wrapup
play

Wrapup CSE497b - Spring 2007 Introduction Computer and Network - PowerPoint PPT Presentation

Wrapup CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Final The final is on


  1. Wrapup CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger

  2. Final • The final is on – Tuesday, May 8, 8:00 in 160 Willard (here) • Be late at your own peril (We may lock the door at 8:10) • You will have the full time to take the test, but no more • Coverage: – Anything we talked about in class … – or appeared in the readings – Mainly topics since mid-term • Types of questions – Constructive (here is scenario, design X and explain it) – Philosophical (why does Z argue that …) – Explanatory (what is the key tradeoff between A and B …) CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 2

  3. Prior Topics • Terminology – Any term defined in the early lectures • Crypto Algorithms – Diffie-Hellman and RSA – Keys • Crypto protocols – Public key – Secret key – Integrity, Authenticity, Secrecy CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 3

  4. Topics Since Midterm • Code Security • Access Control Principles • UNIX Security • Windows Security • Trusted Computing • Secrecy • Integrity • Intrusion Detection • MAC systems • Virtual machine systems CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 4

  5. Code Security • Problems – Buffer overflows, printf, integer overflows, names, characters • Considerations for writing and deploying secure code – Validate input (prevent vulnerabilities) – Minimize attack surface (number of points of potential vulnerabilities) – Minimize permissions – Safe transition of privilege via invocation – Return little information • Type safety – Implications to attacks above CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 5

  6. Access Control Principles • Protection System – Protection State – State Enforcer • Access Matrix – Use it – Variants (RBAC) – Security guarantees from policies • Protection and Security – Know the difference • Reference Monitor – Know the guarantees – Know how to apply them to other systems • How does X satisfy RM guarantees? CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 6

  7. UNIX and Windows • Subjects – UNIX: users; Windows: more complex • Objects – UNIX: files; Windows: more complex • User Authentication • Access Enforcement – Process – Implications for security • Transitions – UNIX: Setuid; Windows: Windows Services • Constrained execution – UNIX: chroot, nobody; Windows: Restricted contexts • General vulnerabilities CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 7

  8. Trusted Computing • Palladium • TPM • Know the difference • Mechanisms – Protected Storage – Attestation – How TPM supports • Boot guarantees CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 8

  9. Secrecy and Integrity • Secrecy – Secrecy and security – Multilevel security, Chinese Wall Security – Secrecy properties – Miscellaneous • Trojan horses, covert channels – Program secrecy (Denning) • Integrity – Integrity and security – Biba and LOMAC – Integrity realization – Privilege separation CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 9

  10. Intrusion Detection • Anomaly and misuse detection • Relation to access control • Network and host IDS • Positives/Negatives • Bayes ’ Rule Analysis CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 10

  11. MAC Systems and VM Systems • Relation to Reference Monitors • Mandatory Access Control • Multics • Transitions (all) • SELinux/LSM architecture • Virtual Machine architectures • VM principles • Xen enforcement • VM vs OS enforcement • Java enforcement CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 11

  12. The state of security … • … issues are in public consciousness – Press coverage is increasing … – Losses mounting … (billions and billions) – Affect increasing …… (ATMs, commerce) • What are we doing? “… sound and fury signifying nothing …” - W. Shakespeare (well, its not quite that bad) CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 12

  13. The problems … • What is the root cause? – Security is not a key goal … – … and it never has been … … so , we need to figure out how to change the way we do engineering (and science) … … to make computers secure. • Far too much misunderstanding about basic security and the use of technology • This is also true physical security CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 13

  14. The current solutions … • Make better software – “we mean it” - B. Gates (2002) – “no really …” - B. Gates (2003) – “Linux is bad too …” - B. Gates (2005) – “it ’ s in longhorn ...” - B. Gates (2006) • CERT/SANS-based problem/event tracking – Experts tracking vulnerabilities – Patch system completely broken • Destructive research – Back-pressure on product developers – Arms-race with bad guys • Problem: reactive, rather than proactive CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 14

  15. The real solutions … • Fix the economic incentive equation … – Eventually, MS/Sun/Apple/*** will be in enough pain that they change the way they make software • Education – Things will get better when people understand when how to use technology • Fix engineering practices – Design for security • Apply technology – What we have been talking about CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 15

  16. The bottom line • The Web/Internet and new technologies are being limited by their ability to address security and privacy concerns … • … it is incumbent in us as scientists to meet these challenges. – Evangelize importance of security … – Provide sound technologies … – Define better practices … CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 16

  17. Thank You!!! tjaeger@cse.psu.edu CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend