Domain4 - Security Architecture & Models
Domain4 - Security Architecture & Models
Class 4:
Security architecture and
models
Lecturer Shon Harris, CISSP, MCSE
President, Logical Security
CISSP Essentials:
Mastering the Common Body of Knowledge
Attack types
Agenda
Hardware and software
computer components
Control unit
Coordinates activities during
program instruction execution
Memory management
Responsibilities
Memory protection
Access control
Ensure that a requesting process has the necessary rights to access a memory
section
Waiting
Running
Run-time
Ready
Language types
Machine Language 1GL
Executed directly by CPU
Assembly Language 2GL
Written in hexadecimal representation 1 character = 8 bits
Translated into machine language by an assembler
High-Level Language 3GL, 4GL, 5GL
Easier to write by working at an abstraction level
Requires a compiler or interpreter to turn source code into object
code
Complier.
Object code = machine language that still needs to be converted into binary.
Interpreter.
Agenda
System self protection
Levels of access to resources and
trust levels
Memory segmenting
Process isolation
Layering and data hiding
Virtual machines
Protection rings
Security domains
Trusted computing base
These components are highly scrutinized when being evaluated for an assurance
rating
Security kernel
TCB components that enforce the reference monitors access rules
Physical implementation of the reference monitor
Security kernel is a portion of the TCB that is concerned specifically with
access control
Agenda
Models
State Machine
Bell-LaPadula
Biba
Clark-Wilson
Non-interference
Information-flow
Lattice
Grant-Take
Brewer and Nash
(Chinese-Wall)
Agenda
Security evaluations
Trusted Computer System
Evaluation Criteria (TCSEC)
Information Technology
Security Evaluation Criteria
(ITSEC)
Common Criteria
TCSEC Characteristics
Developed by the National Computer Security Center (NCSC)
Alias Orange Book
Based on the Bell-LaPadula model
B1, B2, B3
Mandatory Protection
C1, C2
Discretionary Protection
Minimal Security
Agenda
Threats to systems
Covert channels
Backdoors
Timing attacks
Race conditions
Buffer overflows
SYN flood
Session hijacking
Man-in-the-middle
Land attacks
Ping-of-death
Distributed denial-of-service
attacks
Flaws with channels and access controls can lead to covert channels
system resources
Cloning
Reprogramming a cell phone with a ESN/MIN pair from
another cell phone
Tumbling
Changing the ESN/MIN pair values for each call
CISSP Essentials:
Mastering the Common Body of Knowledge
Lecturer Shon Harris, CISSP, MCSE
President, Logical Security
www.LogicalSecurity.com
[email protected]