Lecture1
Lecture1
Lecture #1
13-2
Outline
0 Cyber Security Modules
0 Risk and Governance
0 Security Architectures
0 Access Control
0 Cryptography
0 Network Security
0 Digital Forensics
0 Data Management Security
01/18/25 04:49
13-3
C. I.A.
0 Confidentiality: Preventing from unauthorized disclosure
0 Integrity: Preventing from unauthorized modification
0 Availability: Preventing denial of service
01/18/25 04:49
13-4
13-5
13-6
Access Control
0 Security Principles
0 Identification, Authentication, Authorization, Accountability
0 Access Control Models
0 Access Control techniques
0 Access Control Administration
0 Access Control Methods
0 Access Control Types
0 Accountability
0 Access Control practices
0 Access Control Monitoring
0 Threats to Access Control
01/18/25 04:49
13-7
13-8
13-9
13-10
Cryptography
0 History, Definitions and Concepts
0 Types of Ciphers
0 Methods of Encryption
0 Type of Asymmetric Systems
0 Message Integrity
0 PKI
0 Key Management
0 Link / End-to-end Encryption
0 Email standards
0 Internet security
0 Attacks
01/18/25 04:49
13-11
13-12
Applications Security
0 Database Security
0 Software and applications security issues
0 Secure systems development
0 Application development and security
0 Object-oriented systems and security
0 Distributed computing and security
0 Expert systems and security
0 Web security
0 Mobile code
0 Patch management
01/18/25 04:49
13-13
Business Continuity
0 Data Storage and Recovery
0 Storage Area Networks
0 Business Continuity Planning
0 Disaster Planning
01/18/25 04:49
13-14
Operations Security
0 Role of the Operations Department
0 Administrative Management
0 Assurance Levels
0 Configuration management
0 Media Controls
0 Data Leakage
0 Network and Resource Availability
0 Mainframes
0 Email Security
0 Vulnerability testing
01/18/25 04:49
13-15
13-16
13-17
13-18
13-19
13-20
13-21
Information Classification
0 It is essential to classify information according to its actual value
and level of sensitivity in order to deploy the appropriate level of
security.
0 A system of classification should ideally be:
- simple to understand and to administer
- effective in order to determine the level of protection the
information is given.
- applied uniformly throughout the whole organization (note:
when in any doubt, the higher, more secure classification
should be employed).
01/18/25 04:49
13-22
Information Classification
0 With the exception of information that is already in the public
domain, information should not be divulged to anyone who is not
authorized to access it or is not specifically authorized by the
information owner.
0 Violations of the Information Classification Policy should result in
disciplinary proceedings against the individual.
0 Number of information classification levels in an organization
should be a manageable number as having too many makes
maintenance and compliance difficult.
01/18/25 04:49
13-23
Information Classification
0 Top Secret: Highly sensitive internal documents and data. For
example, impending mergers or acquisitions, investment strategies,
plans or designs that could seriously damage the organization if lost
or made public. Information classified as Top Secret has very
restricted distribution indeed, and must be protected at all times.
Security at this level is the highest possible.
0 Highly Confidential: Information which is considered critical to the
organization’s ongoing operations and could seriously impede or
disrupt them if made shared internally or made public. Such
information includes accounting information, business plans,
sensitive information of customers of banks (etc), patients' medical
records, and similar highly sensitive data. Such information should
not be copied or removed from the organization’s operational
control without specific authority. Security should be very high.
01/18/25 04:49
13-24
Information Classification
0 Proprietary: Procedures, project plans, operational work routines,
designs and specifications that define the way in which the
organization operates. Such information is usually for proprietary
use by authorized personnel only. Security at this level is high.
0 Internal Use Only: Information not approved for general circulation
outside the organization, where its disclosure would inconvenience
the organization or management, but is unlikely to result in financial
loss or serious damage to credibility/reputation. Examples include:
internal memos, internal project reports, minutes of meetings.
Security at this level is controlled but normal.
0 Public Documents: Information in the public domain: press
statements, annual reports, etc. which have been approved for
public use or distribution. Security at this level is minimal.
01/18/25 04:49
13-25
13-26
13-27
13-28
13-29
13-30
13-31
13-32
13-33
Operating Systems
0 Memory Management
0 Process management
0 File Management
0 Capability Domains
0 Virtual Machines
01/18/25 04:49
13-34
System Architecture
0 The software components that make up the system
0 Middleware
0 Database management
0 Networks
0 Applications
01/18/25 04:49
13-35
Security Architecture
0 Security critical components of the system
0 Trusted Computing Base
0 Reference Monitor and Security Kernel
0 Security Perimeter
0 Security Policy
0 Least Privilege
01/18/25 04:49
13-36
13-37
13-38
Security Models
0 Bell and LaPadula (BLP) Confidentiality Model
0 Biba Integrity Model (opposite to BLP)
0 Clark Wilson Integrity Model
0 Other Models
- information Flow Model
- Non Interference Model
- Graham Denning Model
- Harrison-Ruzzo-Ullman Model
- Lattice Model
01/18/25 04:49
13-39
13-40
Biba
0 In general, preservation of data integrity has three goals:
- Prevent data modification by unauthorized parties
- Prevent unauthorized data modification by authorized parties
- Maintain internal and external consistency (i.e. data reflects the real
world)
0 Biba security model is directed toward data integrity (rather than
confidentiality) and is characterized by the phrase: "no read down, no write
up". This is in contrast to the Bell-LaPadula model which is characterized by
the phrase "no write down, no read up".
0 The Biba model defines a set of security rules similar to the Bell-LaPadula
model. These rules are the reverse of the Bell-LaPadula rules:
0 The Simple Integrity Axiom states that a subject at a given level of integrity
must not read an object at a lower integrity level (no read down).
0 The * (star) Integrity Axiom states that a subject at a given level of integrity
must not write to any object at a higher level of integrity (no write up).
01/18/25 04:49
13-41
13-42
13-43
13-44
13-45
13-46
13-47
13-48
13-49
Access Control
0 Access Control Overview
0 Identification, Authentication, Authorization, Accountability
0 Single Sign-on and Kerberos
0 Access Control Models
0 Access Control Techniques and Technologies
0 Access Control Administration
0 Access Control Monitoring: Intrusion Detection
0 Threats to Access Control
01/18/25 04:49
13-50
13-51
Access Control
0 Access control models used by current systems tend to fall into one
of two classes: those based on capabilities and those based on
access control lists (ACLs).
0 In a capability-based model, holding an unforgeable reference or
capability to an object provides access to the object
0 Access is conveyed to another party by transmitting such a
capability over a secure channel.
0 In an ACL-based model, a subject's access to an object depends on
whether its identity is on a list associated with the object
01/18/25 04:49
13-52
13-53
Single Sign-On
0 Single sign-on (SSO) is a property of access control of multiple,
related, but independent software systems.
0 With this property a user logs in once and gains access to all
systems without being prompted to log in again at each of them.
0 Single sign-off is the reverse property whereby a single action of
signing out terminates access to multiple software systems.
0 As different applications and resources support different
authentication mechanisms, single sign-on has to internally
translate to and store different credentials compared to what is used
for initial authentication.
01/18/25 04:49
13-54
13-55
13-56
Access Control
0 Access control techniques: Access control techniques are sometimes
categorized as either discretionary or non-discretionary. The three most
widely recognized models are Discretionary Access Control (DAC),
Mandatory Access Control (MAC), and Role Based Access Control (RBAC).
MAC and RBAC are both non-discretionary.
0 Attribute-based Access Control: In attribute-based access control, access is
granted not based on the rights of the subject associated with a user after
authentication, but based on attributes of the user.
0 The user has to prove so called claims about his attributes to the access
control engine. An attribute-based access control policy specifies which
claims need to satisfied in order to grant access to an object. For instance the
claim could be "older than 18" .
01/18/25 04:49
13-57
Access Control
0 Discretionary access control: (DAC) is an access policy determined
by the owner of an object. The owner decides who is allowed to
access the object and what privileges they have.
0 Two important concepts in DAC are
0 File and data ownership: Every object in the system has an owner. In
most DAC systems, each object's initial owner is the subject that
caused it to be created. The access policy for an object is
determined by its owner.
0 Access rights and permissions: These are the controls that an owner
can assign to other subjects for specific resources.
0 Access controls may be discretionary in ACL-based or capability-
based access control systems. (In capability-based systems, there is
usually no explicit concept of 'owner', but the creator of an object
has a similar degree of control over its access policy.)
01/18/25 04:49
13-58
Access Control
0 Mandatory access control: (MAC) is an access policy determined by the
system, not the owner. MAC is used in multilevel systems that process highly
sensitive data, such as classified government and military information. A
multilevel system is a single computer system that handles multiple
classification levels between subjects and objects.
0 Sensitivity labels: In a MAC-based system, all subjects and objects must have
labels assigned to them. A subject's sensitivity label specifies its level of
trust. An object's sensitivity label specifies the level of trust required for
access. In order to access a given object, the subject must have a sensitivity
level equal to or higher than the requested object.
0 Data import and export: Controlling the import of information from other
systems and export to other systems (including printers) is a critical function
of MAC-based systems, which must ensure that sensitivity labels are properly
maintained and implemented so that sensitive information is appropriately
protected at all times.
01/18/25 04:49
13-59
What is Biometrics?
0 Biometrics are automated methods of recognizing a person based
on a physiological or behavioral characteristic
0 Features measured: Face, Fingerprints, Hand geometry, handwriting,
Iris, Retinal, Vein and Voice
0 Identification and personal certification solutions for highly secure
applications
0 Numerous applications: medical, financial, child care, computer
access etc.
0 Biometrics replaces Traditional Authentication Methods
0 Provides better security
0 More convenient
0 Better accountability
0 Applications on Fraud detection and Fraud deterrence
0 Dual purpose: Cyber Security and National Security
01/18/25 04:49
13-60
13-61
Security Vulnerabilities
0 Type 1 attack: present fake biometric such a synthetic
biometric
0 Type 2 attack: Submit a previously intercepted biometric
data: replay
0 Type 3 attack: Compromising the feature extractor module to
give results desired by attacker
0 Type 4 attack: Replace the genuine feature values produced
by the system by fake values desired by attacker
0 Type 5 attack: Produce a high number of matching results
0 Type 6 attack: Attack the template database: add templates,
modify templates etc.
01/18/25 04:49
13-62
13-63
Cryptography
0 Cryptography
- Mathematical manipulation of information that prevents the
information being disclosed or altered
0 Cryptanalysis
- Defeating the protected mechanisms of cryptography
0 Cryptology
0 Study of Cryptography and Cryptanalysis
0 Goals
- Confidentiality, Integrity, Authenticity, Non-repudiation, Access
Control, Make compromise difficult
01/18/25 04:49
13-64
Process
0 Input (also called Plaintext or Clear Text)
0 Cryptosystem (device that performs encryption/decryption)
0 Cryptographic Algorithms (Mathematical functions)
0 Output (Cipher text or Cryptogram)
0 Key (Crypto variable)
01/18/25 04:49
13-65
Key Clustering
0 In cryptography, key clustering is said to occur when two different
keys generate the same ciphertext from the same plaintext, using the
same cipher algorithm.
0 A good cipher algorithm, using different keys on the same plaintext,
should generate a different ciphertext, irrespective of the key length.
0 If an 'attacker' tries to break a cipher by brute-force (trying all
possible keys until it finds the correct key) then key clustering will
result in an easier attack on a particular cipher text.
0 If there are N possible keys without any key clustering then the
attacker will on average need to try N/2 keys to decrypt it and a worst
case of trying all N keys.
0 If there are two keys that are clustered then the average number of
keys to try is reduced to N/4 (worst case is N-1 keys). If three keys
cluster than average attempt is only N/6 attempts.
01/18/25 04:49
13-66
13-67
13-68
13-69
Network Security
0 Network security consists of the provisions made in an
underlying computer network infrastructure, policies
adopted by the network administrator to protect the
network and the network-accessible resources from
unauthorized access, and consistent and continuous
monitoring and measurement of its effectiveness
0 Network security starts from authenticating the user,
commonly with a username and a password; Once
authenticated, a firewall enforces access policies such as
what services are allowed to be accessed by the network
users.
0 Though effective to prevent unauthorized access, this
component may fail to check potentially harmful content
such as computer worms or Trojans being transmitted over
the network.
01/18/25 04:49
13-70
Network Security
0 Anti-virus software or an intrusion prevention system (IPS) help
detect and inhibit the action of such malware; An anomaly-based
intrusion detection system may also monitor the network and traffic
for unexpected (i.e. suspicious) content or behavior and other
anomalies to protect resources logged for audit purposes and for
later high level analysis.
0 Honeypots essentially decoy network-accessible resources, could
be deployed in a network as surveillance and early-warning tools.
Techniques used by the attackers that attempt to compromise these
decoy resources are studied during and after an attack to keep an
eye on new exploitation techniques.
0 A Botnet is a collection of software agents, or robots, that run
autonomously and automatically. The term is most commonly
associated with malicious software, but it can also refer to a network
of computers using distributed computing software.
01/18/25 04:49
13-71
Digital Forensics
0 Digital forensics is about the investigation of crime including
using digital/computer methods
0 More formally: “Digital forensics, also known as computer
forensics, involved the preservation, identification, extraction,
and documentation of computer evidence stored as data or
magnetically encoded information”, by John Vacca
0 Digital evidence may be used to analyze cyber crime (e.g.
Worms and virus), physical crime (e.g., homicide) or crime
committed through the use of computers (e.g., child
pornography)
0 Computers are attacked (Cyber crime); Computers are used
to commit a crime (child predators, Embezzlement, Fraud);
Computers are used to solve a crime (Homicide)
01/18/25 04:49
13-72
13-73
13-74
13-75
13-76
13-77
13-78
Some Examples
0 Temporal Access Control
- After 1/1/05, only doctors have access to medical records
0 Role-based Access Control
- Manager has access to salary information
- Project leader has access to project budgets, but he does not
have access to salary information
- What happens is the manager is also the project leader?
0 Positive and Negative Authorizations
- John has write access to EMP
- John does not have read access to DEPT
- John does not have write access to Salary attribute in EMP
- How are conflicts resolved?
01/18/25 04:49
13-79
Dissemination Policies
0 Release policies will determine to whom to release the data
- What is the connection to access control
- Is access control sufficient
- Once the data is retrieved from the information source (e.g.,
database) should it be released to the user
0 Once the data is released, dissemination policies will determine who
the data can be given to
- Electronic music, etc.
01/18/25 04:49
13-80
13-81
Summary
0 Cyber Security Modules
0 Risk and Governance
0 Security Architectures
0 Access Control
0 Cryptography
0 Network Security
0 Digital Forensics
0 Access Control for Database Management