Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 1: Introduction

Similar presentations


Presentation on theme: "Chapter 1: Introduction"— Presentation transcript:

1 Chapter 1: Introduction
Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues April 1, 2004 ECS 235

2 Basic Components Confidentiality Integrity Availability
Keeping data and resources hidden Integrity Data integrity (integrity) Origin integrity (authentication) Availability Enabling access to data and resources April 1, 2004 ECS 235

3 Classes of Threats Disclosure Deception Disruption Usurpation Snooping
Modification, spoofing, repudiation of origin, denial of receipt Disruption Modification Usurpation Modification, spoofing, delay, denial of service April 1, 2004 ECS 235

4 Policies and Mechanisms
Policy says what is, and is not, allowed This defines “security” for the site/system/etc. Mechanisms enforce policies Composition of policies If policies conflict, discrepancies may create security vulnerabilities April 1, 2004 ECS 235

5 Goals of Security Prevention Detection Recovery
Prevent attackers from violating security policy Detection Detect attackers’ violation of security policy Recovery Stop attack, assess and repair damage Continue to function correctly even if attack succeeds April 1, 2004 ECS 235

6 Trust and Assumptions Underlie all aspects of security Policies
Unambiguously partition system states Correctly capture security requirements Mechanisms Assumed to enforce policy Support mechanisms work correctly April 1, 2004 ECS 235

7 Types of Mechanisms secure precise broad set of reachable states
set of secure states April 1, 2004 ECS 235

8 Assurance Specification Design Implementation Requirements analysis
Statement of desired functionality Design How system will meet specification Implementation Programs/systems that carry out design April 1, 2004 ECS 235

9 Operational Issues Cost-Benefit Analysis Risk Analysis
Is it cheaper to prevent or recover? Risk Analysis Should we protect something? How much should we protect this thing? Laws and Customs Are desired security measures illegal? Will people do them? April 1, 2004 ECS 235

10 Human Issues Organizational Problems People problems
Power and responsibility Financial benefits People problems Outsiders and insiders Social engineering April 1, 2004 ECS 235

11 Tying Together Threats Policy Specification Design Implementation
Operation April 1, 2004 ECS 235

12 Chapter 13: Design Principles
Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability April 1, 2004 ECS 235

13 Overview Simplicity Restriction Less to go wrong
Fewer possible inconsistencies Easy to understand Restriction Minimize access Inhibit communication April 1, 2004 ECS 235

14 Least Privilege A subject should be given only those privileges necessary to complete its task Function, not identity, controls Rights added as needed, discarded after use Minimal protection domain April 1, 2004 ECS 235

15 Fail-Safe Defaults Default action is to deny access
If action fails, system as secure as when action began April 1, 2004 ECS 235


Download ppt "Chapter 1: Introduction"

Similar presentations


Ads by Google