CSCI E-170 Lecture 02: Physical Security and Information Leakage Simson L. Garfinkel
Center for Research on Computation and Society Harvard University September 26, 2005
1
CSCI E-170 Lecture 02: Physical Security and Information Leakage - - PowerPoint PPT Presentation
CSCI E-170 Lecture 02: Physical Security and Information Leakage Simson L. Garfinkel Center for Research on Computation and Society Harvard University September 26, 2005 1 Todays Outline: 1. LiveJournal 2. HW1 and HW2 3. Readings 4.
Center for Research on Computation and Society Harvard University September 26, 2005
1
2
3
HARVARD UNIVERSITY
FACULTY OF ARTS AND SCIENCES
DIVISION OF CONTINUING EDUCATION
Authorization and Release Form for Video and Television
I will be a speaker or a student in [name
semester of 200_ at Harvard University - Division of Continuing Education. I authorize Harvard, and anyone that Harvard may permit, to film, videotape, audio record, and photograph me during my class participation in the course for subsequent broadcast or other dissemination in perpetuity through any media, which includes, without limitation,commercial and public radio and television, cable, and the Internet. I understand that signing this Authorization and Release Form is not a requirement for participating in the class. I further understand that I will not receive a copy of any film, videotape, audio recording, photograph, or computer file that is or may be produced. I hereby acknowledge that I have signed this release voluntarily as an instrument under seal on this day of [month], 200 . Signature Print Name S:dlagreements\authorization00.202
51 BRATTLE STREET CAMBRIDGE, MASSACHUSETTS 02138-3722
4
5
6
Master-Keyed Mechanical Locks.” March 2003. IEEE Security and Privacy. March/April 2003.
Transmissions Using Electromagnetic Emanations,” David Aucsmith (Ed.): Information Hiding 1998, LNCS 1525, pp. 124-142, 1998.
Displays, Proceedings 2002 IEEE Symposium on Security and Privacy, 12-15 May 2002, Berkeley, CA., pp. 3-18.
Sanitization Practices,” IEEE Security and Privacy, January 2003.
7
8
9
10
11
12
13
14
15
16
500 1, 000 1, 500 2, 000 2, 500 Megabytes Data in the file system (level 0) Data not in the file system (level 2 and 3) No Data (blocks cleared)
17
18
19
20
21
22
23
Do not forget data when power is removed. Contain data that is not immediately visible. Today’s computers can read hard drives that are 15 years old!
(FAT16/32 file systems)
24
25
26
27
28
29
30
31
32
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
33
34
– File Contents – File Directory Entry – Bookkeeping
b1______.___ jan 1 2004 block 7 b2______.___ jan 1 2004 block 14
35
– New root directory – Bookkeeping
?1______.___ jan 1 2004 block 7 ?2______.___ jan 1 2004 block 14
36
– New root directory – madonna.mp3 – Bookkeeping
Madonna_.mp3 jan 2 2004 block 7 ?2______.___ jan 1 2004 block 14
/mp3 /?2 0
37
/mp3 /?2 0
38
39
40
41
42
43
44
– Your hard disk won’t work after it’s been degaussed (why not?)
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
used PC with pharmacy records [Markoff 97]
“thousands of files” on state employees [Villano 02]
by his bank [Leyden 04]
63
64
65
User Audit
Visibility
Users
Sanitization
Document Files, Applications, and Media
Users Complete Delete
Delayed Unrecoverable Action
Reset to Installation Explicit Item Delete
66
present on drives.
actually remove data. [Bauer & Priyantha 01]
data recovery.
[Whitten 04]
[FTC 05, SEC 05]
67
usr bin ls cp mv tmp slg / b a mail junk beth
68
usr bin ls cp mv tmp slg / b a mail junk beth x5 x4 x3 x2 x1 x6 x7 x8
69
usr bin ls cp mv tmp slg / b a mail junk beth x5 x4 x3 x2 x1 x6 x7 x8
70
usr bin ls cp mv tmp slg / b a mail junk beth x5 x4 x3 x2 x1 x6 x7 x8
.
71
. .
time
72
. .
time
73
. .
time
74
. .
time
75
. .
time
76
. .
time
77
. . time
78
500 1, 000 1, 500 2, 000 2, 500 Megabytes Data in the file system (level 0) Data not in the file system (level 2 and 3) No Data (blocks cleared)
79
80
81
82
83
for organization
inside the organization
human subjects work
06/19/1999 /:dir216/Four H Resume.doc 03/31/1999 /:dir216/U.M. Markets & Society.doc 08/27/1999 /:dir270/Resume-Deb.doc 03/31/1999 /:dir270/Deb-Marymount Letter.doc 03/31/1999 /:dir270/Links App. Ltr..doc 08/27/1999 /:dir270/Resume=Marymount U..doc 03/31/1999 /:dir270/NCR App. Ltr..doc 03/31/1999 /:dir270/Admissions counselor, NCR.doc 08/27/1999 /:dir270/Resume, Deb.doc 03/31/1999 /:dir270/UMUC App. Ltr..doc 03/31/1999 /:dir270/Ed. Coordinator Ltr..doc 03/31/1999 /:dir270/American College ...doc 04/01/1999 /:dir270/Am. U. Admin. Dir..doc 04/05/1999 /:dir270/IR Unknown Lab.doc 04/06/1999 /:dir270/Admit Slip for Modernism.doc 04/07/1999 /:dir270/Your Honor.doc
84
85
✔ Home computer; woman’s son took to “PC Recycle” ✔ Community college; no procedures in place ✔ Church in South Dakota; administrator “kind of crazy” ✔ Auto dealership; consultant sold drives he “upgraded” ✔ Home computer, financial records; same consultant
86
✔ California electronic manufacturer ✔ Supermarket credit-card processing terminal ✔ ATM machine from a Chicago bank
87
✔ Bankrupt Internet software developer ✔ Layoffs at a computer magazine
88
✘ Bankrupt biotech startup ✘ Another major electronics manufacturer ✘ Primary school principal’s office ✘ Mail order pharmacy ✘ Major telecommunications provider ✘ Minnesota food company ✘ State Corporation Commission
89
User Audit
Visibility
Users
Sanitization
Document Files, Applications, and Media
Users Complete Delete
Delayed Unrecoverable Action
Reset to Installation Explicit Item Delete
90
Sanitization
Document Files, Applications, and Media
Users Complete Delete
usr bin ls cp mv tmp slg / b a mail junk beth usr bin ls cp mv tmp slg / b a mail junk beth x5 x4 x3 x2 x1 x6 x7 x8
91
Sanitization
Document Files, Applications, and Media
Users
Delayed Unrecoverable Action
Complete Delete
92
Sanitization
Document Files, Applications, and Media
Users
Delayed Unrecoverable Action
Complete Delete Explicit Item Delete
93
Sanitization
Document Files, Applications, and Media
Users
Delayed Unrecoverable Action
Complete Delete Reset to Installation Explicit Item Delete
Reset/reinstall functionality is common (Windows; PalmOS; etc.). This pattern framework clarifies Reset’s security property.
94
User Audit
Visibility
Users
usr bin ls cp mv tmp slg / b a mail junk beth
95
96
containing the names of Iranians who helped with the 1953 coup. [Young 00]
report” containing embarrassing redacted
journalists that revealed its Linux legal
UNCLASSIFIED TABLE OF CONTENTS
AND TRAINING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 i UNCLASSIFIED
97
User Audit
Users
Document Files, Applications, and Media
Users
Delayed Unrecoverable Action
Complete Delete Reset to Installation Explicit Item Delete
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113