SlideShare a Scribd company logo
Security Models
Copyright by Aakash Panchal
All Right reversed by LJ Projects
2
Basic Concepts
Terminology
3
Trusted Computing Base (TCB) – combination of protection
mechanisms within a computer system
Subjects / Objects
Subjects are active (e.g., users / programs)
Objects are passive (e.g., files)
Reference Monitor – abstract machine that mediates subject
access to objects
Security Kernel – core element of TCB that enforces the
reference monitor’s security policy
Types of Access Control
4
Discretionary Access Control (DAC) – data owners can
create and modify matrix of subject / object relationships
(e.g., ACLs)
Mandatory Access Control (MAC) – “insecure”
transactions prohibited regardless of DAC
Cannot enforce MAC rules with DAC security kernel
Someone with read access to a file can copy it and build a new
“insecure” DAC matrix because he will be an owner of the new
file.
Information Flow Models
5
In reality, there are state transitions
Key is to ensure transitions are secure
Models provide rules for how information flows from state to state.
Information flow models do not address covert channels
Trojan horses
Requesting system resources to learn about other users
State Machine Model
State is a snapshot of the system at one moment in time.
State transition is the change to the next state.
If all the state transitions in a system are secure and if the
initial state of the system is secure, then every subsequent
state will also be secure, no matter what input occurs.
7
Access Control Models
Bell-LaPadula (BLP) Model
8
BLP is formal (mathematical) description of mandatory access control
First model that was created to control access to data.
Three properties:
ds-property (discretionary security)
ss-property (simple security – no “read up”)
*-property (star property – no “write down”)
A secure system satisfies all of these properties
BLP includes mathematical proof that if a system is secure and a
transition satisfies all of the properties, then the system will remain
secure.
Bell-LaPadula Model (Continued)
9
Honeywell Multics kernel was only true implementation of
BLP, but it never took hold
DOD information security requirements currently achieved
via discretionary access control and segregation of systems
rather than BLP-compliant computers
The problem with this model is that it does not deal with
integrity of the data.
Bell-LaPadula Model (Continued)
10
The star property makes it possible for a lower level subject
to write to a higher classified object.
A covert channel is an information flow that is not controlled
by a security mechanism.
A low level subject may see high level object name but are
denied access to the contents of the object.
Harrison-Ruzzo-Ullman Model
BLP model does not state policies for changing access rights
or for the creation or deletion of subjects and objects.
This model defines authorization system that address these
issues.
It operates on access matrices and verifies if there is any
sequence of instructions that cause an access right to leak
information.
Three Main Goals of Integrity
Preventing unauthorized users from making modifications to
data or programs.
Preventing authorized users from making improper or
unauthorized modifications.
Maintaining internal and external consistency of data and
programs.
Biba Model
13
Similar to BLP but focus is on integrity, not confidentiality
Implements the first goal of integrity.
Result is to turn the BLP model upside down
High integrity subjects cannot read lower integrity objects (no “read
down”)
Subjects cannot move low integrity data to high-integrity environment
(no “write up”)
Intuition Behind Models
Control of confidential information is important both in
military and commercial environment.
However in commercial environment the integrity of data is
also equally important to prevent errors and frauds.
The higher the level, the more confidence one has that a
program will execute correctly.
Data at higher level is more accurate, reliable and
trustworthy than data at the lower level.
Clark-Wilson Model
15
Reviews distinction between military and commercial policy
Military policy focus on confidentiality
Commercial policy focus on integrity
Mandatory commercial controls typically involve who gets to
do what type of transaction rather than who sees what
(Example: Handle a check above a certain amount)
Clark-Wilson Model (Continued)
16
Two types of objects:
Constrained Data Items (CDIs)
Unconstrained Data Items (UDIs)
Two types of transactions on CDIs in model
Integrity Verification Procedures (IVPs)
Transformation Procedures (TPs)
IVPs certify that TPs on CDIs result in valid state
All TPs must be certified to result in valid
transformation
Clark-Wilson Model (Continued)
17
System maintains list of valid relations of the form:
{UserID, TP, CDI/UDI}
Only permitted manipulation of CDI is via an authorized TP
If a TP takes a UDI as an input, then it must result in a
proper CDI or the TP will be rejected
Additional requirements
Auditing: TPs must write to an append-only CDI (log)
Separation of duties
Clark-Wilson Model (Continued)
18
Subjects have to identified and authenticated.
Objects can be manipulated only by a restricted set of
programs.
Subjects can execute only a restricted set of programs
A proper audit log has to be maintained.
Clark-Wilson versus Biba
19
In Biba’s model, UDI to CDI conversion is performed by
trusted subject only (e.g., a security officer), but this is
problematic for data entry function.
In Clark-Wilson, TPs are specified for particular users and
functions. Biba’s model does not offer this level of
granularity.
Chinese Wall
20
Focus is on conflicts of interest.
Principle: Users should not access the confidential
information of both a client organization and one or more of
its competitors.
How it works
Users have no “wall” initially.
Once any given file is accessed, files with competitor
information become inaccessible.
Unlike other models, access control rules change with
user behavior
Chinese Wall
21
Separation of Duty.
A given user may perform transaction A or Transaction B but
not both.
A simple security property
A subject has access to an object if and only if, all the objects that
subject can read are from non competing groups.
The *- Property
A subject can write to client only if the subject can not read any
object from a competing group.
+91-82381-35844
Aakashpanchal100@
gmail.com
Follow us

More Related Content

What's hot

Ipsec
IpsecIpsec
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Protection models
Protection modelsProtection models
Protection models
G Prachi
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
G Prachi
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
Muzamil Amin
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
Ankit Mistry
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
User authentication
User authenticationUser authentication
User authentication
CAS
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
vishalgohel12195
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 

What's hot (20)

Ipsec
IpsecIpsec
Ipsec
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protection models
Protection modelsProtection models
Protection models
 
LAN Security
LAN Security LAN Security
LAN Security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Network Security
Network SecurityNetwork Security
Network Security
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Security policies
Security policiesSecurity policies
Security policies
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
User authentication
User authenticationUser authentication
User authentication
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 

Similar to Security models

Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSP
Srishti Ahuja
 
Network Security Layers
Network Security LayersNetwork Security Layers
Network Security Layersnatarafonseca
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
International Journal of Engineering Inventions www.ijeijournal.com
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
gourav kottawar
 
Access control3
Access control3Access control3
Access control3Awhydot
 
Access control3
Access control3Access control3
Access control3Awhydot
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
Jyotishkar Dey
 
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...FilGov
 
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
ThangVuQuang4
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
AccessControl.ppt
AccessControl.pptAccessControl.ppt
AccessControl.ppt
DAKSHATAPANCHAL2
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
tom termini
 
Chapter 08 security_management_models
Chapter 08 security_management_modelsChapter 08 security_management_models
Chapter 08 security_management_models
husseinalshomali
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseDavid Murphy
 
Presentation security measure
Presentation security measurePresentation security measure
Presentation security measure
mukarram522
 
IJET-V3I2P8
IJET-V3I2P8IJET-V3I2P8
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Dr. Ramchandra Mangrulkar
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
G Prachi
 
Iaetsd database intrusion detection using
Iaetsd database intrusion detection usingIaetsd database intrusion detection using
Iaetsd database intrusion detection using
Iaetsd Iaetsd
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
ijcnes
 

Similar to Security models (20)

Security Architecture and Design - CISSP
Security Architecture and Design - CISSPSecurity Architecture and Design - CISSP
Security Architecture and Design - CISSP
 
Network Security Layers
Network Security LayersNetwork Security Layers
Network Security Layers
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Access control3
Access control3Access control3
Access control3
 
Access control3
Access control3Access control3
Access control3
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
 
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
AccessControl.ppt
AccessControl.pptAccessControl.ppt
AccessControl.ppt
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Chapter 08 security_management_models
Chapter 08 security_management_modelsChapter 08 security_management_models
Chapter 08 security_management_models
 
Security Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational DatabaseSecurity Issues Surrounding Data Manipulation in a Relational Database
Security Issues Surrounding Data Manipulation in a Relational Database
 
Presentation security measure
Presentation security measurePresentation security measure
Presentation security measure
 
IJET-V3I2P8
IJET-V3I2P8IJET-V3I2P8
IJET-V3I2P8
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Iaetsd database intrusion detection using
Iaetsd database intrusion detection usingIaetsd database intrusion detection using
Iaetsd database intrusion detection using
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 

More from LJ PROJECTS

Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ ProjectsTips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
LJ PROJECTS
 
LJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ ProjectsLJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ Projects
LJ PROJECTS
 
Cloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development CompanyCloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development Company
LJ PROJECTS
 
Foodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management PortalFoodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management Portal
LJ PROJECTS
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)
LJ PROJECTS
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Socket Programming- Data Link Access
Socket Programming- Data Link AccessSocket Programming- Data Link Access
Socket Programming- Data Link Access
LJ PROJECTS
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
LJ PROJECTS
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document LJ PROJECTS
 

More from LJ PROJECTS (11)

Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ ProjectsTips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
 
LJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ ProjectsLJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ Projects
 
Cloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development CompanyCloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development Company
 
Foodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management PortalFoodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management Portal
 
Information security
Information securityInformation security
Information security
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Socket Programming- Data Link Access
Socket Programming- Data Link AccessSocket Programming- Data Link Access
Socket Programming- Data Link Access
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
 

Recently uploaded

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 

Recently uploaded (20)

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 

Security models

  • 1. Security Models Copyright by Aakash Panchal All Right reversed by LJ Projects
  • 3. Terminology 3 Trusted Computing Base (TCB) – combination of protection mechanisms within a computer system Subjects / Objects Subjects are active (e.g., users / programs) Objects are passive (e.g., files) Reference Monitor – abstract machine that mediates subject access to objects Security Kernel – core element of TCB that enforces the reference monitor’s security policy
  • 4. Types of Access Control 4 Discretionary Access Control (DAC) – data owners can create and modify matrix of subject / object relationships (e.g., ACLs) Mandatory Access Control (MAC) – “insecure” transactions prohibited regardless of DAC Cannot enforce MAC rules with DAC security kernel Someone with read access to a file can copy it and build a new “insecure” DAC matrix because he will be an owner of the new file.
  • 5. Information Flow Models 5 In reality, there are state transitions Key is to ensure transitions are secure Models provide rules for how information flows from state to state. Information flow models do not address covert channels Trojan horses Requesting system resources to learn about other users
  • 6. State Machine Model State is a snapshot of the system at one moment in time. State transition is the change to the next state. If all the state transitions in a system are secure and if the initial state of the system is secure, then every subsequent state will also be secure, no matter what input occurs.
  • 8. Bell-LaPadula (BLP) Model 8 BLP is formal (mathematical) description of mandatory access control First model that was created to control access to data. Three properties: ds-property (discretionary security) ss-property (simple security – no “read up”) *-property (star property – no “write down”) A secure system satisfies all of these properties BLP includes mathematical proof that if a system is secure and a transition satisfies all of the properties, then the system will remain secure.
  • 9. Bell-LaPadula Model (Continued) 9 Honeywell Multics kernel was only true implementation of BLP, but it never took hold DOD information security requirements currently achieved via discretionary access control and segregation of systems rather than BLP-compliant computers The problem with this model is that it does not deal with integrity of the data.
  • 10. Bell-LaPadula Model (Continued) 10 The star property makes it possible for a lower level subject to write to a higher classified object. A covert channel is an information flow that is not controlled by a security mechanism. A low level subject may see high level object name but are denied access to the contents of the object.
  • 11. Harrison-Ruzzo-Ullman Model BLP model does not state policies for changing access rights or for the creation or deletion of subjects and objects. This model defines authorization system that address these issues. It operates on access matrices and verifies if there is any sequence of instructions that cause an access right to leak information.
  • 12. Three Main Goals of Integrity Preventing unauthorized users from making modifications to data or programs. Preventing authorized users from making improper or unauthorized modifications. Maintaining internal and external consistency of data and programs.
  • 13. Biba Model 13 Similar to BLP but focus is on integrity, not confidentiality Implements the first goal of integrity. Result is to turn the BLP model upside down High integrity subjects cannot read lower integrity objects (no “read down”) Subjects cannot move low integrity data to high-integrity environment (no “write up”)
  • 14. Intuition Behind Models Control of confidential information is important both in military and commercial environment. However in commercial environment the integrity of data is also equally important to prevent errors and frauds. The higher the level, the more confidence one has that a program will execute correctly. Data at higher level is more accurate, reliable and trustworthy than data at the lower level.
  • 15. Clark-Wilson Model 15 Reviews distinction between military and commercial policy Military policy focus on confidentiality Commercial policy focus on integrity Mandatory commercial controls typically involve who gets to do what type of transaction rather than who sees what (Example: Handle a check above a certain amount)
  • 16. Clark-Wilson Model (Continued) 16 Two types of objects: Constrained Data Items (CDIs) Unconstrained Data Items (UDIs) Two types of transactions on CDIs in model Integrity Verification Procedures (IVPs) Transformation Procedures (TPs) IVPs certify that TPs on CDIs result in valid state All TPs must be certified to result in valid transformation
  • 17. Clark-Wilson Model (Continued) 17 System maintains list of valid relations of the form: {UserID, TP, CDI/UDI} Only permitted manipulation of CDI is via an authorized TP If a TP takes a UDI as an input, then it must result in a proper CDI or the TP will be rejected Additional requirements Auditing: TPs must write to an append-only CDI (log) Separation of duties
  • 18. Clark-Wilson Model (Continued) 18 Subjects have to identified and authenticated. Objects can be manipulated only by a restricted set of programs. Subjects can execute only a restricted set of programs A proper audit log has to be maintained.
  • 19. Clark-Wilson versus Biba 19 In Biba’s model, UDI to CDI conversion is performed by trusted subject only (e.g., a security officer), but this is problematic for data entry function. In Clark-Wilson, TPs are specified for particular users and functions. Biba’s model does not offer this level of granularity.
  • 20. Chinese Wall 20 Focus is on conflicts of interest. Principle: Users should not access the confidential information of both a client organization and one or more of its competitors. How it works Users have no “wall” initially. Once any given file is accessed, files with competitor information become inaccessible. Unlike other models, access control rules change with user behavior
  • 21. Chinese Wall 21 Separation of Duty. A given user may perform transaction A or Transaction B but not both. A simple security property A subject has access to an object if and only if, all the objects that subject can read are from non competing groups. The *- Property A subject can write to client only if the subject can not read any object from a competing group.

Editor's Notes

  1. Copyright by Aakash Panchal All Right reversed by LJ Projects
  2. Follow us