Computer Security PRESENTATION CHAPTER 5
Computer Security PRESENTATION CHAPTER 5
Computer Security:
Chapter 5
( Designing Trusted Operating System )
Presented By: Harikeesh A/L Mohanan
Mohan A/L Selvaraj
Ong Zheng Young
Sahfrie Yue Chai
Trusted Operating Systems
Four Requirements from Designers Perspective
• Security Policy
– A set of rules that lay out what is to be secured and why.
– A statement of the security we expect the system to enforce.
• Model
– Construct model for environment to be secured.
– Model represents policy to be enforced.
• Design
– How do you implement the security policy?
– Several choices to choose from.
• Trust
– Assurance from users that OS meets security expectation.
– OS will enforce security correctly.
Security Policies
Military Security Policy
• Based on protecting classified information
• Information is ranked at different sensitivity level,
e.g.
– Unclassified
– Restricted
– Confidential
Figure 5-1 Hierarchy of Sensitivities.
– Secret
– Top Secret
• Each piece of classified information may be
associated with one or more projects, called
compartments.
• A compartment may include information at only one
Figure 5-2 Compartments and Sensitivity Levels.
or several sensitivity levels
Models Of Security
• Why study Models Of Computer Security?
– To determining the policies a secure system should enforce
– To understand the properties of protection systems
• Regular OS –
addresses features
only
• Trusted OS –
addresses features
and assurance (Figure
5-11) Figure 5-11 Security Functions of a Trusted Operating System.
Key Features of Trusted Operating Systems
• Complete Mediation
• All access are controlled
Key Features of Trusted Operating Systems
• Trusted Path
• Allow users to supply protected information only to a legitimate receivers