DOC PREVIEW
UConn CSE 298/300 - Lecture notes

This preview shows page 1-2-3-4-5-36-37-38-39-40-73-74-75-76-77 out of 77 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 77 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Security Concepts and CapabilitiesOverviewIntroduction: General ConceptsType of Security IssuesGlossary of Protection and Security TermsSlide 6Slide 7Slide 8Slide 9Slide 10Slide 11Policy & MechanismAuthenticationAuthorizationUser AuthenticationNetwork AuthenticationCore Security Capabilities of JavaSlide 18Recall Java Bytecode Verification:Digital Signatures and JAR FilesDatabase Security ApproachDatabase SecuritySlide 23Available Security ApproachesWhat are Key Access Control Concepts?Mandatory Access ControlMandatory Security MechanismOperationsSlide 29Slide 30Slide 31Slide 32Using the PropertiesA Classic ExampleIllustrating MACSlide 36Security in Software ApplicationsWhat is Role Based Access Control (RBAC)?Motivating Security for OO ParadigmWhy is RBAC Needed?Slide 41Examples of Why RBAC is NeededRBAC for OOSample RBAC Hierarchy for HCASample RBAC Hierarchy for UniversityDiscretionary Access ControlAccess Matrix ModelSlide 48Access Matrix ModelAccess ModesWhat is Role Delegation?Why is Role Delegation Important?What Can be Delegated?Delegation/Pass on Delegation AuthoritiesExample - Role DelegationSlide 56Role Delegation Revocation RulesSlide 58Monotonicity and PermanenceTotality and AdministrationRevocationDAC in SQL2Privileges in SQLExample SchemaSQL ExamplesSlide 66Slide 67CryptographyMore on CryptographyCryptographic SystemsStatistical Database SecurityExample of Statistical DBExample Two of Statistical DBSlide 74Public Policy on SecuritySecurity Solutions for Systems/DatabasesConcluding RemarksSecBG-1CSE 333Security Concepts and CapabilitiesSecurity Concepts and CapabilitiesProf. Steven A. Demurjian, Sr. Computer Science & Engineering DepartmentThe University of Connecticut371 Fairfield Road, Box U-1155Storrs, CT [email protected]://www.engr.uconn.edu/~steve(860) 486 - 4818The majority of these slides represent material that has been accumulated from various sources over The majority of these slides represent material that has been accumulated from various sources over the years. the years. A portion these slides are being used with the permission of Dr. Ling Lui, Associate Professor, A portion these slides are being used with the permission of Dr. Ling Lui, Associate Professor, College of Computing, Georgia Tech. College of Computing, Georgia Tech.SecBG-2CSE 333OverviewOverviewConcepts and IssuesConcepts and IssuesGlossary of Security TermsGlossary of Security TermsSecurity Policy, Authentication, and AuthorizationSecurity Policy, Authentication, and AuthorizationSecurity in JavaSecurity in JavaDatabase SecurityDatabase SecurityAccess ControlAccess ControlMandatory Access Control (MAC)Discretionary Access Control (DAC) Role-Based Access Control (RBAC)CryptographyCryptographySecurity in Statistical DBSecurity in Statistical DBEmerging Security TrendsEmerging Security TrendsSecBG-3CSE 333Introduction: General ConceptsIntroduction: General ConceptsAuthenticationAuthenticationProving you are who you areSigning a MessageIs the Client who S/he Says they are?AuthorizationAuthorizationGranting/Denying AccessRevoking AccessDoes the Client have Permission to do what S/he Wants?EncryptionEncryptionEstablishing Communications Such that No One but Receiver will Get the Content of the MessageSymmetric Encryption Public Key EncryptionSecBG-4CSE 333Type of Security IssuesType of Security IssuesLegal and Ethical Issues Legal and Ethical Issues Information that Must be Protected (e.g., SSN)Information that Must be Accessible (e.g., SSN)Policy Issues Policy Issues Who Can See What Information When?Applications Limits w.r.t. Data vs. Users?System Level EnforcementSystem Level EnforcementWhat is Provided by the DBMS? Programming Language? OS? Application?How Do All of the Pieces Interact?Multiple Security Levels/Organizational EnforcementMultiple Security Levels/Organizational EnforcementMapping Security to Organizational HierarchyProtecting Information in OrganizationSecBG-5CSE 333Glossary of Protection and Security TermsGlossary of Protection and Security TermsPrincipalPrincipalEntity (Person/Process/etc.) to Which Authorizations are GrantedCan be a User, User Group, Program, Client, etc.Also Known as SubjectProtected ObjectProtected ObjectKnown Object whose Internal Structure is Inaccessible Except by Protection SystemThe Unit of ProtectionFor Our Purposes:Table, Column, TupleData and Meta-DataGlossary from: Saltzer and Schroeder, “The Protection of Information in Computer Glossary from: Saltzer and Schroeder, “The Protection of Information in Computer Systems”, Proc. of IEEE, Vol. 63, No. 9, September 1975.Systems”, Proc. of IEEE, Vol. 63, No. 9, September 1975.SecBG-6CSE 333Glossary of Protection and Security TermsGlossary of Protection and Security TermsAccess Control ListAccess Control ListList of Principals (User, User Group, Process, …) Authorized to have Access to Some ObjectFor Every Object, Maintain Authorized PrincipalsEasily Implemented in Algorithm/Typically in OSAuthenticateAuthenticateVerify Identity of Principal Making RequestIn OS - Equivalent to Logging on (ID, Password)May be More Complicated Based on Security NeedsAuthorizeAuthorizeGrant Principal Access to ObjectsGranularity Ranges from Fine to CoarseApplication DirectedSecBG-7CSE 333Glossary of Protection and Security TermsGlossary of Protection and Security TermsCapabilityCapabilityUnforgeable Ticket as Proof of Authorization of Presenter (Principal) to Access Named ObjectTicket or Certificate Must be Presented at Each AccessCapability ListCapability ListList of Protected Objects which Likewise List Authorized PrinciplesUsed in Conjunction with Tickets for AuthorizationCertifyCertifyVerify Accuracy, Correctness, & Completeness of Security/Protection MechanismCritical for Select Domains (DoD, Banking, etc.)SecBG-8CSE 333Glossary of Protection and Security TermsGlossary of Protection and Security TermsConfinementConfinementRestricting What a Process Can Do to with Authorized ObjectsSimilar in Concept to Sandbox of JavaDomainDomainObjects Currently Accessed by Principal(De)Encryption(De)EncryptionDe(Encoding) of Data According to Transformation Key for Transmission/StorageReciprocal Activity - Many Different OptionsGrantGrantAuthorize Access to Objects by


View Full Document

UConn CSE 298/300 - Lecture notes

Documents in this Course
Java Tool

Java Tool

58 pages

Load more
Download Lecture notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?