S.S. Yau CSE465-591 Fall 2006 1 Classified Systems.

Slides:



Advertisements
Similar presentations
FOIA Exemption 1 & E.O Classified National Security Information
Advertisements

1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Lecture 8 Access Control (cont)
Special systems: MLS Multilevel security [“Red book” US-DOD 1987] Considers the assurance risk when composing multilevel secure systems evaluated under.
CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.
Department of the Navy Information Security Program
Evaluation, Assurance, Classified Systems Dr. William Hery CS 996 Spring 2004.
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.
Controlled Unclassified Information (CUI). Unclassified Information Public Domain: information that does not qualify for status of CUI -- suitable for.
DDBMS Security - Bakul Gada.
Access Control Intro, DAC and MAC System Security.
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
Evaluation, Assurance, Classified Systems Dr. William Hery CS 996 Spring 2005.
Confidentiality Policies  Overview  What is a confidentiality model  Bell-LaPadula Model  General idea  Informal description of rules  Formal description.
S.S. Yau 1CSE Fall 2006 Administrative Security Procedural Controls.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Stephen S. Yau CSE , Fall Evaluating Systems for Functionality and Assurance.
Stephen S. Yau 1CSE , Fall 2006 Firewalls.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
EE40206 Security Techmology Dr. LM Cheng G6410 x7778
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Stephen S. Yau 1CSE Fall 2006 IA Policies.
Internet and Intranet Protocols and Applications Lecture 0: Administrivia January 23, 2002 Joseph Conron Computer Science Department New York University.
: Distributed Systems Dr. Rajkumar Buyya Senior Lecturer and Director of MEDC Course Grid Computing and Distributed Systems (GRIDS) Laboratory Dept.
Information Security 2010 Worldwide Security Conference.
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Additional Security Tools Lesson 15. Skills Matrix.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
Chapter 5 Network Security
Government classification
CIS 3360: Security in Computing Cliff Zou Spring 2012.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Confidentiality Policies and Integrity Policies by Stefanie Wilcox.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Sensitive But Unclassified (SBU) Information
Chapter 5 – Designing Trusted Operating Systems
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Chapter 8: Principles of Security Models, Design, and Capabilities
Design and Implementation MAC in Security Operating System CAI Yi, ZHENG Zhi-rong, SHEN Chang-xiang Presented By, Venkateshwarlu Jangili. 1.
Chapter 5: Protecting Security of Assets. Classifying and Labeling Assets Defining sensitive data Defining classifications Defining data security requirements.
Software Architecture Exercise 3 System Architecture © Ingo Arnold Department Computer Science University of Basel Introduction.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
TCSEC: The Orange Book.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Domain 2 – Asset Security
Unauthorized Disclosure Training
Examples of Data Dissemination
Army Automatic Declassification Program
THE ORANGE BOOK Ravi Sandhu
Introduction to the course
Army FOIA/Privacy/Records Management Course
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Building Trustworthy Semantic Webs
Lecture 17: Mandatory Access Control
Chapter 5: Confidentiality Policies
Session 1 – Introduction to Information Security
Presentation transcript:

S.S. Yau CSE Fall Classified Systems

S.S. Yau 2CSE Fall 2006 Classified Systems Early 1980s: DoD is concerned about the confidentiality of classified information on computers with multiple users (time sharing systems) Early 1980s: DoD is concerned about the confidentiality of classified information on computers with multiple users (time sharing systems) Mid 80s to mid 90s: Mid 80s to mid 90s: The Orange Book (or TCSEC): standard reference for computer security for DoD The Orange Book (or TCSEC): standard reference for computer security for DoD The Red Book: covering Trusted Network Interpretation (TNI) of the Orange Book The Red Book: covering Trusted Network Interpretation (TNI) of the Orange Book The whole “rainbow series” The whole “rainbow series” nbow/rainbow.html nbow/rainbow.html nbow/rainbow.html nbow/rainbow.html

S.S. Yau 3CSE Fall 2006 DoD Classification Scheme Data classification based on need for confidentiality Data classification based on need for confidentiality Levels based on potential damage if compromised, and defines treatment rules Levels based on potential damage if compromised, and defines treatment rules Top secret Top secret Secret Secret Confidential Confidential Unclassified Unclassified Unclassified includes Unclassified includes Sensitive But Unclassified (SBU); e. g., medical, salary, performance review data Sensitive But Unclassified (SBU); e. g., medical, salary, performance review data For Official Use Only (FOUO). Not subject to release under the Freedom of Information Act (FOIA). May include company proprietary information. For Official Use Only (FOUO). Not subject to release under the Freedom of Information Act (FOIA). May include company proprietary information.

S.S. Yau 4CSE Fall 2006 Classified Information Management Accountability for classified data Accountability for classified data Declassification/Downgrade Declassification/Downgrade Sanitization/Purging Sanitization/Purging Destruction Destruction

S.S. Yau 5CSE Fall 2006 References M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, ISBN M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, ISBN Matt Bishop, Introduction to Computer Security, Addison-Wesley, 2004, ISBN: Matt Bishop, Introduction to Computer Security, Addison-Wesley, 2004, ISBN: Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: