1
CSCI 8260– Spring 2016 Computer and Networks Security
INTRODUCTION
CSCI 8260 Spring 2016 Computer and Networks Security INTRODUCTION - - PowerPoint PPT Presentation
CSCI 8260 Spring 2016 Computer and Networks Security INTRODUCTION 1 Research in Computer Security Studies in what ways security mechanisms may fail Can we gain access to a computer system without authorizaDon? Can we compromise
1
INTRODUCTION
3
4
5
permission to U1
6
7 Alice logs into her workstaDon Alice accesses HR dtabaset Alice reads employee informaDon file (e.g., salary info) Alice closes file and logs
Alice shares employee file
8 Alice logs into her workstaDon Alice accesses HR dtabaset Alice reads employee informaDon file (e.g., salary info) Alice closes file and logs
Alice sends file to colleague in another branch via email Security Breach?
9
Integrity Confidentiality Availability
Authentication Authorization
10
11 encrypt decrypt ciphertext
plaintext
shared secret key shared secret key
Communica6on channel Sender Recipient A1acker (eavesdropping)
plaintext
12
13 encrypt hide
14
– something the person has (like a smart card or a radio key fob storing secret keys), – something the person knows (like a password), – something the person is (like a human with a fingerprint).
15
Something you are Something you know Something you have radio token with secret keys password=ucIb()w1V mother=Jones pet=Caesar human with fingers and eyes
16
contents of a file to a numerical value. A checksum funcDon depends on the enDre contents of a file and is designed in a way that even a small change to the input file (such as flipping a single bit) is highly likely to result in a different output value.
small changes can be easily detected and automaDcally corrected.
17
18
h
Communica6on channel Sender Recipient A1acker modifies M
Hash
6B34339
message M’
h
87F9024
message M
Attack Detected!
19
20
Authenticity Anonymity Assurance
– Policies, which specify behavioral expectaDons that people or systems have for themselves and others.
describe how users can access and copy songs.
– Permissions, which describe the behaviors that are allowed by the agents that interact with a person or system.
and copying to people who have purchased certain songs.
– Protec6ons, which describe mechanisms put in place to enforce permissions and polices.
prevent people from unauthorized access and copying of its songs.
21 Microsoft Security Development Lifecycle
22
23
Policies Mechanisms Assurance Statement of requirements Define security expectations Security modules designed and implemented to enforce the policies Provides evidence that mechanisms meet the requirements stated in the policies
24
25
26
27
abributable to any individual
– Aggrega6on: the combining of data from many individuals so that disclosed sums or averages cannot be Ded to any individual. – Mixing: the intertwining of transacDons, informaDon, or communicaDons in a way that cannot be traced to any individual. – Proxies: trusted agents that are willing to engage in acDons for an individual in a way that cannot be traced back to that person.
– Pseudonyms: ficDonal idenDDes that can fill in for real idenDDes in communicaDons and transacDons, but are otherwise known only to a trusted enDty.
– Good use: anD-censorship – Bad use: abacks
28 You
29
Attack and Intrusion often used interchangeably!
30
31 encrypt decrypt ciphertext C shared secret key plaintext M plaintext M′ shared secret key
Communica6on channel Sender Recipient A1acker (intercepting)
ciphertext C′
32
33
34
Public domain image from http://commons.wikimedia.org/wiki/File:Plastic_eraser.jpeg
35
36
37
38
39
40
41
42 encrypt decrypt ciphertext
plaintext
shared secret key shared secret key
Communica6on channel Sender Recipient A1acker (eavesdropping)
plaintext
43
44
45
Public domain image from http://commons.wikimedia.org/wiki/File:Caesar3.svg
46 encrypt decrypt ciphertext
plaintext
shared secret key shared secret key
Communica6on channel Sender Recipient A1acker (eavesdropping)
plaintext
47
shared secret shared secret shared secret shared secret shared secret shared secret
48
49
encrypt decrypt ciphertext
plaintext
public key private key
Communica6on channel Sender Recipient A1acker (eavesdropping)
plaintext plaintext
50
private private private private public public public public
51
52
53
(a1ack detected) =?
MAC
h shared secret key
Communica6on channel Sender Recipient A1acker (modifying)
MAC
6B34339 4C66809 4C66809
message M’
h shared secret key
87F9024
received MAC computed MAC message M
54
55
Butch:ASDSA 21QW3R50E ERWWER323 … … hash function Dog124
Butch:ASDSA 21QW3R50E ERWWER323 … … hash function Dog124 https://www.owasp.org/index.php/Password_Storage_Cheat_Sheet
protect(user,password) { return [user_salt] + H([sys_key], [user_salt] + [password]); }
[root@uga ~]# cat /etc/shadow
root:$1$Txg2ExAZ$G9NTP7omsdhKI12aBMqng1:1565:0:99999:4:::
Format = user : $ hash function ID $ user_salt $ hash(psw+user_salt) : expiration info …
58
59
60
61
62
63
64
1/25/16 Introduction 65
1/25/16 Introduction 66
67
68
69 /etc/passwd /usr/bin/ /u/roberto/ /admin/ root: r,w,x backup: r,x root: r,w,x roberto: r,w,x backup: r,x root: r,w,x mike: r,x roberto: r,x backup: r,x root: r,w mike: r roberto: r backup: r
70 /etc/passwd: r,w,x; /usr/bin: r,w,x; /u/roberto: r,w,x; /admin/: r,w,x root /usr/passwd: r; /usr/bin: r; /u/roberto: r,w,x roberto /usr/passwd: r; /usr/bin: r,x mike backup /etc/passwd: r,x; /usr/bin: r,x; /u/roberto: r,x; /admin/: r,x
71
72 Department Member AdministraDve Personnel Accountant Secretary AdministraDve Manager Faculty Lab Technician Lab Manager Student Undergraduate Student Graduate Student Department Chair Technical Personnel Backup Agent System Administrator Undergraduate TA Graduate TA
– Groups:
– Roles:
– E.g., log-in as Roberto-admin, or Roberto-faculty
– E.g., different password for different roles
roles
– Least privilege principle! – E.g., prevent ‘rm –rf /’ from working when logged-in as ‘faculty’
73
74
Economy of mechanism Fail-safe defaults Complete mediaDon Open design SeparaDon
Least privilege Least common mechanism
Psychological acceptability
Work factor Compromis e recording
“The protection of information in computer systems” (1975) http://www.acsac.org/secshelf/papers/protection_information.pdf
75
76
77
78
79
80
81
the remote system
82
physical terminal
83
84