Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 56 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
56
Dung lượng
4,11 MB
Nội dung
Chapter Security 9.1 The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from outside the system 9.6 Protection mechanisms 9.7 Trusted systems SinhVienZone.com https://fb.com/sinhvienzonevn The Security Environment Threats Security goals and threats SinhVienZone.com https://fb.com/sinhvienzonevn Intruders Common Categories Casual prying by nontechnical users Snooping by insiders Determined attempt to make money Commercial or military espionage SinhVienZone.com https://fb.com/sinhvienzonevn Accidental Data Loss Common Causes Acts of God - fires, floods, wars Hardware or software errors - CPU malfunction, bad disk, program bugs Human errors - data entry, wrong tape mounted SinhVienZone.com https://fb.com/sinhvienzonevn Basics of Cryptography Relationship between the plaintext and the ciphertext SinhVienZone.com https://fb.com/sinhvienzonevn Secret-Key Cryptography • Monoalphabetic substitution – each letter replaced by different letter • Given the encryption key, – easy to find decryption key • Secret-key crypto called symmetric-key crypto SinhVienZone.com https://fb.com/sinhvienzonevn Public-Key Cryptography • All users pick a public key/private key pair – publish the public key – private key not published • Public key is the encryption key – private key is the decryption key SinhVienZone.com https://fb.com/sinhvienzonevn One-Way Functions • Function such that given formula for f(x) – easy to evaluate y = f(x) • But given y – computationally infeasible to find x SinhVienZone.com https://fb.com/sinhvienzonevn Digital Signatures (b) • Computing a signature block • What the receiver gets SinhVienZone.com https://fb.com/sinhvienzonevn User Authentication Basic Principles Authentication must identify: Something the user knows Something the user has Something the user is This is done before user can use the system SinhVienZone.com https://fb.com/sinhvienzonevn 10 Protection Domains (2) A protection matrix SinhVienZone.com https://fb.com/sinhvienzonevn 42 Protection Domains (3) A protection matrix with domains as objects SinhVienZone.com https://fb.com/sinhvienzonevn 43 Access Control Lists (1) Use of access control lists of manage file access SinhVienZone.com https://fb.com/sinhvienzonevn 44 Access Control Lists (2) Two access control lists SinhVienZone.com https://fb.com/sinhvienzonevn 45 Capabilities (1) Each process has a capability list SinhVienZone.com https://fb.com/sinhvienzonevn 46 Capabilities (2) • Cryptographically-protected capability Server • Object Rights f(Objects, Rights, Check) Generic Rights Copy capability Copy object Remove capability Destroy object SinhVienZone.com https://fb.com/sinhvienzonevn 47 Trusted Systems Trusted Computing Base A reference monitor SinhVienZone.com https://fb.com/sinhvienzonevn 48 Formal Models of Secure Systems (a) An authorized state (b) An unauthorized state SinhVienZone.com https://fb.com/sinhvienzonevn 49 Multilevel Security (1) The Bell-La Padula multilevel security model SinhVienZone.com https://fb.com/sinhvienzonevn 50 Multilevel Security (2) The Biba Model • Principles to guarantee integrity of data Simple integrity principle • process can write only objects at its security level or lower The integrity * property • process can read only objects at its security level or higher SinhVienZone.com https://fb.com/sinhvienzonevn 51 Orange Book Security (1) • Symbol X means new requirements • Symbol -> requirements from next lower category apply here also SinhVienZone.com https://fb.com/sinhvienzonevn 52 Orange Book Security (2) SinhVienZone.com https://fb.com/sinhvienzonevn 53 Covert Channels (1) Client, server and collaborator processes SinhVienZone.com Encapsulated server can still leak to collaborator via covert channels https://fb.com/sinhvienzonevn 54 Covert Channels (2) A covert channel using file locking SinhVienZone.com https://fb.com/sinhvienzonevn 55 Covert Channels (3) • Pictures appear the same • Picture on right has text of Shakespeare plays – encrypted, inserted into low order bits of color values Zebras SinhVienZone.com Hamlet, Macbeth, Julius Caesar Merchant of Venice, King Lear https://fb.com/sinhvienzonevn 56 ... https://fb .com/ sinhvienzonevn 29 How Viruses Work (4) • • • After virus has captured interrupt, trap vectors After OS has retaken printer interrupt vector After virus has noticed loss of printer interrupt... victim's computer – trick user into running that program SinhVienZone. com https://fb .com/ sinhvienzonevn 17 Login Spoofing (a) Correct login screen (b) Phony login screen SinhVienZone. com https://fb .com/ sinhvienzonevn... smart cards SinhVienZone. com https://fb .com/ sinhvienzonevn 14 Authentication Using Biometrics A device for measuring finger length SinhVienZone. com https://fb .com/ sinhvienzonevn 15 Countermeasures