security professor mona mursi. environment it infrastructures are made up of many components,...

16
SECURITY SECURITY Professor Professor Mona Mursi Mona Mursi

Upload: clare-bradley

Post on 05-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

SECURITYSECURITY

ProfessorProfessor

Mona MursiMona Mursi

Page 2: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

ENVIRONMENTENVIRONMENT

IT infrastructures are made up of many IT infrastructures are made up of many components, abstractly:components, abstractly:

computer NETWORK computercomputer NETWORK computer

Each component is uniquely vulnerable to Each component is uniquely vulnerable to attackattack

S/WS/W

InternetR

Page 3: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

SecuritySecurity

Information SecurityInformation Security

Cryptography and Information Security Cryptography and Information Security

Cryptography: Basic building blocks of securityCryptography: Basic building blocks of security

Using cryptography to protect informationUsing cryptography to protect information

System SecuritySystem Security

Attack and defense of individual computer systemsAttack and defense of individual computer systems

Focus on software securityFocus on software security

Applications, Operating SystemApplications, Operating System Network SecurityNetwork Security

Attack and defense of entire networksAttack and defense of entire networks

Focus on network protocol security and protecting network Focus on network protocol security and protecting network infrastructure devicesinfrastructure devices

Page 4: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Security GoalsSecurity Goals

ConfidentialityConfidentiality

Concealment of informationConcealment of information

IntegrityIntegrity

Trustworthiness of information Trustworthiness of information

AvailabilityAvailability

Access to informationAccess to information

Page 5: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

ThreatsThreats

VocabularyVocabulary

ThreatThreat:: potential security vulnerability potential security vulnerability

AttackAttack:: action exploiting security vulnerabilities action exploiting security vulnerabilities

AdversaryAdversary:: one who implements attacks one who implements attacks

Types of threatsTypes of threats

DisclosureDisclosure: unauthorized access to information: unauthorized access to information

Threat to CONFIDENTIALITYThreat to CONFIDENTIALITY

DeceptionDeception: acceptance of false data: acceptance of false data

Threat to INTEGRITYThreat to INTEGRITY

DisruptionDisruption: interruption of correct operation: interruption of correct operation

Threat to AVAILABILITYThreat to AVAILABILITY

UsurpationUsurpation: unauthorized system control: unauthorized system control

Threat to ALLThreat to ALL

Page 6: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

ThreatsThreats

Types of attacksTypes of attacks Snooping, aka wiretappingSnooping, aka wiretapping

Modification, unauthorized change of informationModification, unauthorized change of information

Masquerading, aka spoofing, impersonationMasquerading, aka spoofing, impersonation

Repudiation of Origin, false denial that an entity sent/created Repudiation of Origin, false denial that an entity sent/created somethingsomething

Denial of Receipt, false denial that an entity received somethingDenial of Receipt, false denial that an entity received something

DelayDelay

Denial of serviceDenial of service

Page 7: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Entire TaxonomyEntire Taxonomy

Confidentiality AvailabilityIntegrity

Disclosure Deception

Snooping

UsurpationDisruption

Modification Spoofing Repudiation of Origin

Denial of Receipt

Delay Denial of Service

Page 8: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Threat ModelsThreat Models

Threat models define a hypothetical Threat models define a hypothetical adversary’s capabilitiesadversary’s capabilities

Based on capabilities, we can determine Based on capabilities, we can determine the types of attacksthe types of attacks

Given attacks we can determine threatsGiven attacks we can determine threats Given threats we can determine the Given threats we can determine the

necessary security goalsnecessary security goals

AdversaryCapabilities

SecurityGoals

ThreatsAttacks

Page 9: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Adversary CapabilitiesAdversary Capabilities

Can vary depending on the application, environment, systemCan vary depending on the application, environment, system

Examples…Examples…

Crypto / Information SecurityCrypto / Information Security

Access to keying materialAccess to keying material

Computational capabilities (i.e. laptop vs supercomputer)Computational capabilities (i.e. laptop vs supercomputer)

System SecuritySystem Security

Access to operating system, applicationsAccess to operating system, applications

User vs administrator accessUser vs administrator access

Physical access to systemPhysical access to system

Network SecurityNetwork Security

On-path vs off-pathOn-path vs off-path

Active vs passiveActive vs passive

Page 10: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Policy vs. MechanismPolicy vs. Mechanism

How are security goals achieved?How are security goals achieved?

Security PolicySecurity Policy:: statement as to what is or is not allowed statement as to what is or is not allowed

Security MechanismSecurity Mechanism: method, tool, or procedure to enforce policy: method, tool, or procedure to enforce policy

Example 1:Example 1:

Bank policy requires that all home banking transactions have confidentiality and Bank policy requires that all home banking transactions have confidentiality and integrityintegrity

Bank website encrypts communications to web browsers and requires that users Bank website encrypts communications to web browsers and requires that users log in before accessing accountslog in before accessing accounts

Example 2:Example 2:

University policy requires that users who forget their password be authenticated University policy requires that users who forget their password be authenticated before having their password resetbefore having their password reset

University requires users to bring a photo ID to the helpdesk to reset University requires users to bring a photo ID to the helpdesk to reset passwordspasswords

Page 11: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

AssumptionsAssumptions

Two key assumptions:Two key assumptions: Policy correctly and unambiguously Policy correctly and unambiguously

partitions the set of system states partitions the set of system states into into securesecure and and nonsecurenonsecure

Security mechanisms prevent the Security mechanisms prevent the system from entering a system from entering a nonsecure-nonsecure-statestate

Page 12: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Dealing with AttacksDealing with Attacks

PreventionPrevention

Mechanisms prevent attack from being effectiveMechanisms prevent attack from being effective

DetectionDetection

Mechanisms to detect an attack has occurredMechanisms to detect an attack has occurred

RecoveryRecovery

Mechanisms to allow a system to be restored to its pre-attack state after Mechanisms to allow a system to be restored to its pre-attack state after an attack is detectedan attack is detected

Mechanisms to allow a system to function correctly in spite of an attack Mechanisms to allow a system to function correctly in spite of an attack (more difficult)(more difficult)

Page 13: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

TrustTrust

Implementing policy typically requires some level of trustImplementing policy typically requires some level of trust

Example:Example:

Opening a door requires a keyOpening a door requires a key

Trusted parties have keysTrusted parties have keys

Trusted parties can open the doorTrusted parties can open the door

What about lock pickers? We assume they are trustworthy, and do not open doors without What about lock pickers? We assume they are trustworthy, and do not open doors without permission.permission.

Example:Example:

Reading your email requires a passwordReading your email requires a password

Only you know your password, so only you can read your emailOnly you know your password, so only you can read your email

What about system administrators? We assume they are trustworthy and do not use their system What about system administrators? We assume they are trustworthy and do not use their system access to read our email.access to read our email.

Page 14: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

AssuranceAssurance

Trust is imprecise, and rarely “yes” or “no”Trust is imprecise, and rarely “yes” or “no”

AssuranceAssurance is a trust metric: is a trust metric: specifies how much you trust specifies how much you trust a system, and what do you trust it to do?a system, and what do you trust it to do?

ExamplesExamples

Who on the Internet do you trust with your credit card Who on the Internet do you trust with your credit card information?information?

Would you trust a computer system more if it had up-to-Would you trust a computer system more if it had up-to-date anti-virus software installed?date anti-virus software installed?

Page 15: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

Assurance Operational Assurance Operational IssuesIssues

Enterprise networks: information assurance is based on a cost-benefit analysisEnterprise networks: information assurance is based on a cost-benefit analysis

Weigh the value of the information with the expense of protecting itWeigh the value of the information with the expense of protecting it

Financial cost of a security policy violationFinancial cost of a security policy violation

Theft of funds, intellectual property, state secretsTheft of funds, intellectual property, state secrets

Loss of revenue or reputationLoss of revenue or reputation

Cost of recovering from the attackCost of recovering from the attack

Financial cost of implementing mechanismsFinancial cost of implementing mechanisms

Additional staff to audit computer networksAdditional staff to audit computer networks

Cost of firewalls, secure servers, physical security, etcCost of firewalls, secure servers, physical security, etc

Cost of increased system complexityCost of increased system complexity

Page 16: SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,

OverallOverall Determine Adversary CapabilitiesDetermine Adversary Capabilities Determine Possible AttacksDetermine Possible Attacks

Develop Overall System Security Policy

Establish Security Goals for System Components

(i.e. confidentiality, integrity, availability)

Enumerate Threats

Implement Security Mechanisms consistent with the required

level of Assurance