0% found this document useful (0 votes)
43 views33 pages

Principles of Computer Security: Simen Hagen

1) The document discusses principles of computer security including policy risk analysis, faults, and detecting flaws. 2) It focuses on risk analysis including defining security policies, identifying assets and risks, and determining countermeasures. 3) Methods for detecting vulnerabilities and flaws are examined, including formal verification and penetration studies.

Uploaded by

maxbyz
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
43 views33 pages

Principles of Computer Security: Simen Hagen

1) The document discusses principles of computer security including policy risk analysis, faults, and detecting flaws. 2) It focuses on risk analysis including defining security policies, identifying assets and risks, and determining countermeasures. 3) Methods for detecting vulnerabilities and flaws are examined, including formal verification and penetration studies.

Uploaded by

maxbyz
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 33

Policy Risk Analysis Faults Detecting aws

Principles of Computer Security


Lecture 2 Simen Hagen

Trust and Risk Analysis

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Change of Student Assistent

Lu Xing is unable to stay on as student assistant New student assistant will be Ebenezer Paintsil

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Outline
1 2

Policy Risk Analysis Foundation Policy Policy Violations Faults Faults Probabilities Detecting aws

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Last week

What is security? Privacy/Condentiality Integrity Trust Predictability

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

This week

Risk Analysis What are the threats? How can we guard against these threats (countermeasures)?

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Policy

Denition (From Merriam-Webster Online) a : a denite course or method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions b : a high-level overall plan embracing the general goals and acceptable procedures especially of a governmental body Denition (From Wikipedia) A policy is a plan of action for tackling issues.

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Security policy

Denition (Policy) A security policy is a statement of what is, and what is not, allowed.

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Policy

There are several challenges with making policies: We have to state what we value. We do not always agree on what is valuable. Security is often inconvenient. Management is necessary (assign and control of privileges).

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Human-Computer System

Denition (Human-Computer system) A human-computer system is an organized effort involving humans and computers to solve some problem or perform a service.

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Bank example

Bank security Relies on tamper-proof technologies


Physical isolation Self-destruct if tampered with

Tamper resistance is almost impossible to achieve

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

How can we get security?

What are we trying to protect? Find sources of trust and risks Find Counter-measures

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Airport example
If you were considering an airport, identify at least 5 items for each of the following points: Assets baggage, human life, aircraft, equipment, ticket, money Risks lost luggage, plane crash, mechanical failures, sabotage, hijack, robbery Counter-measures baggage tracking, pilot redundancy (co-pilot), protocols, personnel restrictions, security checks (X-rays, metal detectors)

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Computer system

Policies Procedures Operating environment

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Trust

Trust is based on Predictability Reliability

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Policy

Rules Codied responses

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Policy violations

Example (ATM Scam) Install ATM to collect card information Read information from card Ask for PIN code Give error message

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Policy Violations

Example (Password violations) Attach Post-It with password on screen Use childs name as password Give password to family or friend Send password in e-mail

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Motivations for violations


Why do some people violate policy? Greed (resource gain) To show off (social gain) Bribery or Blackmail Vandalism Revenge Sabotage Opportunism Selsh challenge (because it is there) War
Simen Hagen Security

There is a payoff for the attacker

university-logo

Policy Risk Analysis Faults Detecting aws

Foundation Policy Policy Violations

Unintentional violations

Not all violations are intentional Forgetfulness Misunderstandings Confusion/Stress/Intoxication Ignorance Carelessness Slowness of response Inability to cooperate with others

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Faults

Design fault System does not meet specication Emergent fault Bug! System has unpredictable and unintended behavior Catastrophe Power failure, ood . . .

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Fault Dependency
Faults propagate through dependencies.

Serial (dependent)
Single point of failure

Parallel (redundant)

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Fault Trees

Simple systematic method for analyzing risk Assume hierarchical dependency (cause-effect) List independent causes with AND, OR etc. Estimate probability of component failure Sum probabilities to nd the most important pathway Countermeasures

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Fault Tree Example

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Probabilities
Use these rules for combining probability

P(A AND B) = P(A)P(B) P(A OR B) = P(A) + P(B) - P(A)P(B)

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Example calculation

Limited model: Threaten employee and all else has zero probability P(Guess password)= P(A) = 5/1000 = 0.005 P(Find service bug) = P(B) = 5/100 = 0.05 P(Machine miscongured) = P(C) = 10% = 0.1

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Example calculation

P(Attack) = P(B AND C) = P(BC) = P(B)P(C). P(Hack) = P(A OR BC) = P(A) + P(BC) - P(A)P(BC) = P(A) + P(B)P(C) - P(A)P(B)P(C)

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Example calculation
Alternative

P(Hack) = P(A) OR P(NOT A) AND (P(B) AND P(C)) = P(A) + (1-P(A)) P(B)P(C) = P(A) + P(B)P(C) - P(A)P(B)P(C)

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Example calculation
In numbers

P(Hack) = 0.005 + 0.995 x 0.05 x 0.1 = 0.005 + 0.0049 = 0.01 = 1% chance Both branches have about the same probability We should protect both equally

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Conicts

What happens if there are disagreements about the policy? There are different ways to protect against attacks Choose
The best Several

What is the best choice?


The most probable

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Faults Probabilities

Risk Analysis

We need a rational method of evaluating systems Model of the system How threats occur Cause of failure

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Formal verication

Technique for detecting vulnerabilities Analyze design and implementation {Precondition} | Program | {Postconditions}

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Penetration studies

An authorized attempt to violate a security policy Evaluate the strengths of all security controls Designed to test
Procedures Operations Technologies

university-logo

Simen Hagen

Security

Policy Risk Analysis Faults Detecting aws

Thought for the Week

In any human-computer system, it is unlikely to nd a technology that can protect against all these forms and motivations for attack.

university-logo

Simen Hagen

Security

You might also like