Lecture 1 - Introduction & Software Security Concepts
Lecture 1 - Introduction & Software Security Concepts
and Syllabus
Discussion
Dr. Nada Hany Sherief
Agenda
1 2 3 4 5 6
Understand software Understand software Experiment with and Understand secure Apply secure software Experiment with and
security concepts security problems and measure software software architecture development life cycle apply software
threats to security security through and software security security and testing
estimation and metrics assurance
Course Overview
Continuous Assessment
Final Exam 10 marks on Quizzes
and Assignments
40 marks on exam
Course Lecturer’s Contact
1. Redundancy:
• Hardware redundancy: Having multiple copies of hardware
components to ensure that if one fails, the system can continue
to operate.
• Software redundancy: Having multiple copies of software
components to ensure that if one fails, the system can continue
to operate.
• Data redundancy: Having multiple copies of data to ensure that
if one copy is lost, the data can be recovered.
Availability Measures
2. Fault Tolerance:
• Error detection and correction: Implementing mechanisms to
detect and correct errors in hardware, software, or data.
• Automatic failover: Automatically switching to a backup system
or component in case of a failure.
3. Load Balancing:
• Distributing workload across multiple servers or components to
prevent overload and improve performance.
4. Firewalls:
• Implementing firewalls to protect systems from unauthorized
access and malicious traffic. Firewalls can help to prevent DoS
attacks and other threats that can impact availability.
Security
Models
Bell-LaPadula:
Example: A military
Bell-LaPadula: A database should use the
confidentiality model that Bell-LaPadula model to
restricts information flow to ensure that sensitive
prevent unauthorized information is only
disclosure. accessible to authorized
personnel.
About Bell-LaPadula
•Subject: Administrator
•Objects: All levels of data
•Security Levels: Top Secret, Secret, Confidential, Unclassified
•Rules:
•Administrators can read files at all security levels.
Enforce the Bell-LaPadula Rules:
•Subject: Administrator
•Objects: All levels of data
•Security Levels: Top Secret, Secret, Confidential, Unclassified
•Rules:
•Administrators must adhere to the Bell-LaPadula rules to
prevent unauthorized disclosure.
Enforce the Bell-LaPadula Rules:
1 2 3
Student Access: A student Faculty Access: A faculty Administrator Access: An
can access their own grades member can access student administrator can access all
(Secret) and course materials grades (Secret), course levels of data, including top-
(Confidential) but cannot materials (Confidential), and secret administrative
access other students' grades administrative data relevant information. However, they
or sensitive administrative to their role (e.g., course must adhere to the Bell-
data (Top Secret). rosters, grading policies). LaPadula rules to prevent
unauthorized disclosure.
Advantages of Bell-LaPadula Model
• Helps to ensure that security measures are consistent and effective.
• Clearly defines the goal of confidentiality and provides specific rules for
achieving it.
• Can be applied to a wide range of systems and applications, from military
databases to commercial software.
Disadvantages of Bell-LaPadula Model
• The Bell-LaPadula model can be complex to implement and understand,
especially for organizations that are not familiar with formal security
models.
• The Star Confidentiality Rule can be overly restrictive in scenarios where
data needs to flow downward in a hierarchical structure.
• The rules can hinder collaboration between users at different security
levels. For instance, a researcher working on a classified project may need
to share findings with colleagues at a lower security level to get feedback
or assistance.
Questions
Thanks!