CH 1
CH 1
• Technical measures
– Access control; identification & authentication; system &
communication protection; system & information integrity
• Management controls and procedures
– Awareness & training; audit & accountability; certification,
accreditation, & security assessments; contingency planning;
maintenance; physical & environmental protection; planning;
personnel security; risk assessment; systems & services acquisition
• Overlapping technical and management
– Configuration management; incident response; media protection
THE OSI(X.800) SECURITY ARCHITECTURE
• The OSI security architecture focuses on security attack, security
mechanism ,security service
X.800, Security Architecture for OSI
systematic way of defining requirements for security and
characterizing approaches to satisfying them
• security attack: Any action that compromises the security of
information owned by an organization.
• Security mechanism: A process that is designed to detect, prevent,
or recover from a security attack.
• Security service: A processing or communication service that
enhances the security of the data processing systems and the
information transfers of an organization.
Fundamental security design principles
[1/4]
• Despite years of research, it is still difficult to
design systems that comprehensively prevent
security flaws
• But good practices for good design have been
documented (analogous to software engineering)
– Economy of mechanism, fail-safe defaults, complete
mediation, open design, separation of privileges,
lease privilege, least common mechanism,
psychological accountability, isolation, encapsulation,
modularity, layering, least astonishment
Fundamental security design principles
[2/4]
• Economy of mechanism: the design of security
measures should be as simple as possible
– Simpler to implement and to verify
– Fewer vulnerabilities
• Fail-safe default: access decisions should be
based on permissions; i.e., the default is lack of
access
• Complete mediation: every access should
checked against an access control system
• Open design: the design should be open rather
than secret (e.g., encryption algorithms)
Fundamental security design principles
[3/4]
• Isolation
– Public access should be isolated from critical
resources (no connection between public and critical
information)
– Users files should be isolated from one another
(except when desired)
– Security mechanism should be isolated (i.e.,
preventing access to those mechanisms)
• Encapsulation: similar to object concepts (hide
internal structures)
• Modularity: modular structure
Fundamental security design principles
[4/4]
• Layering (defense in depth): use of multiple,
overlapping protection approaches
• Least astonishment: a program or interface
should always respond in a way that is least
likely to astonish a user
Fundamental security design principles
• Separation of privilege: multiple privileges
should be needed to do achieve access (or
complete a task)
• Least privilege: every user (process) should have
the least privilege to perform a task
• Least common mechanism: a design should
minimize the function shared by different users
(providing mutual security; reduce deadlock)
• Psychological acceptability: security mechanisms
should not interfere unduly with the work of
users
Attack surfaces
• Attack surface: the reachable and exploitable
vulnerabilities in a system
– Open ports
– Services outside a firewall
– An employee with access to sensitive info
– …
• Three categories
– Network attack surface (i.e., network vulnerability)
– Software attack surface (i.e., software vulnerabilities)
– Human attack surface (e.g., social engineering)
• Attack analysis: assessing the scale and severity of threats
Attack trees
• A branching, hierarchical data structure that
represents a set of potential vulnerabilities
• Objective: to effectively exploit the info
available on attack patterns
– published on CERT(Computer Emergency
Response Team ) or similar forums
– Security analysts can use the tree to guide design
and strengthen countermeasures
An attack tree
Computer security strategy
• An overall strategy for providing security
– Policy (specs): what security schemes are supposed to do
• Assets and their values
• Potential threats
• Ease of use vs security
• Cost of security vs cost of failure/recovery
– Implementation/mechanism: how to enforce
• Prevention
• Detection
• Response
• Recovery
– Correctness/assurance: does it really work
(validation/review)
Security Taxonomy
Security Trends
Computer Security Losses
Security Technologies Used
Summary
• Security concepts
• Terminology
• Functional requirements
• Security design principles
• Security strategy