49
Computer Science and Engineering 1 What these What these organizations have in organizations have in common? common? American Education Services, PA United States Marine Corps / Penn State University St. Vincent Hospital Fox News SAIC, (San Diego, CA) Western Union Fidelity National Information Services

Computer Science and Engineering 1 What these organizations have in common? American Education Services, PA United States Marine Corps / Penn State University

Embed Size (px)

Citation preview

Computer Science and Engineering 1

What these organizations What these organizations have in common?have in common?

• American Education Services, PA

• United States Marine Corps / Penn State University

• St. Vincent Hospital

• Fox News

• SAIC, (San Diego, CA)

• Western Union

• Fidelity National Information Services

Computer Science and Engineering 2

What these organizations What these organizations have in common?have in common?

• American Education Services, PA

• United States Marine Corps / Penn State University

• St. Vincent Hospital

• Fox News

• SAIC, (San Diego, CA)

• Western Union

• Fidelity National Information Services

Security BreachesSecurity BreachesJuly 2007July 2007

http://http://www.privacyrights.org/ar/www.privacyrights.org/ar/ChronDataBreaches.htm#200ChronDataBreaches.htm#2007 7

Computer Science and Engineering 3

Computer Science and Engineering 4

Computer Science and Engineering 5

Csilla FarkasAssociate Professor

Dept. of Computer Science and EngineeringUniversity of South Carolina

[email protected]://www.cse.sc.edu/~farkas

Computer Science and Engineering 6

Security ObjectivesSecurity Objectives

Secrecy

Prevent/detect/deter improperDisclosure of information

Availability

Prevent/detect/deter improperDenial of access to services

Integrity

Prevent/detect/deter Improper modificationof information

Computer Science and Engineering 7

Security TradeoffsSecurity Tradeoffs

COST

Security Functionality

Ease of Use

Computer Science and Engineering 8

Achieving Security

PolicyWhat to protect?

MechanismHow to protect?

AssuranceHow good is the protection?

Computer Science and Engineering 9

PolicyPolicyOrganizational policy

Information systems policy

Computer Science and Engineering 10

Security by ObscuritySecurity by Obscurity

Hide inner working of the systemBad idea!

– Vendor independent open standard– Widespread computer knowledge

Computer Science and Engineering 11

Security by LegislationSecurity by Legislation

Instruct users how to behaveNot good enough!

– Important– Only enhance security– Targets only some of the security problems

Computer Science and Engineering 12

Security MechanismSecurity Mechanism

Prevention DetectionTolerance and Recovery

Computer Science and Engineering 13

Prevention: Access Control

Ensures that all direct accesses are authorized

Protects against accidental and malicious threats

Computer Science and Engineering 14

Access ControlAccess Control

Subject: active entity that requests access to an object - e.g., user or program

Object: passive entity accessed by a subject- e.g., record, relation, file

Access right (privileges): how a subject is allowed to access an object- e.g., subject s can read object o

Computer Science and Engineering 15

Access Control Models

Discretionary Access Control (DAC) Mandatory Access Control (MAC) Role-Based Access Control (RBAC)

Computer Science and Engineering 16

Discretionary Access Control (DAC)

For each subject access right to the objects are defined.

User based Grant and Revoke Problems:

- Propagation of access rights- Revocation of propagated access rights

Computer Science and Engineering 17

DAC by Grant and DAC by Grant and RevokeRevoke

Brown (owner)

Black Red

White

GRANT SELECT ON EmployeeTO Red

GRANT SELECT ON EmployeeTO BlackWITH GRANT OPTION ?

Brown revokes grantgiven to Black

?Brown does not want Red to access the Employee relation

GRANT UPDATE(Salary) ON Employee TO White

Computer Science and Engineering 18

Mandatory Access Control (MAC)

Security label Dominance (), e.g., Top-Secret Secret

Public Objects: security classification

- File 1 is Secret, File 2 is Public Subjects: security clearances

- Brown is cleared to Secret, Black is cleared to Public

Access rights: defined by comparing the security classification of the requested objects with the security clearance of the subject

Computer Science and Engineering 19

MAC – Bell-LaPadula MAC – Bell-LaPadula (BLP) Model(BLP) Model

Single security property: a subject S is allowed a read access to an object O only if label(S) dominates label(O)

Star-property: a subject S is allowed a write access to an object O only if label(O) dominates label(S)

No direct flow of information from high security objects to low security objects!

Computer Science and Engineering 20

Role-Based Access Role-Based Access Control (RBAC)Control (RBAC)

Express organizational policies- Separation of duties- Delegation of authority

Flexible: easy to modify to meet new security requirements

Supports- Least-privilege- Separation of duties- Data abstraction

Computer Science and Engineering 21

RBACRBAC00

.

.

UUsers

RRoles

PPermissions

. SSessions

User assignment

Permissionassignment

Computer Science and Engineering 22

ResearchResearch Secure Semantic WebSecure Semantic Web

Computer Science and Engineering 23

Web EvolutionWeb Evolution

• Past: Human usage – HTTP– Static Web pages (HTML)

• Current: Human and some automated usage – Interactive Web pages– Web Services (WSDL, SOAP, SAML)– Semantic Web (RDF, OWL, RuleML, Web databases)– XML technology (data exchange, data representation)

• Future: Semantic Web Services

Computer Science and Engineering 24

Research AreasResearch Areas

Access Control for DataMetadataApplication

Computer Science and Engineering 25

Secure XML ViewsSecure XML Views<medicalFiles> UC <countyRec> S <patient> S <name>John Smith </name> UC <phone>111-2222</phone> S </patient> <physician>Jim Dale </physician> UC </countyRec> <milBaseRec> TS <patient> S <name>Harry Green</name> UC <phone>333-4444</phone> S </patient> <physician>Joe White </physician> UC <milTag>MT78</milTag> TS </milBaseRec></medicalFiles>

medicalFiles

countyRec

patient

nameJohn Smith

milBaseRec

physicianJim Dale

physicianJoe White

nameHarry Green

milTagMT78

patient

phone111-2222

phone333-4444

View over UC data

Computer Science and Engineering 26

Secure XML Views (cont.)Secure XML Views (cont.)

<medicalFiles> <countyRec> <patient> <name>John Smith</name> </patient> <physician>Jim Dale</physician> </countyRec> <milBaseRec> <patient> <name>Harry Green</name> </patient> <physician>Joe White</physician> </milBaseRec></medicalFiles>

medicalFiles

countyRec

patient

nameJohn Smith

milBaseRec

physicianJim Dale

physicianJoe White

nameHarry Green

patient

View over UC data

Computer Science and Engineering 27

Secure XML Views (cont.)Secure XML Views (cont.)medicalFiles

countyRec

patient

nameJohn Smith

milBaseRec

physicianJim Dale

physicianJoe White

nameHarry Green

patient

View over UC data

<medicalFiles> <tag01> <tag02> <name>John Smith</name> </tag02> <physician>Jim Dale</physician> </tag01> <tag03> <tag02> <name>Harry Green</name> </tag02> <physician>Joe White</physician> </tag03></medicalFiles>

Computer Science and Engineering 28

Secure XML Views (cont.)Secure XML Views (cont.)

<medicalFiles> UC <countyRec> S <patient> S <name>John Smith</name> UC </patient> <physician>Jim Dale</physician> UC </countyRec> <milBaseRec> TS <patient> S <name>Harry Green</name> UC </patient> <physician>Joe White</physician> UC </milBaseRec></medicalFiles>

medicalFiles

countyRec

patient

nameJohn Smith

milBaseRec

physicianJim Dale

physicianJoe White

nameHarry Green

patient

View over UC data

Computer Science and Engineering 29

Secure XML Views (cont.)Secure XML Views (cont.)medicalFiles

nameJohn Smith

physicianJim Dale

physicianJoe White

nameHarry Green

View over UC data

<medicalFiles> <name>John Smith</name> <physician>Jim Dale</physician> <name>Harry Green</name> <physician>Joe White</physician></medicalFiles>

Computer Science and Engineering 30

<medicalFiles>

<milTag>

<phone>

<milBaseRec>

<countyRec>

<patient>

<physician> <name>

TopSecret

Secret

Unclassified

Multi-Plane DTD GraphMulti-Plane DTD Graph

D,medicalFiles

D, countyRec D, milBaseRec

D, patient D, milTag

D, name D, phone

UC

UC

UC

S

S

S

TS

TSD, physician

MPG = DTD graphover multiple

security planes

Computer Science and Engineering 31

TransformationTransformation

name phone

physician

MSCG

MPG

<medicalFiles>

<milTag>

<phone>

<milBaseRec>

<countyRec><patient>

<physician> <name>

TS

UC

S

Security Space Secret

Computer Science and Engineering 32

TransformationTransformation

MPG

<medicalFiles>

<milTag>

<phone>

<milBaseRec>

<countyRec><patient>

<physician> <name>

TS

S

UC

<emrgRec>

SP

name

physician

MSCG

Computer Science and Engineering 33

TransformationTransformation

MPG

<medicalFiles>

<milTag>

<phone>

<milBaseRec>

<countyRec><patient>

<physician> <name>

TS

S

UC

<emrgRec>

SPMSCG

Computer Science and Engineering 34

TransformationTransformation

MPG

<medicalFiles>

<milTag>

<phone>

<milBaseRec>

<countyRec><patient>

<physician> <name>

TS

S

UC SP

<emrgRec>

medicalFiles

emergencyRec

namephysician

Data Structure

Computer Science and Engineering 35

Metadata SecurityMetadata Security

• No security model exists for metadata • Can we use existing security models to protect

metadata?• RDF/S is the Basic Framework for SW• RDF/S supports simple inferences• This is not true of XML: XML Access control cannot

be used to protect RDF /S data

Computer Science and Engineering 36

John USC

studiesAt

Person

University

GovAgency

Student

memberAt

studiesAt

inferred rdf:type

rdf:type

rdfs:subClassOf

rdfs:subPropertyOf

Legend

schema

instance

Example Graph Example Graph FormatFormat

RDF Triples:(Student, rdfs:subClassOf, Person)(University, rdfs:subClassOf, GovAgency)(studiesAt, rdfs:domain, Student)(studiesAt, rdfs:range,University)(studiesAt, rdfs:subPropertyOf, memberAt)(John, studiesAt, USC)

Computer Science and Engineering 37

John USC

studiesAt

Person

University

GovAgency

Student

memberAt

studiesAt

inferred rdf:type

rdf:type

rdfs:subClassOf

rdfs:subPropertyOf

Legend

schema

instance

Rdfs2 : Fact3 + Fact6 Fact7

Example Graph Example Graph FormatFormat

Computer Science and Engineering 38

John USC

studiesAt

Person

University

GovAgency

Student

memberAt

studiesAt

inferred rdf:type

rdf:type

rdfs:subClassOf

rdfs:subPropertyOf

Legend

schema

instance

Rdfs2 : Fact3 + Fact6 Fact7

Rdfs3 : Fact4+Fact6 Fact8

Example Graph Example Graph FormatFormat

Computer Science and Engineering 39

John USC

studiesAt

Person

University

GovAgency

Student

memberAt

studiesAt

inferred rdf:type

rdf:type

rdfs:subClassOf

rdfs:subPropertyOf

Legend

schema

instance

Rdfs2 : Fact3 + Fact6 Fact7

Rdfs3 : Fact4+Fact6 Fact8

Rdfs9 : Fact2 + Fact8 Fact9

Example Graph Example Graph FormatFormat

Computer Science and Engineering 40

Secure RDFSecure RDF

Entailed Data in RDF can cause illegal inferences:

• (John, studiesAt, USC) [S] + (studiesAt, rdfs:domain, University) [S] (USC, rdf:type, University) [S]• (USC, rdf:type, University) [S]+ (University, rdf:subclassOf, GovAgency) [S] (USC, rdf:type, GovAgency) [TS]

Secret User can infer TS informationSecret User can infer TS information

Computer Science and Engineering 41

RDF Access Control RDF Access Control

• Security Policy– Subject– Object – Object pattern – Access Mode

• Default policy• Conflict Resolution • Classification of entailed data • Flexible granularity

Computer Science and Engineering 42

Application SecurityApplication Security

Security Policy: – Application semantics (from syntax to semantics)– External requirements– Privacy – Trust management– Compliance checking

Computer Science and Engineering 43

How to become information How to become information security professional?security professional?

Computer Science and Engineering 44

EDUCATION:

Graduate Certificate Program in Information Assurance and

Security (IA&S)

Computer Science and Engineering 45

CNSS CertificationsCNSS Certifications

• National Training Standard for Information Systems Security Professionals, CNSSI No. 4011

• National Training Standard for System Administrators in Information Systems Security, CNSSI No. 4013

• National Training Standard for Information Systems Security Officers, CNSSI No. 4014

Computer Science and Engineering 46

Core CoursesCore Courses

• CSCE 522 – Information Systems Security Principles – offered every Fall semester

• CSCE 715– Network Security– offered every Fall semester

• CSCE 727 – Information Warfare– offered every 3rd semester

Computer Science and Engineering 47

Elective CoursesElective Courses• CSCE 517 – Computer Crime and Forensics • CSCE 557 – Introduction to Cryptography• CSCE 548 – Secure Software Construction• CSCE 716 – Design for Reliability• CSCE 717 – Comp. Systems Performance• CSCE 813 – Internet Security• CSCE 814 – Distributed Systems Security• CSCE 824 – Secure Databases• CSCE 853 – Formal Models of Information Security

Computer Science and Engineering 48

Undergraduate EducationUndergraduate Education

• New undergraduate courses:

– CSCE 201: Introduction to Information Security

Computer Science and Engineering 49

Questions?Questions?