0% found this document useful (0 votes)
57 views27 pages

Chapter 4: Security Policies: - Overview - The Nature of Policies - The Nature of Mechanisms - Underlying Both

The document discusses security policies and mechanisms. It covers the nature of security policies, including what they cover and policy languages. It also discusses the nature of security mechanisms and types of mechanisms. Both policies and mechanisms are underpinned by the concept of trust. The document provides examples of security policies for confidentiality, integrity, and availability. It also gives an example of an English language security policy for an academic institution.

Uploaded by

sunny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views27 pages

Chapter 4: Security Policies: - Overview - The Nature of Policies - The Nature of Mechanisms - Underlying Both

The document discusses security policies and mechanisms. It covers the nature of security policies, including what they cover and policy languages. It also discusses the nature of security mechanisms and types of mechanisms. Both policies and mechanisms are underpinned by the concept of trust. The document provides examples of security policies for confidentiality, integrity, and availability. It also gives an example of an English language security policy for an academic institution.

Uploaded by

sunny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 27

Chapter4:SecurityPolicies

Overview
Thenatureofpolicies
Whattheycover
Policylanguages

Thenatureofmechanisms
Types

Underlyingboth
Trust
November1,

IntroductiontoCompu

Slide#41

Overview

Overview
Policies
Trust
NatureofSecurityMechanisms
ExamplePolicy

November1,

IntroductiontoCompu

Slide#42

SecurityPolicy
Policypartitionssystemstatesinto:
Authorized(secure)
Thesearestatesthesystemcanenter

Unauthorized(nonsecure)
Ifthesystementersanyofthesestates,itsasecurity
violation

Securesystem
Startsinauthorizedstate
Neverentersunauthorizedstate
November1,

IntroductiontoCompu

Slide#43

Confidentiality
Xsetofentities,Iinformation
IhasconfidentialitypropertywithrespecttoXif
noxXcanobtaininformationfromI
Icanbedisclosedtoothers
Example:
Xsetofstudents
Ifinalexamanswerkey
IisconfidentialwithrespecttoXifstudentscannot
obtainfinalexamanswerkey
November1,

IntroductiontoCompu

Slide#44

Integrity
Xsetofentities,Iinformation
IhasintegritypropertywithrespecttoXifallx
XtrustinformationinI
Typesofintegrity:
trustI,itsconveyanceandprotection(dataintegrity)
Iinformationaboutoriginofsomethingoranidentity
(originintegrity,authentication)
Iresource:meansresourcefunctionsasitshould
(assurance)
November1,

IntroductiontoCompu

Slide#45

Availability
Xsetofentities,Iresource
IhasavailabilitypropertywithrespecttoXifallx
XcanaccessI
Typesofavailability:
traditional:xgetsaccessornot
qualityofservice:promisedalevelofaccess(for
example,aspecificlevelofbandwidth)andnotmeetit,
eventhoughsomeaccessisachieved
November1,

IntroductiontoCompu

Slide#46

PolicyModels
Abstractdescriptionofapolicyorclassof
policies
Focusonpointsofinterestinpolicies
Securitylevelsinmultilevelsecuritymodels
SeparationofdutyinClarkWilsonmodel
ConflictofinterestinChineseWallmodel

November1,

IntroductiontoCompu

Slide#47

TypesofSecurityPolicies
Military(governmental)securitypolicy
Policyprimarilyprotectingconfidentiality

Commercialsecuritypolicy
Policyprimarilyprotectingintegrity

Confidentialitypolicy
Policyprotectingonlyconfidentiality

Integritypolicy
Policyprotectingonlyintegrity
November1,

IntroductiontoCompu

Slide#48

IntegrityandTransactions
Begininconsistentstate
Consistentdefinedbyspecification

Performseriesofactions(transaction)
Actionscannotbeinterrupted
Ifactionscomplete,systeminconsistentstate
Ifactionsdonotcomplete,systemrevertsto
beginning(consistent)state
November1,

IntroductiontoCompu

Slide#49

Trust
Administratorinstallspatch
1. Trustspatchcamefromvendor,not
tamperedwithintransit
2. Trustsvendortestedpatchthoroughly
3. Trustsvendorstestenvironment
correspondstolocalenvironment
4. Trustspatchisinstalledcorrectly
November1,

IntroductiontoCompu

Slide#410

TrustinFormalVerification
Givesformalmathematicalproofthatgiven
inputi,programPproducesoutputoas
specified
SupposeasecurityrelatedprogramS
formallyverifiedtoworkwithoperating
systemO
Whataretheassumptions?
November1,

IntroductiontoCompu

Slide#411

TrustinFormalMethods
1. Proofhasnoerrors

Bugsinautomatedtheoremprovers

2. PreconditionsholdinenvironmentinwhichSis
tobeused
3. StransformedintoexecutableSwhoseactions
followsourcecode

Compilerbugs,linker/loader/libraryproblems

4. HardwareexecutesSasintended

Hardwarebugs(Pentiumf00fbug,forexample)

November1,

IntroductiontoCompu

Slide#412

TypesofAccessControl
DiscretionaryAccessControl(DAC,IBAC)
individualusersetsaccesscontrolmechanismtoallow
ordenyaccesstoanobject

MandatoryAccessControl(MAC)
systemmechanismcontrolsaccesstoobject,and
individualcannotalterthataccess

OriginatorControlledAccessControl(ORCON)
originator(creator)ofinformationcontrolswhocan
accessinformation
November1,

IntroductiontoCompu

Slide#413

Question
Policydisallowscheating
Includescopyinghomework,withorwithout
permission

CSclasshasstudentsdohomeworkoncomputer
Anneforgetstoreadprotectherhomeworkfile
Billcopiesit
Whocheated?
Anne,Bill,orboth?

November1,

IntroductiontoCompu

Slide#414

AnswerPart1
Billcheated
Policyforbidscopyinghomeworkassignment
Billdidit
Systementeredunauthorizedstate(Billhavingacopy
ofAnnesassignment)

Ifnotexplicitincomputersecuritypolicy,
certainlyimplicit
Notcrediblethataunitoftheuniversityallows
somethingthattheuniversityasawholeforbids,unless
theunitexplicitlysaysso
November1,

IntroductiontoCompu

Slide#415

AnswerPart2
Annedidntprotectherhomework
Notrequiredbysecuritypolicy

Shedidntbreachsecurity
Ifpolicysaidstudentshadtoreadprotect
homeworkfiles,thenAnnedidbreach
security
Shedidntdothis
November1,

IntroductiontoCompu

Slide#416

Mechanisms
Entityorprocedurethatenforcessomepart
ofthesecuritypolicy
Accesscontrols(likebitstopreventsomeone
fromreadingahomeworkfile)
DisallowingpeoplefrombringingCDsand
floppydisksintoacomputerfacilitytocontrol
whatisplacedonsystems

November1,

IntroductiontoCompu

Slide#417

ExampleEnglishPolicy
Computersecuritypolicyforacademic
institution
Institutionhasmultiplecampuses,administered
fromcentraloffice
Eachcampushasitsownadministration,and
uniqueaspectsandneeds

AuthorizedUsePolicy
ElectronicMailPolicy
November1,

IntroductiontoCompu

Slide#418

AuthorizedUsePolicy
Intendedforonecampus(Davis)only
Goalsofcampuscomputing
Underlyingintent

Proceduralenforcementmechanisms
Warnings
Denialofcomputeraccess
Disciplinaryactionuptoandincludingexpulsion

Writteninformally,aimedatusercommunity

November1,

IntroductiontoCompu

Slide#419

ElectronicMailPolicy
Systemwide,notjustonecampus
Threeparts
Summary
Fullpolicy
Interpretationatthecampus

November1,

IntroductiontoCompu

Slide#420

Summary
Warnsthatelectronicmailnotprivate
Canbereadduringnormalsystem
administration
Canbeforged,altered,andforwarded

Unusualbecausethepolicyalertsusersto
thethreats
Usually,policiessayhowtopreventproblems,
butdonotdefinethethreats
November1,

IntroductiontoCompu

Slide#421

Summary
Whatusersshouldandshouldnotdo
Thinkbeforeyousend
Becourteous,respectfulofothers
Dontnterferewithothersuseofemail

Personaluseokay,providedoverheadminimal
Whoitappliesto
ProblemisUCisquasigovernmental,soisboundbyrulesthat
privatecompaniesmaynotbe
Educationalmissionalsoaffectsapplication

November1,

IntroductiontoCompu

Slide#422

FullPolicy
Context
DoesnotapplytoDept.ofEnergylabsrunbytheuniversity
Doesnotapplytoprintedcopiesofemail
Otherpoliciesapplyhere

Email,infrastructureareuniversityproperty
Principlesofacademicfreedom,freedomofspeechapply
Accesswithoutuserspermissionrequiresapprovalofvice
chancellorofcampusorvicepresidentofUC
Ifinfeasible,mustgetpermissionretroactively

November1,

IntroductiontoCompu

Slide#423

UsesofEmail
Anonymityallowed
Exception:ifitviolateslawsorotherpolicies

Cantinterferewithothersuseofemail
Nospam,letterbombs,emailedworms,etc.

Personalemailallowedwithinlimits
Cannotinterferewithuniversitybusiness
Suchemailmaybeauniversityrecord
subjecttodisclosure
November1,

IntroductiontoCompu

Slide#424

SecurityofEmail
Universitycanreademail
Wontgooutofitswaytodoso
Allowedforlegitimatebusinesspurposes
Allowedtokeepemailrobust,reliable

Archivingandretentionallowed
Maybeabletorecoveremailfromendsystem
(backedup,forexample)
November1,

IntroductiontoCompu

Slide#425

Implementation
Addscampusspecificrequirementsand
procedures
Example:incidentalpersonalusenotallowedifit
benefitsanonuniversityorganization
Allowsimplementationtotakeintoaccountdifferences
betweencampuses,suchasselfgovernanceby
AcademicSenate

Proceduresforinspecting,monitoring,disclosing
emailcontents
Backups
November1,

IntroductiontoCompu

Slide#426

KeyPoints
Policiesdescribewhatisallowed
Mechanismscontrolhowpoliciesare
enforced
Trustunderlieseverything

November1,

IntroductiontoCompu

Slide#427

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy