CH 4: Security Policies: Week 2
CH 4: Security Policies: Week 2
Week 2
Underlying both
Trust
Security Policy
Policy partitions system states into:
Authorized (secure)
These are states the system can enter
Unauthorized (nonsecure)
If the system enters any of these states, its a security
violation
Secure system
Starts in authorized state
Never enters unauthorized state
Security Policy
Recall the three basic properties relevant to security:
Confidentiality
Integrity
Availability
CIA properties
Confidentiality
X set of entities, I information
I has confidentiality property w.r.t. X if no x
X can obtain information from I
I can be disclosed to others
Example:
X : set of students
I : final exam answer key
I is confidential w.r.t. X if students cannot obtain
final exam answer key
Integrity
X set of entities, I information
I has integrity property w.r.t. X if all x X
trust information in I
Types of integrity:
trust I, its conveyance and storage (data integrity)
I is the information about origin of something or
an identity (origin integrity, authentication)
I is a resource: The resource functions as it should
(assurance)
Availability
X set of entities, I resource
I has availability property w.r.t. X if all x X can
access I.
The access depends on the needs of the members of
X, the nature of the resource, and the use to which
the resource is put.
Types of availability:
traditional: x gets access or not
quality of service: e.g. a channel promised a level of
access (for example, a specific level of bandwidth) but
not meet it, even though some access is achieved
Policy Models
Abstract description of a policy or class of
policies
Focus on points of interest in policies
Security levels in multilevel security models
Separation of duty in Clark-Wilson model
Conflict of interest in Chinese Wall model
Integrity policy
Policy protecting only integrity
Indicate how much the object can be trusted
Given that the level of trust is correct, the integrity
policy dictates what a subject can do with that object
Usually assigns a certain level of integrity (low, high, or
in between)
Trust - Example
Administrator installs patch
1. Trusts patch came from vendor, not tampered with
in transit
2. Trusts vendor tested patch thoroughly
3. Trusts vendors test environment corresponds to
local environment
4. Trusts patch is installed correctly
2.
3.
4.
Example (1/3)
Policy disallows cheating
Includes copying homework, with or without permission
Example (1/2)
Bill cheated
Policy forbids copying homework assignment
Bill did it
System entered unauthorized state (Bill having a copy of
Annes assignment)
Example (3/3)
Anne didnt protect her homework
Not required by security policy
Mechanisms
Entity or procedure that enforces some part of the
security policy
Access controls (like bits to prevent someone from
reading a homework file)
Disallowing people from bringing CDs and floppy disks
into a computer facility to control what is placed on
systems
Summary
Warns that electronic mail not private
Can be read during normal system administration
Can be forged, altered, and forwarded
Summary
What users should and should not do
Think before you send
Be courteous, respectful of others
Dont interfere with others use of email
Full Policy
Context
Does not apply to Dept. of Psychology labs run by the
university
Does not apply to printed copies of email
Other policies apply here
Uses of E-mail
Anonymity allowed
Exception: if it violates laws or other policies
Security of E-mail
University can read e-mail
Wont go out of its way to do so
Allowed for legitimate business purposes
Allowed to keep e-mail robust, reliable
Implementation
Adds campus-specific requirements and procedures
Example: incidental personal use not allowed if it benefits
a non-university organization
Allows implementation to take into account differences
between campuses, such as self-governance by Academic
Senate
Key Points
Policies describe what is allowed
Mechanisms control how policies are enforced
Trust underlies everything