dr. bhavani thuraisingham

50
Dr. Bhavani Thuraisingham Summary of Cyber Security Modules February 4, 2011 Lecture #7

Upload: lance

Post on 21-Jan-2016

25 views

Category:

Documents


0 download

DESCRIPTION

Summary of Cyber Security Modules February 4, 2011 Lecture #7. Dr. Bhavani Thuraisingham. Cyber Security. Security traditionally has been about CIA (Confidentiality, Integrity, Availability) Security now also includes areas like Trustworthiness, Quality, Privacy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Dr. Bhavani Thuraisingham

Dr. Bhavani Thuraisingham

Summary of Cyber Security Modules

February 4, 2011

Lecture #7

Page 2: Dr. Bhavani Thuraisingham

13-204/21/23 18:20

Cyber Security

0 Security traditionally has been about CIA (Confidentiality, Integrity, Availability)

0 Security now also includes areas like Trustworthiness, Quality, Privacy

0 Dependability includes Security, Reliability and Fault Tolerance

0 Initially the term used was Computer Security (Compusec); it then evolved into Infosec – Information security – to include data and networks – now with web its called Cyber Security

Page 3: Dr. Bhavani Thuraisingham

13-304/21/23 18:20

C. I.A.

0 Confidentiality: Preventing from unauthorized disclosure

0 Integrity: Preventing from unauthorized modification

0 Availability: Preventing denial of service

Page 4: Dr. Bhavani Thuraisingham

13-404/21/23 18:20

Ten Major Modules of Cyber Security

0 Information Security and Risk Management

0 Access Control

0 Security Architecture and Design

0 Cryptography

0 Network Security

0 Applications Security (aka Data and Applications Security)

0 Legal Regulations, Compliance and Investigations (aka Digital Forensics)

0 Physical and Environmental Security

0 Business Continuity Planning

0 Operations Security

0 Not included: Hardware security; Performance Analysis, Ethical Hacking and Penetration Testing, - - -

Page 5: Dr. Bhavani Thuraisingham

13-504/21/23 18:20

Information Governance and Risk Management

0 Security Management, Administration and Governance

0 Policies, Standards, Guidelines, Procedures

0 Information Classification

0 Roles and Responsibilities

0 Risk Management and Analysis

0 Best Practices

Page 6: Dr. Bhavani Thuraisingham

13-604/21/23 18:20

Security Management, Administration and Governance

0 Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks.

0 The risks to these assets can be calculated by analysis of the following issues:

0 Threats to your assets. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets

0 Vulnerabilities. How susceptible your assets are to attack

0 Impact. The magnitude of the potential loss or the seriousness of the event.

Page 7: Dr. Bhavani Thuraisingham

13-704/21/23 18:20

Policies, Standards, Guidelines and Procedures

0 Policies are the top tier of formalized security documents. These high-level documents offer a general statement about the organization’s assets and what level of protection they should have.

0 Well-written policies should spell out who’s responsible for security, what needs to be protected, and what is an acceptable level of risk..

0 Standards are much more specific than policies. Standards are tactical documents because they lay out specific steps or processes required to meet a certain requirement. As an example, a standard might set a mandatory requirement that all email communication be encrypted. So although it does specify a certain standard, it doesn’t spell out how it is to be done. That is left for the procedure.

Page 8: Dr. Bhavani Thuraisingham

13-804/21/23 18:20

Policies, Standards, Guidelines and Procedures

0 A baseline is a minimum level of security that a system, network, or device must adhere to. Baselines are usually mapped to industry standards. As an example, an organization might specify that all computer systems comply with a minimum Trusted Computer System Evaluation Criteria (TCSEC) C2 standard.

0 A guideline points to a statement in a policy or procedure by which to determine a course of action. It’s a recommendation or suggestion of how things should be done. It is meant to be flexible so it can be customized for individual situations.

0 A procedure is the most specific of security documents. A procedure is a detailed, in-depth, step-by-step document that details exactly what is to be done.

0 A security model is a scheme for specifying and enforcing security policies. Examples include: Bell and LaPadula, Biba, Access control lists

Page 9: Dr. Bhavani Thuraisingham

13-904/21/23 18:20

Information Classification

0 It is essential to classify information according to its actual value and level of sensitivity in order to deploy the appropriate level of security.

0 A system of classification should ideally be:

- simple to understand and to administer

- effective in order to determine the level of protection the information is given.

- applied uniformly throughout the whole organization (note: when in any doubt, the higher, more secure classification should be employed).

Page 10: Dr. Bhavani Thuraisingham

13-1004/21/23 18:20

Roles and Responsibilities

0 Internal Roles

- Executive Management; Information System Security Professionals; Owners: Data and System Owners; Custodians

- Operational Staff; Users; Legal, Compliance and Privacy Officers; Internal Auditors; Physical Security Officers

0 External Roles

- Vendors and Supplies; Contractors; Temporary Employees; Customers; Business Partners; Outsourced Relationships; Outsourced Security

0 Human Resources

- Employee development and management; Hiring and termination; Signed employee agreements; Education

Page 11: Dr. Bhavani Thuraisingham

13-1104/21/23 18:20

Risk Management and Analysis

0 Risk is the likelihood that something bad will happen that causes harm to an informational asset (or the loss of the asset). A vulnerability is a weakness that could be used to endanger or cause harm to an informational asset. A threat is anything (man made or act of nature) that has the potential to cause harm.

0 The likelihood that a threat will use a vulnerability to cause harm creates a risk. When a threat does use a vulnerability to inflict harm, it has an impact. In the context of information security, the impact is a loss of availability, integrity, and confidentiality, and possibly other losses (lost income, loss of life, loss of real property). It should be pointed out that it is not possible to identify all risks, nor is it possible to eliminate all risk. The remaining risk is called residual risk.

Page 12: Dr. Bhavani Thuraisingham

13-1204/21/23 18:20

Risk Managementg and Analysis

0 A risk assessment is carried out by a team of people who have knowledge of specific areas of the business. Membership of the team may vary over time as different parts of the business are assessed.

0 The assessment may use a subjective qualitative analysis based on informed opinion (scenarios), or where reliable dollar figures and historical information is available, the analysis may use quantitative analysis

0 For any given risk, Executive Management can choose to accept the risk based upon the relative low value of the asset, the relative low frequency of occurrence, and the relative low impact on the business. Or, leadership may choose to mitigate the risk by selecting and implementing appropriate control measures to reduce the risk. In some cases, the risk can be transferred to another business by buying insurance or out-sourcing to another business.

Page 13: Dr. Bhavani Thuraisingham

13-1304/21/23 18:20

Risk Management and Analysis

0 Identification of assets and estimating their value. Include: people, buildings, hardware, software, data supplies.

0 Conduct a threat assessment. Include: Acts of nature, accidents, malicious acts originating from inside or outside the organization.

0 Conduct a vulnerability assessment, and for each vulnerability, calculate the probability that it will be exploited. Evaluate policies, procedures, standards, training, physical security, - - -

0 Calculate the impact that each threat would have on each asset. Use qualitative analysis or quantitative analysis.

0 Identify, select and implement appropriate controls. Provide a proportional response. Consider productivity, cost effectiveness, and value of the asset.

0 Evaluate the effectiveness of the control measures. Ensure the controls provide the required cost effective protection without discernible loss of productivity.

Page 14: Dr. Bhavani Thuraisingham

13-1404/21/23 18:20

Risk Management and Analysis

0 Step 1: Estimate Potential Loss

- SLE = AV ($) x EF (%)

- SLE: Single Loss Expectancy, AV: Asset Value. EF: Exposure Factor (percentage of asset value)

0 Step 2: Conduct Threat Likelihood Analysis

- ARO Annual Rate of Occurrence

- Number of times per year that an incident is likely to occur

0 Step 3: Calculate ALE

- ALE: Annual Loss Expectancy

- ALE = SLE x ARO

Page 15: Dr. Bhavani Thuraisingham

13-1504/21/23 18:20

Security Best Practices

0 Job Rotation

0 Separation of Duty

0 Security Awareness training

0 Ethics Education

Page 16: Dr. Bhavani Thuraisingham

13-1604/21/23 18:20

Security Architecture

0 Security critical components of the system

0 Trusted Computing Base

0 Reference Monitor and Security Kernel

0 Security Perimeter

0 Security Policy

0 Least Privilege

Page 17: Dr. Bhavani Thuraisingham

13-1704/21/23 18:20

Trusted Computing Base

0 The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the security policy.

0 The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern operating systems strive to reduce the size of the TCB so that an exhaustive examination of its code base (by means of manual or computer-assisted software audit or program verification) becomes feasible.

Page 18: Dr. Bhavani Thuraisingham

13-1804/21/23 18:20

Reference Monitor and Security Kernel

0 In operating systems architecture, a reference monitor is a tamperproof, always-invoked, and small-enough-to-be-fully-tested-and-analyzed module that controls all software access to data objects or devices (verifiable).

0 The reference monitor verifies that the request is allowed by the access control policy.

0 For example, Windows 3.x and 9x operating systems were not built with a reference monitor, whereas the Windows NT line, which also includes Windows 2000 and Windows XP, was designed to contain a reference monitor, although it is not clear that its properties (tamperproof, etc.) have ever been independently verified, or what level of computer security it was intended to provide.

Page 19: Dr. Bhavani Thuraisingham

13-1904/21/23 18:20

Security Models

0 Bell and LaPadula (BLP) Confidentiality Model

0 Biba Integrity Model (opposite to BLP)

0 Clark Wilson Integrity Model

0 Other Models

- information Flow Model

- Non Interference Model

- Graham Denning Model

- Harrison-Ruzzo-Ullman Model

- Lattice Model

Page 20: Dr. Bhavani Thuraisingham

13-2004/21/23 18:20

Bell and LaPadula

0 A system state is defined to be "secure" if the only permitted access modes of subjects to objects are in accordance with a security policy. To determine whether a specific access mode is allowed, the clearance of a subject is compared to the classification of the object (more precisely, to the combination of classification and set of compartments, making up the security level) to determine if the subject is authorized for the specific access mode. The clearance/classification scheme is expressed in terms of a lattice. The model defines two mandatory access control (MAC) rules and one discretionary access control (DAC) rule with three security properties:

0 The Simple Security Property - a subject at a given security level may not read an object at a higher security level (no read-up).

0 The *-property (read "star"-property) - a subject at a given security level must not write to any object at a lower security level (no write-down). The *-property is also known as the Confinement property.

0 The Discretionary Security Property - use of an access matrix to specify the discretionary access control.

Page 21: Dr. Bhavani Thuraisingham

13-2104/21/23 18:20

Biba

0 In general, preservation of data integrity has three goals:

- Prevent data modification by unauthorized parties

- Prevent unauthorized data modification by authorized parties

- Maintain internal and external consistency (i.e. data reflects the real world)

0 Biba security model is directed toward data integrity (rather than confidentiality) and is characterized by the phrase: "no read down, no write up". This is in contrast to the Bell-LaPadula model which is characterized by the phrase "no write down, no read up".

0 The Biba model defines a set of security rules similar to the Bell-LaPadula model. These rules are the reverse of the Bell-LaPadula rules:

0 The Simple Integrity Axiom states that a subject at a given level of integrity must not read an object at a lower integrity level (no read down).

0 The * (star) Integrity Axiom states that a subject at a given level of integrity must not write to any object at a higher level of integrity (no write up).

Page 22: Dr. Bhavani Thuraisingham

13-2204/21/23 18:20

Clark Wilson Model

0 The Clark-Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a computing system.

0 The model is primarily concerned with formalizing the notion of information integrity.

0 Information integrity is maintained by preventing corruption of data items in a system due to either error or malicious intent.

0 An integrity policy describes how the data items in the system should be kept valid from one state of the system to the next and specifies the capabilities of various principals in the system.

0 The model defines enforcement rules and certification rules.

0 The model’s enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the model is based on the notion of a transaction.

Page 23: Dr. Bhavani Thuraisingham

13-2304/21/23 18:20

Clark Wilson Model

0 A well-formed transaction is a series of operations that transition a system from one consistent state to another consistent state.

0 In this model the integrity policy addresses the integrity of the transactions.

0 The principle of separation of duty requires that the certifier of a transaction and the implementer be different entities.

0 The model contains a number of basic constructs that represent both data items and processes that operate on those data items. The key data type in the Clark-Wilson model is a Constrained Data Item (CDI). An Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid at a certain state. Transactions that enforce the integrity policy are represented by Transformation Procedures (TPs). A TP takes as input a CDI or Unconstrained Data Item (UDI) and produces a CDI. A TP must transition the system from one valid state to another valid state. UDIs represent system input (such as that provided by a user or adversary). A TP must guarantee (via certification) that it transforms all possible values of a UDI to a “safe” CDI

Page 24: Dr. Bhavani Thuraisingham

13-2404/21/23 18:20

Clark Wilson Model

0 At the heart of the model is the notion of a relationship between an authenticated principal (i.e., user) and a set of programs (i.e., TPs) that operate on a set of data items (e.g., UDIs and CDIs). The components of such a relation, taken together, are referred to as a Clark-Wilson triple. The model must also ensure that different entities are responsible for manipulating the relationships between principals, transactions, and data items. As a short example, a user capable of certifying or creating a relation should not be able to execute the programs specified in that relation.

0 The model consists of two sets of rules: Certification Rules (C) and Enforcement Rules (E). The nine rules ensure the external and internal integrity of the data items. To paraphrase these:

0 C1—When an IVP is executed, it must ensure the CDIs are valid. C2—For some associated set of CDIs, a TP must transform those CDIs from one valid state to another. Since we must make sure that these TPs are certified to operate on a particular CDI, we must have E1 and E2.

Page 25: Dr. Bhavani Thuraisingham

13-2504/21/23 18:20

Clark Wilson Model

0 E1—System must maintain a list of certified relations and ensure only TPs certified to

run on a CDI change that CDI. E2—System must associate a user with each TP and set

of CDIs. The TP may access the CDI on behalf of the user if it is “legal.” This requires

keeping track of triples (user, TP, {CDIs}) called “allowed relations.”

0 C3—Allowed relations must meet the requirements of “separation of duty.” We need

authentication to keep track of this.

0 E3—System must authenticate every user attempting a TP. Note that this is per TP

request, not per login. For security purposes, a log should be kept.

0 C4—All TPs must append to a log enough information to reconstruct the operation.

When information enters the system it need not be trusted or constrained (i.e. can be a

UDI). We must deal with this appropriately.

0 C5—Any TP that takes a UDI as input may only perform valid transactions for all

possible values of the UDI. The TP will either accept (convert to CDI) or reject the UDI.

Finally, to prevent people from gaining access by changing qualifications of a TP:

0 E4—Only the certifier of a TP may change the list of entities associated with that TP

Page 26: Dr. Bhavani Thuraisingham

13-2604/21/23 18:20

Security Architecture

0 Security critical components of the system

0 Trusted Computing Base

0 Reference Monitor and Security Kernel

0 Security Perimeter

0 Security Policy

0 Least Privilege

Page 27: Dr. Bhavani Thuraisingham

13-2704/21/23 18:20

Trusted Computing Base

0 The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the security policy.

0 The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern operating systems strive to reduce the size of the TCB so that an exhaustive examination of its code base (by means of manual or computer-assisted software audit or program verification) becomes feasible.

Page 28: Dr. Bhavani Thuraisingham

13-2804/21/23 18:20

Reference Monitor and Security Kernel

0 In operating systems architecture, a reference monitor is a tamperproof, always-invoked, and small-enough-to-be-fully-tested-and-analyzed module that controls all software access to data objects or devices (verifiable).

0 The reference monitor verifies that the request is allowed by the access control policy.

0 For example, Windows 3.x and 9x operating systems were not built with a reference monitor, whereas the Windows NT line, which also includes Windows 2000 and Windows XP, was designed to contain a reference monitor, although it is not clear that its properties (tamperproof, etc.) have ever been independently verified, or what level of computer security it was intended to provide.

Page 29: Dr. Bhavani Thuraisingham

13-2904/21/23 18:20

Security Models

0 Bell and LaPadula (BLP) Confidentiality Model

0 Biba Integrity Model (opposite to BLP)

0 Clark Wilson Integrity Model

0 Other Models

- information Flow Model

- Non Interference Model

- Graham Denning Model

- Harrison-Ruzzo-Ullman Model

- Lattice Model

Page 30: Dr. Bhavani Thuraisingham

13-3004/21/23 18:20

Bell and LaPadula

0 A system state is defined to be "secure" if the only permitted access modes of subjects to objects are in accordance with a security policy. To determine whether a specific access mode is allowed, the clearance of a subject is compared to the classification of the object (more precisely, to the combination of classification and set of compartments, making up the security level) to determine if the subject is authorized for the specific access mode. The clearance/classification scheme is expressed in terms of a lattice. The model defines two mandatory access control (MAC) rules and one discretionary access control (DAC) rule with three security properties:

0 The Simple Security Property - a subject at a given security level may not read an object at a higher security level (no read-up).

0 The *-property (read "star"-property) - a subject at a given security level must not write to any object at a lower security level (no write-down). The *-property is also known as the Confinement property.

0 The Discretionary Security Property - use of an access matrix to specify the discretionary access control.

Page 31: Dr. Bhavani Thuraisingham

13-3104/21/23 18:20

Biba

0 In general, preservation of data integrity has three goals:

- Prevent data modification by unauthorized parties

- Prevent unauthorized data modification by authorized parties

- Maintain internal and external consistency (i.e. data reflects the real world)

0 Biba security model is directed toward data integrity (rather than confidentiality) and is characterized by the phrase: "no read down, no write up". This is in contrast to the Bell-LaPadula model which is characterized by the phrase "no write down, no read up".

0 The Biba model defines a set of security rules similar to the Bell-LaPadula model. These rules are the reverse of the Bell-LaPadula rules:

0 The Simple Integrity Axiom states that a subject at a given level of integrity must not read an object at a lower integrity level (no read down).

0 The * (star) Integrity Axiom states that a subject at a given level of integrity must not write to any object at a higher level of integrity (no write up).

Page 32: Dr. Bhavani Thuraisingham

13-3204/21/23 18:20

Clark Wilson Model

0 The Clark-Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a computing system.

0 The model is primarily concerned with formalizing the notion of information integrity.

0 Information integrity is maintained by preventing corruption of data items in a system due to either error or malicious intent.

0 An integrity policy describes how the data items in the system should be kept valid from one state of the system to the next and specifies the capabilities of various principals in the system.

0 The model defines enforcement rules and certification rules.

0 The model’s enforcement and certification rules define data items and processes that provide the basis for an integrity policy. The core of the model is based on the notion of a transaction.

Page 33: Dr. Bhavani Thuraisingham

13-3304/21/23 18:20

Clark Wilson Model

0 A well-formed transaction is a series of operations that transition a system from one consistent state to another consistent state.

0 In this model the integrity policy addresses the integrity of the transactions.

0 The principle of separation of duty requires that the certifier of a transaction and the implementer be different entities.

0 The model contains a number of basic constructs that represent both data items and processes that operate on those data items. The key data type in the Clark-Wilson model is a Constrained Data Item (CDI). An Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid at a certain state. Transactions that enforce the integrity policy are represented by Transformation Procedures (TPs). A TP takes as input a CDI or Unconstrained Data Item (UDI) and produces a CDI. A TP must transition the system from one valid state to another valid state. UDIs represent system input (such as that provided by a user or adversary). A TP must guarantee (via certification) that it transforms all possible values of a UDI to a “safe” CDI

Page 34: Dr. Bhavani Thuraisingham

13-3404/21/23 18:20

Clark Wilson Model

0 At the heart of the model is the notion of a relationship between an authenticated principal (i.e., user) and a set of programs (i.e., TPs) that operate on a set of data items (e.g., UDIs and CDIs). The components of such a relation, taken together, are referred to as a Clark-Wilson triple. The model must also ensure that different entities are responsible for manipulating the relationships between principals, transactions, and data items. As a short example, a user capable of certifying or creating a relation should not be able to execute the programs specified in that relation.

0 The model consists of two sets of rules: Certification Rules (C) and Enforcement Rules (E). The nine rules ensure the external and internal integrity of the data items. To paraphrase these:

0 C1—When an IVP is executed, it must ensure the CDIs are valid. C2—For some associated set of CDIs, a TP must transform those CDIs from one valid state to another. Since we must make sure that these TPs are certified to operate on a particular CDI, we must have E1 and E2.

Page 35: Dr. Bhavani Thuraisingham

13-3504/21/23 18:20

Secure System Evaluation: TCSEC

0 Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information.

0 The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow Series publications. Initially issued in 1983 by the National Computer Security Center (NCSC), an arm of the National Security Agency, and then updated in 1985,.

0 TCSEC was replaced by the Common Criteria international standard originally published in 2005.

Page 36: Dr. Bhavani Thuraisingham

13-3604/21/23 18:20

Secure System Evaluation: TCSEC

0 Policy: The security policy must be explicit, well-defined and enforced by the computer system. There are two basic security policies:

0 Mandatory Security Policy - Enforces access control rules based directly on an individual's clearance, authorization for the information and the confidentiality level of the information being sought. Other indirect factors are physical and environmental. This policy must also accurately reflect the laws, general policies and other relevant guidance from which the rules are derived.

- Marking - Systems designed to enforce a mandatory security policy must store and preserve the integrity of access control labels and retain the labels if the object is exported.

0 Discretionary Security Policy - Enforces a consistent set of rules for controlling and limiting access based on identified individuals who have been determined to have a need-to-know for the information.

Page 37: Dr. Bhavani Thuraisingham

13-3704/21/23 18:20

Secure System Evaluation: TCSEC

0 Accountability: Individual accountability regardless of policy must be enforced. A secure means must exist to ensure the access of an authorized and competent agent which can then evaluate the accountability information within a reasonable amount of time and without undue difficulty. There are three requirements under the accountability objective:

0 Identification - The process used to recognize an individual user.

0 Authentication - The verification of an individual user's authorization to specific categories of information.

0 Auditing - Audit information must be selectively kept and protected so that actions affecting security can be traced to the authenticated individual.

0 The TCSEC defines four divisions: D, C, B and A where division A has the highest security. Each division represents a significant difference in the trust an individual or organization can place on the evaluated system. Additionally divisions C, B and A are broken into a series of hierarchical subdivisions called classes: C1, C2, B1, B2, B3 and A1.

Page 38: Dr. Bhavani Thuraisingham

13-3804/21/23 18:20

Secure System Evaluation: TCSEC

0 Assurance: The computer system must contain hardware/software mechanisms that can be independently evaluated to provide sufficient assurance that the system enforces the above requirements. By extension, assurance must include a guarantee that the trusted portion of the system works only as intended. To accomplish these objectives, two types of assurance are needed with their respective elements:

0 Assurance Mechanisms : Operational Assurance: System Architecture, System Integrity, Covert Channel Analysis, Trusted Facility Management and Trusted Recovery

0 Life-cycle Assurance : Security Testing, Design Specification and Verification, Configuration Management and Trusted System Distribution

Page 39: Dr. Bhavani Thuraisingham

13-3904/21/23 18:20

Secure System Evaluation: ITSEC

0 The Information Technology Security Evaluation Criteria (ITSEC) is a structured set of criteria for evaluating computer security within products and systems. The ITSEC was first published in May 1990 in France, Germany, the Netherlands, and the United Kingdom based on existing work in their respective countries. Following extensive international review, Version 1.2 was subsequently published in June 1991 by the Commission of the European Communities for operational use within evaluation and certification schemes.

0 Levels E1 – E6

Page 40: Dr. Bhavani Thuraisingham

13-4004/21/23 18:20

Secure System Evaluation: Common Criteria

0 The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

0 Common Criteria is a framework in which computer system users can specify their security functional and assurance requirements, vendors can then implement and/or make claims about the security attributes of their products, and testing laboratories can evaluate the products to determine if they actually meet the claims. In other words, Common Criteria provides assurance that the process of specification, implementation and evaluation of a computer security product has been conducted in a rigorous and standard manner.

0 Levels: EAL 1 – EAL 7 (Evaluation Assurance Levels)

Page 41: Dr. Bhavani Thuraisingham

13-4104/21/23 18:20

Some Security Threats

0 Buffer Overflow

0 Maintenance Hooks

0 Time of check / Time of use attacks

Page 42: Dr. Bhavani Thuraisingham

13-4204/21/23 18:20

Access Control

0 Access Control Overview

0 Identification, Authentication, Authorization, Accountability

0 Single Sign-on and Kerberos

0 Access Control Models

0 Access Control Techniques and Technologies

0 Access Control Administration

0 Access Control Monitoring: Intrusion Detection

0 Threats to Access Control

Page 43: Dr. Bhavani Thuraisingham

13-4304/21/23 18:20

Access Control Overview

0 Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system.

0 In computer security, access control includes authentication, authorization and audit. It also includes measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems.

0 In any access control model, the entities that can perform actions in the system are called subjects, and the entities representing resources to which access may need to be controlled are called objects (see also Access Control Matrix). Subjects and objects should both be considered as software entities and as human users

Page 44: Dr. Bhavani Thuraisingham

13-4404/21/23 18:20

Access Control

0 Access control models used by current systems tend to fall into one of two classes: those based on capabilities and those based on access control lists (ACLs).

0 In a capability-based model, holding an unforgeable reference or capability to an object provides access to the object

0 Access is conveyed to another party by transmitting such a capability over a secure channel.

0 In an ACL-based model, a subject's access to an object depends on whether its identity is on a list associated with the object

Page 45: Dr. Bhavani Thuraisingham

13-4504/21/23 18:20

Identification, Authentication, Authorization

0 Access control systems provide the essential services of identification and authentication (I&A), authorization, and accountability where:

0 identification and authentication determine who can log on to a system, and the association of users with the software subjects that they are able to control as a result of logging in;

0 authorization determines what a subject can do;

0 accountability identifies what a subject (or all subjects associated with a user) did.

Page 46: Dr. Bhavani Thuraisingham

13-4604/21/23 18:20

Single Sign-On

0 Single sign-on (SSO) is a property of access control of multiple, related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems.

0 As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication.

Page 47: Dr. Bhavani Thuraisingham

13-4704/21/23 18:20

Single Sign-on Kerberos

0 Kerberos is a computer network authentication protocol, which allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by MIT that implements this protocol. Its designers aimed primarily at a client–server model, and it provides mutual authentication — both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

0 Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography by utilizing asymmetric key cryptography during certain phases of authentication

Page 48: Dr. Bhavani Thuraisingham

13-4804/21/23 18:20

Symmetric Key Cryptography

0 Symmetric-key algorithms are a class of algorithms for cryptography that use trivially related, often identical, cryptographic keys for both decryption and encryption.

0 The encryption key is trivially related to the decryption key, in that they may be identical or there is a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.

0 The disadvantage of symmetric cryptography is that it presumes two parties have agreed on a key and been able to exchange that key in a secure manner prior to communication. This is a significant challenge. Symmetric algorithms are usually mixed with public key algorithms to obtain a blend of security and speed.

Page 49: Dr. Bhavani Thuraisingham

13-4904/21/23 18:20

Public Key Cryptography

0 Public-key cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.

0 Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more secret keys to both sender and receiver.

0 The asymmetric key algorithms are used to create a mathematically related key pair: a secret private key and a published public key. Use of these keys allows protection of the authenticity of a message by creating a digital signature of a message using the private key, which can be verified using the public key.

0 It also allows protection of the confidentiality and integrity of a message, by public key encryption, encrypting the message using the public key, which can only be decrypted using the private key.

Page 50: Dr. Bhavani Thuraisingham

13-5004/21/23 18:20

What is Network Security

0 Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness

0 The terms network security and information security are often used interchangeably. Network security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (hackers).

0 Information security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of data loss prevention (DLP) techniques.