Correctness of security Does it really work?

Dangers Vandalism or sabotage that Theft of money Theft of information damages information disrupts service Theft of money Theft of information Loss of privacy integrity availability secrecy

Vulnerabilities Bad (buggy or hostile) programs Bad (careless or hostile) people giving instructions to good programs Bad guy interfering with communications

Defensive strategies Keep everybody out Keep the bad guy out Isolation Keep the bad guy out Code signing, firewalls Let him in, but keep him from doing damage Sandboxing, access control Catch him and prosecute him Auditing, police

The Access Control Model Guards control access to valued resources. Do Reference Principal Object operation monitor Source Request Guard Resource

Mechanisms—The Gold Standard Authenticating principals Mainly people, but also channels, servers, programs Authorizing access. Usually for groups of principals Auditing Assurance Trusted computing base

Assurance: Making Security Work Trusted computing base Limit what has to work to ensure security Ideally, TCB is small and simple Includes hardware and software Also includes configuration, usually overlooked What software has privileges Database of users, passwords, privileges, groups Network information (trusted hosts, …) Access controls on system resources . . . The unavoidable price of reliability is simplicity.—Hoare

Assurance: Configuration Users—keep it simple At most three levels: self, friends, others Three places to put objects Everything else done automatically with policies Administrators—keep it simple Work by defining policies. Examples: Each user has a private home folder Each user belongs to one workgroup with a private folder System folders contain vendor-approved releases All executable programs are signed by a trusted party Today’s systems don’t support this very well

Assurance: Defense in Depth Network, with a firewall Operating system, with sandboxing Basic OS (such as NT) Higher-level OS (such as Java) Application that checks authorization directly All need authentication

Why We Don’t Have “Real” Security A. People don’t buy it: Danger is small, so it’s OK to buy features instead. Security is expensive. Configuring security is a lot of work. Secure systems do less because they’re older. Security is a pain. It stops you from doing things. Users have to authenticate themselves. B. Systems are complicated, so they have bugs.

Standard Operating System Security Assume secure channel from user (without proof) Authenticate user by local password Assign local user and group SIDs Access control by ACLs: lists of SIDs and permissions Reference monitor is the OS, or any RPC target Domains: same, but authenticate by RPC to controller Web servers: same, but simplified Establish secure channel with SSL Authenticate user by local password (or certificate) ACL on right to enter, or on user’s private state

End-to-End Security Authenticate secure channels Work uniformly between organizations Microsoft can securely accept Intel’s authentication Groups can have members from different organizations Delegate authority to groups or systems Audit all security decisions