The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments presented by Toby.

Slides:



Advertisements
Similar presentations
Security Issues in Mobile Code Systems David M.Chess, High Integrity Computing Lab, IBM T.J. Watson Research Center Hawthorne, NY, USA Mobile code systems.
Advertisements

Operating System Security
Chapter 1  Introduction 1 Chapter 1: Introduction.
User Documentation.  You cannot build a system for a client and leave them without adequate documentation  Computer systems are complex, require configuration.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Access Control Methodologies
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
Securing the Broker Pattern Patrick Morrison 12/08/2005.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Accounting, Protection, Security and More Fault Handling Gotchas May 26, 2000 Instructor: Gary Kimura.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Trusted Path Client- server applications Using COTS components Tommy Kristiansen
What does it mean for you?.  The protection of private, identifying information.  If information is accorded a confidential status, that status mandates.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
Designing Active Directory for Security
G53SEC 1 Reference Monitors Enforcement of Access Control.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Action SecWG1012:9 “Investigate how role-based access, in compliance with FIPS 140-2, can be used by flight crypto systems.” Where this question comes.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 The SqlConnection Object ADO.NET - Lesson 02  Training time: 10 minutes 
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Class 6 Distributed Systems CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Module 3 Creating Groups and Organizational Units.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Privilege Management Chapter 22.
Introduction to Active Directory
Security Debate Why cracking should be criminalized.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
The Exchange Network Node Mentoring Workshop User Management on the Exchange Network Joe Carioti February 28, 2005.
Lecture 4 Page 1 CS 111 Online Modularity and Memory Clearly, programs must have access to memory We need abstractions that give them the required access.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
CHAPTER Network Operating System Concepts. Chapter Objectives Provide an overview of network operating systems and its functions Explain the concept of.
Modularity Most useful abstractions an OS wants to offer can’t be directly realized by hardware Modularity is one technique the OS uses to provide better.
COMPSCI 110 Operating Systems
Modularity and Memory Clearly, programs must have access to memory
How to Fix Windows 10 Update Error 0x ?.
Seraphim : A Security Architecture for Active Networks
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Chapter 17: Confinement Problem
16. Account Monitoring and Control
Access Control What’s New?
Chapter 4: Security Policies
Presentation transcript:

The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments presented by Toby

Introduction

Introduction Premise 1.Ppl be debating lots of security additions without much talk about the operating systems

Introduction Premise 1.Ppl be debating lots of security additions without much talk about the operating systems 2.Debates are flawed—assume that application level security can be attained on current operating systems

Introduction Premise 1.Ppl be debating lots of security additions without much talk about the operating systems 2.Debates are flawed—assume that application level security can be attained on current operating systems 3.Current (err.. 15 year old) operating systems are inadequate from a security standpoint

2 The Missing Link

Mandatory Security Trusted Path

2 The Missing Link Mandatory Security Mandatory Security: “...any security policy where the definition of the policy logic and the assignment of security attributes is tightly controlled by a system security policy administrator.” –this paper The user should have no influence over the security policy in theory

2 The Missing Link Mandatory Security Example systems that should have Mandatory Security: access control authentication usage cryptographic usage

2 The Missing Link Mandatory Security According to the big black box, Mandatory Security has these general benefits: Confinement of applications (from a security standpoint) Lack of burden on individual users to manage security Narrowing of bandwidth of channels for leaking private information Increased accountability of unauthorized private information flow

2 The Missing Link Mandatory Security Example of 1998 state of OSes Windows NT: Two security domains: Complete Privilege Complete Unprivileged Pretty coarse-grained

2 The Missing Link Trusted Path “A trusted path is a mechanism by which a user may directly interact with trusted software, which can only be activated by either the user or the trusted software and may not be imitated by other software.” –this paper

2 The Missing Link Trusted Path “A trusted path is a mechanism by which a user may directly interact with trusted software, which can only be activated by either the user or the trusted software and may not be imitated by other software.” –this paper

2 The Missing Link Trusted Path Example given: Windows NT: Trusted path given for stuff like password changing But no means for extending to other trusted software

3 General Examples

3 General Examples Access Control

4 Concrete Examples

4 Concrete Examples Mobile Code Mobile code probably meant something much different in 1998 Here: Java Mobile = portable Does not equal iPhone

4 Concrete Examples Mobile Code Java (1998): “not tamperproof or unbypassable” i.e. you can break boundaries of abstraction depends on the application-space access control for security e.g. executables could be tampered with

4 Concrete Examples Kerberos Malicious software could spoof client-side authentication Need a trusted path to guarantee this can’t happen Client’s password could be obtained

4 Concrete Examples Kerberos Malicious software could spoof client-side authentication Need a trusted path to guarantee this can’t happen Client’s password could be obtained

6 Summary

No single security mechanism will be a solution to security problems but we knew that Modern (1998) computing threats cannot be addressed without secure operating systems they were right Authors hoped to motivate interest in OS security well, people are interested don’t know if it’s their doing or not