150 likes | 364 Views
Security by Design. A Prequel for COMPSCI 702. Perspective. “ Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough to know what things mean, sometimes you have to know what things don't mean.” - Bob Dylan
E N D
Security by Design A Prequel for COMPSCI 702
Perspective • “Any fool can know. The point is to understand.” - Albert Einstein • “Sometimes it's not enough to know what things mean, sometimes you have to know what things don't mean.” - Bob Dylan • “Life can only be understood backwards; but it must be lived forwards.” - Søren Kierkegaard
Definitions • For the purposes of this class, a security service is a service that is designed to offset the potential loss of confidentiality, integrity, and/or availability, through the utilization of one or more security mechanisms and protocols. • It is in this context that the security services of authentication, access control, integrity, confidentiality, non-repudiation, auditing and availability will be considered. • Security services are enacted through the use of security mechanisms and protocols. • Overlap of security services may occur in the same mechanism and/or protocol
Definitions • Authentication • Authentication techniques establish trust in a principal and its credentials by verifying the claimed identity. • For effective authentication, the credentials need to be a unique form of identification that is difficult to counterfeit. • In distributed, networked computing environments it is necessary that people, computers, and services confirm each other’s identities before initiating data transfers or granting access to files and processes.
Definitions • Access Control • Access control involves the enforcement of privileges based on the system’s access control policy. • The function of access control is to limit the actions or operations that a legitimate user of a computer system can perform. • The use of access control extends to the execution of system commands by both subjects (people) and objects (programs) in an effort to prevent a breach of the system’s security policy. • Policies are high-level guidelines that determine how accesses are controlled and access decisions determined.
Definitions • Integrity • Integrity means that the data is unaltered based on its original state. Integrity can also be defined as data that has had no unauthorized changes. • During electronic storage and transmission, data can be corrupted or destroyed through error or malicious intent. • Integrity services seek to maintain the integrity of stored and transmitted data with the assistance of other security services and mechanisms in an effort to prevent corruption and tampering.
Definitions • Confidentiality • Confidentiality is said to describe the state in which data is protected from unauthorized disclosure. • Confidentiality services seek to maintain the privacy of stored and transmitted data with the support of other security services and mechanisms such as encryption using a secret or public/private key.
Definitions • Non-Repudiation • A non-repudiation service makes entities accountable for their actions by providing non-refutable evidence that an action took place by the entity. • Evidence can come in the form of proof of origin, proof of original content, proof of delivery, and proof of original content received. • The first two forms of evidence protect the receiver and the last two protect the sender. • A non-repudiation service collects evidence in a manner that the entities cannot repudiate their actions at a later date, and retains that evidence in a secure manner.
Definitions • Audit • Audit services provide monitoring functions through the use of logs so that an examination of past activities and events may be conducted. • An audit policy establishes what activities and events are to be recorded and under what conditions. • Security auditing services are concerned with monitoring, recording, and maintaining security-relevant events so that in the event of a security breach they can be utilized to secure future transactions. • This includes the protection of the logs so that the data is not modified or deleted through unintentional or deliberate acts.
Definitions • Availability • Availability services ensure that a system is operational and functional at any given moment. • Usually provided through redundancy • High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. • Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system essentially forcing it to shut down.
The Bigger Picture Security Services & Mechanisms Perceived Safe Zone Theoretical Safe Zone • Intrusion Detection Systems - Highly developed Non-Repudiation systems • Server transaction logs - Database transaction logs - Certificate Authorities • Secret Key and Public / Private Key - Secure Socket Layer (SSL) • Transport Layer Security (TLS) - IPv6 - Internet Protocol Security (IPSec) • Hash Product (MD5, SHA-1, RIPEMD-160) - Digital Certificate - IPv6 • Capacity Planning / Scalable Bandwidth - Server / Site Mirroring • Packet Filtering and Blocking - Distributive Operations • Public Key Infrastructure and X.509 - Kerberos • Global Directory Services (X.500) - Tokens • Reference Monitor - Access Control Lists • PKI - Digital Certificates - HMAC
User Privacy (secrecy) User Features Security Design Data Usage (transparency) The Bigger Picture Competing Interests
What I am looking for from YOU • View the activities of this class from a security services’ perspective. • Evaluate what “secure” means in this context • Select security mechanisms and protocols based on this perspective • Identify what security services and mechanisms are lacking in development environments, and… • Discover new ways of securing applications