cs526: information security chris clifton august 26, 2003 course overview portions of the material...

31
CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

Upload: gwenda-bishop

Post on 12-Jan-2016

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

CS526: Information SecurityChris Clifton

August 26, 2003

Course Overview

Portions of the material courtesy Professor Matt Bishop

Page 2: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

2

What is Information Security?

• Confidentiality– Is this all?– Why not?

• Availability– To whom?

• Authentication– Still not there

• Integrity

It’s about more than network security!

Page 3: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

3

Course Outline1. Introduction: Role of security,

Types of security, Definitions.2. Classification Schemes, Access

Control.3. Formalisms: Information flow,

Protection Models.4. Policy: Risk Analysis, Policy

Formation, Role of audit and control.

5. Formal policy models.6. Cryptography: Cipher methods,

Key management, digital signatures.

7. Authentication and Identity.8. System Design principles. TCB

and security kernel construction, Verification, Certification issues.

Midterm. Most likely date: 10/16.

9. System Verification.10.Network Security. Distributed

cooperation and commit. Distributed authentication issues. Routing, flooding, spamming. Firewalls.

11.Audit Mechanisms.12.Malicious Code: Viruses, Worms,

etc.13. Intrusion Detection and Response 14.Vulnerability Analysis.15.Physical threats, operational

security, Legal and Societal IssuesFinal Exam

Page 4: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

4

Course Administrationwww.cs.purdue.edu/homes/clifton/cs526/

• Teaching Assistants:– Yan Wu– Ali Kumcu

• Mailing list: cs526@cs• Evaluation/Grading

– Midterm 25%, Final 36%– Exercises, projects, paper reviews 36%

• 1-2 programming projects• 9-11 written assignments (e.g., book exercises)

• Let me know if you will be taking the qual1

Page 5: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

6

Introduction

• Components of computer security

• Threats

• Policies and mechanisms

• The role of trust

• Assurance

• Operational Issues

• Human Issues

Page 6: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

7

Basic Components

• Confidentiality– Keeping data and resources hidden

• Integrity– Data integrity (integrity)– Origin integrity (authentication)

• Availability– Enabling access to data and resources

Page 7: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

8

Classes of Threats

• Disclosure– Snooping

• Deception– Modification, spoofing, repudiation of origin, denial of

receipt

• Disruption– Modification

• Usurpation– Modification, spoofing, delay, denial of service

Page 8: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

9

Policies and Mechanisms

• Policy says what is, and is not, allowed– This defines “security” for the site/system/etc.– Policy definition: Informal? Formal?

• Mechanisms enforce policies

• Composition of policies– If policies conflict, discrepancies may create

security vulnerabilities

Page 9: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

10

Goals of Security

• Prevention– Prevent attackers from violating security

policy

• Detection– Detect attackers’ violation of security policy

• Recovery– Stop attack, assess and repair damage– Continue to function correctly even if attack

succeeds

Page 10: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

11

Trust and Assumptions

• Underlie all aspects of security

• Policies– Unambiguously partition system states– Correctly capture security requirements

• Mechanisms– Assumed to enforce policy– Support mechanisms work correctly

Page 11: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

12

Types of Mechanisms

secure precise broad

set of reachable states set of secure states

Page 12: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

13

Assurance

• Specification– Requirements analysis– Statement of desired functionality

• Design– How system will meet specification

• Implementation– Programs/systems that carry out design

Page 13: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

14

Operational Issues

• Cost-Benefit Analysis– Is it cheaper to prevent or recover?

• Risk Analysis– Should we protect something?– How much should we protect this thing?

• Laws and Customs– Are desired security measures illegal?– Will people do them?

Page 14: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

15

Human Issues

• Organizational Problems– Power and responsibility– Financial benefits

• People problems– Outsiders and insiders

• Which do you think is the real threat?

– Social engineering

Page 15: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

16

Tying the Definitions Together

Threats

Policy

Specification

Design

Implementation

Operation

Page 16: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

17

Key Points

• Policy defines security, and mechanisms enforce security– Confidentiality– Integrity– Availability

• Trust and knowing assumptions• Importance of assurance• The human factor

Page 17: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

18

Models: Access Control

• What is access control?– Limiting who is allowed to do what

• What is an access control model?– Specifying who is allowed to do what

• What makes this hard?– Interactions between types of access

Page 18: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

19

Basics

• State: Status of the system– Protection state: subset that deals with protection

• Access Control Matrix– Describes protection state

• Formally:– Objects O– Subjects S– Matrix A S O

• Tuple (S, O, A) defines protection states of system

Page 19: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

20

Student Choice Topics

• Trusted Computing Systems– How does software know underlying system

can be trusted?– Case study of trusted system / verification– Validation process

• Forensics– Recovery/Prevention– Tracing/Prosecution

• Digital Rights Management

Page 20: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

CS526: Information SecurityChris Clifton

August 28, 2003

Access Control Matrices

Page 21: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

22

Access Restriction Facility

• Subject: attributes (name, role, groups)

• Verbs: possible actions– Default rule for each verb

• Objects associated with set of verbs– Rule for each (object, verb) pair– Rule may be function of subject attributes

• Can be converted to Access Control Matrix

Page 22: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

23

Access Control Matrix:Boolean Evaluation ExampleInternal Local State

UniversityLong Distance

International

Public CR R

Student CR CR R R R

Staff CR CR CR R R

Account CR CR CR CR CR

TT

T

T

Transfer

T

T

T

T

T

T

Page 23: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

24

What Else Might We Add?

• Default Rule– General default: Receive– Object default: Call Internal– Requires ability to override with negative and

positive access

• Time-based access– Allow students to call on State University

system after hours?

• History-based access

Page 24: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

25

Access Control by History

• Example: Statistical Database– Allows queries for general statistics– But not individual values

• Valid queries: Statistics on 20+ individuals– Total salary of all Deans– Salary of Computer Science Professors

• See a problem coming?– Salary of CS Professors who aren’t Deans

Page 25: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

26

Solution: Query Set Overlap Control (Dobkin, Jones & Lipton ’79)

• Query valid if intersection of query coverage and each previous query < r

• Given K minimum query size, r overlap:– Need 1 + (K-1)/r queries to compromise

• Can represent as access control matrix– Subjects: entities issuing queries– Objects: Powerset of records– Os(i) : objects referenced by s in queries 1..i– A[s,o] = read iff

( 1)s

q iq o r

O

Page 26: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

CS526: Information SecurityChris Clifton

August 28, 2003

Why Security is Hard

Page 27: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

28

Protection Study:Your Homework

• What does it take to make sure your homework is secure?– Let’s assume a Unix system (mentor.ics)– Issues?

• Participation Expected!

Page 28: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

29

Protection State Transitions

• State Xi = (Si, Oi, Ai)• Transitions τi

– Single transition Xi ├τi+1 Xi+1

– Series of transitions X ├* Y

• Access control matrix may change– Change command c associated with transition

– Xi ├ci+1 (pi+1,…,pi+1 ) Xi+1

• Change command c associated with transition

Page 29: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

30

Primitive Commands

• Create Object o– Adds o to objects with no access– S’=S, O’=O{o}, (xS’)[a’[x,o] =], (xS’)(yO)

[a’[x,y] = a[x,y]]

• Create Subject s– Adds s to objects, subjects, sets relevant access

control to • Enter r into a[s,o]• Delete r from a[s,o]• Destroy subject s, destroy object o

Page 30: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

31

Special Privileges:Copy, Ownership

• Copy (or grant)– Possessor can extend privileges to another

• Own right– Possessor can change their own privileges

• Principle of Attenuation of Privilege– A subject may not give rights it does not

possess

Page 31: CS526: Information Security Chris Clifton August 26, 2003 Course Overview Portions of the material courtesy Professor Matt Bishop

32

Next

• Optional reading: Dobkin, Jones, and Lipton (TODS 4(1), see course web site)

• Basic theorems on protection states– Decidability of safety of a state with respect to

a right

• More Protection Models