DOC PREVIEW
A Security-centric Ring-based Software Architecture

This preview shows page 1-2-16-17-18-34-35 out of 35 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 35 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

A Security-centric Ring-based Software ArchitectureIntroductionIntroduction (continued)Slide 4OverviewSecurity-centric Software ArchitecturesCritical Concepts in the Security Domain [Neumann]Multiple Security Rings [Gemini]Seven Ring Gemguard Architecture [Gemini]Properties of Ring-based Software Architectures [Schell]Ring-based Program Execution Policy [Nguyen and Levin]Design of a Ring-based Software ArchitectureRing-based Architectural StyleSlide 14Ring-based Architectural Style (continued)Features of Rings as InterfacesFeatures of Rings as Gates [Fernandez]Design Patterns for a Ring-based Software Architecture [Fernandez]A Computer Security Adaptation using Warden’s Concentric RingsWarden’s Five-Ring Model [Warden]Five-Ring Model Applied to Other Domains [Warden]Computer Security Adaptation of Warden’s ModelComputer Security RingsProtecting Centers of Gravity in a Software SystemCenters of GravityLeadership RingOrganic Essentials RingInfrastructure RingPopulation RingFighting Mechanism RingConclusion and Future PlansConclusionRelated WorkFuture PlansSlide 35A Security-centric Ring-based Software Architecture1A Security-centric Ring-based Software Architecture Jay-Evan J. Tevis John A. Hamilton, Jr.Western Illinois University Auburn University Macomb, IL Auburn, ALLeadershipOrganic EssentialsInfrastructurePopulationFighting MechanismA Security-centric Ring-based Software Architecture2Introduction•Software systems are vulnerable to many different forms of attack•Protection of such systems can be improved by viewing their key components from the perspective of an enemy attackerA Security-centric Ring-based Software Architecture3Introduction (continued)•Colonel John Warden developed a five-ring system model for military strategic warfare–It describes the parts of an enemy system as five concentric rings–It is designed for use in planning and conducting strategic targeting against an adversaryA Security-centric Ring-based Software Architecture4Introduction (continued)•We apply this model to software architecture in a similar manner to identify–What system-level components are essential–How these components can be better protected through a security-focused architectural designA Security-centric Ring-based Software Architecture5Overview•Security-centric software architectures•Design of a ring-based software architecture•A computer security adaptation using Warden’s concentric rings•Adapting Warden’s model to computer security•Protecting centers of gravity in a software system•Conclusion and future plansOverviewSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansA Security-centric Ring-based Software Architecture6Security-centric Software ArchitecturesA Security-centric Ring-based Software Architecture7Critical Concepts in the Security Domain [Neumann]•Multi-level security–Restrict flow of information from higher-security entities to lower-security entities•Multi-level integrity–Restrict dependencies between entities of higher integrity with entities of lower integrity•Multi-level availability–Restrict dependencies between entities of higher availability with entities of lower availabilitySecurity-centric Software ArchitecturesSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansA Security-centric Ring-based Software Architecture8Security-centric Software ArchitecturesSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansMultiple Security Rings [Gemini]•High assurance security–Hardware and kernel-enforced protection•Multi-level security–Enforcement of organizational access controls•Cryptographic communication security–IPSec-based authentication, confidentiality, and integrity• Integrated information systems security–Protection at transport and network layersA Security-centric Ring-based Software Architecture9Seven Ring Gemguard Architecture [Gemini]Security-centric Software ArchitecturesSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansA Security-centric Ring-based Software Architecture10Security-centric Software ArchitecturesSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansProperties of Ring-based Software Architectures [Schell]•Memory segmentation•Three protection rings–Security kernel •Located in the most protected ring•Enforces mandatory access controls–Operating system– Applications•Although applied in research, such ring-based architectures are not widely deployed in industryA Security-centric Ring-based Software Architecture11Security-centric Software ArchitecturesSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansRing-based Program Execution Policy [Nguyen and Levin]•Mandatory access control (All users including root)•Four ring-based execution domains–(3) Unprivileged application–(2) Privileged application–(1) Administration–(0) Operating System•Programs assigned to a less privileged ring are unable to execute or access objects allocated in a more privileged ringA Security-centric Ring-based Software Architecture12Design of a Ring-based Software ArchitectureA Security-centric Ring-based Software Architecture13Design of a Ring-based Software ArchitectureSecurity-centric Software ArchitecturesDesign of a Ring-based Software ArchitectureA Computer Security Adaptation using Warden’s Concentric RingsProtecting Centers of Gravity in a Software SystemConclusion and Future PlansRing-based Architectural StyleRing 0Ring 1Ring 2Ring 3Ring 4A


A Security-centric Ring-based Software Architecture

Download A Security-centric Ring-based Software Architecture
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view A Security-centric Ring-based Software Architecture and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A Security-centric Ring-based Software Architecture 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?