Chapter 19: Building Systems with Assurance

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
Chapter 6 Security Kernels.
Effective Design of Trusted Information Systems Luděk Novák,
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Vulnerability Assessments
Session 3 – Information Security Policies
SEC835 Database and Web application security Information Security Architecture.
Information Systems Security Computer System Life Cycle Security.
IS2150/TEL2910: Introduction of Computer Security1 Nov 15, 2005 Assurance.
ISA 562 Internet Security Theory & Practice
Security Architecture
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
SOFTWARE DESIGN (SWD) Instructor: Dr. Hany H. Ammar
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Engineering Essential Characteristics Security Engineering Process Overview.
Chapter 7 Securing Commercial Operating Systems. Chapter Overview Retrofitting Security into a Commercial OS History of Retrofitting Commercial OS's Commercial.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
CSCE 548 Secure Software Development Security Operations.
CS526: Information Security Chris Clifton November 4, 2003 Assurance.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 23: Vulnerability Analysis Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 1: Security Governance Through Principles and Policies
Module 7: Designing Security for Accounts and Services.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Advanced Software Engineering Dr. Cheng
CS457 Introduction to Information Security Systems
CompTIA Security+ Study Guide (SY0-401)
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Chapter 1: Introduction
CS4311 Spring 2011 Process Improvement Dr
Introduction to Assurance
Security Engineering.
Official levels of Computer Security
Advanced System Security
Chapter 1: Introduction
NAAS 2.0 Features and Enhancements
IS4680 Security Auditing for Compliance
THE ORANGE BOOK Ravi Sandhu
Cryptography and Network Security
Chapter 23: Vulnerability Analysis
How to Mitigate the Consequences What are the Countermeasures?
Chapter 19 Technical Metrics for Software
Chapter 29: Program Security
Advanced System Security
Requirements Document
Architectural Mismatch: Why reuse is so hard?
Presentation transcript:

Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University Summers_wayne@colstate.edu http://csc.colstate.edu/summers

Assurance in Requirements Definition and Analysis Threat – potential occurrence that can have an undesirable effect on the system assets or resources (can lead to undesirable consequences) Breaches of confidentiality, disruption of integrity, or denials of service Vulnerability – weakness that makes it possible for a threat to occur Control- countermeasure that mitigates a threat or eliminates a vulnerability

Assurance in Requirements Definition and Analysis Security Mechanisms and Layered Architecture Building Security In or Adding Security Layer Reference monitor – access control concept of an abstract machine that mediates all accesses to objects by subjects Reference validation mechanism(RVM) – implementation of the reference monitor concept (must be tamperproof, always be invoked, small enough to be tested for completeness) Security kernel – combination of h’ware and s’ware that implements a reference monitor Trusted computer base (TCB)- all protection mechanisms within a computer system that are responsible for enforcing a security policy.

Assurance in Requirements Definition and Analysis Policy Definition and Requirements Specification Specification- description of characteristics of a computer system or program (must be clear, unambiguous, and complete) Extract applicable requirements from existing security standards (e.g. Common Criteria) Create a new policy from results from threat analysis and existing policies Map system to an existing model Justifying Requirements Once a policy has been defined and specified, it must be shown to be complete and consistent.

Assurance During Systems and Software Design Design Techniques that Support Assurance Module – set of related functions and pertinent data structures (objects) Minimize communications between modules (avoid the use of global variables) Assignment of privilege should be tighly controlled and privileges revoked when no longer needed

Assurance During Systems and Software Design Design Document Contents Security functions – identifies the high-level security functions that are defined for the system (i.e. identification, authentication, access control, and auditing) External Functional Specification - high-level description of external interfaces to a system, component, subcomponent, or module Internal Design – describes the internal structures and functions of the components of a system Review: guidelines, conflict resolution methods, completion procedures

Assurance in Implementation and Integration Implementation Considerations that Support Assurance Choice of language – strong typing, built-in buffer overflow protections, data hiding, modularity, domains & domain access protections, garbage collection, error handling Assurance Through Implementation Management Configuration Management Version control and tracking Change authorization Integration procedures Tools for product generation

Assurance in Implementation and Integration Justifying That the Implementation Meets the Design Security Testing Functional testing Structural testing Unit testing Systems testing Third-party testing (independent testing) Security testing Assurance During Operation and Maintenance