Computers and Security: Fact of The Week
Computers and Security: Fact of The Week
Computers and Security: Fact of The Week
REVISE YOUR NOTES ON SECURITY FROM THE SYSTEM ADMINISTRATION COURSE Chapter 1 Gollmann Chapter 1 Bishop: Introduction to Computer Security Chapter 1 Bishop: Computer Security: Art and Science Security is about protecting our assets and assumptions. A man walks into a bank. He knows that he cannot crack the safe because the safe is protected by a combination lock. So he pulls a gun and asks one of the bank employees to open it for him. Unfortunately, he is 10 years too late there is no safe to crack. The money is stored in an automated container that the sta has no access toits impossible to open. Even the sta do not have a code, without customer authorization. So he points his gun at the customers and says, empty your accounts. A spy or perhaps a journalist stands outside the Pentagon and wonders how hell nd out about Americas plans to destroy the axis of evil. He cannot get into the building; its heavily guarded. He cannot crack into their computer system, because he doesnt know how to start. So he waits until one of the generals comes out to eat lunch at a local restaurant, and steals the generals laptop. These examples might seem rather trivial even ippant in their attitude to security. But they are classic examples of how to bypass the so-called security that have been practices successfully for years. 1
What is computer security? You might have some ideas about this alreadysomething to do with hackers or viruses? Maybe codes or encryption? This is what many companies would like us to believebut, in fact, it has little to do with any of this. Security is much more interesting, and a lot harder.
We must accept a certain level of risk! (Always) Security is about well-being (integrity ) and about protecting property or interests from intrusions, stealing or wire-tapping (privacy - the right to keep a secret can also be stolen). In order to do that, in a hostile environment, we need to restrict access to our assets. To grant access to a few, we need to know whom we can trust and we need to verify the credentials (authenticate ) of those we allow to come near us. Security is thus based on the following independent issues: Condentiality/Privacy - the ability to keep things private/condential 2
Trust - do we trust data from an individual or a host? Could they be used against us? Authenticity - are security credentials in order? Are we talking to whom we think we are talking to, privately or not? Integrity - has the system been compromised/altered already? Non-repudiation - (strictly speaking, this is a matter of integrity). This means that it should not be possible for users to deny or repudiate actions carried out (hide their tracks). This gives one the possibility of monitoring and even punishing those responsible for criminal actions. It is about preserving the integrity of evidence, or forensic tracks, lain by attackers. Environments can be hostile because of Physical threats - weather, natural disaster, bombs, power failures, etc. Human threats - stealing, trickery, bribery, spying, sabotage, accidents. Software threats - viruses, Trojan horses, logic bombs, denial of service. What are we afraid of? Losing the ability to use the system. Losing important data or les Losing face/reputation Losing money Spreading private information about people. In the system administration course, we reviewed these issues from the perspective of a system manager, and discussed possible defenses. There we stated the fundamental requirement for security to exist: In order to secure a system, we require the ability to restrict access or privilege to the system.
If we are going to understand all the issues related to security, we need to see the problems from a greater number of perspectives. We need to open up some of the black boxes that we referred to in the system administration course and look inside. This is a journey that will touch upon topics from almost every course you have ever had. In this course we shall cover many aspects of security in connection with computer systems. Whereas, in system administration we looked at some of the practical aspects of computer security, here we look more carefully at the theory of the subject. This will allow us to bring in several new issues that we did not consider earlier. For instance, many computers are used in mission-critical systems, such as aircraft controls and machinery, where human lives are at stake. Thus reliability and safety are also concerns here (actually, these can be dened under the heading of integrity, if we think of an unreliable system as being one whose operation whose behavior loses integrity). Real-time systems are computer systems that are guaranteed to respond in real-time to every request that is made of them. That means that a real-time system must always be fast enough to cope with any demand that is made of it. Real time systems are required in cases where human lives and huge sums of money are involved. For instance, in a ight control system it would be unacceptable to give a command Oh my goodness, were going to crash, aps NOW! and have the computer reply with Processing, please wait.... Thus we need to use our imaginations, and ask the question: what is important to us? What do we need to protect? A nal point: when we are restricting access, in an environment where there is a thin line between trust and mistrust, accountability is often important. We can keep records of who does what, and hold people responsible for their actions. This is often important to organizations, since it means that they can blame someone else for their loss. This seems to be important to nancial and political organizations.
If we make things dicult for users by imposing too many restrictions, they will tend to work around them, because people are essentially lazy. The harsh truth is this: in practice, most users have little or no understanding of security. This is our biggest security hole.
Systems!
Security is a property of systems; its not something you can buy. If you want an old house, you cant buy oldness (age), it is just a property of some houses. You cannot buy an age add-on for your house. Anyone selling security in a box is a fraud. An American admiral once said: Before World War 2, everything was simpleafter that, we had systems. Systems are rule-based, or algorithmic protocols for working often in collaboration with others. How do we do X? We follow a recipe. The problem arises because systems suer from complexity and thus have bugs and unpredictable consequences. This is an important source of security problems. Weaknesses in systems can be dangerous in themselves, and malicious parties can exploit them.
This is an insecure user-interface, because a simple slip of the mouse could result in selecting Quit, instead of Sell. We have a lot to lose by such a mistake. The Newsash function broadcasts news bulletins about buying/selling strategies and the days secret password information to everyone on a list of names within the company. This information is not encrypted, so it is susceptible to sning or spoong attacks. This function is an intrinsically insecure function of the program. The algorithms that the program uses to calculate its prognoses use temporary les in a public le space, which could be modied by other users. Another user could therefore trick the program into calculating incorrectly. This is a security fault in the coding. We could continue this deconstruction through all the levels of the program in a litany of condemnation. Suce it to say that, at every level, there are potentially damaging aws. We begin to see a pattern of thoughtless design faults that we could do something about.
Here is a summary of the principles from the course in Network and System Administration, which relate to security. You should think about these in the light of this introduction: The principle of communities: What one member of a cooperative community does aects every other member, and vice versa. Each member of a community therefore has a responsibility to consider the well-being of other members of the community. Policy : a clear expression of goals and responses prepares a site for future trouble, and documents intent and procedure. Simplest is best: simple rules make system behavior easy to understand. Users tolerate rules if they understand them. Security: the fundamental requirement for security is the ability to restrict access and privilege to data. Data invulnerability (redundancy): The purpose of a backup copy is to provide an image of data which is unlikely to be destroyed by the same act that destroys the original. In the coming weeks, we shall take some of the issues above and consider them in detail. We shall also try to gauge some of the political developments and current concerns about security that dominate the computer news.