15 - Introduction to computer security

Class: CSCE-313


Notes:

Is computer security necessary?

...

Notes:

Examples of security problems

...

Notes:

Buffer Overflow in a Nutshell

...

Notes:

Denial of Service

...

Notes:

What is computer security?

...

Notes:

Why is security hard?

...

Notes:

1. Confidentiality

Confidentiality: Encryption

...

Notes:

Encryption ~ Speaking

...

Notes:

Confidentiality: access control

...

Notes:

Confidentiality: Authentication

...

Notes

Confidentiality: Authorization

...

Notes:

Confidentiality: Physical Security

...

Notes:

2. Integrity

Integrity-the property that information has not been altered in an unauthorized way. Integrity is a separate property than Confidentiality.

Notes:

Integrity: checksum

...

Notes:

For example:

$ cat foo
ATTACK AT DAWN
$ sha1sum foo
0806b996cbad73b0f5e0f68898d3c80eaea27bcf  foo

But when we do

$ cat foo
ATTACK AT MOON
$ sha1sum foo
ee6f10e08c5a841ccd2a5261d0326623855fd3a3  foo

Integrity: error correcting codes

...

Notes:

3. Availability

...

Notes:

Design Principles for Secure Systems

...

Notes:

Questions

A Unix file system checks permissions on every file access - not just when a file is first opened/ Even if a process has already read from a file, each subsequent read is re-checked against the current ACL.

Answer: Complete mediation


A new employee at a hospital is given read/write access to all patient records, billing, HR files, and the pharmacy system - 'just in case they need it later.'

Answer: Least privilege


A bank's wire-transfer system requires both a manager's password and a hardware token before a large transfer would be approved

Answer: Separation of privileges


An operating system's kernel is kept as small as possible, with only the most essential functions inside it. Everything else runs in user space.

Answer: Economy of [protection] mechanism


An operating system's kernel security system requires users to enter a 47-step authentication ritual before they can access their own calendar. Most users end up writing their password on a sticky note.

Answer: Acceptability