Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Computer Security: Confidentiality, Integrity, and Availability, Study notes of Advanced Computer Architecture

This document, 'comsm0213: what is security?' by e. Oswald and n.p. Smart, explores the concepts of security, confidentiality, integrity, and availability in the context of computer systems. The authors discuss various security threats, services, mechanisms, and policies to ensure secure data and systems. They also introduce security evaluation criteria such as tcsec, itsec, and common criteria.

Typology: Study notes

2010/2011

Uploaded on 09/07/2011

home-alone
home-alone 🇬🇧

4

(1)

19 documents

1 / 33

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
COMSM0213 : What is Security?
E. Oswald and N.P. Smart
Department of Computer Science,
University Of Bristol,
Merchant Venturers Building,
Woodland Road,
Bristol, BS8 1UB
United Kingdom.
April 8, 2010
E. Oswald and N.P. Smart
COMSM0213 : What is Security? Slide 1
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21

Partial preview of the text

Download Understanding Computer Security: Confidentiality, Integrity, and Availability and more Study notes Advanced Computer Architecture in PDF only on Docsity!

COMSM0213 : What is Security?

E. Oswald and N.P. Smart

Department of Computer Science, University Of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB United Kingdom.

April 8, 2010

E. Oswald and N.P. Smart

Outline

Definition of Security

When is something secure?

Security Analysis

E. Oswald and N.P. Smart

Confidentiality

Confidentiality is about preventing unauthorised users reading information to which they are not entitled.

Traditionally, security and confidentiality are often identified.

Confidentiality is usually provided by encryption.

E. Oswald and N.P. Smart

Integrity

Integrity is about making sure things are as they should be.

In the context of computing, integrity is about preventing unauthorised users writing information to which they are not entitled.

In a general system, integrity is about ensuring that the system state has not been modified by those not authorised to do so.

In the context of data communications, integrity is often restricted to detecting modifications or knowing where information comes from

Integrity is usually provided by MACs and digital signatures.

E. Oswald and N.P. Smart

Authentication

Authentication is about knowing who an entity is, I (^) Before you allow them to do something.

We shall see how authentication is provided by various mechanisms such as I (^) Passwords I (^) Tokens I (^) Biometrics

We will also look at various models for ensuring authenticated entities only do what they are supposed to do.

E. Oswald and N.P. Smart

Accountability

In practice not all improper actions can be prevented.

Thus users must be held accountable for their actions, including system misuse.

This is typically done by securely identifying users, and keeping an audit trail of security related events.

E. Oswald and N.P. Smart

How do we know something is secure?

In the “real world” a large amount of effort in security is about justifying a given product is secure.

Often the goal is to obtain a third party evaluation.

It is worth understanding a little about how this works as it has influenced a lot of products.

E. Oswald and N.P. Smart

TCSEC

Trusted Computer Systems Evaluation Critera (1983-1999) I (^) US system known as “The Orange Book” I (^) Used to evaluate mainly operating systems I (^) Six classes C1,C2,B1,B2,B3 and A1. I (^) Biased towards confidentiality and govenment applications

A system to get a rating had to meet certain specified functional requirements. I (^) Mandatory access control (see later) not required till B

Also needed to meet certain specified assurance requirements. I (^) e.g. testing, design specification and verification, documentation etc etc

E. Oswald and N.P. Smart

Problems with TCSEC and ITSEC

Criteria creep over time I (^) More stuff added at each level I (^) How to compare a C2 OS in year X with one in year X+2?

Testing took ages I (^) Testing done by evaluation labs seperate from the vendors and approved by govenments.

Two different regimes I (^) OK if only selling in one country, but by early 1990s we had a global economy.

E. Oswald and N.P. Smart

Common Criteria

This is what is currently used (1998 onwards) I (^) Vendor defines a protection profile (PP) stating what the security requirements are I (^) Vendor defines a security target (ST) defining what is tested I (^) CC defines an evaluation methodology so one countries testing labs are equivalent to anothers. I (^) CC defines certain requirements for specific subsystems to obtain certain Evaluation Assurance Levels (EAL) I (^) The CC requirements are both functional requirements and assurance requirements Often the ST follows from the PP

E. Oswald and N.P. Smart

Security Threats

Another way of defining security, particularly in the case of systems other than computers, is to first perform a threat analysis.

Security can then be defined in terms of combating the perceived threats.

Not all threats are always worth defeating I (^) Need a Cost/Benefits Analysis

Risk Analysis This notion of assessing the importance of each threat, thereby leading to an assessment of whether it should be combated, is the essence of risk analysis. I (^) The cost of living with some threats (e.g. low level theft which can be quantified) may be less than the cost of prevention.

E. Oswald and N.P. Smart

Providing Security

Next consider (in general terms) how security can be provided in a system.

What general types of security control exist, and where can these be located?

Security provided in an application can be subverted by attacking the operating system.

Security provided in the OS can be subverted by attacking the hardware.

Designing security into a system from the start is much better than adding security as an afterthought.

E. Oswald and N.P. Smart

Location of Security Controls

A typical IT system can be modelled as having 5 layers I (^) Application Programs I (^) Services : eg provided by DBMS or a distributed file system I (^) Operating System : Performing file and printer management etc. I (^) Kernel (of OS) : Mediating access to processor and memory. I (^) Hardware : Processor and memory. Security controls can be located in any of these layers.

Mechanisms close to hardware are typically more generic and computer-oriented, whilst those close to the application are more user-oriented.

E. Oswald and N.P. Smart

Bypassing Security Controls

An attacker with access to a system layer below where a security mechanism is located can bypass the mechanism.

Given system privilege access by the operating system allows one to bypass application program controls, I (^) e.g. by directly accessing files.

Given access to system hardware, the logical access controls of the operating system can be bypassed. I (^) e.g. to gain access to the hard drive on a computer unscrew it.

E. Oswald and N.P. Smart