DOC PREVIEW
Pitt IS 2150 - Assurance

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Nov 15, 2005OverviewTrustRelationshipsProblem Sources (Neumann)ExamplesRole of RequirementsTypes of AssuranceSlide 9Assurance stepsLife CycleConceptionManufactureDeploymentFielded Product LifeWaterfall Life Cycle ModelRelationship of StagesOther Models of Software DevelopmentModelsSlide 20Key PointsThreats and VulnerabilitiesArchitectural considerationsArchitectural considerations Example: Four layer architectureSlide 25Build or Add?Trusted Computing BaseSecurity Policy RequirementsDesign assuranceTechniques for Design AssuranceDesign DocumentsDesign meets requirements?Requirement mapping and informal correspondenceDesign meets requirements?Slide 35Implementation considerations for assuranceAssurance through Implementation managementImplementation meets Design?Code development and testingOperation and maintenance assuranceIS2150/TEL2910: Introduction of Computer Security 1Nov 15, 2005Nov 15, 2005AssuranceAssurance2IS2150/TEL2910: Introduction of Computer SecurityOverviewOverviewTrustTrustProblems from lack of assuranceProblems from lack of assuranceTypes of assuranceTypes of assuranceLife cycle and assuranceLife cycle and assuranceWaterfall life cycle modelWaterfall life cycle modelOther life cycle modelsOther life cycle models3IS2150/TEL2910: Introduction of Computer SecurityTrustTrustTrustworthyTrustworthy entity has sufficient credible entity has sufficient credible evidence leading one to believe that the system evidence leading one to believe that the system will meet a set of requirementswill meet a set of requirementsTrustTrust is a measure of trustworthiness relying on is a measure of trustworthiness relying on the evidencethe evidenceAssuranceAssurance is confidence that an entity meets its is confidence that an entity meets its security requirements based on evidence security requirements based on evidence provided by the application of assurance provided by the application of assurance techniquestechniquesFormal methods, design analysis, testing etc.4IS2150/TEL2910: Introduction of Computer SecurityRelationshipsRelationshipsPolic yMechanismsAssuranceStatement of requirements that explicitly definesthe security expectations of the mechanism(s)Provides justification that the mechanism meets policythrough assurance evidence and approvals based onevidenceExecutable entities that are designed and implementedto meet the requirements of the policyEvaluation standardsTrusted Computer System Evaluation Criteria Information Technology Security Evaluation Criteria Common Criteria5IS2150/TEL2910: Introduction of Computer SecurityProblem Sources (Neumann)Problem Sources (Neumann)1.1.Requirements definitions, omissions, and mistakesRequirements definitions, omissions, and mistakes2.2.System design flawsSystem design flaws3.3.Hardware implementation flaws, such as wiring and chip Hardware implementation flaws, such as wiring and chip flawsflaws4.4.Software implementation errors, program bugs, and Software implementation errors, program bugs, and compiler bugscompiler bugs5.5.System use and operation errors and inadvertent mistakesSystem use and operation errors and inadvertent mistakes6.6.Willful system misuseWillful system misuse7.7.Hardware, communication, or other equipment malfunctionHardware, communication, or other equipment malfunction8.8.Environmental problems, natural causes, and acts of GodEnvironmental problems, natural causes, and acts of God9.9.Evolution, maintenance, faulty upgrades, and Evolution, maintenance, faulty upgrades, and decommissionsdecommissions6IS2150/TEL2910: Introduction of Computer SecurityExamplesExamplesChallenger explosion (1986)Challenger explosion (1986)Sensors removed from booster rockets to meet accelerated launch scheduleDeaths from faulty radiation therapy systemDeaths from faulty radiation therapy systemHardware safety interlock removedFlaws in software designBell V22 Osprey crashesBell V22 Osprey crashesFailure to correct for malfunctioning components; two faulty ones could outvote a thirdIntel 486 chip bug (trigonometric function)Intel 486 chip bug (trigonometric function)Cost a lot of time and money7IS2150/TEL2910: Introduction of Computer SecurityRole of RequirementsRole of RequirementsRequirementsRequirements are statements of goals that are statements of goals that must be metmust be metVary from high-level, generic issues to low-level, concrete issuesSecurity objectivesSecurity objectives are high-level security are high-level security issues and business goalsissues and business goalsSecurity requirementsSecurity requirements are specific, are specific, concrete issuesconcrete issues8IS2150/TEL2910: Introduction of Computer SecurityTypes of AssuranceTypes of AssurancePolicy assurancePolicy assurance is evidence establishing is evidence establishing security requirements in policy is complete, security requirements in policy is complete, consistent, technically soundconsistent, technically soundTo counter threats and meet objectivesDesign assuranceDesign assurance is evidence establishing is evidence establishing design sufficient to meet requirements of security design sufficient to meet requirements of security policypolicyImplementation assuranceImplementation assurance is evidence is evidence establishing implementation consistent with establishing implementation consistent with security requirements of security policysecurity requirements of security policyNeed to use good engineering practices9IS2150/TEL2910: Introduction of Computer SecurityTypes of AssuranceTypes of AssuranceOperationalOperational assuranceassurance is evidence is evidence establishing system sustains the security establishing system sustains the security policy requirements during installation, policy requirements during installation, configuration, and day-to-day operationconfiguration, and day-to-day operationAlso called administrative assuranceExample, Do a thorough review of product or system documentation and procedures, to ensure that the system cannot accidentally be placed in a non-secure state.10IS2150/TEL2910: Introduction of Computer SecurityAssurance stepsAssurance stepsSecurity requirementsDesignImplementation1324AssurancejustificationDesign andimplementationrefinement11IS2150/TEL2910: Introduction of Computer SecurityLife CycleLife CycleConceptionConceptionManufactureManufactureDeploymentDeploymentFielded Product LifeFielded


View Full Document

Pitt IS 2150 - Assurance

Documents in this Course
QUIZ

QUIZ

8 pages

Load more
Download Assurance
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Assurance and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Assurance 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?