CS 621 - Trusted SystemsCourse Outline
©1998 Charles Abzug
- Perspectives on the Role of Technical and System Flaws in the INFOSEC Vulnerabilities Spectrum
- What is a "Trusted System"?
- A system that someone trusts
- A system built to meet a set of rigorously defined criteria
- Technical System Vulnerabilities
- Trust Issues in System Design
- Processor/System States
- The Security Kernel: isolation of security functionality
- The Reference Monitor
- Structure and Function of every line of code
- Integrity of the Compiler
- Layering vs. Hierarchical design of the Operating System
- The Multilevel Security Problem: Subject-to-Object Access Control
- Objects
- The Object Reuse problem
- Subjects
- Function and Ubiquity of the Reference Monitor
- Discretionary Access Control (DAC)
- The Military Model
- The Bell-:LaPadula Model
- Mandatory Access Control (MAC)
- Lattice Model
- The Biba Integrity Model
- The Take-Grant Model
- Role-based Access Control
- The Chinese Wall Model
- Other models
- Prologue to Database Security: "Database 101"
- What is a database?
- Relational Database Concepts
- Query and Update: reading from and writing to the database
- Normalization: reduction of redundancy
- The Join Operation: the price paid for normalization
- Actual Data and Meta-Data
- Issues in Database Security
- The Inference Problem
- Micro-Objects and their Granularity
- Multi-Level Security in s Micro-Object Environment
- Techniques to Provide Database Security
- Statistical Rules for Sub-Query Responses to Confound Inference
- Encryption
- Partitioning
- Integrity Lock
- Trusted Front-End
- Polyinstantiation and its problems
- The Covert Channel Problem
- Storage channels
- Timing Channels
- Miscellaneous Security Issues
- Inter-Process Isolation
- Domain and Type Enforcement
- Trusted Path
- Assurance and Formal Specification
- Code Correspondence Proofs
- Mathematical Verification
- Validation
- Compiler Integrity
- Trusted Systems Standards
- The NCSCs Rainbow Series
- ITSEC and CTCPEC
- The Common Criteria
- Application of Standards
- Evaluation
- Certification
- Accreditation
- The Wiley Hacker
- Evaluating, Enhancing, and Maintaining the Security Configuration of a System
- Checking the System Configuration
- Enhancing the Security of the System
- Continual Monitoring of Security Effectiveness
- Prolog to Network Security: Data Networks 101
- Protocol Basics
- The ISO-OSI "Seven-Layer" Communications Model
- Targets for Attack in the ISO-OSI Model
- Issues in Security in a Networked Environment
- Communications Security: cryptography and cryptographic protocols (VERY brief overview only)
- Authentication of the User in a distributed environment
- Transfer of information between Trusted Systems of different accreditation range
- Security in the Internet Environment
- Firewalls
- Sample Network Attacks
- Network Security Tools: Practical Security Surveying and Monitoring
- The challenge of Distributed Systems
- Available Services: use or ignore
- Coming Back Down to Earth:
- "Trusting a System" vs. a "Trusted System"
- Product Availability , Product Performance, and Price
- Hands-On Experience in the Administration of Systems for Trustworthiness
- Summary and Conclusions