lecture 1
play

Lecture #1 Course overview Basics of security Access control - PowerPoint PPT Presentation

Lecture #1 Course overview Basics of security Access control matrix Primitive operations and commands Miscellaneous points January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-1 Matt Bishop, UC Davis Course Overview:


  1. Lecture #1 • Course overview • Basics of security • Access control matrix • Primitive operations and commands • Miscellaneous points January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-1 Matt Bishop, UC Davis

  2. Course Overview: Administration • Web sites – Main site • http://smartsite.ucdavis.edu – Secondary Site: • http://nob.cs.ucdavis.edu/classes/ecs235b-2009-01 • Being recorded for Livermore students • If you (or I  ) miss a class, you can view it – But please try to come! January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-2 Matt Bishop, UC Davis

  3. Course Overview: Questions • What can security decide, and what can it not decide? • Policy models: what can systems and people do, and what can they not do? • Information flow: how can information move around a system? January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-3 Matt Bishop, UC Davis

  4. Functionality • Confidentiality – Keeping data and resources hidden • Integrity – Data integrity (integrity) – Origin integrity (authentication) • Availability – Enabling access to data and resources January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-4 Matt Bishop, UC Davis

  5. Assurance • Specification – Requirements analysis • Design – How system will meet specification • Implementation – Program/systems that carry out design • Operation and maintenance – How to update, modify, use program/system January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-5 Matt Bishop, UC Davis

  6. Trust and Assumptions • Underlie all aspects of security • Policies: what is, is not allowed – Unambiguously partition system states – Correctly capture security requirements • Mechanisms: what enforce policies – Assumed to enforce policy – Support mechanisms work correctly January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-6 Matt Bishop, UC Davis

  7. People and Organizations • Organizational Problems – Power and responsibility – Financial benefits • People problems – Outsiders and insiders – Social engineering January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-7 Matt Bishop, UC Davis

  8. Models • Abstract irrelevant details of entity or process being modeled – Allows you to focus on aspects that are of interest – If done correctly , results from analyzing the model apply to entity or process • Assumption: nothing you omit affects the application of the results January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-8 Matt Bishop, UC Davis

  9. Why Access Control Matrix? • Protection state of system – Describes current settings, values of system relevant to protection • Access control matrix – Describes protection state precisely – Matrix describing rights of subjects – State transitions change elements of matrix January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-9 Matt Bishop, UC Davis

  10. Description objects (entities) • Subjects S = { s 1 ,…, s n } o 1 … o m s 1 … s n • Objects O = { o 1 ,…, o m } s 1 subjects s 2 • Rights R = { r 1 ,…, r k } • Entries A [ s i , o j ] ⊆ R … • A [ s i , o j ] = { r x , …, r y } means subject s i has rights s n r x , …, r y over object o j January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-10 Matt Bishop, UC Davis

  11. Example 1 • Processes p , q • Files f , g • Rights r , w , x , a , o f g p q p rwo r rwxo w q a ro r rwxo January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-11 Matt Bishop, UC Davis

  12. Example 2 • Procedures inc_ctr , dec_ctr , manage • Variable counter • Rights + , – , call counter inc_ctr dec_ctr manage inc_ctr + dec_ctr – manage call call call January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-12 Matt Bishop, UC Davis

  13. Boolean Expression Evaluation • ACM controls access to database fields – Subjects have attributes – Verbs define type of access – Rules associated with objects, verb pair • Subject attempts to access object – Rule for object, verb evaluated – Result controls granting, denying access January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-13 Matt Bishop, UC Davis

  14. Example • Subject annie – Attributes role (artist), groups (creative) • Verb paint – Default 0 (deny unless explicitly granted) • Object picture – Rule: paint: ‘artist’ in subject.role and ‘creative’ in subject.groups and time.hour ≥ 0 and time.hour < 5 January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-14 Matt Bishop, UC Davis

  15. ACM at 3AM and 10AM At 3AM, time condition At 10AM, time condition met; ACM is: not met; ACM is: … picture … … picture … … annie … … annie … paint January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-15 Matt Bishop, UC Davis

  16. History Database: name position age salary Alice teacher 45 $40,000 Bob aide 20 $20,000 Cathy principal 37 $60,000 Dilbert teacher 50 $50,000 Eve teacher 33 $50,000 Queries: 1. sum(salary, “position = teacher”) = 140,000 2. sum(salary, “age > 40 & position = teacher”) should not be answered (deduce Eve’s salary) January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-16 Matt Bishop, UC Davis

  17. ACM of Database Queries O i = { objects referenced in query i } for o i ∈ O i , if ∀ k , | O k – ∪ j = 1,…, i; j ≠ k O j | > 1 f ( o i ) = { read } f ( o i ) = ∅ for o i ∈ O i , otherwise 1. O 1 = { Alice, Dilbert, Eve } and no previous query set, so: A[asker, Alice] = f (Alice) = { read } A[asker, Dilbert] = f (Dilbert) = { read } A[asker, Eve] = f (Eve) = { read } and query can be answered January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-17 Matt Bishop, UC Davis

  18. But Query 2 From last slide: for o i ∈ O i , if ∀ k , | O k – ∪ j = 1,…, i; j ≠ k O j | > 1 f ( o i ) = { read } f ( o i ) = ∅ for o i ∈ O i , otherwise O 2 = { Alice, Dilbert } but | O 1 ‒ O 2 | = 1 so 2. A[asker, Alice] = f (Alice) = ∅ A[asker, Dilbert] = f (Dilbert) = ∅ and query cannot be answered January 12, 2009 ECS 235B Winter Quarter 2009 Slide #1-18 Matt Bishop, UC Davis

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend