Lecture 1: Introduction and Overview January 4, 2011 Lecture 1, - - PowerPoint PPT Presentation

lecture 1 introduction and overview
SMART_READER_LITE
LIVE PREVIEW

Lecture 1: Introduction and Overview January 4, 2011 Lecture 1, - - PowerPoint PPT Presentation

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Lecture 1: Introduction and Overview January 4, 2011 Lecture 1, Slide 1 ECS 235B, Foundations of Information and Computer Security January 4, 2011


slide-1
SLIDE 1

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Lecture 1: Introduction and Overview

January 4, 2011

Lecture 1, Slide 1 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-2
SLIDE 2

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

1 About This Course 2 Basic Components

Confidentiality, Integrity, Availability Threats

3 Policy and Mechanism

Policy and Mechanism Goals of Security

4 Assurance

Trust and Assumptions Assurance

5 Practical Issues

Lecture 1, Slide 2 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-3
SLIDE 3

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Goals of the Course

What can security decide, and what can it not decide? Policy models: what can systems and people do, and what can they not do? Information flow: how can information move around a system?

Lecture 1, Slide 3 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-4
SLIDE 4

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Confidentiality, Integrity, Availability

Confidentiality

What it is

Concealing information, resources May hide attributes (including existence) of data as well as content May hide resources to keep others from using them

How to do this

Cryptography File access controls Other access controls (e.g., firewalls)

Lecture 1, Slide 4 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-5
SLIDE 5

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Confidentiality, Integrity, Availability

Confidentiality Example

Example: protecting a tax return on a PC Tax return is enciphered, so it cannot be read directly If owner has the cryptographic key, she can read it by deciphering the tax return So can anyone who has that cryptographic key If someone can rig the decryption program to send them the decryption key, that also compromises the tax return

Lecture 1, Slide 5 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-6
SLIDE 6

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Confidentiality, Integrity, Availability

Integrity

What it is

Has the data been altered without authorization, or in unauthorized ways? Is the data credible (trustworthy)

Types of integrity

Data integrity (contents) Origin integrity (source, authentication)

Example: database transaction

If interrupted, may leave database in an inconsistent state

Much harder to quantify than confidentiality

Lecture 1, Slide 6 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-7
SLIDE 7

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Confidentiality, Integrity, Availability

Integrity Example

Example: government leaking Newspaper prints information leaked to it from White House, attributing it to wrong source Data integrity: preserved, as information printed as received Origin integrity: corrupt, as source is mis-attributed Data trustworthiness: depends . . .

Lecture 1, Slide 7 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-8
SLIDE 8

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Confidentiality, Integrity, Availability

Availability

What it is

Ability to use information or resource desired Key part of reliability as well as security

Most models based on statistics, so assume a predicted pattern of use overall

Attackers change the pattern of use, so the model no longer applies Mechanisms providing availability not designed for changed environment—and fail

Lecture 1, Slide 8 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-9
SLIDE 9

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Confidentiality, Integrity, Availability

Availability Example

Example: compromising a bank Anne controls secondary server that supplies bank balances for credit cards Anne blocks access to primary server, so requests sent to secondary server Anne supplies any balance she likes, ensuring none of her purchases is declined

Lecture 1, Slide 9 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-10
SLIDE 10

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Threats

Threats

A potential violation of security Actions that could cause it to occur are attacks Four classes of threats

Disclosure: unauthorized access to information Deception: acceptance of false data Disruption: interruption or prevention of correct operation Usurpation: unauthorized control of some part of a system

Lecture 1, Slide 10 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-11
SLIDE 11

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Threats

Common Threats and Their Classes

Snooping, passive wiretapping: disclosure Modification, active wiretapping: deception, disruption, usurpation Masquerading, spoofing: deception, usurpation

Delegation: a legitimate form of masquerading

Repudiation of origin: deception Denial of receipt: deception Delay, denial of service: usurpation, may support deception

Lecture 1, Slide 11 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-12
SLIDE 12

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Policy and Mechanism

Policy and Mechanism

Policy says what is, and is not, allowed

This defines “security” for the site/system/etc.

Mechanisms enforce the policy Policy composition: if they conflict, the discrepancies may create security vulnerabilities

Lecture 1, Slide 12 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-13
SLIDE 13

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Policy and Mechanism

Expressions

Policy expression

Natural language: usually imprecise, but easy to understand Mathematics: usually precise but hard to understand Policy languages: look like some form of programming language and try to balance precision with ease of understanding

Mechanisms

Technical: controls in the computer enforce the policy

Require the user supply a password to authenticate herself before using the computer

Procedural: controls outside the system enforce the policy

Require the firing of someone who beings in a disk containing a game program obtained from an untrusted source

Lecture 1, Slide 13 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-14
SLIDE 14

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Goals of Security

Goals of Security

Prevention: the attack will fail Detection: the attack will be identified

Appropriate when the attack cannot be prevented Appropriate to check effectiveness of preventative measures

Recovery: return system to correct functioning during (or after) attack

First form: stop attack, assess and repair damage from that attack Second form: continue to function correctly during the attack (“attack tolerant”)

Lecture 1, Slide 14 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-15
SLIDE 15

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Trust and Assumptions

Trust and Assumptions

Underlie all aspects of security What happens if assumptions incorrect?

Key needed to open a door lock ⇒ lock cannot be picked Good lock picker can pick a lock Consequent false, therefore antecedent (assumption) false

Lecture 1, Slide 15 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-16
SLIDE 16

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Trust and Assumptions

Example Assumptions

Assumptions policies make

Unambiguously partition system states Correctly capture security requirements

Assumptions mechanisms make

Correctly implemented Support tools (libraries, operating system services, etc.) work correctly Installed, administered correctly Union of mechanisms implements all aspects of security policy

Lecture 1, Slide 16 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-17
SLIDE 17

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Trust and Assumptions

Types of Mechanisms

secure precise broad set of reachable states set of secure states

Lecture 1, Slide 17 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-18
SLIDE 18

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Assurance

Assurance

How much to trust a system, based on evidence obtained from specification, design, implementation, and operation Assurance based on assurance evidence gathered during analysis Assurance evidence provides a basis for assessing what one must trust in order to believe system is secure Assurance does not guarantee correctness or security

Lecture 1, Slide 18 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-19
SLIDE 19

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Assurance

Example: Aspirin

Aspirin sold in safety-sealed container

Testing, certification of drugs by FDA Manufacturing standards of company and precautions it takes to prevent contamination

In 980s, technologies above considered sufficient to provide assurance evidence that aspirin not contaminated

Then someone contaminated the aspirin after manufacture but before consumer purchase

Evidence no longer deemed sufficient sufficient

Safety seal on bottle added in 1980s to prevent introduction of harmful chemicals as happened above

Assurance evidence then considered sufficient

Lecture 1, Slide 19 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-20
SLIDE 20

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Assurance

Phases

Specification: statement of desired functioning of system

Need to meet requirements (requirements assurance) Specification may be formal or informal Statement of functionality, not assurance

Design: translates specification into components that will implement the specification

Need to prove design satisfies specification (design assurance) Design can be given in many ways (mathematics, pseudocode, etc.) Typically, system treated as layers of abstraction, and then components of layers, and interfaces between layers, designed

Lecture 1, Slide 20 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-21
SLIDE 21

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Assurance

Phases

Implementation: creates a system that satisfies the design Problem is to prove implementation satisfies design (and, by transitivity, specification) Approach

Specify preconditions, postconditions for each line of code Build function preconditions, postconditions from those of lines

  • f code

Derive preconditions, postconditions for programs from these Verify all preconditions hold and all postconditions satisfy design

Lecture 1, Slide 21 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-22
SLIDE 22

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Assurance

Phases

Problems with mathematical implementation assurance Problem is to prove implementation satisfies design (and, by transitivity, specification) Very difficult and time-consuming to do mathematically

Complexity of programs and environments makes any preconditions subtle Assumption is that implementation is correctly compiled, linked, loaded, and libraries and supporting infrastructure is correct If preconditions require specific forms or values in input, programs must check that the input conforms to the preconditions

Lecture 1, Slide 22 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-23
SLIDE 23

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues Assurance

Phases

Problems with mathematical implementation assurance Problem is to prove implementation satisfies design (and, by transitivity, specification) Very difficult and time-consuming to do mathematically

Complexity of programs and environments makes any preconditions subtle Assumption is that implementation is correctly compiled, linked, loaded, and libraries and supporting infrastructure is correct If preconditions require specific forms or values in input, programs must check that the input conforms to the preconditions

Lecture 1, Slide 23 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-24
SLIDE 24

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Operational Issues: Cost-Benefit Analysis

Balance benefit of security against its cost Analysis rarely clear-cut as benefits overlap and calculating cost, benefits involves judgement and guesswork Benefits may overlap, complicating the calculations

Lecture 1, Slide 24 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-25
SLIDE 25

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Operational Issues: Risk Analysis

What is the probability that the threat will materialize? Risk is a function of environment, and changes with time

Computer system not connected to Internet has one set of risks, generally local Add a network connection and the risks change

“Analysis paralysis”, where risk analysis made but not acted upon

Lecture 1, Slide 25 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-26
SLIDE 26

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Operational Issues: Laws and Customs

Constrain availability, use of technology, procedures

Country X makes reading another’s email illegal Attackers break in by compromising mail system Sysadmins gathering evidence look in mailbox—now they are criminals too!

Systems in multiple jurisdictions complicate how they are (can be) used

Country A requires encryption keys to be registered with police A multinational corporation has offices in Country A Key and message management messy!

That which is legal may be completely unacceptable

Lecture 1, Slide 26 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-27
SLIDE 27

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Human Issues: Organizational Problems

Security a supportive service (no direct benefit, especially not financial) Who is responsible for security—and do they have the power to implement needed controls?

Often lack of people knowledgeable in security Security considered something “additional” to other work rather than job in itself Lack of resources for developing, implementing, acquiring security mechanisms

Lecture 1, Slide 27 ECS 235B, Foundations of Information and Computer Security January 4, 2011

slide-28
SLIDE 28

Outline About This Course Basic Components Policy and Mechanism Assurance Practical Issues

Human Issues: People Problems

People at the heart of every security system Security controls won’t block unauthorized user who knows your login and password People trusted with access (insiders) who betray that trust difficult to thwart

Just look at the Wikileaks messages . . . Untrained people also a threat

Social engineering

Lecture 1, Slide 28 ECS 235B, Foundations of Information and Computer Security January 4, 2011