SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Boundary Controls
• The boundary subsystem establishes the interface
between the would-be user of a computer system
and the computer system itself.
• Once boundary subsystem functions are complete,
the user can commence to use the resources of the
system.
• Boundary subsystem controls have one primary pu
rpose: to establish the identity and authenticity of
would-be users of a system.
• This chapter examines some of the major types of
security exercised in the boundary subsystem.
Boundary Controls
Access Controls
• An Access Control Mechanism is used in a compute
r installation for preventing unauthorized access to
and use of resources.
Boundary Controls
Functions of an Access Control Mechanism.
• An access control mechanism associates with ident
ified, authorized users the resources they are perm
itted to access and the action privileges they have
with respect to those resources.
• The mechanism processes user's requests in three
steps, identification, authentication, and authorizat
ion
Boundary Controls
Identification and Authentication
• Four classes of authentication are remembered inf
ormation, possessed information, personal charact
eristics and dialog.
• There is need to understand the weaknesses in ea
ch of the class of authentication.
• Passwords, possessed objects, and personal charac
teristics all have a further weakness that the authe
ntication information is reduced to a bit stream wh
ich can be wiretapped.
Boundary Controls
Object Resources
• In a generalized access control mechanism, all reso
urces must be named since the mechanism must c
ouple users with resources they are permitted to u
se.
• It is important that the access control mechanism h
ave a means of identifying the authenticity of the o
bject resources it provides to a user .e.g assigning
object resources a unique identity that can not be
copied.
Boundary Controls
Action Privileges
• If a user has the permission to use a commodity, th
e amount of the commodity that the user can cons
ume must be specified.
• The most complex action privileges relate to the us
e of data resources
• ADD, INSERT, APPEND,MODIFY
file1 File2 file3
John Own Read Write
Alice Read Own Read Write Read
bob Read Write Read Own Read Write
Boundary Controls
Action privileges
• Data independent – all the contents of a file ar
e subject to the action privilege assigned to th
e file
• Data dependent – can apply to data items wit
hin a file e.g salary < 15000
Boundary Controls
• One of the important restrictions on action privileg
es is a temporal restriction e.g no access to the ter
minal after working hours.
Implementing an Access Control Mechanism
• Full implementation of an ACM can be costly. In pr
actise, some trade offs must be made; overall contr
ol must be decreased to reduce costs and improve
performance.
• The tradeoffs made in the ACM must be reasonabl
e, given the overall control requirements of the ins
tallation
Boundary Controls
Problems in Implementing ACM
(1)Open Vs Closed Environment
• While an open environment allows for an easier im
plementation of an ACM, only in a closed environm
ent can effective control be exercised over users.
(2)Approaches to Authorization
• They are two approaches to implementing the aut
horization module in an access control mechanism:
Boundary Controls
• A ticket oriented approach?
• A list oriented approach?
(3)Dynamics of Authorization
• Some difficult implementation problems arise in th
e area of authorization dynamics.
Boundary Controls
Cryptographic Controls
• Cryptology is the science of secret codes
• Cryptography deals with systems for translating dat
a into codes that are meaningless to anyone who d
oes not possess the system for recovering the initia
l data.
• Cryptanalysis are the techniques for recovering enc
rypted data
• Cipher is an algorithm for performing encryption o
r decryption
Boundary Controls
Cryptographic Techniques
They are three classes of techniques for enciphering
plaintext:
• Substitution ciphers
• Transposition ciphers.
• Product ciphers
Boundary Controls
Choosing a Cipher System
• A cipher system has two components: algorithm an
d the key
• Five desirable properties of a cipher system:
• High Work Factor
• Small key
• Simplicity
• Low error propagation
• Little expansion of message size.
Boundary Controls
Public Key Cryptosystems
• Ensuring the secure distribution of a private key to
parties who need the key is a difficult task.
• The widely known public key cryptosystem is the R
SA scheme.
• The disadvantage of public key cryptosystems is th
at they are slow relative to the processing time req
uired for private-key cryptosystems.
Boundary Controls
Key Distribution
• Maintaining the secrecy of the cryptographic key is
of paramount importance.
• The method chosen to distribute a key must be reli
able; and maintain the secrecy of the keys thus mai
ntaining overall secrecy of the cryptosystem.
• Reminder: assignment diffie-hellman key exchange
protocol
Boundary Controls
Explain Diffie-Hellman key exchange, El-gamal a
nd RSA Algorithms.
Boundary Controls
Digital Signatures
• Establishing the authenticity of individuals and pre
venting the disavowal of messages and or contract
s are still critical requirements when data is exchan
ged in electronic form.
• A digital signature is simply a string of 0s and 1s rat
her than a line drawn on a page.
• Public key cryptosystems can be used to establish:
secret messages
signed messages
signed, secret messages.
Boundary Controls
Secret Message
• S Pur(m)
• R Prr[Pur(m)]
Signed Secret Message
• S Pur(m)
• S Prs[Pur(m)]
• R Pus (Prs[Pur(m)])
• R Prr[Pur(m)]

Weitere ähnliche Inhalte

Ähnlich wie boundary_security.pptx

System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptxrahulkumarcscsf21
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratMary Margarat
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection MechanismMona Rajput
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdfRobeliaJoyVillaruz
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptMuhammadAbdullah311866
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architectureKarthikeyan Dhayalan
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating systemAbdullah Khosa
 
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...morganjohn3
 
Protection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemProtection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemLalfakawmaKh
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSMaurvi04
 

Ähnlich wie boundary_security.pptx (20)

Os unit i
Os unit iOs unit i
Os unit i
 
Operating System
Operating SystemOperating System
Operating System
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Lec # 1 chapter 2
Lec # 1 chapter 2Lec # 1 chapter 2
Lec # 1 chapter 2
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
 
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
 
Protection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemProtection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating System
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 

Mehr von KelvinDube4

CLOUD_COMPUTING_PRESENTATION.pptx
CLOUD_COMPUTING_PRESENTATION.pptxCLOUD_COMPUTING_PRESENTATION.pptx
CLOUD_COMPUTING_PRESENTATION.pptxKelvinDube4
 
introduction.pptx
introduction.pptxintroduction.pptx
introduction.pptxKelvinDube4
 
DATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxDATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxKelvinDube4
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxKelvinDube4
 
Group 5 Presentation.pptx
Group 5 Presentation.pptxGroup 5 Presentation.pptx
Group 5 Presentation.pptxKelvinDube4
 
Group 5 Presentation.pptx
Group 5 Presentation.pptxGroup 5 Presentation.pptx
Group 5 Presentation.pptxKelvinDube4
 
Group 6 Presentation - Copy.pptx
Group 6 Presentation - Copy.pptxGroup 6 Presentation - Copy.pptx
Group 6 Presentation - Copy.pptxKelvinDube4
 

Mehr von KelvinDube4 (7)

CLOUD_COMPUTING_PRESENTATION.pptx
CLOUD_COMPUTING_PRESENTATION.pptxCLOUD_COMPUTING_PRESENTATION.pptx
CLOUD_COMPUTING_PRESENTATION.pptx
 
introduction.pptx
introduction.pptxintroduction.pptx
introduction.pptx
 
DATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptxDATA COM PRESENTATION-1.pptx
DATA COM PRESENTATION-1.pptx
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
 
Group 5 Presentation.pptx
Group 5 Presentation.pptxGroup 5 Presentation.pptx
Group 5 Presentation.pptx
 
Group 5 Presentation.pptx
Group 5 Presentation.pptxGroup 5 Presentation.pptx
Group 5 Presentation.pptx
 
Group 6 Presentation - Copy.pptx
Group 6 Presentation - Copy.pptxGroup 6 Presentation - Copy.pptx
Group 6 Presentation - Copy.pptx
 

Kürzlich hochgeladen

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

boundary_security.pptx

  • 1. Boundary Controls • The boundary subsystem establishes the interface between the would-be user of a computer system and the computer system itself. • Once boundary subsystem functions are complete, the user can commence to use the resources of the system. • Boundary subsystem controls have one primary pu rpose: to establish the identity and authenticity of would-be users of a system. • This chapter examines some of the major types of security exercised in the boundary subsystem.
  • 2. Boundary Controls Access Controls • An Access Control Mechanism is used in a compute r installation for preventing unauthorized access to and use of resources.
  • 3. Boundary Controls Functions of an Access Control Mechanism. • An access control mechanism associates with ident ified, authorized users the resources they are perm itted to access and the action privileges they have with respect to those resources. • The mechanism processes user's requests in three steps, identification, authentication, and authorizat ion
  • 4. Boundary Controls Identification and Authentication • Four classes of authentication are remembered inf ormation, possessed information, personal charact eristics and dialog. • There is need to understand the weaknesses in ea ch of the class of authentication. • Passwords, possessed objects, and personal charac teristics all have a further weakness that the authe ntication information is reduced to a bit stream wh ich can be wiretapped.
  • 5. Boundary Controls Object Resources • In a generalized access control mechanism, all reso urces must be named since the mechanism must c ouple users with resources they are permitted to u se. • It is important that the access control mechanism h ave a means of identifying the authenticity of the o bject resources it provides to a user .e.g assigning object resources a unique identity that can not be copied.
  • 6. Boundary Controls Action Privileges • If a user has the permission to use a commodity, th e amount of the commodity that the user can cons ume must be specified. • The most complex action privileges relate to the us e of data resources • ADD, INSERT, APPEND,MODIFY file1 File2 file3 John Own Read Write Alice Read Own Read Write Read bob Read Write Read Own Read Write
  • 7. Boundary Controls Action privileges • Data independent – all the contents of a file ar e subject to the action privilege assigned to th e file • Data dependent – can apply to data items wit hin a file e.g salary < 15000
  • 8. Boundary Controls • One of the important restrictions on action privileg es is a temporal restriction e.g no access to the ter minal after working hours. Implementing an Access Control Mechanism • Full implementation of an ACM can be costly. In pr actise, some trade offs must be made; overall contr ol must be decreased to reduce costs and improve performance. • The tradeoffs made in the ACM must be reasonabl e, given the overall control requirements of the ins tallation
  • 9. Boundary Controls Problems in Implementing ACM (1)Open Vs Closed Environment • While an open environment allows for an easier im plementation of an ACM, only in a closed environm ent can effective control be exercised over users. (2)Approaches to Authorization • They are two approaches to implementing the aut horization module in an access control mechanism:
  • 10. Boundary Controls • A ticket oriented approach? • A list oriented approach? (3)Dynamics of Authorization • Some difficult implementation problems arise in th e area of authorization dynamics.
  • 11. Boundary Controls Cryptographic Controls • Cryptology is the science of secret codes • Cryptography deals with systems for translating dat a into codes that are meaningless to anyone who d oes not possess the system for recovering the initia l data. • Cryptanalysis are the techniques for recovering enc rypted data • Cipher is an algorithm for performing encryption o r decryption
  • 12. Boundary Controls Cryptographic Techniques They are three classes of techniques for enciphering plaintext: • Substitution ciphers • Transposition ciphers. • Product ciphers
  • 13. Boundary Controls Choosing a Cipher System • A cipher system has two components: algorithm an d the key • Five desirable properties of a cipher system: • High Work Factor • Small key • Simplicity • Low error propagation • Little expansion of message size.
  • 14. Boundary Controls Public Key Cryptosystems • Ensuring the secure distribution of a private key to parties who need the key is a difficult task. • The widely known public key cryptosystem is the R SA scheme. • The disadvantage of public key cryptosystems is th at they are slow relative to the processing time req uired for private-key cryptosystems.
  • 15. Boundary Controls Key Distribution • Maintaining the secrecy of the cryptographic key is of paramount importance. • The method chosen to distribute a key must be reli able; and maintain the secrecy of the keys thus mai ntaining overall secrecy of the cryptosystem. • Reminder: assignment diffie-hellman key exchange protocol
  • 16. Boundary Controls Explain Diffie-Hellman key exchange, El-gamal a nd RSA Algorithms.
  • 17. Boundary Controls Digital Signatures • Establishing the authenticity of individuals and pre venting the disavowal of messages and or contract s are still critical requirements when data is exchan ged in electronic form. • A digital signature is simply a string of 0s and 1s rat her than a line drawn on a page. • Public key cryptosystems can be used to establish: secret messages signed messages signed, secret messages.
  • 18. Boundary Controls Secret Message • S Pur(m) • R Prr[Pur(m)] Signed Secret Message • S Pur(m) • S Prs[Pur(m)] • R Pus (Prs[Pur(m)]) • R Prr[Pur(m)]