Advance Topics in Info & Comm Security Lecture 2: Security Policies and Prevention Tips
Advance Topics in Info & Comm Security Lecture 2: Security Policies and Prevention Tips
Advance Topics in Info & Comm Security Lecture 2: Security Policies and Prevention Tips
Comm Security
Lecture 2: Security
policies and prevention
tips
Policies and Mechanisms
• Policy says what is, and is not, allowed
– This defines “security” for the site/system/etc.
• Mechanisms enforce policies
• Composition of policies
– If policies conflict, discrepancies may create
security vulnerabilities
Policies and Mechanisms
• Policy: may be expressed in
– natural language, which is usually imprecise but easy to understand;
– mathematics, which is usually precise but hard to understand;
– policy languages, which look like some form of programming language
and try to balance precision with ease of understanding
• Mechanisms: may be
– technical, in which controls in the computer enforce the policy; for
example, the requirement that a user supply a password to authenticate
herself before using the computer
– procedural, in which controls outside the system enforce the policy; for
example, firing someone for ringing in a disk containing a game
program obtained from an untrusted source
• The composition problem requires checking for inconsistencies among policies. If, for
example, one policy allows students and faculty access to all data, and the other
allows only faculty access to all the data, then they must be resolved
Goals of Security
• Prevention
– Prevent attackers from violating security policy
– Prevention is ideal, because then there are no
successful attacks.
• Detection
– Detect attackers’ violation of security policy
– Occurs after someone violates the policy.
• Recovery
– Stop attack, assess and repair damage
– Continue to function correctly even if attack succeeds
Trust and Assumptions
• Underlie all aspects of security
• Policies
– Unambiguously partition system states
– Correctly capture security requirements
• Mechanisms
– Assumed to enforce policy
– Support mechanisms work correctly
• Example of lock picker
Assurance
• Assurance is a measure of how well the system meets its
requirements; more informally, how much you can trust the
system to do what it is supposed to do. It does not say what
the system is to do; rather, it only covers how well the system
does it
• System specification, design, and implementation can provide
a basis for determining "how much" to trust a system
• Specification
– Requirements analysis
– Statement of desired functionality
• Design
– How system will meet specification
• Implementation
– Programs/systems that carry out design
Operational Issues
• Security does not end when the system is
completed. Its operation affects security
– Cost-Benefit Analysis
• Is it cheaper to prevent or recover?
– Risk Analysis
• Should we protect something?
• How much should we protect this thing?
– Laws and Customs
• Are desired security measures illegal?
• Will people do them?
Human Issues
• Organizational Problems
– Power and responsibility
– Financial benefits (security does not bring in
revenue, it merely prevents the loss of
revenue )
• People problems
– Heart of any security system is people
– Outsiders and insiders
– Social engineering
Tying Together
Threats
Policy
Specification
Design
Implementation
Operation
Top 10 Cyber Crime Prevention Tips
3. Be Social-Media Savvy
Make sure your social networking profiles (e.g. Facebook, Twitter,
Youtube, MSN, etc.) are set to private. Check your security settings. Be
careful what information you post online. Once it is on the Internet, it is
there forever!