Computer Security Foundations and Principles Nicolas T. Courtois - University College of London.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Ind – Develop a foundational knowledge of pricing to understand its role in marketing. (Part II) Entrepreneurship I.
Let’s Talk About Cyber Security
StormingForce.com Motion. StormingForce.com StormingForce’s technology is significantly increasing productivity and quality of manual repetitive tasks.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
VM: Chapter 5 Guiding Principles for Software Security.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Prepared by: Nahed Al-Salah
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
1 An Overview of Computer Security computer security.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
SEC835 Database and Web application security Information Security Architecture.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
G53SEC Computer Security Introduction to G53SEC 1.
Computer Security Foundations and Principles Nicolas T. Courtois - University College of London.
Cyber crime & Security Prepared by : Rughani Zarana.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Marketing Ethics and Social Responsibility
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Computer Security Foundations and Principles Nicolas T. Courtois - University College London.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Security in Computer System 491 CS-G(172) By Manesh T
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
CONTROLLING INFORMATION SYSTEMS
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Security Mindset Lesson Introduction Why is cyber security important?
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Computer Security Sample security policy Dr Alexei Vernitski.
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
CS457 Introduction to Information Security Systems
Securing Network Servers
Issues and Protections
Common Methods Used to Commit Computer Crimes
Presented by Muhammad Abu Saqer
Computer Security Foundations and Principles
How to Mitigate the Consequences What are the Countermeasures?
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
6. Application Software Security
Presentation transcript:

Computer Security Foundations and Principles Nicolas T. Courtois - University College of London

CompSec Intro Nicolas T. Courtois, January Plan What is CompSec? –Computer Industry –Security = ? –Security Science 123 Life Context and Threats –Small / Big Threats –Economics –Defenders –Risk –Failures –Ethics, Hackers Principles - Defenses –Security Design Principles, Security Engineering –Security Management Principles –Weakest Link? –Secrecy / Open Source –Case Studies - Attack Trees

CompSec Intro Nicolas T. Courtois, January About Myself – Short Bio: Cryptologist. Main interests: –Cryptanalysis – how to break things… –Smart cards, 8 »(see Applied Crypto module, term 2). –Economics, business and ethical aspects of information security. This will influence the way in which this course will be taught.

CompSec Intro Nicolas T. Courtois, January Computers …

CompSec Intro Nicolas T. Courtois, January Computer Industry We are dealing here with a particular industry: Computer industry. Software and Hardware. This industry is arguably VERY special, unlike any other industry that ever existed… But we can and will compare it to other industries smart cards have their own O.S. –much more focus on security since always mobile phones, similarly developed very differently too… voting machines, door/car lock systems, etc…

CompSec Intro Nicolas T. Courtois, January A Sort of Disclaimer This whole part of my slides (152 pages ) contains a lot of “Philosophy” things… complimentary to other parts, could be studied at any moment I don’t intend to ask you abstract “philosophy” questions at the exam, rather more concrete technical questions: beware of vague statements and excessive generalizations… what do the principles / methodology / ideas actually do in practice… be specific and factual

CompSec Intro Nicolas T. Courtois, January Computer Industry and Security Social-Econ Background: Science background: Tech Background: “Industry Standards” such as: Intel CPU and Chipset, RAM and hard drives, C language, UNIX / Windows TCP/IP, HTTP, TLS,

CompSec Intro Nicolas T. Courtois, January Computer Industry and Security Social-Econ Background: Science background: What technology “enablers”(computers) and “disablers” (cryptology,HWSec) can/cannot achieve? How to define / classify security problems and find “good” solutions “Industry Standards”

CompSec Intro Nicolas T. Courtois, January Computer Industry and Security Social-Econ Background: things exist for a reason. “Nice or unpleasant” facts of life: software/hardware economics: which industry dominates which free market triumphs and disasters these stupid humans that cannot be bothered to obey the policy… these bureaucratic organisations that just cannot get their best interest(?) right nobody is buying/using the wonderful(?) technology, adoption barriers theory vs. practice crime war terrorism… laws / regulations etc… Science background: “Industry Standards” insecure rubbish!

CompSec Intro Nicolas T. Courtois, January The Product Development cycle Social-Econ Background: Science background: “Industry Standards” everything ends up here rapid obsolescence

CompSec Intro Nicolas T. Courtois, January What is Security?

CompSec Intro Nicolas T. Courtois, January Definition 1 [Courtois] Security: protect the value(s). What value(s) ? ALL !

CompSec Intro Nicolas T. Courtois, January Security: protect the value(s). What value(s) ? Money [economical security] But NOT ONLY MONEY. Life and the quality of life. (CB, car panic button) Privacy is a value in itself. Good technology vs. bad one Freedom, Justice, etc …

CompSec Intro Nicolas T. Courtois, January Security: Definition 2. asset holder

CompSec Intro Nicolas T. Courtois, January Security  Safety Difference: protect against intentional damages... Notion of an Attacker / Adversary. Notion of an Attack.

CompSec Intro Nicolas T. Courtois, January Attacker Attacker = Adversary = Threat Agent

CompSec Intro Nicolas T. Courtois, January **Dimensions of Security Physical vs. Logical Psychological / Human vs. Organizational / Business very different!

CompSec Intro Nicolas T. Courtois, January *Security on One Slide

CompSec Intro Nicolas T. Courtois, January Main Goals: Confidentiality Integrity Authenticity Availability Accountability

CompSec Intro Nicolas T. Courtois, January In There a Need for More Security? or will I have a job tomorrow?

CompSec Intro Nicolas T. Courtois, January Hegel [ ], German philosophy The history is the process of broadening freedom.

CompSec Intro Nicolas T. Courtois, January Why Security, why Cryptography ? Freedom, new technologies  More possibilities  More security problems … “ Theorem ” [Courtois]: Freedom    Security  0

CompSec Intro Nicolas T. Courtois, January Freedom  Security issues … Examples: invention of train/metro  threat of pickpockets car traffic:  major cause of death, trains are much safer invention of the internet  pirates and hackers.

CompSec Intro Nicolas T. Courtois, January Why Security, why Cryptography ? Freedom of travel by car  main cause of death (e.g. 1.2 M people die every year in car accidents !) Unlimited exchange of data over the internet  unlimited security problems.

CompSec Intro Nicolas T. Courtois, January *Prof. Shigeo Tsujii, “ The society should be designed to help people to enjoy the freedoms ”… “ broadened by IT ”. Enjoy benefits, limit/remove disadvantages.

CompSec Intro Nicolas T. Courtois, January “ Adding ” Security – Def. 3. The goal of cryptology and security [Courtois]: Add security to the information technologies (IT) that are by nature insecure.

CompSec Intro Nicolas T. Courtois, January Adding Security - Criticism

CompSec Intro Nicolas T. Courtois, January Critics [Schneier] Why security it is an after-thought? “ Aftermarket security is actually a very inefficient way to spend our security dollars; it may compensate for insecure IT products, but doesn't help improve their security ”. “ Additionally, as long as IT security is a separate industry, there will be companies making money based on insecurity -- companies who will lose money if the internet becomes more secure. ” Why security is not built-in? “ utopian vision ” Security is difficult, expensive and takes time …

CompSec Intro Nicolas T. Courtois, January ***Today [Schneier] “ I am regularly asked what average Internet users can do to ensure their security. My first answer is usually, "Nothing--you're screwed. “

CompSec Intro Nicolas T. Courtois, January ****Visions [Schneier] Future? Two visions. “ will become another utility ” “ users will simply expect it to work -- and the details of how it works won't matter ”. “ computer security for the general populace will never be achievable. ” “ let's just live with being as secure as we can. ”

CompSec Intro Nicolas T. Courtois, January Security Science

CompSec Intro Nicolas T. Courtois, January Claim [Courtois, Schneier]: Computer Security and real-world security are governed by the same laws !!!

CompSec Intro Nicolas T. Courtois, January The Security ? 3-point Formal Approach What is Security ? Inability to achieve: 1.Security against what: Adversarial Goal. 2.Against whom: resources of the Adversary: money, human resources, computing power, memory, risk, expertise, etc.. 3.Access to the system.

CompSec Intro Nicolas T. Courtois, January Attackers

CompSec Intro Nicolas T. Courtois, January Vocabulary Attacker / Adversary / Threat Agent

CompSec Intro Nicolas T. Courtois, January Adversarial Goals

CompSec Intro Nicolas T. Courtois, January a. Who Are the Attackers bored teenagers, petty => organized criminals, rogue states, industrial espionage, disgruntled employees, … pure legitimate use Inadvertent events, bugs, errors, ourselves (forgot the d … password!), our family / friends / co-workers,

CompSec Intro Nicolas T. Courtois, January b. Their Means computers (MIPS) / other hardware (antennas, liquid Nitrogen, etc … ) knowledge / expertise risk/exposure capacity

CompSec Intro Nicolas T. Courtois, January Access

CompSec Intro Nicolas T. Courtois, January Access to Computers Somewhat similar as for cars:

CompSec Intro Nicolas T. Courtois, January Access to your car. Miles away … When you drive on the road When parked on the street. Enters your garage Had a key yesterday and he made a copy …

CompSec Intro Nicolas T. Courtois, January Access to a Computer Remote location, not connected to Internet Remote location, somewhat connected … Physical proximity … Access to USB ports. Access (alone) for a few seconds … Take it home and hack it …

CompSec Intro Nicolas T. Courtois, January *3. Access

CompSec Intro Nicolas T. Courtois, January Insecurity

CompSec Intro Nicolas T. Courtois, January ***Insecurity Aspects

CompSec Intro Nicolas T. Courtois, January “ Small ” Little Things

CompSec Intro Nicolas T. Courtois, January What are Important Security Issues? Think twice.

CompSec Intro Nicolas T. Courtois, January Mildest Forms of Insecurity nuisance and irritation generated by security and updates, necessity to think about such sordid things as security, losing some pennies on it … Slight problem: the long tail theory.

CompSec Intro Nicolas T. Courtois, January the Long Tail theory frequency cost

CompSec Intro Nicolas T. Courtois, January Major Threats

CompSec Intro Nicolas T. Courtois, January Block Buster Insecurity Viruses/Worms (e.g. Melissa 1999) DOS hurting big corp. / countries [Estonia] Financial/personal data files leaked/lost [lots in the media US] Computer break-ins [little publicity?]

CompSec Intro Nicolas T. Courtois, January Explosion of Known Vulnerabilities What about the unknown ones?

CompSec Intro Nicolas T. Courtois, January Is My PC Infected? Many PCs are

CompSec Intro Nicolas T. Courtois, January Why Things Happen? Bugs … or don ’ t care. Programming developed with absence of security. C/C++ is unsafe (Microsoft is currently blacklisting big chunks of standard C, could have happened 10 years ago). Security/cryptography research developed with obsession with security. Both never met. Mystified: –security issues are probably always exaggerated and distorted, one way or another (downplayed OR exaggerated, Ross Anderson: “ hypertrophy ” of security) Economics/Business: –many things just don ’ t matter! –customers do not see => do not care about security –usability: user burden frustrates them.

CompSec Intro Nicolas T. Courtois, January CompSec and Economics

CompSec Intro Nicolas T. Courtois, January Question “[…] Why do so many vulnerabilities exist in the first place?[…]” Cf. Ross Anderson, Tyler Moore et al: 1.“The Economics of Information Security” In Science, October “Security Economics and the Internal Market”: public report for ENISA (European Network and Information Security Agency), March 2008.

CompSec Intro Nicolas T. Courtois, January Why Commercial Security Fails? Claim: the link between “ money ” and security is frequently broken today: –Security is a public good. “ private ” incentives are weak. –Worse than “ market for lemons ” : Not only that the customer cannot see the difference between good security and bad. Frequently the manufacturer cannot either. Too frequently security (and our safety) remains something that money cannot buy … (money seems to work for cars, and to fail for computers)

CompSec Intro Nicolas T. Courtois, January Security and Economics Security is about [sensible] security trade-offs. Closely related to economy: How to allocate resources efficiently. Goes much further: Most security trade-offs are economical in nature. Security is shaped by the economy. Uncertainty and security problems (e.g. social security) appear in all free economies.

CompSec Intro Nicolas T. Courtois, January The Very Nature of Security: Bruce Schneier “ Beyond Fear ” book [2003], p.1: Critical to any security decision is the notion of [security] trade-offs, meaning the costs – terms of money, convenience, comfort, freedoms, and so on - that inevitably attach themselves to any security system. People make security trade-offs naturally. Many costs are intangible and hard to trade for money: Paying attention, loss of freedom&privacy, being subject to unforeseen risks and consequences etc.

CompSec Intro Nicolas T. Courtois, January *Defenders relevant though boring vocabulary..

CompSec Intro Nicolas T. Courtois, January Actions of Defenders

CompSec Intro Nicolas T. Courtois, January Types of Prevention [+cost -freq]

CompSec Intro Nicolas T. Courtois, January Detection and Recovery Detect Recover – have a recovery plan monitoring anomaly analysis etc. example: Intrusion detection

CompSec Intro Nicolas T. Courtois, January ***IT Sec and the Military

CompSec Intro Nicolas T. Courtois, January Military vs. Commercial Military data security: focus on secrecy, prevent leaks. Commercial data security: integrity and authenticity: prevent fraud.

CompSec Intro Nicolas T. Courtois, January ****** Traditional Military Doctrine Each country has 3 frontiers: land sea air, space as a consequence they have 3 armies. Now, we have a new frontier, the digital frontier. Shouldn ’ t we have a fourth army? It would be totally useless and waste of money? Arguably less than the 3 above (better technical education for young people).

CompSec Intro Nicolas T. Courtois, January *Risk

CompSec Intro Nicolas T. Courtois, January Risk Management = Measuring or/and assessing risks 2.Developing strategies and solutions to manage risks: reduce/avoid and handle risks

CompSec Intro Nicolas T. Courtois, January **Risk Management contd … handle risks risk retention risk transfer contract … hedging (e.g. insurance) (minimise exposure by some transaction)

CompSec Intro Nicolas T. Courtois, January Residual Risk = def what remains after defences are in place …

CompSec Intro Nicolas T. Courtois, January Failures

CompSec Intro Nicolas T. Courtois, January ****Attacks  Target attacker vulnerabilities defences controls countermeasures attack target system expectations, goals properties security policy =what is allowed/not (protection goals) if there is one

CompSec Intro Nicolas T. Courtois, January *Security Failures vulnerability security policy: what is allowed/not, protection goals defences: controls countermeasures

CompSec Intro Nicolas T. Courtois, January Types of Failures Failure in design Failure in implementation Failure in operation

CompSec Intro Nicolas T. Courtois, January If It Can Fail … It Will

CompSec Intro Nicolas T. Courtois, January

CompSec Intro Nicolas T. Courtois, January Key Question: Is actively researching serious security vulnerabilities socially desirable? - Of Course Yes! …will tell you every professional hacker and every academic code-breaker…

CompSec Intro Nicolas T. Courtois, January Bruce Schneier [14 May 2008]: Problem: A hacker who discovers one [attack] can sell it on the black market, blackmail the vendor with disclosure, or simply publish it without regard to the consequences. Q: […] is it ethical to research new vulnerabilities? A: Unequivocally, yes. [according to Schneier] Because: Vulnerability research is vital because it trains our next generation of computer security experts.

CompSec Intro Nicolas T. Courtois, January Our Answer: The question is open to debate and remains somewhat controversial Maybe it depends.. …on what?

CompSec Intro Nicolas T. Courtois, January Rescorla [2004] Research and disclose? Yes, if … …these vulnerabilities are likely to be rediscovered Cf. E. Rescorla. “Is finding security holes a good idea?” In 3rd Workshop on the Economics of Information Security (2004).

CompSec Intro Nicolas T. Courtois, January Benefits: Disclosure creates incentives for fixing these vulnerabilities.

CompSec Intro Nicolas T. Courtois, January Attackers and Hackers

CompSec Intro Nicolas T. Courtois, January Motivation Enjoyment, fame, ego, role models Develop science and offensive technology: –University researchers, (good/bad) –Security professionals (defenders) –Professional hackers, pen testers, etc … Profits and other benefits –Crime business, –Promoting legal security business, –Political activism, terrorism,

CompSec Intro Nicolas T. Courtois, January Hackers Are: bored teenagers, petty => organized criminals, rogue states, industrial espionage, disgruntled employees, … pure legitimate use Inadvertent events, bugs, errors, ourselves (forgot the d … password!), our family / friends / co-workers,

CompSec Intro Nicolas T. Courtois, January b. Their Means computers (MIPS) / other hardware (antennas, liquid Nitrogen, etc … ) knowledge / expertise risk/exposure capacity

CompSec Intro Nicolas T. Courtois, January Hacker Movement

CompSec Intro Nicolas T. Courtois, January Hacktivism Mostly about getting attention in the press through direct and spectacular action (hacking) against a government or corporate entity. In order to achieve a political effect. Usually still a technology claim: Just improve the security! It is broken. Just hire better experts/cryptographers/programmers … Political statement unrelated to technology: Russia does not agree with Estonia.

CompSec Intro Nicolas T. Courtois, January Chaos Computer Club started in Hamburg in 1981 as a German-speaking libertarian-anarchist conference and social movement claiming freedom at any price, including freedom to pirate anything …

CompSec Intro Nicolas T. Courtois, January Chaos Computer Club Very strong relations with German press makes that it is much harder to put hackers to jail (fear of bad press coverage). Don ’ t do the same things that some people do.. They will get away with it, you will not. These people are very strong defenders of some rights such as privacy and freedom of speech, and thus they achieve a sort of legitimacy in the public eye to indulge in activities that would otherwise be considered just criminal. in the same way trade unions frequently get away with doing illegal things, but not always, many trade union leader have been in prison once or twice. The risk is totally and absolutely non-zero. In the 80s the CCC guys showed the insecurity of Bildschirmtext computer network and made it debit a bank in Hamburg 134K DM in favour of the Club. Then they organized a press conference. The banks were nice, did NOT sue them. But how can you predict they will be nice?

CompSec Intro Nicolas T. Courtois, January Recent Trend: Rapid growth. The industrialization of hacking: division of labour, clear definition of roles forming a supply chain professional management

CompSec Intro Nicolas T. Courtois, January ***Question:

CompSec Intro Nicolas T. Courtois, January Principles of Security Engineering

CompSec Intro Nicolas T. Courtois, January Security Engineering Definition: [Ross Anderson] building systems to remain dependable in face of malice, error or mischance.

CompSec Intro Nicolas T. Courtois, January Magic Formulas … or “Security Mantras”: repeat after me: C.I.A. C.I.A. In fact we have no silver bullet. on the contrary: Security is about trade-offs. Conflicting engineering criteria…. Conflicting requirements… Overcoming human, technology and market failures. insecure rubbish!

CompSec Intro Nicolas T. Courtois, January Proportionality Principle Maximize security??? Maximize “ utility ” (the benefits) while limiting risk to an acceptable level within reasonable cost … »all about economics …

CompSec Intro Nicolas T. Courtois, January Efficiency and Effectiveness Security measures must be: Efficient and effective…

CompSec Intro Nicolas T. Courtois, January

CompSec Intro Nicolas T. Courtois, January Open Design Principle Frequently incorrectly understood and confused with open source [cf. also Kerckhoffs and later slides 140-…]. Examples: cryptography such as SHA256 (used in bitcoin) is open source but was designed behind closed doors at the NSA.

CompSec Intro Nicolas T. Courtois, January Least Privilege [or Limitation] Principle Every “module” (such as a process, a user or a program) should be able to access only such information and resources that are necessary to its legitimate purpose.

CompSec Intro Nicolas T. Courtois, January Attitudes There are two basic attitudes: Default permit - "Everything, not explicitly forbidden, is permitted" Allows greater functionality by sacrificing security. Good if security threats are non-existent or negligible. Default deny - "Everything, not explicitly permitted, is forbidden" Improves security, harder to get any functionality. Believed to be a good approach if you have lots of security threats. BTW. default deny + fine granularity = the Least Privilege principle

CompSec Intro Nicolas T. Courtois, January Fail-safe Defaults Secure by default, Example:if we forget to specify access, deny it.

CompSec Intro Nicolas T. Courtois, January Economy of Mechanism A protection mechanism should have a simple and small design. –small and simple enough to be build in a rigorous way, and fully tested and analysed

CompSec Intro Nicolas T. Courtois, January Separation of Privileges Split into pieces with limited privileges! Implementation in software engineering: Have computer program fork into two processes. The main program drops privileges (e.g. dropping root under Unix). The smaller program keeps privileges in order to perform a certain task. The two halves then communicate via a socket pair. Benefits: A successful attack against the larger program will gain minimal access. –even though the pair of programs will perform privileged operations. A crash in a process run as nobody cannot be exploited to gain privileges. Additional possibilities: obfuscate individual modules and/or make them tamper resistant through software. Or burn them into a dedicated hardware module, and burn the fuse that allows to read the firmware.

CompSec Intro Nicolas T. Courtois, January Least Common Mechanism

CompSec Intro Nicolas T. Courtois, January Be Friendly!

CompSec Intro Nicolas T. Courtois, January Saltzer and Schroeder 1975: Psychologically Acceptable not enough anymore

CompSec Intro Nicolas T. Courtois, January Usability + Consent Acceptable and accepted… or not: otherwise the mechanism will be bypassed (-consent) Nice User-friendly

CompSec Intro Nicolas T. Courtois, January Be Even More Friendly: Don’t annoy people. –Minimize the number of clicks –Minimize the number of things to remember –Make security easy to understand and self-explanatory –Security should NOT impact users that obey the rules. Established defaults should be reasonable. –People should not feel trapped. It should be easy to –Restrict access –Give access –Personalize settings –Etc…

CompSec Intro Nicolas T. Courtois, January More Design Principles

CompSec Intro Nicolas T. Courtois, January Think Ahead

CompSec Intro Nicolas T. Courtois, January Trust vs. Security

CompSec Intro Nicolas T. Courtois, January Trust

CompSec Intro Nicolas T. Courtois, January Be Reluctant to Trust Cf. Least Privilege.

CompSec Intro Nicolas T. Courtois, January Be Trustworthy

CompSec Intro Nicolas T. Courtois, January

CompSec Intro Nicolas T. Courtois, January Lipner 1982 These can be see as management principles: How to manage development and production, avoid random failures and security breaches alike. Principle of Segregation of Duties = Separation of Duty.

CompSec Intro Nicolas T. Courtois, January Segregation of Duties Achieved by (closely related): Principle of Functional separation: Several people should cooperate. Examples: one developer should not work alone on a critical application, the tester should not be the same person as the developer If two or more steps are required to perform a critical function, at least two different people should perform them, etc. –This principle makes it very hard for one person to compromise the security, on purpose of inadvertently. Principle of Dual Control: –Example 1: in the SWIFT banking data management system there are two security officers: left security officer and right security officer. Both must cooperate to allow certain operations. –Example 2: nuclear devices command. –Example 3: cryptographic secret sharing

CompSec Intro Nicolas T. Courtois, January Auditing / Monitoring –Record what actions took place and who performed them –Contributes to both disaster recovery (business continuity) and accountability.

CompSec Intro Nicolas T. Courtois, January Lipner 1982: Requirements, focus on integrity of the business processes and of the “production” data whatever it means: 1.Users will not write their own programs. 2.Separation of Function : Programmers will develop on test systems and test data, not on “production” systems. 3.A special procedure will allow to execute programs. 4.Compliance w.r.t. 3 will be controlled / audited. 5.Managers and auditors should have access to the system state and to all system logs.

CompSec Intro Nicolas T. Courtois, January

CompSec Intro Nicolas T. Courtois, January Weakest Link Chain metaphor: Schneier: “security is only as strong as the weakest link.”

CompSec Intro Nicolas T. Courtois, January Cryptographic Failures

CompSec Intro Nicolas T. Courtois, January Chains vs. Layers

CompSec Intro Nicolas T. Courtois, January Two Cases Security can be like a chain: or, better Security can be layered

CompSec Intro Nicolas T. Courtois, January Military: Defence in Depth

CompSec Intro Nicolas T. Courtois, January Layers Computer systems have multiple layers, e.g. –HW components –Chipset/MB –OS –TCP/IP stack –HTTP application –Secure http layer –Java script –User/smart card interface

CompSec Intro Nicolas T. Courtois, January Example 1: assuming 1000 little details …

CompSec Intro Nicolas T. Courtois, January Example 2: assuming 1000 little details …

CompSec Intro Nicolas T. Courtois, January **Weakest Link vs. Sum of Efforts

CompSec Intro Nicolas T. Courtois, January About of Software Development Process

CompSec Intro Nicolas T. Courtois, January *Probability Distributions

CompSec Intro Nicolas T. Courtois, January *Bell Curve – Repetitive Events Worst Case - Median Case - Best Case, probability cost 50 %

CompSec Intro Nicolas T. Courtois, January *Bell Curve – Repetitive Events Average Case? no such thing … => Average (Cost) = Cost Expectancy =  = total surface below the curve  Average (Time) probability cost

CompSec Intro Nicolas T. Courtois, January Bell Curve – Repetitive Events Here 99% of the Time Average Cost is Substantial probability cost

CompSec Intro Nicolas T. Courtois, January Rare Events Here 99% of the Time Average Cost is VERY low! probability cost

CompSec Intro Nicolas T. Courtois, January Rare Events Worst Case - Median Case - Best Case, probability cost 50 %

CompSec Intro Nicolas T. Courtois, January Back to Schneier Quote

CompSec Intro Nicolas T. Courtois, January Worst Case Defences? Criticism Cormac Herley [Microsoft research]: Most security systems are build to defend against the worst case. In reality, the average case losses are insignificant or small, e.g. actually computer crime worldwide is very small … and many security technologies are maybe -- from the economics point of view -- totally useless but it depends, we cannot judge security technologies by present losses, because there are also losses that have been avoided or deterred by this technology, and also that losses evolve over the time with highly chaotic pattern (they are 0 then suddenly they may explode)

CompSec Intro Nicolas T. Courtois, January Worst Case Defences? Conclusion There is no general answer. Both arguments are legitimate. More detailed analysis is needed; what if etc... Can this be done? Maybe there will always be some purely political choices that is impossible neither to justify, nor to undermine.

CompSec Intro Nicolas T. Courtois, January Security Technologies: Security as f(penetration rate)

CompSec Intro Nicolas T. Courtois, January Deployment / Penetration Rate Two sorts of technologies: A) Those that are effective if deployed at 20%: Examples: 1.virus detection (as opposed to removal / fighting the viruses), 99 % 2. / hard disk encryption, 20 % 3.making the entry/authentication harder, as an option for the user, 20% B)Those that are totally ineffective even at 99%: Examples: 1.virus removal, 2.buggy anti-virus: “ your anti-virus has just restarted due to an internal error ”… 3.we click YES for 1 % of the security alerts out of fatigue … certificates are frequently invalid … it invalidates the 99 % of the time we did prevent the intrusion … we lost our time 4.if some ATMs still accept a blank mag-stripe only cards, the whole purpose of chips on bank cards is nearly defeated …

CompSec Intro Nicolas T. Courtois, January Secrecy vs. Transparency

CompSec Intro Nicolas T. Courtois, January Open Source vs. Closed Source and Security

CompSec Intro Nicolas T. Courtois, January Secrecy: Very frequently an obvious business decision. Creates entry barriers for competitors. But also defends against hackers.

CompSec Intro Nicolas T. Courtois, January Kerckhoffs ’ principle: [1883] “ The system must remain secure should it fall in enemy hands …”

CompSec Intro Nicolas T. Courtois, January Kerckhoffs ’ principle: [1883]

CompSec Intro Nicolas T. Courtois, January Yes (1,2,3,4): 1. Military: layer the defences.

CompSec Intro Nicolas T. Courtois, January Yes (2): 2) Basic economics: these 3 extra months (and not more  ) are simply worth a a lot of money.

CompSec Intro Nicolas T. Courtois, January Yes (3): 3) Prevent the erosion of profitability / barriers for entry for competitors / “ inimitability ”

CompSec Intro Nicolas T. Courtois, January Yes (4): 4) Avoid Legal Risks companies they don't know where their code is coming from, they want to release the code and they can't because it's too risky! re-use of code can COMPROMISE own IP rights and create unknown ROYALTY obligations (!!!) clone/stolen code is more stable, more reliable, easier to understand!

CompSec Intro Nicolas T. Courtois, January What ’ s Wrong with Open Source?

CompSec Intro Nicolas T. Courtois, January Kerckhoffs principle: Rather WRONG in the world of smart cards … –Reasons: side channel attacks, PayTV card sharing attacks etc.. But could be right elsewhere for many reasons … –Example: DES,AES cipher, open-source, never really broken KeeLoq cipher, closed source, broken in minutes …

CompSec Intro Nicolas T. Courtois, January *Kerckhoffs principle vs. Public Key Crypto vs. Financial Cryptography In Public Key Cryptography one key CAN be made public. In practice this means that –some group of people has it –NO obligation to disclose, to make it really public (and it is almost never done in serious financial applications) Again full disclosure for public keys is unbelievably stupid and simply BAD security engineering and BAD security management. Examples: all ATMs in the country have 6 public keys, not really public though in Bitcoin: the public key can remain a secret for years, only a hash is revealed, this is BRILLIANT key management which makes Bitcoin MUCH more secure that it would otherwise be!

CompSec Intro Nicolas T. Courtois, January Which Model is Better? Open and closed security are more or less equivalent … more or less as secure: opening the system helps both the attackers and the defenders. Cf. Ross Anderson: Open and Closed Systems are Equivalent (that is, in an ideal world). In Perspectives on Free and Open Source Software, MIT Press 2005, pp

CompSec Intro Nicolas T. Courtois, January Open Source:

CompSec Intro Nicolas T. Courtois, January Social Critique of Open Source Software

CompSec Intro Nicolas T. Courtois, January

CompSec Intro Nicolas T. Courtois, January Attack Tree [Schneier 1999] but what about unknown attacks? Get Admin Access Abuse Limited Account Get Limited Access Abuse System Privileges 1/10 Privilege Escalation Exploit #36 sub-goals refinement details

CompSec Intro Nicolas T. Courtois, January Expanded Example Get Admin Access Become Admin Directly Obtain Legit. Admin Account Create One’s Own Account Obtain Sb’s CredentialsCreate Account login passwordin person remotely Abuse Limited Account Get Limited Access Abuse System Privileges 1/100 Privilege Escalation Exploit #36 similar bribe £1000 shoulder surfing intercept keyboard sniffer 1/10 guess / crack reset

CompSec Intro Nicolas T. Courtois, January Unix Log In

CompSec Intro Nicolas T. Courtois, January Weakest Link Security like a chain: Get Admin Access Become Admin Directly Abuse Limited Account 1/100 1/10 easier!

CompSec Intro Nicolas T. Courtois, January Defense in Depth also appears in attack trees… Crack Password spec secrecy cipher secrecy password hardness getting the SAM file

CompSec Intro Nicolas T. Courtois, January Conclusion: In complex systems, the principles of weakest link and defence in depth will occur simultaneously.

CompSec Intro Nicolas T. Courtois, January Accessing Password Database

CompSec Intro Nicolas T. Courtois, January Stealing Data with Costs

CompSec Intro Nicolas T. Courtois, January Opening a Safe with Costs © Bruce Schneier

CompSec Intro Nicolas T. Courtois, January Cheapest Attack without Special Equipment © Bruce Schneier

CompSec Intro Nicolas T. Courtois, January Attack Tree for PGP © Bruce Schneier

CompSec Intro Nicolas T. Courtois, January Reading a message sent between 2 Windows machines with countermeasures © Bruce Schneier