System Security
Chapter 29
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-1
System Security Chapter 29 Computer Security: Art and Science , 2 nd - - PowerPoint PPT Presentation
System Security Chapter 29 Computer Security: Art and Science , 2 nd Edition Version 1.0 Slide 29-1 Outline Introduction Policy Networks Users Authentication Processes Files Retrospective Computer Security: Art
Chapter 29
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-2
authenticated to that system correctly and is a “trusted” user
developers can use
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-3
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-4
downloaded through it
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-5
WC1 No unrequested network connections except HTTP, HTTPS from
– Replies to DNS queries from DMZ DNS okay
WC2 User access only to those with user access to trusted administrative host
– Number of these users as small as possible – All actions attributed to individual account, not group or group account
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-6
WC3 Configured to provide minimal access to system
server control
WC4 Software is high assurance
WC5 Contains as few programs, as little software, configuration information, and other data as possible
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-7
user systems
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-8
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-9
commercial ISP
reconnected
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-10
DC1 Communications authenticated, enciphered, integrity checked
DC2 Each workstation has privileged accounts for administrators
functions
DC3 Notion of “audit” or “login” identity associated with each action
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-11
DC4 Need approval to install program, and must install it in special area
DC5 Each workstation protects base system software from being altered
DC6 Employee’s files be available continuously
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-12
DC7 Workstations store only transient files, so need not be backed up
DC8 Logging system to hold logs needed
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-13
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-14
administrative users have access as users
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-15
should too
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-16
evaluate allow, then deny lines allow from outer_firewall anything outer firewall sends is okay allow from inner_firewall anything inner firewall sends is okay deny from all don’t accept anything else
server (for now)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-17
evaluate allow, then deny lines allow from outer_firewall anything outer firewall sends is okay allow from inner_firewall anything inner firewall sends is okay deny from all don’t accept anything else
server (for now)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-18
trusted administrative server
allow trusted_admin_server
connections from admin server okay
deny all
refuse all others
server on this system
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-19
#! /bin/sh echo $$ > /var/servers/webdwrapper.pid while true do /usr/local/bin/webd sleep 30 done
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-20
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-21
restrictions
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-22
workstations
requests from that origin
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-23
daemons
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-24
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-25
restrictions
to block attacks from non-devnet systems
environment for developers
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-26
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-27
spooling area
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-28
ACL:
appropriately), then deletes original file
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-29
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-30
log into host B without re-authenticating
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-31
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-32
accessing UINFO system (and for local restores)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-33
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-34
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-35
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-36
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-37
physically secure area
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-38
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-39
web pages
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-40
server
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-41
system
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-42
directory to /usr/Web
directory to /usr/trans
processes
/ usr
web
pages trans xdir 1
web server commerce server
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide #29-43
mechanism
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-44
request
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-45
files and editor backup files not in use
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-46
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-47
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-48
sysadmins simply reboot to recover
directory
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-49
mounted from DVD
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-50
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-51
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-52
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-53
comparing result to reports from IDS
intrusions
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-54
compromised
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-55
remotely
tailored for Drib’s purpose
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-56
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-57
recovery from successful attack
second line of defense
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-58
mechanism (as few services as possible)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 29-59