Introduction to Computer Security Cunsheng Ding HKUST, Hong Kong, - - PowerPoint PPT Presentation

introduction to computer security
SMART_READER_LITE
LIVE PREVIEW

Introduction to Computer Security Cunsheng Ding HKUST, Hong Kong, - - PowerPoint PPT Presentation

Introduction to Computer Security Cunsheng Ding HKUST, Hong Kong, CHINA cding@cs.ust.hk C. Ding - COMP4631 - L02 1 Outline of this Lecture A brief introduction to computer security A theoretical framework of computer security


slide-1
SLIDE 1
  • C. Ding - COMP4631 - L02

1

Introduction to Computer Security

Cunsheng Ding HKUST, Hong Kong, CHINA cding@cs.ust.hk

slide-2
SLIDE 2
  • C. Ding - COMP4631 - L02

2

  • A brief introduction to computer

security

  • A theoretical framework of computer

security

  • References on computer security

Outline of this Lecture

slide-3
SLIDE 3
  • C. Ding - COMP4631 - L02

3

A Brief Introduction of Computer Security

slide-4
SLIDE 4
  • C. Ding - COMP4631 - L02

4

  • Sources of threats to computer

security

  • Computer security aspects
  • Potential Solutions

Agenda of this Part

slide-5
SLIDE 5
  • C. Ding - COMP4631 - L02

5

Sources of Threats to Computer Security

  • Attackers on a computer system may

be “insiders” or “outsiders”.

  • Is outside threat more serious than

inside threat?

slide-6
SLIDE 6
  • C. Ding - COMP4631 - L02

6

Sources of Threats: Internal versus External

  • Is outside threat more serious than

insider threat?

– While the threat from outsiders is indeed as great as generally believed, the malicious insider with approved access to the system is an even greater threat! – Why?

slide-7
SLIDE 7
  • C. Ding - COMP4631 - L02

7

Sources of Threats to Computer Security

  • Various surveys, with results of order

(Why?)

– human error

  • For example, system administrator and users

compromised password incidentally.

– disgruntled (discontented) employees – dishonest employees – outsider access

slide-8
SLIDE 8
  • C. Ding - COMP4631 - L02

8

Insider Threat to Computer Security (1)

  • Unauthorized entry into any

compartmented computer system.

  • Unauthorized searching/browsing through

classified computer libraries.

  • Unauthorized modification, destruction,

manipulation, or denial of access to information residing on a computer system.

slide-9
SLIDE 9
  • C. Ding - COMP4631 - L02

9

Insider Threat to Computer Security (2)

  • Storing or processing classified

information on any system not explicitly approved for classified processing.

  • Attempting to circumvent or defeat

security or auditing systems, without prior authorization from the system administrator.

  • Any other willful violation of rules for the

secure operation of your computer network.

slide-10
SLIDE 10
  • C. Ding - COMP4631 - L02

10

Outsider Threat to Computer Security (1)

In addition to foreign intelligence services, your computer network is at risk from many other types of outsiders.

  • Freelance information brokers.
  • Foreign or domestic competitors.
  • Military people from adversary nations who

are developing the capability to use the Internet as a military weapon.

slide-11
SLIDE 11
  • C. Ding - COMP4631 - L02

11

Outsider Threat to Computer Security (2)

  • Terrorist organizations for which
  • rganized hacking offers the potential for

low cost, low risk, but high gain actions.

  • Crime syndicates and drug cartels.
  • Hobbyist hackers who penetrate your

system for sport or to do malicious damage.

  • Common thieves who specialize in stealing

and reselling laptop computers.

slide-12
SLIDE 12
  • C. Ding - COMP4631 - L02

12

Users Hackers Terrorists Criminals Issue Motivated Groups Foreign Intelligence || || || \/ Destroy Disrupt Modify Disclose

Threats in Summary

slide-13
SLIDE 13
  • C. Ding - COMP4631 - L02

13

Computer Security Aspects

  • Personnel (human aspect => identification + auth.)
  • Physical (machines => access control to rooms)
  • Managerial (administration => security education)
  • Data security
  • Networking security
  • Software security
  • Operating systems security
  • Hardware security
  • Communication security
slide-14
SLIDE 14
  • C. Ding - COMP4631 - L02

14

Potential Security Solutions

  • Personnel - Access Tokens, Biometrics
  • Physical - Integrated Access Control
  • Managerial - Security Education
  • Data Networking - Configuration control
  • S/W & O/S - use "Trusted" systems

– E.g., Use the logon screen provided by the OS

  • H/W - h/w handshake (not covered in this

course)

slide-15
SLIDE 15
  • C. Ding - COMP4631 - L02

15

Assets in a Computer System

  • Hardware
  • Software
  • Documentation
  • Data
  • Communications
  • People
slide-16
SLIDE 16
  • C. Ding - COMP4631 - L02

16

slide-17
SLIDE 17
  • C. Ding - COMP4631 - L02

17

Countermeasures

A check or restraint is implemented to:

  • Reduce threat (firewalls)
  • Reduce vulnerability (biometrics auth.)
  • Reduce impact (backup data)
  • Detect a hostile event (intrusion detect.)
  • Recover from an event (software backup)
slide-18
SLIDE 18
  • C. Ding - COMP4631 - L02

18

A Theoretical Framework

  • f Computer Security

After giving a brief introduction to computer security, we now present:

slide-19
SLIDE 19
  • C. Ding - COMP4631 - L02

19

Agenda of this Part

  • Search for a definition of computer

security

  • Propose fundamental design principles

for computer security

slide-20
SLIDE 20
  • C. Ding - COMP4631 - L02

20

What is security?

  • Prevention: taking measures that prevent

your assets from being damaged.

  • Detection: taking measures that allow you

to detect when, how, and by whom an asset has been damaged.

  • Reaction: taking measures that allow you to

recover your assets or to recover from a damage to your assets.

slide-21
SLIDE 21
  • C. Ding - COMP4631 - L02

21

Example 1 - Private Property

  • Prevention: locks at doors, window

bars, walls round the property.

  • Detection: burglar alarms, closed

circuit TV.

  • Reaction: calling the police, replace

stolen items, make an insurance claim.

slide-22
SLIDE 22
  • C. Ding - COMP4631 - L02

22

Example 2 - eCommerce

  • Prevention: use encryption when

placing orders, rely on the merchant to perform checks on the caller.

  • Detection: an unauthorized

transaction on your credit card statement

  • Reaction: complain, ask for a new card

number, etc.

slide-23
SLIDE 23
  • C. Ding - COMP4631 - L02

23

Prevention Aspects

  • Confidentiality: preventing

unauthorized disclosure of information

  • Integrity: preventing unauthorized

modification of information

  • Availability: preventing unauthorized

with-holding of information or resources

slide-24
SLIDE 24
  • C. Ding - COMP4631 - L02

24

Confidentiality (Prevention)

  • Prevent unauthorized disclosure of

information (prevent unauthorized reading)

  • Question: How to achieve

confidentiality?

– Encryption (cryptography)

slide-25
SLIDE 25
  • C. Ding - COMP4631 - L02

25

Integrity (Prev. + Det.)

  • No unauthorized and malicious

alteration or destruction of data or software stored in computer.

  • Question: How do we check data

integrity?

– Cryptography

slide-26
SLIDE 26
  • C. Ding - COMP4631 - L02

26

Integrity (Prev. + Det.) ctd.

  • Software integrity is crucial for

computer security.

  • Integrity is a prerequisite for many
  • ther security services.
  • Operating systems security has a lot

to do with integrity.

slide-27
SLIDE 27
  • C. Ding - COMP4631 - L02

27

Availability (Prevention)

  • Availability: The property of being

accessible and usable upon demand by an authorized entity

– Email service

  • Denial of Service: The prevention of

authorized access of resources or the delaying of time-critical operations

– DoS attacks on an email server

  • Availability may be the most important aspect of

computer security, but there are few methods.

slide-28
SLIDE 28
  • C. Ding - COMP4631 - L02

28

Accountability (Detection)

  • Accountability: audit information must be

selectively kept and protected so that actions affecting security can be traced to the responsible party. E.g., “su” command in Unix

  • Users are identified and authenticated to have a

basis for access control decisions.

– ID + Password: Students and professors have different access rights

  • The security system keeps an audit log (audit

trail) of security relevant events to detect and investigate intrusions.

slide-29
SLIDE 29
  • C. Ding - COMP4631 - L02

29

The main conclusion

  • There is no single definition of security
  • When reading a document, be careful not

to confuse your own notion of security with that used in the document.

  • Our definition: computer security deals

with the prevention and detection of unauthorized actions by users of a computer system.

slide-30
SLIDE 30
  • C. Ding - COMP4631 - L02

30

Principles of Computer Security

The Dimensions of Computer Security

Application Software User (subject) Hardware Resource (object)

slide-31
SLIDE 31
  • C. Ding - COMP4631 - L02

31

1st Fundamental Design Decision

What is the focus of security controls?

  • Integrity follows a given set of rules on

1) the format and content of data items

  • 2) the operations that may be performed on a data item
  • 3) the users who are allowed to access a data item

(authorized access)

  • Security controls can focus on
  • 1) data
  • 2) operations
  • 3) users
slide-32
SLIDE 32
  • C. Ding - COMP4631 - L02

32

2nd Fundamental Design Decision

Where to place security controls? hardware applications services (middleware)

  • perating system

OS kernel Man end Machine end

slide-33
SLIDE 33
  • C. Ding - COMP4631 - L02

33

The Man-Machine Scale

  • Security mechanisms can be visualized as

concentric protection rings, with hardware mechanisms in the center and application mechanisms at the outside.

H/W OS H.W. OS kernel OS Services Applications The Onion model of protection mechanisms

slide-34
SLIDE 34
  • C. Ding - COMP4631 - L02

34

The Man-Machine Scale

  • Mechanisms towards the center tend to be more

generic while mechanisms at the outside are more likely to address individual user requirements

H/W OS H.W. OS kernel OS Services Applications

slide-35
SLIDE 35
  • C. Ding - COMP4631 - L02

35

The Man-Machine Scale

  • Combining our first two design decisions,

we refer to a man-machine scale for security mechanisms.

slide-36
SLIDE 36
  • C. Ding - COMP4631 - L02

36

The Man-Machine Scale

specific complex focus on users generic simple focus on data man

  • riented

machine

  • riented
slide-37
SLIDE 37
  • C. Ding - COMP4631 - L02

37

3rd Fundamental Design Decision

complexity vs assurance

  • Frequently, the location of a security mechanism on

the man-machine scale is related to its complexity.

– If it is put at the application layer, then it is usually more complex (it can provide a higher level of security). – If it is put in the center, it is simpler and generic, but may not provide a higher level of security.

  • You find simple generic mechanisms, while applications
  • ften clamor for feature-rich security functions.

– “IPSec” can provide security for many types of data, including email data, and is thus generic. But “PGP” can provide the “sender nonrepudiation” security service.

  • The fundamental dilemma: simple generic mechanisms

may not match specific security requirements. [Shirt design problem]

slide-38
SLIDE 38
  • C. Ding - COMP4631 - L02

38

Security Evaluation (1)

  • Security evaluation checks whether a

product delivers a promised security

  • service. We have to state

1) the function of the security system 2) the required degree of assurance (trust) in its security

  • To achieve a high degree of assurance, the

security system has to be examined exhaustively and in close detail.

slide-39
SLIDE 39
  • C. Ding - COMP4631 - L02

39

Security Evaluation (2)

  • There is an obvious trade-off between

complexity and assurance.

  • Usually, a very secure system must be complex

enough.

  • Simplicity and high assurance do not match

easily.

  • A simple security mechanism may not provide

the required security level and security features.

  • A complex security mechanism may not be

secure if it is not well designed.

slide-40
SLIDE 40
  • C. Ding - COMP4631 - L02

40

4th Fundamental Design Decision

centralized or decentralized controls?

  • Within the domain of a security policy, the

same controls should be enforced.

  • If a single entity is in charge of security,

then it is easy to achieve uniformity, but this central entity may become a performance bottleneck.

  • A distributed solution may be more

efficient but you have to take added care to guarantee that different components enforce a consistent policy.

slide-41
SLIDE 41
  • C. Ding - COMP4631 - L02

41

4th Fundamental Design Decision

centralized or decentralized controls?

Question:

  • Should the tasks of defining and enforcing

security be given to a central entity or should they be left to individual components in a system?

slide-42
SLIDE 42
  • C. Ding - COMP4631 - L02

42

5th Fundamental Design Decision

blocking access to the layer below

  • Every protection mechanism defines a security

perimeter (boundary).

  • Attackers may bypass protection mechanisms at

some layer.

  • How do you stop an attacker from getting access

to a layer below your protection mechanism?

  • Example: You just arrived at a hotel with 900

security guards who stand around it. One may carry out a tunnel attack which bypass the protection.

slide-43
SLIDE 43
  • C. Ding - COMP4631 - L02

43

The Layer Below - Example

  • Recovery tools, like Norton Utilities,

restore the data by reading memory directly and then restoring the file structure.

  • Such a tool can be used to circumvent

logical access control as it does not care for the logical memory structure.

slide-44
SLIDE 44
  • C. Ding - COMP4631 - L02

44

The Layer Below - Example

  • Unix treats I/O devices and physical

memory devices like files.

  • If access permissions are defined badly,

e.g. if read access is given to a disk containing read protected files, then an attacker can read the disk contents and reconstruct the files.

slide-45
SLIDE 45
  • C. Ding - COMP4631 - L02

45

The Layer Below - example

  • Object reuse: in a single processor system,

when a new process becomes active, it gets access to memory positions used by the previous process.

  • You have to avoid storage residues, i.e.

data left behind in the memory area allocated to the new process.

slide-46
SLIDE 46
  • C. Ding - COMP4631 - L02

46

The Layer Below - Example

  • Backup: whoever has access to a backup

tape has access to all the data on it.

  • Logical access control is of no help and

backup tapes have to be locked away safely to protect the data.

slide-47
SLIDE 47
  • C. Ding - COMP4631 - L02

47

Books on Computer Security

  • C.P. Pfleeger: Security in Computing, Prentice-Hall,

1997

  • E. Amoroso: Fundamentals of Computer Security

Technology, Prentice-Hall, 1994

  • Ernst & Young: Logical Access Control, McGraw-

Hill, 1993

  • M. Gasser: Building a Secure Computer System.

Van Nostrand Reinhold, 1988

  • D. Gollmann: Computer Security, Wiley & Sons,

1999