Top Banner
고려대학교정보보호대학원 고려대학교 정보보호대학원 Foundations
20

Security Engineering Lecture Notes (2/6)

Jul 20, 2015

Download

Engineering

Seungjoo Kim
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

고려대학교정보보호대학원

Foundations

Page 2: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

Page 3: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

3

Definitions

Page 4: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

4

The Security “Big Picture”

Page 5: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

5

The Security “Big Picture”

Page 6: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

6

Software

Hardware

Data and Information

Reputation

Identification easy, valuation difficult

Data, Information, Reputation – difficult to measure

Assets

Page 7: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

7

Assets

Page 8: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

8

Vulnerabilities = An error or a weakness in the design, implementation, or operation of a system.

Badly configured accounts

Programs with known flaws

Weak access control

Weak firewall configuration

Can be rated according to impact

Vulnerabilities

Page 9: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

9

Threats = Actions by adversaries who try to exploit vulnerabilities to damage assets

Threat Agent = An adversary that is motivated to exploit a system vulnerability and is capable of doing so

Threats & Threat Agents

Page 10: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

10

Risk Treatment Decision-making Process

Page 11: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

11

Trusted system or component is one whose failure can break the security policy.

Trustworthy system or component is one that won’t fail.

Trusted & Trustworthy

Page 12: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

12

Security engineering is about building systems to remain dependable in the face of malice, error, or mischance.

As a discipline, it focuses on the tools, processes, and methods needed to design, implement, and test complete systems, and to adapt existing systems as their environment evolves.

Security Engineering

Page 13: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

13

Security engineering requires cross-disciplinary expertise, ranging from cryptography and computer security through hardware tamper-resistance and formal methods to a knowledge of economics, applied psychology, organizations and the law.

Security Engineering

Page 14: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

14

Fundamental Design Principles

Page 15: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

15

Saltzer and Schroeder describe eight principles for the design and implementation of security mechanisms. The principles draw on the ideas of simplicity and restriction.

Saltzer’s 8 Fundamental Principles

☞ J. Saltzer and M. Schroeder, "The Protection of Information in Computer Systems," Proceedings of the IEEE 63 (9), pp. 1278–1308 (Sep. 1975).

Page 16: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

16

1. Principle of Least Privilege

2. Principle of Fail-Safe Defaults

3. Principle of Economy of Mechanism

4. Principle of Complete Mediation

5. Principle of Open Design

6. Principle of Separation of Privilege

7. Principle of Least Common Mechanism

8. Principle of Psychological Acceptability

Saltzer’s 8 Fundamental Principles

Page 17: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

17

Application Software

Hardware

User(subject)

Resource(object)

Ext.1 The Dimensions of COMPUSEC

Page 18: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

18

Ext.2 Onion Model of Protection

Hardware

OS Kernel

OS

Services

Application

Page 19: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

19

Should security control tasks be given to a central entity of left to individual components?

Ext.3 Centralized v.s. Decentralized

Page 20: Security Engineering Lecture Notes (2/6)

고려대학교정보보호대학원

마스터제목스타일편집

고려대학교정보보호대학원

Foundations