1 / 16

CHAPTER 2

CHAPTER 2. Laws of Security. Introduction. Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really laws, but rather behaviors that happen so often that be regarded as laws. First Law. Client-site Security Doesn’t Work

Download Presentation

CHAPTER 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 2 Laws of Security

  2. Introduction • Laws of security enable user make the judgment about the security of a system. • Some of the “laws” are not really laws, but rather behaviors that happen so often that be regarded as laws

  3. First Law • Client-site Security Doesn’t Work • What is client-site? • The computer that the user (or attacker) has control over. • What is client-site security? • Some sort of mechanism that is being enforced solely on the client. • Reason • It not possible to keep software secure from the person sitting in front the computer

  4. First Law • Exceptions • Disk Encryption – the product must require the user to enter a password for decryption when the machine is booted. • Problems • 1. It doesn’t stop the user from being deprived of the data. • 2. It doesn’t stop replace the hardware. • 3. It doesn’t stop the information from being erased if the attacker want to format the hard drive.

  5. First Law • Defense • 1. Always validate data at the server in a client-site system. • 2. Treat the information received as suspect.

  6. Second Law • User Can’t Exchange Encryption Keys without Shared Piece of Information • In life scenario: the telemarketer begins tell us about product X. we would like to purchase the product and telemarketer need our credit card number. For verifying, we need some extra info. But how do we trust? • In Encryption scenario: how do we know what computer we exchanged keys with? It might be the right person or it might be an attacker.

  7. Second Law • Reasons • It is difficult to make sure we are exchanging keys with the right party and not falling victim to a man-in-the-middle (MITM) attack. • Exceptions • Using SSL (Secure Socket Layer) – provide nothing to go to a secure Web page. • It is not really an exception but its really need “the root certificate’s public key”. • Defense • We must have good key management.

  8. Third Law • Viruses and Trojans Cannot Be 100 Percent Protected • Reasons • 1. Even a slight change can be done in the virus code, the antivirus software won’t be able to spot it any longer. • 2. The most recent set of viruses propagate so much and more quickly. It can spread via any method – web pages, e-mail and downloads.

  9. Third Law • Exceptions • Modifying our behavior. How? • 1. We have to install software only from a trusted vendor. • 2. We must never exchange information with anyone when using a network. • 3. Our computer would have to be physically secure.

  10. Third Law • Defense • 1. Employing the standard antivirus tools at a minimum. • 2. Make sure we know how to configure mail server, firewalls or IDS (Intrusion Detection System).

  11. Fourth Law • Firewalls Cannot Protect 100 Percent from Attack • Reasons • 1. There are so many threats – malicious employees, physical security, modems and infected floppies. • 2. Firewall are designed to permit some types of traffic while denying other traffics. • 3. What is permitted or denied should reflect a written security that exist in certain organization.

  12. Fourth Law • Exceptions • No exceptions, only can defense. • Defense • Using IDS – designed to spot bad traffic through some mechanisms: • 1. Match against known bad pattern. • 2. Check for compliance against written standards. • 3. Profile normal traffic and flag it that varies. • IDS also have key in collecting information about new attacks.

  13. Fifth Law • In Order for A System To Be Secure, It Must Undergo An Independent Security Audit • Reason • Most programmers only doing functionally testing but doesn’t doing security testing. • Functionally Testing – to ensure that the users will be able to use the product without complaining. • Security Testing – mush more in-depth analysis including checking the source code.

  14. Fifth Law • One of the most secure operating system is OpenBSD. • A couple of years, OpenBSD team have done independent auditing: • 1. Audit the source code for bugs and fixing them. • 2. Fixed any bugs that found whether security related or not. • 3. Search all source code to see whether that type of bug had been made anywhere else.

  15. Fifth Law • Exceptions • Using NSA rules – software have been rated as A1 for designing secure computer systems, especially operating system. • Defense • 1. Use purchasing dollars to encourage vendors to do better work • 2. Give training to employees to contribute security reviews for the system.

  16. End of Chapter 2 Thank You

More Related