Exam 2 Review CS461/ECE422 Fall 2009 Exam guidelines Same as for - - PowerPoint PPT Presentation

exam 2 review
SMART_READER_LITE
LIVE PREVIEW

Exam 2 Review CS461/ECE422 Fall 2009 Exam guidelines Same as for - - PowerPoint PPT Presentation

Exam 2 Review CS461/ECE422 Fall 2009 Exam guidelines Same as for first exam A single page of supplementary notes is allowed 8.5x11. Both sides. Write as small as you like. Closed book No calculator or other widgets.


slide-1
SLIDE 1

Exam 2 Review

CS461/ECE422 Fall 2009

slide-2
SLIDE 2

Exam guidelines

 Same as for first exam  A single page of supplementary notes is allowed

− 8.5x11. Both sides. Write as small as you like.

 Closed book  No calculator or other widgets.  Students should show work on the exam. They

can use supplementary sheets of paper if they run out of room.

slide-3
SLIDE 3

Exam logistics

 Exam will be given during normal lecture time in

1310 DCL

 You will be given 50 minutes to complete the

exam.

slide-4
SLIDE 4

Topics

 Access Control  Data base security  Confidentiality and Integrity Policies and Models  Trusted Operating Systems  System Evaluation Frameworks  Trusted System Development  Malicious Code  Network Security Threats and Controls  Security Law

slide-5
SLIDE 5

Access control

 Access Control Matrix

− Common model for encoding protection state of

system

− HRU commands and the safety property

 Access Control Lists

− ACM by column − Unix and windows examples

 Did not address capabilities this semester  Did not address hardware based rings in this

lecture

slide-6
SLIDE 6

Database Security

 Access control model – Griffiths and Wade

model

− Basic relational model − No single owner of all data/privilege − Use “grant” to delegate privileges − Use view to shared restricted set of data − Revocation issues

 Integrity

− Transactions − Two phase commit

slide-7
SLIDE 7

Trusted Models and Policies

 Mandatory Access Control

− How does it differ from DAC

 Bell-LaPadula

− MLS – Confidentiality policy − Lattice of Security Labels, e.g., Security:{Proj1,

Proj2}

− Read down, write up − Basic Security Theorem − Tranquility

slide-8
SLIDE 8

Integrity Policies

 Biba models

− Low water mark – tries to preserve indirect

information flow constraints

− Ring policy – Like low water mark but doesn't

attempt to address indirect flows

− Strict – Dual of the BLP model

 Did not address this semester

− Lipner Matrix model − Clark Wilson

slide-9
SLIDE 9

Example Trusted OS

 Guest lecture by Paul McNabb  Reviewed common issues

− MLS and shared directories − Fine grained privileges − Constraining privileges − Labeling network data − Roles

slide-10
SLIDE 10

Evaluation Framework

 Covered TCSEC (Orange book) and Common

Criteria

 Assurance vs functionality requirements  TCSEC

− Fixed assurance and functionality evaluation levels

 Common Criteria

− Dynamic functionality profiles and fixed assurance

levels

slide-11
SLIDE 11

Design Principles

 Salzer and Schoeder's principles

− Understand and recognize application in systems

slide-12
SLIDE 12

Assurance

 Assurance is evidence that system meets

requirements

 Techniques for gathering evidence during

product life cycle

− Different types of assurance: policy, design,

implementation, operational

 Different development processes and how they

gather assurance

slide-13
SLIDE 13

Secure Software Design

 Security architecture as focus for tracking and

analyzing system security

− Security requirements

 Documentation and requirements tracing  Threat analysis

− Analyze design/code – identify entry points.

Develop data flow diagrams

− Identify threats − Build attack trees

 Security testing

slide-14
SLIDE 14

Malicious Code

 Types of malicious code

− Trojan programs − Rootkits − Virus

 Detection and virus evasion

− Worms

 Propagation techniques

− NetBots

slide-15
SLIDE 15

Common Implementation Flaws

 Buffer Overflow

− Stack smashing

 Incomplete Parameter Validation  Time of use to time of check  Covered a little bit on ethical hacking and

vulnerability research

slide-16
SLIDE 16

Network Security Concerns

 Review the network stack  Physical/Data link layer and CIA  Network Layer

− Routing − ARP − ICMP − Smurf

slide-17
SLIDE 17

Network Security Concerns

 Transport (UDP/TCP)

− Syn flood − Port scan − DHCP

 Application

− Spoofing − DNS

 Open relay

− Preferred server layout

 Cache poisoning

slide-18
SLIDE 18

Network Security Architecture

 Segmentation  Perimeters and domains  VPNs  Common network layout

− In, out, DMZ

slide-19
SLIDE 19

Network Security Controls

 Firewalls

− Application proxy − Packet filter − Stateful packet filter − NAT − Identify and firewalls

 Intrusion Detection

− Did not coverHoney pots − Mis-use/signature detection − Anomaly/statistical detection − IDS vs IPS

slide-20
SLIDE 20

Law and Security

 Different laws apply for service providers, law

enforcement, intelligence, war fighter

 Privacy

− 4th amendment − Wiretapping and ECPA − CALEA − FISA

slide-21
SLIDE 21

Law and Security

 Crime

− CFAA − Economic Espionage Act − International laws

 Cryptography and the law

 Did not cover the Computer Use slides this

semester

 (Did not cover the Intellectual property hidden

slides this semester)

slide-22
SLIDE 22

Good luck!