DOC PREVIEW
Berkeley COMPSCI 161 - Government models of security

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1October 31, 2005 © Doug Tygar, 2005 (cs161.org)Government models of securityDoug Tygar ([email protected])October 31, 2005cs161.orgOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)Military models of security• “Need to know”• Three models of security Classification unclassified, classified, secret, top secret Compartmentalization nuclear, crypto, weapons specific Discretionary access control Distribution listsOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)What clearance means• Clearance is primarily a restriction on what you can release• Declassification = permission to discuss • Everyday example: Non-disclosure agreements• Advice: Be careful before agreeing to clearance or NDAsOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)Two ways to rank systems• How much do they protect military models of classification?• What is the strength of mechanismOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)HistoryUSOrange book (Trusted Computer Security Evaluation Criteria) → TCSEC Rainbow SeriesEuropeHarmonized Criteria (UK, Germany, France, Holland) →ITSECCanadaCTCPECInternationalizationCommon Criteria (now on version 3.0)October 31, 2005 © Doug Tygar, 2005 (cs161.org)US levelsD : minimal protectionC1: discretionary access controlC2: controlled access controlB1: labeled security protectionB2: structured protectionB3: security domainsA1: verified designA2: verified implementation (never achieved)2October 31, 2005 © Doug Tygar, 2005 (cs161.org)Key ideas• Bell-Lapudula• We trust people, not processes• Small “trusted computing base” (TCB)• Includes a “security kernel”• Processes “read down”• Processes “write up” (star property)October 31, 2005 © Doug Tygar, 2005 (cs161.org)More on the star property• Star property acts as a “King Midas” touch• Once a process reads a classified file, its security level is boosted to that of the file• Then everything it writes (modifies, deletes, etc.) is at the same security levelOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)Problem: covert channels• There is more than one way to leak information Existence of a file System load Paging behavior• Example: TENEX passwordsOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)Covert channels• Covert channels are virtually impossible to remove entirely• So we restrict the bandwidth of what can transmitted • This means that high-classification processes are heavily restrictedOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)What killed the Orange Book?• System performance was poor Often 1,000 to 10,000 times worse than unsecureoperating systems• Using special hardware was expensive• Formal methods for evaluation never really worked• User interface was horrible• Evaluation took years (and was expensive)October 31, 2005 © Doug Tygar, 2005 (cs161.org)The last great evaluated system• Windows NT was evaluated at the C-2 level of security … as long as you didn’t hook it up to a network.3October 31, 2005 © Doug Tygar, 2005 (cs161.org)Today’s problems & the Orange book• Problems we face today seem strangely distant from the Orange book• Denial of service, worms, privacy, aggregation of data … none of these are addressedOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)Common Criteria• Protection Profile• Security TargetOctober 31, 2005 © Doug Tygar, 2005 (cs161.org)Common Criteria Levels• EAL 1: functionally tested (US between D & C1)• EAL 2: structurally tested (US C1)• EAL 3: methodically tested & checked (US C2)• EAL 4: methodically designed, tested, & reviewed (US B1)• EAL 5: semiformally designed & tested (US B2)• EAL 6: semiformally verified design & tested (US B3)• EAL 7: formally verified design & tested (US


View Full Document

Berkeley COMPSCI 161 - Government models of security

Documents in this Course
Rootkits

Rootkits

11 pages

Load more
Download Government models of security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Government models of security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Government models of security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?