Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Science and Engineering Computer System Security CSE 5339/7339 Session 23 November 9, 2004.

Similar presentations


Presentation on theme: "Computer Science and Engineering Computer System Security CSE 5339/7339 Session 23 November 9, 2004."— Presentation transcript:

1 Computer Science and Engineering Computer System Security CSE 5339/7339 Session 23 November 9, 2004

2 Computer Science and Engineering Contents  A6 Q/A  Database Security (cont.)  Security in Networks  Group Work  Wenyi’s presentation

3 Computer Science and Engineering Proposal for Multilevel security  Partitioning (Separation)  The database is divided into several databases, each at its own level of security  Encryption (Separation)  Sensitive data are encrypted  Each level of sensitive data can be stored in a table encrypted under a key unique to the level of sensitivity

4 Computer Science and Engineering Integrity Lock (Spray Paint)  The lock is a way to provide both integrity and limited access for a database  At the US Air Force Summer Study on DB Security Secret Agent10FBTS Data ItemSensitivityChecksum

5 Computer Science and Engineering Cryptographic Checksum  Data item  plain text  Sensitivity  unforgeable -- unique – concealed  Checksum  record number, attribute name, data item, sensitivity Secret Agent10FBTS Data ItemSensitivityChecksum AssignmentR07 Record numberAttribute name Checksum

6 Computer Science and Engineering Security Lock  Combination of a unique identifier (record number) and the sensitivity level  Graubert and Kramer Secret AgentTS Data ItemSensitivitySensitivity lock R07 Record number Encryption Function Key

7 Computer Science and Engineering Short Term Solution Untrusted DB manager Users Trusted Access Controller Sensitive database

8 Computer Science and Engineering Trusted Front End Untrusted DB manager Users Trusted Access Controller Sensitive databaseTrusted Front End

9 Computer Science and Engineering Commutative Filters  The filter screens the user’s request, reformats it so that only data of an appropriate sensitivity level are returned. Retrieve NAME where ((OCCUP = engineer) and (CITY = WashDC) retrieve NAME where ((OCCUP = engineer) and (CITY = WashDC) from all records R where (NAME-SEC-LEVEL (R )  USER-SEC-LEVEL) and (OCCUP-SEC-LEVEL (R )  USER-SEC-LEVEL) and (CITY-SEC-LEVEL (R )  USER-SEC-LEVEL)

10 Computer Science and Engineering Computer Network Basics  Wide Area Networks (WAN)  Metropolitan Area Network (MAN)  Local Area Network (LAN)  System or Storage Area Network (SAN)

11 Computer Science and Engineering Routing Schemes  Connection-oriented The entire message follows the same path from source to destination.  Connectionless A message is divided into packets. Packets may take different routes from source to destination Serial number

12 Computer Science and Engineering Network Performance  Gilder’s Law George Gilder projected that the total bandwidth of communication systems triples every twelve months. Ethernet: 10Mbps  10Gbps (1000 times) CPU clock frequency: 25MHz  2.5GHz (100 times)  Metcalfe's Law Robert Metcalfe projected that the value of a network is proportional to the square of the number of nodes Internet

13 Computer Science and Engineering Internet Internet is the collection of networks and routers that form a single cooperative virtual network, which spans the entire globe. The Internet relies on the combination of the Transmission Control Protocol and the Internet Protocol or TCP/IP. The majority of Internet traffic is carried using TCP/IP packets.

14 Computer Science and Engineering Country Internet Users Latest Data Population ( 2004 Est. ) % of Population United States209,518,183294,540,10071.1 % China79,500,0001,327,976,2276.0 % Japan63,884,205127,944,20049.9 % Germany45,315,16682,633,20054.8 % United Kingdom35,089,47059,157,40059.3 % South Korea29,220,00047,135,50062.0 % France22,534,96759,494,80037.9 % Brazil20,551,168183,199,60011.2 % Italy19,900,00056,153,70035.4 % Canada16,841,81132,026,60052.6 %

15 Computer Science and Engineering ISO OSI Network Model Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical LAN Internet

16 Computer Science and Engineering Mail ftp Telnet Transmission Control Protocol (TCP) Internet Protocol (IP) Ethernet Token ring TCP/IP

17 Computer Science and Engineering Addressing  MAC (Media Access Control) address Every host connected to a network has a network interface card (NIC) with a unique physical address.  IP address IPv4  32 bits (129.16.48.6) IPv6  128 bits

18 Computer Science and Engineering IP Protocol  Unreliable packet delivery service  Datagram (IPv4) Service TypeVERSHLENTOTAL LENGTH IDENTIFICATIONFLAGSFRAGMENT OFFSET TIME TO LIVEPROTOCOLHEADER CHECKSUM SOURCE ADDRESS DESTINATION ADDRESS PADDINGOPTIONS (IF ANY) DATA

19 Computer Science and Engineering Group Work  Discuss possible attacks on IP.  IP Spoofing  Teardrop attacks


Download ppt "Computer Science and Engineering Computer System Security CSE 5339/7339 Session 23 November 9, 2004."

Similar presentations


Ads by Google