SlideShare a Scribd company logo
1 of 19
Download to read offline
Lecture #8: Clark-Wilson & Chinese Wall Model for
Multilevel Security
Dr.Ramchandra Mangrulkar, DJSCE Mumbai
August 18, 2020
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 1 / 19
Multilevel Security Models
Bell La Padula Model
Biba Model
Chinese Wall Model
Clark-Wilson Model
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 2 / 19
Chinese Wall Model
Figure 1: The Model 1
1https://www.skillset.com/
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 3 / 19
Chinese Wall Model
Proposed by Brewer and Nash, 1989.
Aimed at consultancy business.
Mainly proposed to avoid conflict between clients.
Analysts have to avoid conflicts of interest when dealing with different clients.
Motivation:
A business consultant should not give advice to ”HSBC” if he has insider
knowledge about ”Natwest”.
A business consultant can give advice to both ”HSBC” and H&M since they
are not competitors.
e.g., stock exchange, investment bank, law firm.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 4 / 19
Example of Conflict
Figure 2: Example of Conflict 2
2http://www.computing.surrey.ac.uk/
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 5 / 19
The Model
Principal: Users should not access the confidential information of both client
organization and one or more of its competitors.
How it works:
Users have no ”Wall” Initially.
Once any given file is accessed, files with competitor information becomes
inaccessible.
Access control rules change with user behavior.
Access control changed dynamically based on user previous actions.
Main goal is to prevent conflict of interests by user’s access attempts.
Information flow model where information flow get restricted that would
result in conflict of interest.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 6 / 19
Terminology used in Chinese Wall
Company denoted c 2C
Subjects s 2S are the analysts having access to company information
Objects o 2O are items of information, each belonging to a company
All objects concerning the same company are collected in a company data
set. Function y : O !C maps object to its company dataset
Conflict of interest classes indicate which companies are in competition. The
function x : O !P(C) gives the conflict of interest class for each object, i.e.
the set of all companies that should not learn about the contents of the
object.
Security label is a pair (x(o), y(o))
Sanitized information is object with no sensitive information
Label is (;y(o))
Matrix NS;O records history of subjects actions (true or false)
Ns;o =
(
True; if if the subject s has had access to object o,:
False; if the subject s has never had access to object o.:
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 7 / 19
Prevent Direct Information Flow
The first security policy deals with direct information flow. We want to
prevent a subject from being exposed to a conflict of interest. Therefore,
access is granted only if the object requested belongs to
A company data set already held by the user, or
An entirely different conflict of interest class.
Simple Security Policy:
A subject s is permitted to access an object o only if for all objects o’ with
Ns;o0 = TRUE;y(o) = y(o0
)
or y(o) =2x(o0
):
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 8 / 19
Prevent Direct Information Flow
Figure 3: Prevent Direct Information Flow 3
An analyst with access to grey shaded areas, will have access to other objects
in Bank A data set, but not Bank B dataset
3https://www.eit.lth.se
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 9 / 19
Indirect Information Flow
Figure 4: Indirect Information Flow 4
Analyst A updates bank information about company A.
Analyst B can read this bank information and write to an object in company
B.
4https://www.eit.lth.se
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 10 / 19
To avoid Indirect Information Flow
* - Property
A subject s is granted write access to an object o only if s has no read access
to an object o’ with y(o) 6= y(o0
) and x(o0
) 6=  .
Write access to an object is only granted if no other object belonging to a
different company data set that contains unsanitized information can be read.
both write operations are blocked by the * - Property.
The * - Property stops unsanitized information from flowing out of a
company data set.
Very restrictive: If you can read sensitive information in one company, you
can not write to objects in any other company – ever
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 11 / 19
Clark – Wilson MODEL
Framework and guideline (‘model’) for formalizing security policies.
Address the security requirements of commercial applications.
Reviews Integrity between Military and Commercial Applications
Typically address, ”Who gets to do what sort of transactions” rather than
”Who sees what information”
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 12 / 19
Clark – Wilson Model cont...
Integrity requirements are divided into two parts:
Internal consistency:refers to properties of the internal state of a system and
can be enforced by the computing system;
External consistency:refers to the relation of the internal state of a system to
the real world and has to be enforced by means outside the computing
system, e.g. by auditing.
General mechanisms for enforcing integrity are as follows:
Well-formed transactions – data items can be manipulated only by a specific
set of programs; users have access to programs rather than to data items.
Separation of duties – users have to collaborate to manipulate data and to
collude to circumvent the security system.
Uses programs as an intermediate layer between subjects and objects (data
items). Subjects are authorized to execute certain programs.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 13 / 19
Points to remember
1 Subjects have to be identified and authenticated.
2 Objects can be manipulated only by a restricted set of programs.
3 Subjects can execute only a restricted set of programs.
4 A proper audit log has to be maintained.
5 The system has to be certified to work properly.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 14 / 19
Basic Principles of Access Control in the Clark–Wilson
Model
Figure 5: Basic Principles 5
5https://www.eit.lth.se
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 15 / 19
Basic Principles of Access Control
Data items governed by the security policy are called constrained data items
(CDIs)
Inputs to the system are captured as unconstrained data items (UDIs).
Conversion of UDIs to CDIs is a critical part of the system.
CDIs can be manipulated only by transformation procedures (TPs).
The integrity of an item is checked by integrity verification procedures (IVPs).
Security properties are defined through five certification rules.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 16 / 19
Basic Principles of Access Control in the Clark–Wilson
Model
Figure 6: Basic Principles 6
6Rezky Wulandari, Youtube
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 17 / 19
Certification Rules
1 CR1 IVPs must ensure that all CDIs are in a valid state at the time the IVP
is run (integrity check on CDIs).
2 CR2 TPs must be certified to be valid, i.e. valid CDIs must always be
transformed into valid CDIs; each TP is certified to access a specific set of
CDIs.
3 CR3 The access rules must satisfy any separation-of-duties requirements.
4 CR4 All TPs must write to an append-only log.
5 CR5 Any TP that takes a UDI as input must either convert the UDI into a
CDI or reject the UDI and perform no transformation at all.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 18 / 19
Enforcement rules
1 ER1 For each TP, the system must maintain and protect the list of entries
(CDIa,CDIb, . . . ) giving the CDIs the TP is certified to access (capability of
the TP).
2 ER2 For each user the system must maintain and protect the list of entries
(TP1,TP2,. . . ) specifying the TPs the user can execute (capability of the
user).
3 ER3 The system must authenticate each user requesting to execute a TP.
4 ER4 Only a subject that may certify an access rule for a TP may modify the
respective entry in the list. This subject must not have execute rights on that
TP.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson  Chinese Wall Model for Multilevel Security August 18, 2020 19 / 19

More Related Content

What's hot

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
classes and objects in C++
classes and objects in C++classes and objects in C++
classes and objects in C++HalaiHansaika
 

What's hot (20)

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Cyber Security Case Studies
Cyber Security Case Studies Cyber Security Case Studies
Cyber Security Case Studies
 
Blowfish Cryptosystem
Blowfish Cryptosystem Blowfish Cryptosystem
Blowfish Cryptosystem
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Security models
Security models Security models
Security models
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Data security
Data securityData security
Data security
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
classes and objects in C++
classes and objects in C++classes and objects in C++
classes and objects in C++
 
The security sdlc
The security sdlcThe security sdlc
The security sdlc
 
System security
System securitySystem security
System security
 

Similar to Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security

Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...Alexandra Deschamps-Sonsino
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Big Data Security Challenges: An Overview and Application of User Behavior An...
Big Data Security Challenges: An Overview and Application of User Behavior An...Big Data Security Challenges: An Overview and Application of User Behavior An...
Big Data Security Challenges: An Overview and Application of User Behavior An...IRJET Journal
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)SimiAttri
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
 
WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017Elsa Prieto
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...hanumayamma
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 

Similar to Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security (20)

Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Protecting the Energy Supply Chain - Dubai
Protecting the Energy  Supply Chain - Dubai Protecting the Energy  Supply Chain - Dubai
Protecting the Energy Supply Chain - Dubai
 
Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...
 
Artificially intelligent
Artificially intelligentArtificially intelligent
Artificially intelligent
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Big Data Security Challenges: An Overview and Application of User Behavior An...
Big Data Security Challenges: An Overview and Application of User Behavior An...Big Data Security Challenges: An Overview and Application of User Behavior An...
Big Data Security Challenges: An Overview and Application of User Behavior An...
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
Remarks security web_of_things_reusch
Remarks security web_of_things_reuschRemarks security web_of_things_reusch
Remarks security web_of_things_reusch
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017WITDOM Credit Risk Scoring use case at ISSE 2017
WITDOM Credit Risk Scoring use case at ISSE 2017
 
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
Cognitive Secure Shield – A Machine Learning enabled threat shield for resour...
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 

More from Dr. Ramchandra Mangrulkar

Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityDr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part IDr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity ManagementDr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security

  • 1. Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security Dr.Ramchandra Mangrulkar, DJSCE Mumbai August 18, 2020 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 1 / 19
  • 2. Multilevel Security Models Bell La Padula Model Biba Model Chinese Wall Model Clark-Wilson Model Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 2 / 19
  • 3. Chinese Wall Model Figure 1: The Model 1 1https://www.skillset.com/ Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 3 / 19
  • 4. Chinese Wall Model Proposed by Brewer and Nash, 1989. Aimed at consultancy business. Mainly proposed to avoid conflict between clients. Analysts have to avoid conflicts of interest when dealing with different clients. Motivation: A business consultant should not give advice to ”HSBC” if he has insider knowledge about ”Natwest”. A business consultant can give advice to both ”HSBC” and H&M since they are not competitors. e.g., stock exchange, investment bank, law firm. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 4 / 19
  • 5. Example of Conflict Figure 2: Example of Conflict 2 2http://www.computing.surrey.ac.uk/ Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 5 / 19
  • 6. The Model Principal: Users should not access the confidential information of both client organization and one or more of its competitors. How it works: Users have no ”Wall” Initially. Once any given file is accessed, files with competitor information becomes inaccessible. Access control rules change with user behavior. Access control changed dynamically based on user previous actions. Main goal is to prevent conflict of interests by user’s access attempts. Information flow model where information flow get restricted that would result in conflict of interest. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security August 18, 2020 6 / 19
  • 7. Terminology used in Chinese Wall Company denoted c 2C Subjects s 2S are the analysts having access to company information Objects o 2O are items of information, each belonging to a company All objects concerning the same company are collected in a company data set. Function y : O !C maps object to its company dataset Conflict of interest classes indicate which companies are in competition. The function x : O !P(C) gives the conflict of interest class for each object, i.e. the set of all companies that should not learn about the contents of the object. Security label is a pair (x(o), y(o)) Sanitized information is object with no sensitive information Label is (;y(o)) Matrix NS;O records history of subjects actions (true or false) Ns;o = ( True; if if the subject s has had access to object o,: False; if the subject s has never had access to object o.: Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 7 / 19
  • 8. Prevent Direct Information Flow The first security policy deals with direct information flow. We want to prevent a subject from being exposed to a conflict of interest. Therefore, access is granted only if the object requested belongs to A company data set already held by the user, or An entirely different conflict of interest class. Simple Security Policy: A subject s is permitted to access an object o only if for all objects o’ with Ns;o0 = TRUE;y(o) = y(o0 ) or y(o) =2x(o0 ): Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 8 / 19
  • 9. Prevent Direct Information Flow Figure 3: Prevent Direct Information Flow 3 An analyst with access to grey shaded areas, will have access to other objects in Bank A data set, but not Bank B dataset 3https://www.eit.lth.se Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 9 / 19
  • 10. Indirect Information Flow Figure 4: Indirect Information Flow 4 Analyst A updates bank information about company A. Analyst B can read this bank information and write to an object in company B. 4https://www.eit.lth.se Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 10 / 19
  • 11. To avoid Indirect Information Flow * - Property A subject s is granted write access to an object o only if s has no read access to an object o’ with y(o) 6= y(o0 ) and x(o0 ) 6= . Write access to an object is only granted if no other object belonging to a different company data set that contains unsanitized information can be read. both write operations are blocked by the * - Property. The * - Property stops unsanitized information from flowing out of a company data set. Very restrictive: If you can read sensitive information in one company, you can not write to objects in any other company – ever Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 11 / 19
  • 12. Clark – Wilson MODEL Framework and guideline (‘model’) for formalizing security policies. Address the security requirements of commercial applications. Reviews Integrity between Military and Commercial Applications Typically address, ”Who gets to do what sort of transactions” rather than ”Who sees what information” Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 12 / 19
  • 13. Clark – Wilson Model cont... Integrity requirements are divided into two parts: Internal consistency:refers to properties of the internal state of a system and can be enforced by the computing system; External consistency:refers to the relation of the internal state of a system to the real world and has to be enforced by means outside the computing system, e.g. by auditing. General mechanisms for enforcing integrity are as follows: Well-formed transactions – data items can be manipulated only by a specific set of programs; users have access to programs rather than to data items. Separation of duties – users have to collaborate to manipulate data and to collude to circumvent the security system. Uses programs as an intermediate layer between subjects and objects (data items). Subjects are authorized to execute certain programs. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 13 / 19
  • 14. Points to remember 1 Subjects have to be identified and authenticated. 2 Objects can be manipulated only by a restricted set of programs. 3 Subjects can execute only a restricted set of programs. 4 A proper audit log has to be maintained. 5 The system has to be certified to work properly. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 14 / 19
  • 15. Basic Principles of Access Control in the Clark–Wilson Model Figure 5: Basic Principles 5 5https://www.eit.lth.se Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 15 / 19
  • 16. Basic Principles of Access Control Data items governed by the security policy are called constrained data items (CDIs) Inputs to the system are captured as unconstrained data items (UDIs). Conversion of UDIs to CDIs is a critical part of the system. CDIs can be manipulated only by transformation procedures (TPs). The integrity of an item is checked by integrity verification procedures (IVPs). Security properties are defined through five certification rules. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 16 / 19
  • 17. Basic Principles of Access Control in the Clark–Wilson Model Figure 6: Basic Principles 6 6Rezky Wulandari, Youtube Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 17 / 19
  • 18. Certification Rules 1 CR1 IVPs must ensure that all CDIs are in a valid state at the time the IVP is run (integrity check on CDIs). 2 CR2 TPs must be certified to be valid, i.e. valid CDIs must always be transformed into valid CDIs; each TP is certified to access a specific set of CDIs. 3 CR3 The access rules must satisfy any separation-of-duties requirements. 4 CR4 All TPs must write to an append-only log. 5 CR5 Any TP that takes a UDI as input must either convert the UDI into a CDI or reject the UDI and perform no transformation at all. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 18 / 19
  • 19. Enforcement rules 1 ER1 For each TP, the system must maintain and protect the list of entries (CDIa,CDIb, . . . ) giving the CDIs the TP is certified to access (capability of the TP). 2 ER2 For each user the system must maintain and protect the list of entries (TP1,TP2,. . . ) specifying the TPs the user can execute (capability of the user). 3 ER3 The system must authenticate each user requesting to execute a TP. 4 ER4 Only a subject that may certify an access rule for a TP may modify the respective entry in the list. This subject must not have execute rights on that TP. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #8: Clark-Wilson Chinese Wall Model for Multilevel Security August 18, 2020 19 / 19