SlideShare a Scribd company logo
1 of 26
Principles of Information Security,
Fifth Edition
Chapter 6
Security Technology: Firewalls and
VPNs
If you think technology can solve your security problems,
then you don’t understand the problems and you don’t
understand the technology.
BRUCE SCHNEIER, AMERICAN CRYPTOGRAPHER,
COMPUTER SECURITY SPECIALIST, AND WRITER
Lesson 1 – Technical
Controls
Learning Objectives
• Upon completion of this material, you should be
able to:
– Discuss the important role of access control in
computer-based information systems, and identify
and discuss widely used authentication factors
– Describe firewall technology and the various
approaches to firewall implementation
– Identify the various approaches to control remote
and dial-up access by authenticating and authorizing
users
Principles of Information Security, Fifth Edition 2
Learning Objectives (cont’d)
– Discuss content filtering technology
– Describe virtual private networks and discuss the
technology that enables them
Principles of Information Security, Fifth Edition 3
Introduction
• Technical controls are essential in enforcing policy
for many IT functions not under direct human
control.
• When properly implemented, technical control
solutions improve an organization’s ability to
balance the objectives of making information
readily available and preserving information’s
confidentiality and integrity.
Principles of Information Security, Fifth Edition 4
Access Control
• Access control: method by which systems
determine whether and how to admit a user into a
trusted area of the organization
• Mandatory access controls (MACs): use data
classification schemes
• Discretionary access controls (DACs): allow users
to control and possibly provide access to
information/resources at their disposal
• Nondiscretionary controls: strictly enforced version
of MACs that are managed by a central authority
Principles of Information Security, Fifth Edition 5
Principles of Information Security, Fifth Edition 6
Identification
• Identification: mechanism whereby unverified
entities seeking access to a resource (supplicants)
provide a label by which they are known to the
system
• Identifiers can be composite identifiers,
concatenating elements—department codes,
random numbers, or special characters—to make
them unique.
• Some organizations generate random numbers.
Principles of Information Security, Fifth Edition 7
Authentication
• Authentication: the process of validating a
supplicant’s purported identity
• Authentication factors
– Something a supplicant knows
• Password: a private word or a combination of
characters that only the user should know
• Passphrase: a series of characters, typically longer
than a password, from which a virtual password is
derived
Principles of Information Security, Fifth Edition 8
Authentication (cont’d)
• Authentication factors (cont’d)
– Something a supplicant has
• Dumb card: ID or ATM card with magnetic stripe
• Smart card: contains a computer chip that can verify
and validate information
• Synchronous tokens
• Asynchronous tokens
– Something a supplicant is
• Relies upon individual characteristics
• Strong authentication
Principles of Information Security, Fifth Edition 9
Authorization
• Authorization: the matching of an authenticated
entity to a list of information assets and
corresponding access levels
• Authorization can be handled in one of three ways:
– Authorization for each authenticated user
– Authorization for members of a group
– Authorization across multiple systems
• Authorization tickets
Principles of Information Security, Fifth Edition 10
Accountability
• Accountability (auditability): ensures that all actions
on a system—authorized or unauthorized—can be
attributed to an authenticated identity
• Most often accomplished by means of system logs
and database journals, and the auditing of these
records
• Systems logs record specific information.
• Logs have many uses.
Principles of Information Security, Fifth Edition 11
Biometrics
• Approach based on the use of measurable human
characteristics/traits to authenticate identity
• Only fingerprints, retina of eye, and iris of eye are
considered truly unique.
• Evaluated on false reject rate, false accept rate,
and crossover error rate
• Highly reliable/effective biometric systems are often
considered intrusive by users.
Principles of Information Security, Fifth Edition 12
Principles of Information Security, Fifth Edition 13
Principles of Information Security, Fifth Edition 14
Access Control Architecture Models
• Illustrate access control implementations and can
help organizations quickly make improvements
through adaptation
• Trusted computing base (TCB)
– Part of TCSEC Rainbow Series
– Used to enforce security policy (rules of system
configuration)
– Biggest challenges include covert channels
• Storage channels
• Timing channels
Principles of Information Security, Fifth Edition 15
Access Control Architecture Models
(cont’d)
• ITSEC: an international set of criteria for evaluating
computer systems
– Compares Targets of Evaluation (ToE) to detailed security
function specifications
• The Common Criteria
– Considered successor to both TCSEC and ITSEC
• Bell-LaPadula Confidentiality Model
– Model of an automated system able to manipulate its state or
status over time
• Biba Integrity Model
– Based on “no write up, no read down” principle
Principles of Information Security, Fifth Edition 16
Access Control Architecture Models
(cont’d)
• Clark-Wilson Integrity Model
– No changes by unauthorized subjects
– No unauthorized changes by authorized subjects
– Maintenance of internal and external consistency
• Graham-Denning Access Control Model
– Composed of set of objects, set of subjects, and set of rights
• Harrison-Ruzzo-Ullman Model
– Defines method to allow changes to access rights and
addition/removal of subjects/objects
• Brewer-Nash Model (Chinese Wall)
– Designed to prevent conflict of interest between two
parties
Principles of Information Security, Fifth Edition 17
Firewalls
• Prevent specific types of information from moving
between an untrusted network (the Internet) and a
trusted network (organization’s internal network)
• May be:
– Separate computer system
– Software service running on existing router or server
– Separate network containing supporting devices
Principles of Information Security, Fifth Edition 18
Firewalls Processing Modes
• Five processing modes by which firewalls can be
categorized:
– Packet filtering
– Application gateways
– Circuit gateways
– MAC layer firewalls
– Hybrids
19
Principles of Information Security, Fifth Edition
Packet-Filtering Firewalls
• Packet-filtering firewalls examine the header
information of data packets.
• Most often based on the combination of:
– IP source and destination address
– Direction (inbound or outbound)
– Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP) source and destination
port requests
• Simple firewall models enforce rules designed to
prohibit packets with certain addresses or partial
addresses from passing through device.
20
Principles of Information Security, Fifth Edition
21
Principles of Information Security, Fifth Edition
22
Principles of Information Security, Fifth Edition
23
Principles of Information Security, Fifth Edition
24
Principles of Information Security, Fifth Edition
Packet-Filtering Firewalls (cont’d)
• Three subsets of packet-filtering firewalls:
– Static filtering: requires that filtering rules be
developed and installed within the firewall
– Dynamic filtering: allows firewall to react to emergent
event and update or create rules to deal with event
– Stateful inspection: firewalls that keep track of each
network connection between internal and external
systems using a state table
25
Principles of Information Security, Fifth Edition
Principles of Information Security, Fifth Edition 26

More Related Content

What's hot

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
koolkampus
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
GOKUL SREE
 

What's hot (20)

Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Instruction Set Architecture
Instruction Set ArchitectureInstruction Set Architecture
Instruction Set Architecture
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
Router forensics
Router forensicsRouter forensics
Router forensics
 
Fixed partitioning of memory
Fixed partitioning of memoryFixed partitioning of memory
Fixed partitioning of memory
 
How Operating system works.
How Operating system works. How Operating system works.
How Operating system works.
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Human Computer Interaction - Interaction Design
Human Computer Interaction - Interaction DesignHuman Computer Interaction - Interaction Design
Human Computer Interaction - Interaction Design
 
Memory management
Memory managementMemory management
Memory management
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Monolithic kernel
Monolithic kernelMonolithic kernel
Monolithic kernel
 
Operating system 34 contiguous allocation
Operating system 34 contiguous allocationOperating system 34 contiguous allocation
Operating system 34 contiguous allocation
 
Coa module1
Coa module1Coa module1
Coa module1
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Processors and its Types
Processors and its TypesProcessors and its Types
Processors and its Types
 

Similar to Lessson 1

Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
woyaoni
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
Malachi Jones
 

Similar to Lessson 1 (20)

Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Lessson 2
Lessson 2Lessson 2
Lessson 2
 
Lessson 3
Lessson 3Lessson 3
Lessson 3
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Information Security
Information SecurityInformation Security
Information Security
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Lessson 1

  • 1. Principles of Information Security, Fifth Edition Chapter 6 Security Technology: Firewalls and VPNs If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology. BRUCE SCHNEIER, AMERICAN CRYPTOGRAPHER, COMPUTER SECURITY SPECIALIST, AND WRITER Lesson 1 – Technical Controls
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Discuss the important role of access control in computer-based information systems, and identify and discuss widely used authentication factors – Describe firewall technology and the various approaches to firewall implementation – Identify the various approaches to control remote and dial-up access by authenticating and authorizing users Principles of Information Security, Fifth Edition 2
  • 3. Learning Objectives (cont’d) – Discuss content filtering technology – Describe virtual private networks and discuss the technology that enables them Principles of Information Security, Fifth Edition 3
  • 4. Introduction • Technical controls are essential in enforcing policy for many IT functions not under direct human control. • When properly implemented, technical control solutions improve an organization’s ability to balance the objectives of making information readily available and preserving information’s confidentiality and integrity. Principles of Information Security, Fifth Edition 4
  • 5. Access Control • Access control: method by which systems determine whether and how to admit a user into a trusted area of the organization • Mandatory access controls (MACs): use data classification schemes • Discretionary access controls (DACs): allow users to control and possibly provide access to information/resources at their disposal • Nondiscretionary controls: strictly enforced version of MACs that are managed by a central authority Principles of Information Security, Fifth Edition 5
  • 6. Principles of Information Security, Fifth Edition 6
  • 7. Identification • Identification: mechanism whereby unverified entities seeking access to a resource (supplicants) provide a label by which they are known to the system • Identifiers can be composite identifiers, concatenating elements—department codes, random numbers, or special characters—to make them unique. • Some organizations generate random numbers. Principles of Information Security, Fifth Edition 7
  • 8. Authentication • Authentication: the process of validating a supplicant’s purported identity • Authentication factors – Something a supplicant knows • Password: a private word or a combination of characters that only the user should know • Passphrase: a series of characters, typically longer than a password, from which a virtual password is derived Principles of Information Security, Fifth Edition 8
  • 9. Authentication (cont’d) • Authentication factors (cont’d) – Something a supplicant has • Dumb card: ID or ATM card with magnetic stripe • Smart card: contains a computer chip that can verify and validate information • Synchronous tokens • Asynchronous tokens – Something a supplicant is • Relies upon individual characteristics • Strong authentication Principles of Information Security, Fifth Edition 9
  • 10. Authorization • Authorization: the matching of an authenticated entity to a list of information assets and corresponding access levels • Authorization can be handled in one of three ways: – Authorization for each authenticated user – Authorization for members of a group – Authorization across multiple systems • Authorization tickets Principles of Information Security, Fifth Edition 10
  • 11. Accountability • Accountability (auditability): ensures that all actions on a system—authorized or unauthorized—can be attributed to an authenticated identity • Most often accomplished by means of system logs and database journals, and the auditing of these records • Systems logs record specific information. • Logs have many uses. Principles of Information Security, Fifth Edition 11
  • 12. Biometrics • Approach based on the use of measurable human characteristics/traits to authenticate identity • Only fingerprints, retina of eye, and iris of eye are considered truly unique. • Evaluated on false reject rate, false accept rate, and crossover error rate • Highly reliable/effective biometric systems are often considered intrusive by users. Principles of Information Security, Fifth Edition 12
  • 13. Principles of Information Security, Fifth Edition 13
  • 14. Principles of Information Security, Fifth Edition 14
  • 15. Access Control Architecture Models • Illustrate access control implementations and can help organizations quickly make improvements through adaptation • Trusted computing base (TCB) – Part of TCSEC Rainbow Series – Used to enforce security policy (rules of system configuration) – Biggest challenges include covert channels • Storage channels • Timing channels Principles of Information Security, Fifth Edition 15
  • 16. Access Control Architecture Models (cont’d) • ITSEC: an international set of criteria for evaluating computer systems – Compares Targets of Evaluation (ToE) to detailed security function specifications • The Common Criteria – Considered successor to both TCSEC and ITSEC • Bell-LaPadula Confidentiality Model – Model of an automated system able to manipulate its state or status over time • Biba Integrity Model – Based on “no write up, no read down” principle Principles of Information Security, Fifth Edition 16
  • 17. Access Control Architecture Models (cont’d) • Clark-Wilson Integrity Model – No changes by unauthorized subjects – No unauthorized changes by authorized subjects – Maintenance of internal and external consistency • Graham-Denning Access Control Model – Composed of set of objects, set of subjects, and set of rights • Harrison-Ruzzo-Ullman Model – Defines method to allow changes to access rights and addition/removal of subjects/objects • Brewer-Nash Model (Chinese Wall) – Designed to prevent conflict of interest between two parties Principles of Information Security, Fifth Edition 17
  • 18. Firewalls • Prevent specific types of information from moving between an untrusted network (the Internet) and a trusted network (organization’s internal network) • May be: – Separate computer system – Software service running on existing router or server – Separate network containing supporting devices Principles of Information Security, Fifth Edition 18
  • 19. Firewalls Processing Modes • Five processing modes by which firewalls can be categorized: – Packet filtering – Application gateways – Circuit gateways – MAC layer firewalls – Hybrids 19 Principles of Information Security, Fifth Edition
  • 20. Packet-Filtering Firewalls • Packet-filtering firewalls examine the header information of data packets. • Most often based on the combination of: – IP source and destination address – Direction (inbound or outbound) – Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests • Simple firewall models enforce rules designed to prohibit packets with certain addresses or partial addresses from passing through device. 20 Principles of Information Security, Fifth Edition
  • 21. 21 Principles of Information Security, Fifth Edition
  • 22. 22 Principles of Information Security, Fifth Edition
  • 23. 23 Principles of Information Security, Fifth Edition
  • 24. 24 Principles of Information Security, Fifth Edition
  • 25. Packet-Filtering Firewalls (cont’d) • Three subsets of packet-filtering firewalls: – Static filtering: requires that filtering rules be developed and installed within the firewall – Dynamic filtering: allows firewall to react to emergent event and update or create rules to deal with event – Stateful inspection: firewalls that keep track of each network connection between internal and external systems using a state table 25 Principles of Information Security, Fifth Edition
  • 26. Principles of Information Security, Fifth Edition 26