Sam Write iClickers for hardware & software Resume lecture at Software.

106
Sam • Write iClickers for hardware & software • Resume lecture at Software

Transcript of Sam Write iClickers for hardware & software Resume lecture at Software.

Page 1: Sam Write iClickers for hardware & software Resume lecture at Software.

Sam

• Write iClickers for hardware & software

• Resume lecture at Software

Page 2: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Architecture and Design

CISSP Guide to Security Essentials

Chapter 9

Page 3: Sam Write iClickers for hardware & software Resume lecture at Software.

Objectives

• Security models– Bell LaPadula– Biba– Clark-Wilson– Access Matrix– Multi-Level– Mandatory Access Control (MAC)– Discretionary Access Control (DAC)– Role-based Access Control (RBAC)– Non-interference– Information Flow

Page 4: Sam Write iClickers for hardware & software Resume lecture at Software.

Objectives (cont.)

• Information systems evaluation models including Common Criteria, TCSEC, ITSEC

• Computer hardware architecture

• Computer software: operating systems, applications, and tools

• Security threats and countermeasures

Page 5: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Models

Page 6: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Models

• A model is a simplified representation used to explain a real world system

• Security models are used to design a system to protect secrets

Page 7: Sam Write iClickers for hardware & software Resume lecture at Software.

Bell LaPadula Security Model(1973)

• State machine model that addresses the confidentiality of information.

• Uses No Read Up & No Write Down

• No Read Up (NRU)– A subject can read all documents at or below his

level of security, but cannot read any documents above his level of security

– Prevents learning secrets at a higher security level

Page 8: Sam Write iClickers for hardware & software Resume lecture at Software.

Bell LaPadula Security Model (cont.)

• No Write Down (NWD)– A subject can write documents at or above

his level of security, but cannot write documents below his level

– Prevents leaks of secrets

Page 9: Sam Write iClickers for hardware & software Resume lecture at Software.

Bell LaPadula Model Problem

• In Bell LaPadula– A subject at a lower security level

can overwrite and potentially destroy secret information at a higher level (even though they cannot see it)

– No Write Down and No Read Up don't prevent this "Write Up" operation

• Bell LaPadula protects confidentiality but not integrity

Page 10: Sam Write iClickers for hardware & software Resume lecture at Software.

Biba Security Model(1977)

• The first formal integrity model, by preventing modifications to data by unauthorized persons.

• A subject cannot read documents below his level (no read down, NRD)

• A subject cannot write documents above his level (no write up, NWU)

Page 11: Sam Write iClickers for hardware & software Resume lecture at Software.

Example: Military Orders

• Write Down is allowed– A General may write orders to a Colonel, who can

issue these orders to a Major

• Integrity is preserved– In this fashion, the General's original orders are kept

intact and the mission of the military is protected

• Write Up is forbidden– Conversely, a Private can never issue orders to his

Sergeant, who may never issue orders to a Lieutenant, also protecting the integrity of the mission

• From Wikipedia, link Ch 9b

Page 12: Sam Write iClickers for hardware & software Resume lecture at Software.

Comparing the Models

• If you need to protect secrets, use Bell-Lapadula– No Write Down– No Read Up

• If you need to stay on target, use Biba– No Write Up– No Read Down

• Both of these are designed for the military, to protect high-level secrets

Page 13: Sam Write iClickers for hardware & software Resume lecture at Software.

Clark-Wilson Security Model(1987)

• Designed for businesses, to protect the integrity of data at all levels, not just the high value secrets

• Based on Transactions– Well-formed transactions move a system from one

consistent state to another consistent state• From Wikipedia, link Ch 9c

Page 14: Sam Write iClickers for hardware & software Resume lecture at Software.

Clark-Wilson Security Model(1987)

• A data integrity model

• Two principals: users and programs (called transformation procedures, or TPs)

• Two types of data: unconstrained data items (UDIs), and constrained data items (CDIs).

Page 15: Sam Write iClickers for hardware & software Resume lecture at Software.

UDIs and CDIs

• Unconstrained Data Items (UDIs)– Untrusted data, like user input– Not necessarily safe– May even be from an attacker

• Constrained Data Items (CDIs)– Data that has been verified and is now

guaranteed to be valid– Data that is "safe"

Page 16: Sam Write iClickers for hardware & software Resume lecture at Software.

Clark-Wilson Security Model (cont.)

• Integrity Verification Procedure (IVP)– Transforms Unconstrained Data Items

(UDIs) into Constrained Data Items (CDIs)

– Changes "unsafe" data into "safe" data

Page 17: Sam Write iClickers for hardware & software Resume lecture at Software.

Clark-Wilson Security Model (cont.)

• Users must be authenticated

• Transaction logs are kept

Page 18: Sam Write iClickers for hardware & software Resume lecture at Software.

Access Matrix Security Model

• Defines which subjects are permitted to access which objects

SubjectContracts Directory

Personnel Directory

Expense Reports

Warren Read Read Submit

Wilson None None Approve

Wyland Read/Write None Submit

Yelte Read/Write None None

Page 19: Sam Write iClickers for hardware & software Resume lecture at Software.

Multi-level Security Model

• Several levels of security– Such as Confidential, Secret, Top Secret

• People have varying levels of security clearance– Such as Confidential, Secret, Top Secret

• System will control access to objects according to their level and the level of the persons accessing them

Page 20: Sam Write iClickers for hardware & software Resume lecture at Software.

Mandatory Access Control (MAC) Security Model

• System controls access to resources

• When a subject requests access to an object– The system examines the user’s identity and access

rights, and compares to access permissions of the object

• System then permits or denies the access– Example: shared file server where access

permissions are administered by an administrator

Page 21: Sam Write iClickers for hardware & software Resume lecture at Software.

Discretionary Access Control (DAC) Security Model

• The owner of an object controls who and what may access it. Access is at the owner’s discretion.– Example: shared file server where access

permissions are administered by the owners (users) of its contents.

Page 22: Sam Write iClickers for hardware & software Resume lecture at Software.

Role-based Access Control (RBAC) Security Model

• An improvement over the mandatory access control (MAC) security model

• Access permissions are granted to “roles” instead of “persons.”– Example: "Managers" can write to the Personnel

folder, but "Help Desk Workers" cannot

Page 23: Sam Write iClickers for hardware & software Resume lecture at Software.

Role-based Access Control (RBAC) Security Model (cont.)

• Simplifies management in a complex system with many users and objects

• Makes changes much easier, because they involve changes to roles instead of to individuals

Page 24: Sam Write iClickers for hardware & software Resume lecture at Software.

Non-Interference Security Model

• Specifies that low inputs and outputs will not be altered by high inputs and outputs

• In other words, activities at a higher security level cannot be detected (and will not interfere with) at lower security levels– Prevents data leaking through "covert channels"– Link Ch 9d

Page 25: Sam Write iClickers for hardware & software Resume lecture at Software.

Information Flow Security Model

• Based upon flow of information rather than on access controls

• Data objects are assigned to a class or level of security

• Flow of objects are controlled by security policy that specifies where objects of various levels are permitted to flow

Page 26: Sam Write iClickers for hardware & software Resume lecture at Software.

iClicker QuestionsiClicker Questions

Page 27: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model uses Which security model uses Constrained Data ItemsConstrained Data Items??

A.A. BibaBiba

B.B. Bell-LaPadulaBell-LaPadula

C.C. Clark-WilsonClark-Wilson

D.D. MACMAC

E.E. DACDAC

Page 28: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model allows the Which security model allows the owner of an object to assign owner of an object to assign

permissions to it?permissions to it?

A.A. BibaBiba

B.B. Bell-LaPadulaBell-LaPadula

C.C. RBACRBAC

D.D. MACMAC

E.E. DACDAC

Page 29: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model forbids Which security model forbids write-up?write-up?

A.A. BibaBiba

B.B. Bell-LaPadulaBell-LaPadula

C.C. Clark-WilsonClark-Wilson

D.D. MACMAC

E.E. DACDAC

Page 30: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model is best for Which security model is best for a large corporation with a large corporation with

thousands of people sharing thousands of people sharing thousands of devices?thousands of devices?

A.A. Non-InterferenceNon-Interference

B.B. RBACRBAC

C.C. Clark-WilsonClark-Wilson

D.D. MACMAC

E.E. DACDAC

Page 31: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model explicitly Which security model explicitly prevents data leaking through prevents data leaking through

covert channels?covert channels?

A.A. Non-InterferenceNon-Interference

B.B. BibaBiba

C.C. Clark-WilsonClark-Wilson

D.D. Bell-LaPadulaBell-LaPadula

E.E. DACDAC

Page 32: Sam Write iClickers for hardware & software Resume lecture at Software.

Information Systems Evaluation Models

Page 33: Sam Write iClickers for hardware & software Resume lecture at Software.

Evaluation Models

• Companies often claim to have secure systems, but how can they prove it?

• Test the system with a Framework– Consistent and repeatable approach to the evaluation of

systems

• Frameworks– Common Criteria– TCSEC– TNI– ITSEC– SEI-CMMI– SSE-SMM

Page 34: Sam Write iClickers for hardware & software Resume lecture at Software.

Common Criteria

• Formal name: Common Criteria for Information Technology Security Evaluation– Usually known as just Common Criteria or CC– ISO 15408 international standard– Supersedes TCSEC and ITSEC– Typically applied to computer components sold to

the government, not to organizations as a whole the way ISO 27002 is

• Link Ch 9e

Page 35: Sam Write iClickers for hardware & software Resume lecture at Software.

Common Criteria (cont.)

• Seven Evaluation Assurance Levels (EALs) for a Target of Evaluation (TOE)

– EAL1: Functionally Tested– EAL2: Structurally Tested– EAL3: Methodically Tested and Checked– EAL4: Methodically Designed, Tested and Reviewed– EAL5: Semiformally Designed and Tested– EAL6: Semiformally Verified Design and Tested– EAL7: Formally Verified Design and Tested

Page 36: Sam Write iClickers for hardware & software Resume lecture at Software.

Common Criteria (cont.)

• Time and expense required to perform evaluation

Page 37: Sam Write iClickers for hardware & software Resume lecture at Software.

TCSEC

• Trusted Computer Security Evaluation Criteria

• U.S. DoD Orange Book as part of the Rainbow Series– A – Verified Protection– B – Mandatory Protection– B3 – Security domains

Superseded byCommon Criteria

Page 38: Sam Write iClickers for hardware & software Resume lecture at Software.

TCSEC (cont.)

• U.S. DoD Orange Book (cont.)– B2 – Structured protection– B1 – Labeled security– C – Discretionary protection– C2 – Controlled access– C1 – Discretionary protection– D – Minimal security Superseded by

Common Criteria

Page 39: Sam Write iClickers for hardware & software Resume lecture at Software.

TNI

• Trusted Network Implementation

• U.S. DoD Red Book in the Rainbow Series

• Used to evaluate confidentiality and integrity in communications networks

Page 40: Sam Write iClickers for hardware & software Resume lecture at Software.

ITSEC

• Information Technology Security Evaluation Criteria

• European standard for security evaluations

• ITSEC addresses confidentiality, integrity, and availability, whereas TCSEC evaluated only confidentiality

• Superseded by Common Criteria

Page 41: Sam Write iClickers for hardware & software Resume lecture at Software.

SEI-CMMI

• Software Engineering Institute Capability Maturity Model Integration

• Objective measure of the maturity of an organization’s system engineering practices

Page 42: Sam Write iClickers for hardware & software Resume lecture at Software.

SEI-CMMI (cont.)

• Maturity Levels– Level 0 – Incomplete– Level 1 – Performed– Level 2 – Managed– Level 3 – Defined– Level 4 – Quantitatively Managed– Level 5 – Optimizing

Page 43: Sam Write iClickers for hardware & software Resume lecture at Software.

SSE-CMM

• Systems Security Engineering Capability Maturity Model

• Objective measure of the maturity of security engineering– Capability Level 1 - Performed Informally

– Capability Level 2 - Planned and Tracked

– Capability Level 3 - Well Defined

– Capability Level 4 - Quantitatively Controlled

– Capability Level 5 - Continuously Improving

Page 44: Sam Write iClickers for hardware & software Resume lecture at Software.

Certification and Accreditation

• Processes used to evaluate and approve a system for government or military use– Or a highly regulated industry like pharmaceuticals

or aeonautics– Not normally used in businesses

• Two-step process– Certification is the process of evaluation of

a system’s architecture, design, and controls, according to established evaluation criteria

– Accreditation is the formal management decision to approve the use of a certified system

Page 45: Sam Write iClickers for hardware & software Resume lecture at Software.

Certification and Accreditation (cont.)

• Five standards for certification and accreditation– FISMA (Federal Information Security

Management Act of 2002)• Requires all US Federal information systems

to conform to security standards

– DITSCAP (Department of Defense Information Technology Security Certification and Accreditation Process)

Page 46: Sam Write iClickers for hardware & software Resume lecture at Software.

Certification and Accreditation (cont.)

• Five standards (cont.)– DIACAP (DoD Information Assurance

Certification and Accreditation Process)• Successor to DITSCAP

– NIACAP (National Information Assurance Certification and Accreditation Process)

• Certifies and accredits systems that handle US national security information

– DCID 6/3 (Director of Central intelligence Directive 6/3)

Page 47: Sam Write iClickers for hardware & software Resume lecture at Software.

iClicker QuestionsiClicker Questions

Page 48: Sam Write iClickers for hardware & software Resume lecture at Software.

Which evaluation model is Which evaluation model is known as the known as the orange bookorange book??

A.A. Common criteriaCommon criteria

B.B. TCSECTCSEC

C.C. TNITNI

D.D. ITSECITSEC

E.E. SEI-CMMISEI-CMMI

Page 49: Sam Write iClickers for hardware & software Resume lecture at Software.

Which evaluation model Which evaluation model supercedes TCSEC?supercedes TCSEC?

A.A. Common criteriaCommon criteria

B.B. SSE-CMMSSE-CMM

C.C. TNITNI

D.D. ITSECITSEC

E.E. SEI-CMMISEI-CMMI

Page 50: Sam Write iClickers for hardware & software Resume lecture at Software.

Which term means "the process of Which term means "the process of evaluation of a system according to evaluation of a system according to

established criteria"?established criteria"?

A.A. CertificationCertification

B.B. AssessmentAssessment

C.C. AccountingAccounting

D.D. AccreditationAccreditation

E.E. AuthenticationAuthentication

Page 51: Sam Write iClickers for hardware & software Resume lecture at Software.

Which standard applies to all federal Which standard applies to all federal government systems, not just to military government systems, not just to military

or intelligence ones?or intelligence ones?

A.A. DITSCAPDITSCAP

B.B. FISMAFISMA

C.C. DIACAPDIACAP

D.D. NIACAPNIACAP

E.E. DCID 6/3DCID 6/3

Page 52: Sam Write iClickers for hardware & software Resume lecture at Software.

Computer Hardware Architecture

Page 53: Sam Write iClickers for hardware & software Resume lecture at Software.

Computer Components

• Central processor

• Bus

• Main storage

• Secondary storage

• Communications

• Firmware

Page 54: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (CPU)

• Executes program instructions

• Components– Arithmetic logic unit (ALU). Performs arithmetic

and logic operations.– Registers. These are temporary storage locations

that are used to store the results of intermediate calculations. A CPU can access data in its registers far more quickly than main memory.

Page 55: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• Components (cont.)– Program counter. A register that keeps track of

which instruction in a program the CPU is currently working on.

– Memory interface. This is the circuitry that permits the CPU to access main memory.

Page 56: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• Operations– Fetch. The CPU fetches (retrieves) an

instruction from memory.– Decode. The CPU breaks the instruction

into its components• Opcode--the task that the CPU is expected to perform

• Operands--numeric values

• Example: ADD R1 R2

Page 57: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• Operations (cont.)– Execute. This is the actual operation

as directed by the opcode.– Writeback. The CPU writes the result of

the opcode (for instance, the sum of the two numbers to add together) to some memory location.

Page 58: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• CPU instruction sets (of opcodes)– CISC (Complex Instruction Set Computer)

• VAX, PDP-11, Motorola 68000, Intel x86

– RISC (Reduced Instruction Set Computer)• SPARC, Dec Alpha, MIPS, Power PC

– Explicitly Parallel Instruction Computing (EPIC)• Intel Itanium

Page 59: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• Single core, multi-core (2 to 8 CPUs on a single die)

Page 60: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• Multi processor computers– Symmetric multiprocessing (SMP)

• Two or more CPUs connected to the computer’s main memory. Virtually all multi processor computers are SMP

– Asymmetric multiprocessing (ASMP)• Two or more CPUs, in a master-slave relationship

• No current operating system supports this

Page 61: Sam Write iClickers for hardware & software Resume lecture at Software.

Central Processor (cont.)

• CPU security features– Protected mode – CPU prevents a process

from being able to access the memory space assigned to another process

– Executable space protection – prevents the execution of instructions that reside in data

Page 62: Sam Write iClickers for hardware & software Resume lecture at Software.

Bus

• High speed network used to transfer data among the computer’s internal components– CPU, storage, network, peripherals– Can also be used to transfer data between

computers• Like USB

Page 63: Sam Write iClickers for hardware & software Resume lecture at Software.

Bus (cont.)

• Actually a special high-speed network

• Modern computers have more than one bus, usually one for communication with memory and another for communication with peripherals

Page 64: Sam Write iClickers for hardware & software Resume lecture at Software.

Bus (cont.)

• Internal bus architectures– Unibus (used in PDP-11 and VAX

computers)– SBus (used in SPARC and Sun computers)– Microchannel (used in IBM PS/2 computers)– PCI (Peripheral Component Interconnect)

(used in modern PCs)

Page 65: Sam Write iClickers for hardware & software Resume lecture at Software.

Bus (cont.)

• External bus architectures– SCSI (Small Computer Systems Interface)– SATA (Serial ATA)– IEEE1394 (also known as FireWire)– PC card (formerly known as PCMCIA)– Universal Serial Bus (USB)

Page 66: Sam Write iClickers for hardware & software Resume lecture at Software.

Main Storage

• Also known as primary storage or memory

• Stores instructions and data being actively worked on

• Computer’s fastest storage (aside from CPU registers)

Page 67: Sam Write iClickers for hardware & software Resume lecture at Software.

Main Storage (cont.)

• Used by operating system, active processes

• Main technologies– DRAM (Dynamic Random Access Memory)– SRAM (Static Random Access Memory)

Page 68: Sam Write iClickers for hardware & software Resume lecture at Software.

Secondary Storage

• Much larger, slower than main storage

• Usually implemented with hard drives– Persistence– Capacity

Page 69: Sam Write iClickers for hardware & software Resume lecture at Software.

Secondary Storage (cont.)

• Structured storage– Partitions– File systems– Directories– Files

• Unstructured storage– “raw” partitions

Page 70: Sam Write iClickers for hardware & software Resume lecture at Software.

Virtual Memory

• Permits main storage to overflow into, and occupy, secondary storage– Swapping – copying a process’ entire memory image

from primary to secondary storage– Paging – copying individual pages of a

process’ memory image from primary to secondary storage

• This is what Windows does

– Permits more efficient and flexible use of main memory

Page 71: Sam Write iClickers for hardware & software Resume lecture at Software.

Communications

• Communications is generally performed by hardware modules that are connected to the computer’s bus– Adaptors, communications adaptors,

communications controllers, interface cards, or network interface cards (NICs)

Page 72: Sam Write iClickers for hardware & software Resume lecture at Software.

Firmware

• Software that is embedded in persistent memory chips

• Used to store the initial computer instructions required to put the computer into operation after power is applied to it

• Firmware is used to store the BIOS (Basic Input-Output Subsystem) in an Intel-based PC

Page 73: Sam Write iClickers for hardware & software Resume lecture at Software.

Firmware (cont.)

• Firmware technologies– PROM (Programmable Read-Only Memory)– EPROM (Erasable Programmable Read-Only

Memory)– EEPROM (Electrically Erasable Programmable

Read-Only Memory)– Flash Memory

Page 74: Sam Write iClickers for hardware & software Resume lecture at Software.

Trusted Computing Base

• Trusted Computing Base (TCB)– The Orange Book defines the trusted computing

base as “the totality of protection mechanisms within it, including hardware, firmware, and software, the combination of which is responsible for enforcing a computer security policy.”

Page 75: Sam Write iClickers for hardware & software Resume lecture at Software.

Reference Monitor

• A hardware or software component in a system that mediates access to objects according to their security level or clearance

• An access control mechanism that is auditable– It creates a record of its activities that can be

examined at a later time.

Page 76: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Hardware

• Trusted Platform Module (TPM)– A secure cryptoprocessor

• A separate microprocessor in the computer that stores and generates cryptographic keys and generates random numbers for use in cryptographic algorithms

– Used for a variety of cryptographic functions • Disk encryption

• Authentication

Page 77: Sam Write iClickers for hardware & software Resume lecture at Software.

Hardware Authentication

• Smart card reader

• Fingerprint reader

• Facial recognition camera

Page 78: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Modes of Operation

• Dedicated security mode– This is a system with only one level of security– All information on the system is at the same security

level– All users must be at or above the same level of

security and have a valid need-to-know for all of the information on the system

Page 79: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Modes of Operation (cont.)

• System high security mode. Similar to dedicated security mode, except that users may access some data on the system based upon their need-to-know.

Page 80: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Modes of Operation (cont.)

• Compartmented security mode. Similar to system high security mode, except that users may access some data on the system based upon their need-to-know plus formal access approval.

Page 81: Sam Write iClickers for hardware & software Resume lecture at Software.

Security Modes of Operation (cont.)

• Multilevel security mode. Similar to compartmented security mode, except that users may access some data based upon their need-to-know, formal access approval, and proper clearance.

Page 82: Sam Write iClickers for hardware & software Resume lecture at Software.

Resume HereResume Here

Page 83: Sam Write iClickers for hardware & software Resume lecture at Software.

Review of first half of Chapter 9Review of first half of Chapter 9

iClicker QuestionsiClicker Questions

Page 84: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model protects Which security model protects secrets but does not ensure integrity secrets but does not ensure integrity

of confidential data?of confidential data?

A.A. BibaBiba

B.B. Bell-LaPudaBell-LaPuda

C.C. Clark-WilsonClark-Wilson

D.D. MACMAC

E.E. DACDAC

Page 85: Sam Write iClickers for hardware & software Resume lecture at Software.

Which security model uses Which security model uses Transactions Transactions and and Integrity Integrity Verification ProceduresVerification Procedures??

A.A. BibaBiba

B.B. Bell-LaPudaBell-LaPuda

C.C. Clark-WilsonClark-Wilson

D.D. MACMAC

E.E. DACDAC

Page 86: Sam Write iClickers for hardware & software Resume lecture at Software.

Which European evaluation Which European evaluation model was superceded by model was superceded by

Common Criteria?Common Criteria?

A.A. SSE-SMMSSE-SMM

B.B. TCSECTCSEC

C.C. TNITNI

D.D. ITSECITSEC

E.E. SEI-CMMISEI-CMMI

Page 87: Sam Write iClickers for hardware & software Resume lecture at Software.

Which standard applies Which standard applies especially to CIA systems?especially to CIA systems?

A.A. FISMAFISMA

B.B. DITSCAPDITSCAP

C.C. DIACAPDIACAP

D.D. NIACAPNIACAP

E.E. DCID 6/3DCID 6/3

Page 88: Sam Write iClickers for hardware & software Resume lecture at Software.

HardwareHardware

iClicker QuestionsiClicker Questions

Page 89: Sam Write iClickers for hardware & software Resume lecture at Software.

Which of these memory types Which of these memory types can read and write the fastest?can read and write the fastest?

A.A. SRAMSRAM

B.B. DRAMDRAM

C.C. RegistersRegisters

D.D. PROMPROM

E.E. Flash memoryFlash memory

Page 90: Sam Write iClickers for hardware & software Resume lecture at Software.

Which of these is a processor Which of these is a processor dedicated to cryptography?dedicated to cryptography?

A.A. TPMTPM

B.B. BIOSBIOS

C.C. EEPROMEEPROM

D.D. EPICEPIC

E.E. DRAMDRAM

Page 91: Sam Write iClickers for hardware & software Resume lecture at Software.

Which of these is a hard disk file that Which of these is a hard disk file that contains a copy of data that was contains a copy of data that was

originally in RAM?originally in RAM?

A.A. FirmwareFirmware

B.B. Page filePage file

C.C. Flash memoryFlash memory

D.D. EEPROMEEPROM

E.E. DRAMDRAM

Page 92: Sam Write iClickers for hardware & software Resume lecture at Software.

Software

Page 93: Sam Write iClickers for hardware & software Resume lecture at Software.

Operating Systems

• Components of an OS– Kernel– Device drivers– Tools

Page 94: Sam Write iClickers for hardware & software Resume lecture at Software.

Operating Systems (cont.)

• Functions of an OS– Process management– Resource management– Access management– Event management– Communications management

Page 95: Sam Write iClickers for hardware & software Resume lecture at Software.

Operating Systems (cont.)

• Operating system security methods– Privilege level

• Windows: admin, user, guest

• Unix: root, non-root

– Protection ring• Ring 0: kernel

• Ring 1: device drivers

• Ring 3: user processes

– But Windows only usesrings 0 and 3

• Links Ch 9g, 9h

Page 96: Sam Write iClickers for hardware & software Resume lecture at Software.

Subsystems

• Database management systems (DBMS)

• Web server

• Authentication server

• E-mail server

• File / print server

• Directory server (DNS, NIS, AD, LDAP)

Page 97: Sam Write iClickers for hardware & software Resume lecture at Software.

Programs, Tools, and Applications

• Programs– Firefox, writer, photoshop, acrobat

• Tools– Compilers, debuggers, defragmenters

• Applications– A collection of programs and tools that support a

business function– Financial (General Ledger (GL), Accounts Payable

(AP), Accounts Receivable (AR), etc.), payroll, mfg resource planning, customer relationship mgmt, etc.

Page 98: Sam Write iClickers for hardware & software Resume lecture at Software.

Software Security Threats and Countermeasures

Page 99: Sam Write iClickers for hardware & software Resume lecture at Software.

Threats

• Covert channel– Unauthorized, hidden channel of communications

that exists within a legitimate communications channel

– Includes timing attacks that leak data through changes in response times

– Difficult to detect– Examples: unused fields in packets, steganography

Page 100: Sam Write iClickers for hardware & software Resume lecture at Software.

Threats (cont.)

• Side channel attack– Observation of the physical characteristics of

a system in order to make inferences on its operation

– Examples: timing, power consumption, emanations

• State attacks– Time of check to time of use (TOCTTOU), also

known as a race condition– Data can be altered between the time of check and

the time of use ("winning the race")

Page 101: Sam Write iClickers for hardware & software Resume lecture at Software.

Threats (cont.)

• Emanations– RF (radio frequency) emissions from CRTs

and equipment

• Maintenance hooks and back doors– Secret master password– Really happened in "Lock My PC" -- link Ch 9i

• Privileged programs– Artifacts of development, testing– Can be used to elevate privileges

Page 102: Sam Write iClickers for hardware & software Resume lecture at Software.

Countermeasures

• Reduce the potential of a threat by reducing its probability of occurrence or its impact – Sniffers (bug detectors)– Source code reviews– Auditing tools

• Filesystem integrity, like Tripwire• Configuration checking like Windows Defender• Log analyzers

– Penetration testing– Application vulnerability testing

Page 103: Sam Write iClickers for hardware & software Resume lecture at Software.

iClicker QuestionsiClicker Questions

Page 104: Sam Write iClickers for hardware & software Resume lecture at Software.

A user launches Microsoft Word on A user launches Microsoft Word on a PC. What protection ring is Word a PC. What protection ring is Word

operating in?operating in?

A.A. Ring 0Ring 0

B.B. Ring 1Ring 1

C.C. Ring 2Ring 2

D.D. Ring 3Ring 3

E.E. Something elseSomething else

Page 105: Sam Write iClickers for hardware & software Resume lecture at Software.

Which threat comes from Which threat comes from accidental radio transmissions?accidental radio transmissions?

A.A. Covert channelCovert channel

B.B. Side channelSide channel

C.C. Race conditionRace condition

D.D. EmanationsEmanations

E.E. Back doorBack door

Page 106: Sam Write iClickers for hardware & software Resume lecture at Software.

Which countermeasure ensures the Which countermeasure ensures the integrity of operating system files?integrity of operating system files?

A.A. SniffersSniffers

B.B. Source code reviewSource code review

C.C. TripwireTripwire

D.D. Pen testPen test

E.E. Application vulnerability testApplication vulnerability test