1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.

Slides:



Advertisements
Similar presentations
CSC 360- Instructor: K. Wu Overview of Operating Systems.
Advertisements

TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
OS Fall ’ 02 Introduction Operating Systems Fall 2002.
CS 300 – Lecture 22 Intro to Computer Architecture / Assembly Language Virtual Memory.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Disco Running Commodity Operating Systems on Scalable Multiprocessors.
OS Spring’03 Introduction Operating Systems Spring 2003.
Chapter 8 Operating System Support
Figure 1.1 Interaction between applications and the operating system.
Modified from Silberschatz, Galvin and Gagne Lecture 15 Chapter 8: Main Memory.
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
Chapter 2: Impact of Machine Architectures What is the Relationship Between Programs, Programming Languages, and Computers.
Information Systems Security Security Architecture Domain #5.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #29-1 Chapter 33: Virtual Machines Virtual Machine Structure Virtual Machine.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
Fraud Prevention and Risk Management
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Operating System A program that controls the execution of application programs An interface between applications and hardware 1.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 20 October 28, 2004.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
Systems Security & Audit Operating Systems security.
Trusted System? What are the characteristics of a trusted system?
ISA 562 Internet Security Theory & Practice
Operating System Review September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1.
 What is OS? What is OS?  What OS does? What OS does?  Structure of Operating System: Structure of Operating System:  Evolution of OS Evolution of.
Operating Systems.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Fall 2000M.B. Ibáñez Lecture 01 Introduction What is an Operating System? The Evolution of Operating Systems Course Outline.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Recall: Three I/O Methods Synchronous: Wait for I/O operation to complete. Asynchronous: Post I/O request and switch to other work. DMA (Direct Memory.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
The Structure of Processes (Chap 6 in the book “The Design of the UNIX Operating System”)
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
30 October Agenda for Today Introduction and purpose of the course Introduction and purpose of the course Organization of a computer system Organization.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
G53SEC 1 Reference Monitors Enforcement of Access Control.
OSes: 3. OS Structs 1 Operating Systems v Objectives –summarise OSes from several perspectives Certificate Program in Software Development CSE-TC and CSIM,
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Silberschatz, Galvin and Gagne  Operating System Concepts Operating Systems 1. Overview 2. Process Management 3. Storage Management 4. I/O Systems.
Domain 6 Security Architecture and Models Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,
Operating Systems Security
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 19 October 26, 2004.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
1 Process Description and Control Chapter 3. 2 Process A program in execution An instance of a program running on a computer The entity that can be assigned.
Operating Systems.
Concepts and Structures. Main difficulties with OS design synchronization ensure a program waiting for an I/O device receives the signal mutual exclusion.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
CSCI/CMPE 4334 Operating Systems Review: Exam 1 1.
Security Architecture and Design. 2 Domain Objectives Benefits of a Security Architecture System Level Security Architecture vs. Enterprise Security Architecture.
Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
1.1 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 1: Introduction What Operating Systems Do √ Computer-System Organization.
Introduction to Operating Systems Concepts
Chapter 19: Building Systems with Assurance
Chapter 15, Exploring the Digital Domain
THE ORANGE BOOK Ravi Sandhu
Operating Systems Lecture 1.
Operating Systems: A Modern Perspective, Chapter 3
Chapter 2 Operating System Overview
Presentation transcript:

1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise Security Architectures  Trusted Systems

Introduction Security architecture describes how system security is integrated to satisfy security requirements. Balance requirements  capability, flexibility,, security, performance…  Security architecture is one aspect of system architecture Security requirements are not just added steps to the development process but they are specifications or guidelines influencing the life cycle 2

Process framework for a Security Architecture 3

Good and bad architectures  Good security architecture ◦ Strategic, holistic, allows multiple implementations. ◦ Manages the process of setting the architecture, Implementation, Compliance, and Monitoring  Bad architectural planning can result in ◦ No support for new business services ◦ Security breaches and vulnerabilities ◦ Poor understanding by usersof security goals and objectives 4

A High-Level Design 5

Enterprise Architecture Frameworks  PDCA Approach ( ISO or ISO )  TQM and ISO 9001:2000 Total Quality Management 6

Enterprise Architecture Frameworks  What is an ISMS? ◦ ISMS = Information Security Management System.  What is for? ◦ Incorporate process into a business which  Influences the quality of the system  Increases product and service quality  Aligns process with business objectives  Implementing an ISMS ◦ Define the IS policy ◦ Define the Scope of ISMS coverage ◦ Go through a security Risk assessment ◦ Identify risks and manage them ◦ Select security controls ◦ Prepare a statement of applicability 7

Enterprise Architecture Frameworks  Six Sigma (process variance control framework) ◦ Data driven and measurement based  DMAIC  DMADV  COSO (Committee of Sponsoring Organizations) ◦ The importance of Identifying and managing risk  CMMI (Capability Maturity Model Integration) ◦ Based on TQM ◦ Improving process ◦ Different Maturity levels 8

System Level Architectural Concepts  Components which provide basic security services ◦ Integrity of computing processes ◦ Controlled access to system resources ◦ Predictable computing services  Two components: ◦ Hardware ◦ Software  Computer layers include ◦ End user ◦ Application, which sits on top of ◦ Utilities, that sit on top of ◦ Operating systems, which sit on top of ◦ Hardware 9

System Level Architecture Concepts  Some of the operating system services are ◦ Process execution ◦ Input and output processing ◦ Error detection and handling ◦ Communication  Security kernel provides critical security services  CPU - two different privilege states ◦ Supervisor state where system programs execute ◦ Application state where application programs and non-privileged programs execute ◦ Process states  Stopped, running, waiting, etc 10

System Level Architecture Concepts  Applications ◦ Current applications are portable and execute in a multi-threaded OS.  System approaches ◦ Open or Closed systems ◦ Single level or multi-level systems  System architectures ◦ Centralized vs. Distributed 11

System Level Architecture Concepts  Memory management requirements ◦ Protection: users cannot generate address, users can share access, etc ◦ Relocation and Sharing ◦ Logical and Physical organization  Memory Addressing ◦ Logical: requires translation to a physical address ◦ Relative: location relative to known point ( ex: array) ◦ Physical: absolute address or actual location 12

System Level Architecture Concepts  Virtual memory ◦ A process uses more memory than what is available in the physical memory ◦ Limited by swap space on disk ◦ Uses the concept of pages and segments  I/O ◦ Inter-process communication which involves locating and relocation data and instructions between a number of storage facilities ( I/O controller, managing memory, etc) 13

Basic System Security Concepts  Trusted Computing base (TCB) ◦ Includes all the components and their operating processes and procedures that ensure the security policy of the organization is enforced ◦ It should also be simple and testable ◦ Enforces security policy ◦ Monitors  Process activation  Execution Domain Switching  Memory protection  Input/output Operations 14

Basic System Security Concepts  Objects that require protection ◦ Anything on the system such as: Memory, Operating system tables, Directory files, Data structures, etc  Reference Monitor Concept ◦ Abstract machine  Tamperproof  Verifiable  Always invoked (cannot bypass) ◦ Includes  Subjects and objects  What is a Security Kernel? ◦ Hardware, firmware, and software elements of a trusted computing base that implements the reference monitor 15

Establishing Confidence in Trusted Systems  Evaluation criteria are standardized methods for establishing confidence that products satisfy the functional and assurance requirements of the organization ◦ Trusted Computer System Evaluation Criteria (TCSEC) – The Orange book ( ) ◦ Information Technology Security Evaluation Criteria (ITSEC) ( ) ◦ Federal criteria 1992 ◦ FIPS of 1994 and FIPS-2 of 2001 ◦ Common Criteria (ISO 15408) (1998-present) 16

17