Com puter Security Part One Security as a subject Security is an - - PDF document

com puter security part one security as a subject
SMART_READER_LITE
LIVE PREVIEW

Com puter Security Part One Security as a subject Security is an - - PDF document

Com puter Security Part One Security as a subject Security is an old problem in the computing world, and are parallel to even older problems outside computing Required level of security is always related to what you protect


slide-1
SLIDE 1

Com puter Security – Part One

slide-2
SLIDE 2

Security as a subject

  • Security is an old problem in the computing world,

and are parallel to even older problems outside computing

  • Required level of security is always related to what

you protect

  • Trade-off between security, cost, and being non-

intrusive to users.

slide-3
SLIDE 3

Security in Distributed System s

  • What is a system?

– A product or component – The above + OS, communications, etc – The above + one or more applications – Any or all of the above + IT staff – Any or all of the above + internal users and management – Any or all of the above + customers and other external users – Any or all of the above + the surrounding environment including the media, competitors, regulators, and politicians

slide-4
SLIDE 4

Principle of Easiest Penetration

Princip le of Ea siest Penetra tion: An intruder must be expected to use any available means of

  • penetration. This is not necessarily the most obvious

means, nor is it necessarily the one against which the most solid defense has been installed. Pfleeger, 1997

slide-5
SLIDE 5

The Basic Com ponents

  • Confidentiality

– The concealment of information or resources – Supported by access control mechanisms – Also applies to the existence of data – Resource hiding – Assumptions and trust underlie confidentiality mechanisms

slide-6
SLIDE 6

The Basic Com ponents ( 2 )

  • Integrity

– The trustworthiness of data or resources – Includes both data integrity and origin integrity – Two classes:

  • prevention mechanisms

– Unauthorized to change data – Unauthorized change to data

  • detection mechanisms

– Relies on assumptions about

  • the source of the data
  • the trust in that source
slide-7
SLIDE 7

The Basic Com ponents ( 3 )

  • Availability

– The ability to use the information or resource desired – Related to security – System design based on a statistical model

  • Break the model –> Break the system

– Stepping stone to other kinds of attacks – Hard to detect

  • Manipulation vs. Environment
slide-8
SLIDE 8

Tying I t All Together

Threats Policy Specification Design Implementation Operation and Maintenance

slide-9
SLIDE 9

Threats ( 2 )

  • Passive attacks

– Hard to detect – Prevent

  • Active attacks

– Easier to detect – Hard to prevent – Detect - Recover

Release of message contents Traffic analysis Masquerade Replay Modification of message contents Denial of service

Passive threats Active threats

  • Threat – a potential violation of security
slide-10
SLIDE 10

Threat Analysis - A Successful Attack

  • 1. Identify the target and gather information
  • 2. Analyze the information and find a vulnerability
  • 3. Achieve sufficient access to the target
  • 4. Execute the attack
  • 5. Erase the traces of the attack and avoid retaliation
  • It is often enough to stop one of the step above
slide-11
SLIDE 11

Threat Analysis ( 2 )

  • Protection

– Physical security

  • Social engineering

– Virtual security – Trust model

  • Who you can trust and how much

– The life cycle of a system

  • Protect all stages of the life cycle
  • Detection
  • Reaction
slide-12
SLIDE 12

Policy and Mechanism

  • An example:

– Umeå University forbids copying some other student – A student sees that another student have not read protected his or hers files and copies them. – Is anyone (or both) violating security?

slide-13
SLIDE 13

Policy and Mechanism ( 2 )

  • Policy language?
  • Two cooperating entities?
  • Def. A security policy is a statement of what is,

and what is not, allowed.

  • Def. A security mechanism is a method, tool, or

procedure for enforcing a security policy.

  • Mechanisms can be nontechnical
slide-14
SLIDE 14

Security strategies

  • Different solutions to the same problem
  • Prevention

– Undefeatable mechanisms – Preventive mechanism are often a hinder

  • Detection

– Do not prevent compromises of the system

  • Recovery

– Stop an attack – Assess and repair any damage – Each attack is unique -> Recovery is complex – Function inhibiting recovery? – Retaliation?

slide-15
SLIDE 15

Assum ptions and Trust

  • “How does we determine if the policy correctly

describes the required level and type of security for the system?”

  • Security rests on assumptions
  • Policy and assumptions

– The policy divides the system in secure and non- secure states – The security mechanisms prevent the system from entering a non-secure state

slide-16
SLIDE 16

Assum ptions and Trust ( 2 )

  • Trusting that mechanisms work requires several

assumptions 1. Each mechanism is designed to implement one

  • r more parts of the security policy

2. The union of the mechanisms implements all aspects of the security policy 3. The mechanisms are implemented correctly 4. The mechanisms are installed and administered correctly

slide-17
SLIDE 17

Operational I ssues

  • Cost-Benefit analysis

– Depends on the mechanism chosen to implement a particular security service and on the mechanisms chosen to implement other security services – Adding security mechanism is more expensive than designing them into the system in the first place

slide-18
SLIDE 18

Operational I ssues

  • Risk analysis

– The level of protection is a function of the probability of an attack occurring and the effects

  • f the attack should it succeed

– Risk is a function of environment – The risks change with time – Many risks are quite remote but still exist, and ignoring them might make them more likely – Analysis paralysis – making risk analyses with no effort to act on those analyses

slide-19
SLIDE 19

Operational I ssues

  • Laws and customs

– Restrictions on availability and use of technology – Laws of multiple jurisdictions – Legal vs. acceptable practices – Psychological acceptability

slide-20
SLIDE 20

Hum an I ssues

  • Organizational problems

– Security provides no direct financial reward – Security controls often add complexity – Is security worth it? – Clear chains of responsibility and power – Which people are trained in security? – Lack of resources

slide-21
SLIDE 21

Hum an I ssues ( 2 )

  • People problems

– The heart of any security system is people

  • Insiders

– More access to resources – Careless/ untrained users and system administrators – Users that steal – Users assisting external attacks

  • Outsiders

– Social engineering

slide-22
SLIDE 22

Tying I t All Together

Threats Policy Specification Design Implementation Operation and Maintenance

slide-23
SLIDE 23

The Future

The world is never going to be perfect, either on- or offline; so let's not set impossibly high standards for online.

  • Esther Dyson