Security Overview. Security Objectives Confidentiality: prevent/detect/deter improper disclosure of information Integrity: prevent/detect/deter improper.

Slides:



Advertisements
Similar presentations
Sri Lanka Institute of Information Technology
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Access Control RBAC Database Activity Monitoring.
Access Control Methodologies
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Database Security - Farkas 1 Database Security and Privacy.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
8.1 Learning Objectives To become familiar with the range of security threats faced by networked and distributed systems (DSs); To examine various cryptographic.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Network Security Sorina Persa Group 3250 Group 3250.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 21 Distributed System Security Copyright © 2008.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Public Key Encryption Terminology RSA Hash functions CSCE Farkas.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Lecture 3 Basic Security Concepts cont.. Homework 1. Score: 10 points Due: September 12, :00 am via dropbox Last day to submit with 4%/day penalty:
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Cryptographic Hash Functions and Protocol Analysis
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Authentication What you know? What you have? What you are?
Cyber Attacks and Cryptography Overview
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
What is Access Control? Discretionary Access Control (DAC)
Private key
Access Control.
CSCE 201 Identification and Authentication Fall 2015.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Chapter 5 : DataBase Security Lecture #1-Week 8 Dr.Khalid Dr. Mohannad Information Security CIT460 Information Security Dr.Khalid Dr. Mohannad 1.
CSCE 522 Identification and Authentication
CSCE 522 Access Control.
CSCE 522 Identification and Authentication
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Protocol Analysis.
Cryptography.
Security Overview.
Access Control.
Access Control What’s New?
Presentation transcript:

Security Overview

Security Objectives Confidentiality: prevent/detect/deter improper disclosure of information Integrity: prevent/detect/deter improper modification of information Availability: prevent/detect/deter improper denial of access to services 2 Farkas CSCE 824

Distributed applications Authenticity Non-repudiation CSCE Farkas

Sample Questions What is the trade off between the security objectives? Give an example of the security objectives in the domain of college education. Consider the trend about attack sophistication and intruder’s knowledge. Recommend an approach to enhance the security of future computing systems. 4 Farkas CSCE 824

Achieving Security Policy  What to protect? Mechanism  How to protect? Assurance  How good is the protection? 5 Farkas CSCE 824

Security Policy Organizational Policy Computerized Information System Policy 6 Farkas CSCE 824

Sample Questions Why do we need to fit the security policy into the organizational policy? Why is it recommended to separate policy from mechanism? What does “assurance” mean in the context of security? Give an example security policy enforced on your personal computer/CSE computing system/CEC computing system and recommend security mechanism to implement the policy. 7 Farkas CSCE 824

Security Mechanism Prevention Detection Tolerance/Recovery 8 Farkas CSCE 824

Security Tradeoffs COST Security Functionality Ease of Use 9 Farkas CSCE 824

Threats, Attacks, Vulnerability, Risk  Types of threats  Types of attacks  Relation to security objectives  M(ethod), O(pportunity), and M(otive) of attacks  Methods of defense – Security planning  Risk Management 10 Farkas CSCE 824

Risk Management Framework (Business Context) Understand Business Context Identify Business and Technical Risks Synthesize and Rank Risks Define Risk Mitigation Strategy Carry Out Fixes and Validate Measurement and Reporting 11 Farkas CSCE 824

Sample Questions Give an example of vulnerability, threat, risk, and attack in the domain of … What does it mean “weakest link” of defense? Recommend a way to increase computing system’s security by incorporating security trade offs into the security planning. Why do we need to understand the business context to have effective security? 12 Farkas CSCE 824

Cryptography

Insecure communications Sender Snooper Recipient Insecure channel Confidential

Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it  Only the recipient should get it  Proof of the sender’s identity  Message shouldn’t be corrupted in transit  Message should be sent/received once only

Conventional (Secret Key) Cryptosystem Encryption Decryption Plaintext Ciphertext K SenderRecipient C=E(K,M) M=D(K,C) K needs secure channel

Public Key Cryptosystem Encryption Decryption Plaintext Ciphertext SenderRecipient C=E(K pub,M) M=D(K priv,C) Recipient’s public Key (K pub ) Recipient’s private Key (K priv ) K pub needs reliable channel

Cryptography Cryptanalyst’s goal:  Break message  Break key  Break algorithm Taxonomy of attacks Breakable vs. unbreakable cryptographic system Properties of good cryptosystem.

Cryptosystem Vulnerabilities Passive Attacker (Eavesdropper) Active Attacker Capabilities

Basic Encryption Techniques Substitution Permutation Combinations and iterations of these Techniques and attacks ADVANTAGES/DISADVANTAGES!

Inherent Weaknesses of Symmetric Cryptography  Key distribution must be done secretly (difficult when parties are geographically distant, or don't know each other)  Need a key for each pair of users  n users need n*(n-1)/2 keys  If the secret key (and cryptosystem) is compromised, the adversary will be able to decrypt all traffic and produce fake messages

Product Ciphers One encryption applied to the result of the other E n (E n-1 (…(E 1 (M)))), e.g.,  Double transposition  Substitution followed by permutation, followed by substitution, followed by permutation… Broken for  Chosen plaintext 22 Farkas CSCE 824

Trustworthy Encryption Systems Based on sound mathematics Has been analyzed by experts Has stood the test of time Examples: Data Encryption Standard (DES), Advanced Encryption Standard (AES), River-Shamir-Adelman (RSA)

Public Key Encryption 24 Farkas CSCE 824

CSCE Farkas 25 Public-Key Encryption Two keys – one is private one is public Solves the key distribution problem (but need reliable channel) Provides electronic signatures Slower than secret-key encryption 25 Farkas CSCE 824

CSCE Farkas 26 Lecture 6 Public-Key Encryption Needed for security:  One of the keys must be kept secret  Impossible (at least impractical) to decipher message if no other information is available  Knowledge of algorithm, one of the keys, and samples of ciphertext must be insufficient to determine the other key 26 Farkas CSCE 824

CSCE Farkas 27 Lecture 6 RSA – Notation C = E(KE-B, M) M = D(KD-B,C) KE-B:public key of B KD-B:private key of B E: encryption alg. D:decryption alg. M:plaintext C:ciphertext 27 Farkas CSCE 824

CSCE Farkas 28 Lecture 6 RSA Both sender and receiver know n Sender knows e Only receiver knows d Modulus: Remainder after division, i.e., if a mod n=b then a=c*n+b Need:  Find values e,d,n such that  Easy to calculate M e, C d for all M < n  Infeasible to determine d give e M ed mod n = M mod n 28 Farkas CSCE 824

CSCE Farkas 29 Lecture 6 Signature and Encryption D EDE A B Plaintext Signed Plaintext Signed Plaintext Encrypted Signed Plaintext A’s private key B’s public key B’s private key A’s public key 29 Farkas CSCE 824

CSCE Farkas 30 Lecture 6 Non-repudiation Requires notarized signature, involving a third party Large system: hierarchies of notarization 30 Farkas CSCE 824

Cryptographic Hash Functions 31 Farkas CSCE 824

CSCE Farkas 32 Lecture 8-9 Hash Functions Hash function h maps an input x of arbitrary length to a fixed length output h(x) (compression) Accidental or intentional change to the data will change the hash value Given h and x, h(x) is easy to compute (ease of computation) 32 Farkas CSCE 824

CSCE Farkas 33 Lecture 8-9 Good Hash Function 1. It is easy to compute the hash value for any given message 2. It is infeasible to find a message that has a given hash 3. It is infeasible to modify a message without changing its hash 4. It is infeasible to find two different messages with the same hash 33 Farkas CSCE 824

Cryptographic Protocols 34 Farkas CSCE 824

CSCE Farkas 35 Lecture 6 Protocols Good protocol characteristics: Established in advance Mutually subscribed Unambiguous Complete 35 Farkas CSCE 824

CSCE Farkas 36 Lecture 6 Symmetric-Key Distribution: Symmetric-Key Techniques Symmetric-Key without Server Symmetric-Key with Server 36 Farkas CSCE 824

CSCE Farkas 37 Lecture 6 Symmetric-Key Distribution: Public-Key Techniques Simple secret key distribution Secret key distribution with confidentiality and authentication Diffie-Hellman Key Exchange 37 Farkas CSCE 824

CSCE Farkas 38 Lecture 6 Simple secret key distribution SenderRecipient 1.KE-S ||ID-S 2. E KE-S (K session ) Vulnerable to active attack! HOW? Public key of S Secret Session key 38 Farkas CSCE 824

CSCE Farkas 39 Lecture 6 With confidentiality and authentication SenderRecipient 1.E KE-R [N1||ID-A] 2. E KE-S [N1||N2] 3. E KE-R [N2] 4. E KE-R E KD-S (K session ) Assume: KE-R and KE-S are known in advance Nonce Question: Why do we need reliable distribution of public keys? 39 Farkas CSCE 824

CSCE Farkas 40 Lecture 6 Intruder in the Middle Attack JohnRose Intruder Hi Rose, I’m John. Hi John, I’m Rose. Hi Rose, I’m John. Intruder and John Uses Diffie-Hellman To agree on key K. Intruder and Rose Uses Diffie-Hellman To agree on key K’. Question: the attacker may want to have K and K’ be the same, Why? 40 Farkas CSCE 824

CSCE Farkas 41 Lecture 6 Asymmetric-Key Exchange Without server  Broadcasting  Publicly available directory With server  Public key distribution center  Certificates 41 Farkas CSCE 824

CSCE Farkas 42 Lecture 6 Public-key certificates Certificate Authority Sender Recipient KE-S C-S=E KD-CAuth [Time1,ID-S,KE-S] 1. C-S 2. C-R KE-R CR=E KD-CAuth [Time2,ID-R,KE-R] 42 Farkas CSCE 824

CSCE Farkas 43 Lecture 6 Certificates Guarantees the validity of the information Establishing trust Public key and user identity are bound together, then signed by someone trusted Need: digital signature 43 Farkas CSCE 824

CSCE Farkas 44 Lecture 6 Digital Signature Need the same effect as a real signature  Un-forgeable  Authentic  Non-alterable  Not reusable 44 Farkas CSCE 824

CSCE Farkas 45 Lecture 6 Digital signature Direct digital signature: public-key cryptography based Arbitrated digital signature:  Conventional encryption: Arbiter sees message Arbiter does not see message  Public-key based Arbiter does not see message 45 Farkas CSCE 824

Identification and Authentication 46 Farkas CSCE 824

Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose identity is verified reveals knowledge of some secret S to the verifier Strong authentication: the entity reveals knowledge of S to the verifier without revealing S to the verifier

Authentication Information Must be securely maintained by the system.

Authentication Requirements Network must ensure  Data exchange is established with addressed peer entity not with an entity that masquerades or replays previous messages Network must ensure data source is the one claimed Authentication generally follows identification  Establish validity of claimed identity  Provide protection against fraudulent transactions

User Authentication What the user knows  Password, personal information What the user possesses  Physical key, ticket, passport, token, smart card What the user is (biometrics)  Fingerprints, voiceprint, signature dynamics

Passwords Commonly used method For each user, system stores (user name, F(password)), where F is some transformation (e.g., one-way hash) in a password file  F(password) is easy to compute  From F(password), password is difficult to compute  Password is not stored in the system When user enters the password, system computes F(password); match provides proof of identity

Vulnerabilities of Passwords Inherent vulnerabilities  Easy to guess or snoop  No control on sharing Practical vulnerabilities  Visible if unencrypted in distributed and network environment  Susceptible for replay attacks if encrypted naively Password advantage  Easy to modify compromised password.

Attacks on Password Guessing attack/dictionary attack Social Engineering Sniffing Trojan login Van Eck sniffing

One-time Password Use the password exactly once!

Lamport’s scheme Doesn’t require any special hardware System computes F(x),F 2 (x),…, F 100 (x) (this allows 100 logins before password change) System stores user’s name and F 100 (x) User supplies F 99 (x) the first time If the login is correct, system replaces F 100 (x) with F 99 (x) Next login: user supplies F 98 (x) … and so on User calculates F n (x) using a hand-held calculator, a workstation, or other devices

Time Synchronized Secret key Time One Time Password DES 56 Farkas CSCE 824

Challenge Response Work station Host Network Non-repeating challenges from the host is used The device requires a keypad User ID Challenge Response 57 Farkas CSCE 824

Access Control 58 Farkas CSCE 824

Access Control Protection objects: system resources for which protection is desirable  Memory, file, directory, hardware resource, software resources, etc. Subjects: active entities requesting accesses to resources  User, owner, program, etc. Access mode: type of access  Read, write, execute

Access Control Requirement Cannot be bypassed Enforce least-privilege and need-to-know restrictions Enforce organizational policy

Access Control Access control: ensures that all direct accesses to object are authorized Protects against accidental and malicious threats by regulating the reading, writing and execution of data and programs Need: – Proper user identification and authentication – Information specifying the access rights is protected form modification 61 Farkas CSCE 824

Access Control Access control components: – Access control policy: specifies the authorized accesses of a system – Access control mechanism: implements and enforces the policy Separation of components allows to: – Define access requirements independently from implementation – Compare different policies – Implement mechanisms that can enforce a wide range of policies 62 Farkas CSCE 824

Closed vs. Open Systems Closed systemOpen System Access requ. Exists Rule? Access permitted Access denied Access denied Access permitted Allowed accesse s Disallowed accesses yesno yesno (minimum privilege)(maximum privilege) 63 Farkas CSCE 824

Access Control Models All accesses Discretionary AC Mandatory AC Role-Based AC 64 Farkas CSCE 824

Discretionary Access Control Access control is based on  User’s identity and  Access control rules Most common administration: owner based  Users can protect what they own  Owner may grant access to others  Owner may define the type of access given to others

Access Matrix Model Read Write Own Read Write Own OBJECTS AND SUBJECTS SUBJECTSSUBJECTS Joe Sam File 1File 2 66 Farkas CSCE 824

Grant and Revoke GRANT ON To [WITH GRANT OPTION] GRANT SELECT * ON Student TO Matthews GRANT SELECT *, UPDATE(GRADE) ON Student TO FARKAS GRANT SELECT(NAME) ON Student TO Brown GRANT command applies to base relations as well as views

Grant and Revoke REVOKE [ON ] FROM REVOKE SELECT* ON Student FROM Blue REVOKE UPDATE ON Student FROM Black REVOKE SELECT(NAME) ON Student FROM Brown

Non-cascading Revoke A B C D E F A B C A revokes D’s privileges E F 69 Farkas CSCE 824

Cascading Revoke A B C D E F A B C A revokes D’s privileges 70 Farkas CSCE 824

Positive and Negative Authorization Problem: Contradictory authorizations GRANT ON X TO DENY ON X TO A B C E D Farkas CSCE 824

Negative Authorization A B C E D Positive authorization granted By A to D becomes blocked but NOT deleted. 72 Farkas CSCE 824

DAC and Trojan Horse Employee Black’s Employee Brown: read, write Black, Brown: read, write Brown Black Read Employee REJECTED! Black is not allowed To access Employee 73 Farkas CSCE 824

DAC and Trojan Horse Employee Black’s Employee Brown: read, write Black, Brown: read, write Brown Black Word Processor TH Inserts Trojan Horse Into shared program Uses shared program Reads Employee Copies Employee To Black’s Employee 74 Farkas CSCE 824

DAC Overview Advantages:  Intuitive  Easy to implement Disadvantages:  Inherent vulnerability (look TH example)  Maintenance of ACL or Capability lists  Maintenance of Grant/Revoke  Limited power of negative authorization

Mandatory Access Control Objects: security classification e.g., grades=(confidential, {student-info}) Subjects: security clearances e.g., Joe=(confidential, {student-info}) Access rules: defined by comparing the security classification of the requested objects with the security clearance of the subject e.g., subject can read object only if label(subject) dominates label(object) 76 Farkas CSCE 824

Mandatory Access Control If access control rules are satisfied, access is permitted e.g., Joe wants to read grades. label(Joe)=(confidential,{student-info}) label(grades)=(confidential,{student-info}) Joe is permitted to read grades Granularity of access rights! 77 Farkas CSCE 824

Mandatory Access Control Security Classes (labels): (A,C) A – total order authority level C – set of categories e.g.,A = confidential > public, C = {student-info, dept-info} (confidential,{ }) (confidential,{dept-info}) (confidential,{student-info,dept-info}) (confidential,{student-info}) (public,{student-info,dept-info}) (public,{,dept-info}) (public,{ }) (public,{student-info}) 78 Farkas CSCE 824

Mandatory Access Control Dominance (  ): label l=(A,C) dominates l’=(A’,C’) iff A  A’ and C  C’ e.g., (confidential,{student-info})  (public,{student-info}) BUT (confidential, {student-info})  (public,{student-info, department-info}) 79 Farkas CSCE 824

Bell- LaPadula (BLP) Model Confidentiality protection Lattice-based access control  Subjects  Objects  Security labels Supports decentralized administration 80 Farkas CSCE 824

BLP Reference Monitor All accesses are controlled by the reference monitor Cannot be bypassed Access is allowed iff the resulting system state satisfies all security properties Trusted subjects: subjects trusted not to compromise security 81 Farkas CSCE 824

BLP Axioms 1. Simple-security property: a subject s is allowed to read an object o only if the security label of s dominates the security label of o  No read up  Applies to all subjects 82 Farkas CSCE 824

*-property: a subject s is allowed to write an object o only if the security label of o dominates the security label of s No write down Applies to un-trusted subjects only BLP Axioms Farkas CSCE 824

Blind Writes Improper modification of data Most implementations disallow blind writes 84 Farkas CSCE 824

Trojan Horse and BLP Employee Black’s Employee Brown: read, write Black, Brown: read, write Brown Black Word Processor TH Insert Trojan Horse Into shared program Use shared program Read Employee Copy Employee To Black’s Employee Secret Public Secret  Public Public Secret Reference Monitor 85 Farkas CSCE 824

RBAC Motivation Multi-user systems Multi-application systems Permissions are associated with roles Role-permission assignments are persistent v.s. user-permission assignments Intuitive: competency, authority and responsibility

RBAC Allows to express security requirements but CANNOT ENFORCE THESE PRINCIPLES e.g., RBAC can be configured to enforce BLP rules but its correctness depend on the configuration done by the system security officer.

Roles User group: collection of user with possibly different permissions Role: mediator between collection of users and collection of permissions RBAC independent from DAC and MAC (they may coexist) RBAC is policy neutral: configuration of RBAC determines the policy to be enforced

RBAC RBAC 3 consolidated model RBAC 1 role hierarchy RBAC 2 constraints RBAC 0 base model 89 Farkas CSCE 824

RBAC U Users R Roles P Permissions. S Sessions User assignment Permission assignment 90 Farkas CSCE 824

RBAC U Users R Roles P Permissions. S Sessions User assignment Permission assignment Role Hierarchy 91 Farkas CSCE 824

RBAC 1 Role Hierarchy Primary-care Physician Specialist Physician Health-care provider Inheritance of privileges 92 Farkas CSCE 824

RBAC U Users R Roles P Permissions. S Sessions User assignment Permission assignment Constraints 93 Farkas CSCE 824

RBAC U Users R Roles P Permissions. S Sessions User assignment Permission assignment Constraints 94 Farkas CSCE 824

Next Class Information Warfare Farkas CSCE