C HAPTER 1 Security Goals Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Access Control Chapter 3 Part 3 Pages 209 to 227.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Access Control Methodologies
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information Security Policies and Standards
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Applied Cryptography for Network Security
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
ISEC0511 Programming for Information System Security
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
C HAPTER 1 Security Goals Ahmed Khademzadeh Imam Reza University of Mashhad
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Systems Security
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Access Control / Authenticity Michael Sheppard 11/10/10.
Computer Security By Duncan Hall.
Privilege Management Chapter 22.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Information Systems Design and Development Security Precautions Computing Science.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Identity and Access Management
Chapter One: Mastering the Basics of Security
Secure Software Confidentiality Integrity Data Security Authentication
SECURITY in IT ~Shikhar Agarwal.
Radius, LDAP, Radius used in Authenticating Users
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Strong Password Authentication Protocols
Operating System Concepts
Presentation transcript:

C HAPTER 1 Security Goals Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita Kesavan (ISBN ; Except as otherwise noted, the content of this presentation is licensed under the Creative Commons 3.0 License.

Agenda Seven Key Security Concepts:  Authentication  Authorization  Confidentiality  Data / Message Integrity  Accountability  Availability  Non-Repudiation System Example: Web Client-Server Interaction

1.1. Security Is Holistic Physical Security Technological Security  Application Security  Operating System Security  Network Security Policies & Procedures All Three Required

Physical Security Limit access to physical space to prevent asset theft and unauthorized entry Protecting against information leakage and document theft Ex: Dumpster Diving - gathering sensitive information by sifting through the company’s garbage

Technological Security (1) (Application Security) No flaws in identity verification process Configure server correctly  local files  database content Interpret data robustly Web Server & Browser Example

Technological Security (2) (OS & Network Security) Apps (e.g. servers) use OS for many functions OS code likely contains vulnerabilities  Regularly download patches to eliminate (e.g. Windows Update for critical patches) Network Security: mitigate malicious traffic Tools: Firewalls & Intrusion Detection Systems

Policies & Procedures Ex: Social engineering attack - taking advantage of unsuspecting employees (e.g. attacker gets employee to divulge his username & password) Guard sensitive corporate information Employees need to be aware, be educated to be somewhat paranoid and vigilant

Security Concepts Authentication Authorization Confidentiality Data / Message Integrity Accountability Availability Non-Repudiation

Archetypal Characters Alice & Bob – “good guys” Eve – a “passive” eavesdropper Mallory – an “active” eavesdropper Trent – trusted by Alice & Bob Alice Bob

1.2. Authentication Identity Verification How can Bob be sure that he is communicating with Alice? Three General Ways:  Something you know (i.e., Passwords)  Something you have (i.e., Tokens)  Something you are (i.e., Biometrics)

Something you KNOW Example: Passwords  Pros: Simple to implement Simple for users to understand  Cons: Easy to crack (unless users choose strong ones) Passwords are reused many times One-time Passwords (OTP): different password used each time, but it is difficult for user to remember all of them

Something you HAVE OTP Cards (e.g. SecurID): generates new password each time user logs in Smart Card: tamper-resistant, stores secret information, entered into a card-reader Token / Key (i.e., iButton) ATM Card Strength of authentication depends on difficulty of forging

Something you ARE Biometrics Pros: “raises the bar” Cons: false negatives/positives, social acceptance, key management  false positive: authentic user rejected  false negative: impostor accepted TechniqueEffectivenessAcceptance Palm Scan16 Iris Scan21 Retinal Scan37 Fingerprint45 Voice Id53 Facial Recognition64 Signature Dynamics72

Final Notes Two-factor Authentication: Methods can be combined (i.e. ATM card & PIN) Who is authenticating who?  Person-to-computer?  Computer-to-computer? Three types (e.g. SSL):  Client Authentication: server verifies client’s id  Server Authentication: client verifies server’s id  Mutual Authentication (Client & Server) Authenticated user is a “Principal”

1.3. Authorization Checking whether a user has permission to conduct some action Identity vs. Authority Is a “subject” (Alice) allowed to access an “object” (open a file)? Access Control List: mechanism used by many operating systems to determine whether users are authorized to conduct different actions

Access Control Lists (ACLs) Set of three-tuples   Specifies which users are allowed to access which resources with which privileges Privileges can be assigned based on roles (e.g. admin) UserResourcePrivilege Alice/home/Alice /* Read, write, execute Bob/home/Bob /* Read, write, execute Table 1-1. A Simple ACL

Access Control Models ACLs used to implement these models Mandatory: computer system decides exactly who has access to which resources Discretionary (e.g. UNIX): users are authorized to determine which other users can access files or other resources that they create, use, or own Role-Based (Non-Discretionary): user’s access & privileges determined by role

Bell-LaPadula Model Classifications:  Top Secret  Secret  Confidential  Unclassified 3 Rules/Properties  Simple property  *-property (confinement)  Tranquility property

1.4. Confidentiality Goal: Keep the contents of communication or data on storage secret Example: Alice and Bob want their communications to be secret from Eve Key – a secret shared between Alice & Bob Sometimes accomplished with  Cryptography, Steganography, Access Controls, Database Views

1.5. Message/Data Integrity Data Integrity = No Corruption Man in the middle attack: Has Mallory tampered with the message that Alice sends to Bob? Integrity Check: Add redundancy to data/messages Techniques:  Hashing (MD5, SHA-1, …), Checksums (CRC…)  Message Authentication Codes (MACs) Different From Confidentiality:  A -> B: “The value of x is 1” (not secret)  A -> M -> B: “The value of x is 10000” (BAD)  A -> M -> B: “The value of y is 1” (BAD)

1.6. Accountability Able to determine the attacker or principal Logging & Audit Trails Requirements:  Secure Timestamping (OS vs. Network)  Data integrity in logs & audit trails, must not be able to change trails, or be able to detect changes to logs  Otherwise attacker can cover their tracks

1.7. Availability Uptime, Free Storage  Ex. Dial tone availability, System downtime limit, Web server response time Solutions:  Add redundancy to remove single point of failure  Impose “limits” that legitimate users can use Goal of DoS (Denial of Service) attacks are to reduce availability  Malware used to send excessive traffic to victim site  Overwhelmed servers can’t process legitimate traffic

1.8. Non-Repudiation Undeniability of a transaction Alice wants to prove to Trent that she did communicate with Bob Generate evidence / receipts (digitally signed statements) Often not implemented in practice, credit-card companies become de facto third-party verifiers

1.9. Concepts at Work (1) Is DVD-Factory Secure? PCs-R-US Bob DVD- Factory orders parts B2B website

1.9. Concepts at Work (2) Availability:  DVD-Factory ensures its web site is running 24-7 Authentication: Confidentiality:  Bob’s browser and DVD-Factory web server set up an encrypted connection (lock on bottom left of browser) authenticates itself to Bob Bob authenticates himself to DVD-Factory, Inc. Encrypted Connection

1.9. Concepts at Work (3) Authorization:  DVD-Factory web site consults DB to check if Bob is authorized to order widgets on behalf of PCs-R-Us Message / Data Integrity:  Checksums are sent as part of each TCP/IP packets exchanged (+ SSL uses MACs) Accountability:  DVD-Factory logs that Bob placed an order for Sony DVD-R 1100 Non-Repudiation:  Typically not provided w/ web sites since TTP req’d.

Summary Technological Security In Context Seven Key Security Concepts DVD-Factory Example: Security Concepts at Work