introduction to computer security: terminology, security policy ece 422 / cs 461 - fall 2013...

44
Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Upload: amie-owen

Post on 23-Dec-2015

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Introduction to Computer Security: Terminology, Security Policy

ECE 422 / CS 461 - Fall 2013

*Acknowledgment: Thanks to Susan Hinrichs for her slides

Page 2: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Outline

• Administrative Issues• Class Overview• Introduction to Computer Security

– What is computer security?– Why computer security?– Computer security components

• Introduction to security policy

1-2

Page 3: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Staff etc. • Staff

– INSTRUCTORS: • David Nicol: First half (Roughly: Aug. 26 – Oct. 14) • Rakesh Bobba: Second half (Roughly: Oct. 16 – Dec. 12)

– TAs • Balaji Manoharan• Ted Pacyga

• Office hours – David Nicol (held when teaching; 451 CSL)

• TBD

– Rakesh Bobba (held when teaching; 444 CSL)• TBD

1-3

Page 4: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Academic Honesty

• Review department and university cheating and honor codes:– http://www.ece.illinois.edu/students/ugrad/academic-

honesty.html– https

://wiki.engr.illinois.edu/display/undergradProg/Honor+Code

– http://admin.illinois.edu/policy/code/article1_part4_1-402.html

• Expectations for exams, homeworks, projects, and papers• When in doubt, ask! 1-4

Page 5: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Class Overview I – Format &Text

• Format– Meets 2-times a week (MW)– Mostly lecture based

• Text Books / Readings– Computer Security: Principles and Practice by

William Stallings and Lawrie Brown 2nd Ed.– Additional Readings

• Links and documents posted in Compass• Books on reserve at library

1-5

Page 6: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Class Overview II – Lectures

• Lecture Slides - Disclaimer– Not intended to be self sufficient– Going through lecture slides will NOT be enough

to master course material

1-6

Page 7: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Class Overview III - Grades

• 2 midterms worth 20% each (total 40%)– Tentatively: October 2nd and November 6th

• Comprehensive Final worth 30%– Date & Time: December 16th 8 -11 AM

• In class quizzes – 5%• Homeworks & MPs 25%

– About 7 – 8 homeworks ; can drop lowest homework– Submit homeworks via Compass2g

• Extra project for grad. students (4 credits) 20%

1-7

Page 8: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Class Overview IV - Communication

• Class web page– https://wiki.engr.illinois.edu/display/ece422sp13/ECE422+-+CS461

+Computer+Security+I+Fall+2013

• Lecture slides, schedule, homeworks

• Lecture Videos (For Online Students)– https://wiki.engr.illinois.edu/display/ENGRonline/Fall+2013+CS+

courses• Compass2g

– Homework submissions and grade distribution• Piazza

– For discussions– https://piazza.com/illinois/fall2013/cs461ece422/home

1-8

Page 9: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Security Classes Roadmap I

• 3 Introductory/General Courses– Computer Security I (CS461/ECE422)

• Covers NSA 4011 security professional requirements• Taught every semester (mostly)

– Computer Security II (CS463/ECE424)• Continues in greater depth on more advanced security topics• Taught every semester or so

– Applied Computer Security Lab (CS460)• Generally taught in the spring• With CS461 covers NSA 4013 system administrator requirements

– Two of the three courses will satisfy the Security Specialization in the CS track for Computer Science majors.

1-9

Page 10: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Security Classes Roadmap II• Theoretical Foundations of Cryptography (CS 498) & Applied Cryptography (CS

598 MAN)– Prof Manoj Prabhakaran

• Advanced Applied Cryptography (ECE 598 NB) & Privacy Enhancing Technologies (ECE 598 NB)– Prof Nikita Borisov

• Cryptography (Math 595/ECE 559)– Prof. Blahut

• Malware Analysis CS498SH• Security Reading Group CS591RHC• Advanced Computer Security CS563• Local talks

– http://www.iti.illinois.edu/content/seminars-and-events• ITI Security Roadmap

– http://www.iti.illinois.edu/education/course-roadmaps/security1-10

Page 11: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

ECE 422 / CS 461 Topics

• First course in computer security at UIUC• Mix of motivation, design, planning, and

mechanisms• Covers what, why and how of computer

security– Breadth first look

1-11

Page 12: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

What is computer security?Why do we need it?

• Art & science of protecting/securing computer systems?

• Because we need to protect/secure computers from …. adversaries– Mischief makers (script kiddies)?– Hackers?– Hactivists?– Ourselves (sometimes)– ….

1-12

Page 13: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

What is Computer Security?

• “The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources” (includes hardware, software, firmware, information/data, and telecommunications).”– NIST Security Handbook

1-13

Page 14: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Key Security Notions/Concepts

• Confidentiality– Preventing unauthorized access or disclosure

• Keeping data confidential to authorized parties

– Privacy (subtle difference)• Integrity

– Preventing against unauthorized modifications• Data Integrity (integrity)• Origin Integrity (authentication)

• Availability– Ensuring timely availability of (data, system service etc.)

1-14

Page 15: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Additional Security Concepts

• Authenticity– Property of being genuine; can be verified and

trusted– Similar to authentication

• Accountability– Requirement for entity actions to be traced

uniquely to that entity – Non-repudiation -- one cannot repudiate one’s

actions

1-15

Page 16: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Why is computer security challenging?

• Both systems to be protected and security mechanisms can be quite complex and subtle

• Security mechanisms themselves might become targets or introduce unintended weaknesses

• A single weakness can bring down the system – defenders have to work harder

• Systems, environments, and adversaries are constantly evolving/changing

• Security often tends to be an afterthought rather than designed in

• ….1-16

Page 17: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Some Terminology

• Threat – Set of circumstances that has the potential to breach security and cause harm

• Vulnerability – Weakness in the system that could be exploited to violate security property of interest

• Attack – When an entity exploits a vulnerability on system

• Control or Countermeasure – A means to prevent a vulnerability from being exploited; or minimize harm from the vulnerability/attack; or detect attack so recovering actions may be initiated

• Adversary – threat agent1-17

Page 18: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Classes of Threats

• Disclosure – Unauthorized access to information

• Deception – Acceptance of false data• Disruption – Interruption or prevention of

correct operation• Usurpation – Unauthorized control of some

part of a system

1-18

What security property(ies) or concept(s) does each class violate?

Page 19: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Some common threats• Snooping or interception– Unauthorized interception of information

• Falsification– Unauthorized change of information

• Masquerading or spoofing – An impersonation of one entity by another

• Repudiation– A false denial that an entity received some

information.

1-19

Page 20: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Security Strategy

• Specification/Policy• What does it mean to be secured in particular?

• Implementation/Mechanism• How to enforce the specified security policy?

• Correctness/Assurance• Does the security system work as advertised

1-20

Page 21: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Specification/Policy

• Specification considerations• Security vs. ease of use• Return on investment – security business case

• Policy• A statement of what is and what is not allowed• Divides the world into secure and non-secure

states• A secure system starts in a secure state. All

transitions keep it in a secure state.

1-21

Page 22: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

1-22

Is this situation secure?• Web server accepts all connections– No authentication required– Self-registration– Connected to the Internet

Page 23: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Security Mechanism or Implementation

• A method, tool, or procedure for enforcing a security policy– Prevention– Detection – Response– Recovery

1-23

Page 24: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

1-24

Trust and Assumptions• Locks prevent unwanted physical access.– What are the assumptions this statement builds

on?

Page 25: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Policy Assumptions• Policy correctly divides world into secure and

insecure states.• Mechanisms prevent transition from secure

to insecure states.

1-25

Page 26: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Assurance• Evidence of how much to trust a system• Evidence can include– System specifications– Design– Implementation

1-26

Page 27: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

1-27

Aspirin Assurance Example• Why do you trust Aspirin from a major

manufacturer?– FDA certifies the aspirin recipe– Factory follows manufacturing standards– Safety seals on bottles

• Analogy to software assurance

Page 28: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Slide #1-28

Key Points• Must look at the big picture when securing a

system• Main components of security– Confidentiality– Integrity– Availability

• Differentiating Threats, Vulnerabilities, Attacks and Controls

• Policy vs. mechanism• Assurance

Page 29: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Security Policy

• A security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must apply. (RFC 2196)

• Defines what it means for the organization to be in a secure state.– Otherwise people can claim ignorance.

1-29

Page 30: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Question

• University policy disallows cheating.– Alice forgets to write protect her homework.– Bob copies it.– Who violated policy?

1-30

Page 31: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Question Part 2

• Alice posts her homework on the department bulletin board (or piazza).

• Bob copies it.• Who is at fault with respect to policy?

1-31

Page 32: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Mechanisms or Controls or Countermeasures

• Entity or procedure that enforces some part of the security policy– Access controls (like bits to prevent someone from

reading a homework file)– Disallowing people from bringing CDs and floppy

disks into a computer facility to control what is placed on systems

1-32

Page 33: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Hierarchy of Policy

Organizational Policy

Departmental Policy

Department Standards

CSIL-Linux10SE Linux Policy

Linux LabUmask settings

1-33

Page 34: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

-34

Natural Language Security Policies

• Targeting Humans– Written at different levels

• To inform end users• To inform lawyers• To inform technicians• Users, owners, beneficiaries (customers)

• As with all policies, should define purpose not mechanism– May have additional documents that define how policy maps to

mechanism• Should be enduring

– Don't want to update with each change to technology• Shows due diligence on part of the organization

1-34

Page 35: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Key Parts of Organizational Policy

1. What is being protected? Why?2. Generally how should it be protected?3. Who is responsible for ensuring policy is

applied?4. How are conflicts and discrepancies to be

interpreted and resolved?

1-35

Page 36: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

-36

How to Write a Policy• Understand your environment

– Risk Analysis (see next lecture)• Understand your industry

– Look for “standards” from similar companies– Leverage others wisdom– Already proven with auditors/regulators

• Standards• ISO 17799 – Code of Practice for Information Security Management• COBIT – Control Objectives for Information and Related Technolgy• SANS, CERT have policy guidelines

• Gather the right set of people– Technical experts, person ultimately responsible, person who can

make it happen– Not just the security policy “expert”

1-36

Page 37: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Security Policy Life Cycle

Risk Analysis

Policy Development

Reassessment

Policy Implementation

Raising Awareness

Policy Approval

1-37

Page 38: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

-38

Security Policy Contents

• Purpose – Why are we trying to secure things

• Identify protected resources• Who is responsible for protecting – What kind of protection? Degree but probably

not precise mechanism. • Cover all cases• Realistic

1-38

Page 39: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

More Specific Policy Content Ideas

• Principles of Security• Organizational Reporting

Structure• Physical Security• Hiring, management, firing• Data protection• Communication security• Hardware• Software• Operating systems

• Technical support• Privacy• Access• Accountability• Authentication• Availability• Maintenance• Violations reporting• Business continuity• Supporting information

1-39

Page 40: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

-40

University of Illinois Information Security Policies

• University of Illinois Information Security Policies– System wide policy; Identifies what, not how– http://www.obfs.uillinois.edu/cms/one.aspx?pageId=91

4038• CITES UIUC standards and guidelines– DNS – http://www.cites.uiuc.edu/dns/standards.html

• CS Department policies• https://wiki.engr.illinois.edu/display/tsg/Policies

1-40

Page 41: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

-41

Example Privacy policies

• Busey Bank• https://www.busey.com/home/fiFiles/static/

documents/privacy.pdf– Financial Privacy Policy• Targets handling of personal non-public data• Clarifies what data is protected• Who the data is shared with

1-41

Page 42: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Poorly Written Policies

• Cars.gov – Had following in click-through policy for dealers

• This application provides access to the [Department of Transportation] DoT CARS system. When logged on to the CARS system, your computer is considered a Federal computer system and is the property of the U.S. Government. Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed... to authorized CARS, DoT, and law enforcement personnel, as well as authorized officials of other agencies, both domestic and foreign.

• According to EFF• http

://www.eff.org/deeplinks/2009/08/cars-gov-terms-service -42 1-42

Page 43: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

-43

Example Acceptable Use Policy

• IEEE Email Acceptable Use Policy – http://eleccomm.ieee.org/email-aup.shtml– Inform user of what he can do with IEEE email– Inform user of what IEEE will provide• Does not accept responsibility of actions resulting

from user email• Does not guarantee privacy of IEEE computers and

networks– Examples of acceptable and unacceptable use

1-43

Page 44: Introduction to Computer Security: Terminology, Security Policy ECE 422 / CS 461 - Fall 2013 *Acknowledgment: Thanks to Susan Hinrichs for her slides

Key Points

• Security policy bridges between human expectations and implementation reality

1-44