Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements
|
|
|
- August Harris
- 10 years ago
- Views:
Transcription
1 Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object Computing for Real-time and Embedded Systems July 9-12, Arlington, VA, USA
2 The Need for Information Assurance (IA) within DDS 1 Data-Centric Publish/Subscribe middleware, most notably the Data Distribution Service for Real-time Systems (DDS), heavily used for systems of highest criticality DDS used for distribution (and storage) of classified information Information to be distributed within a system or a system-of-systems potentially of different classification Distribution over untrusted networks (network segments) Distribution middleware (DDS, CORBA, etc.) is the architectural layer in a distributed systems architecture at which application-level security policies can be defined and enforced, yet with generic, non-application-specific mechanisms/technology DDS-based information backbone is (more trustworthy) infrastructure, in contrast to (less trusted) application code
3 Constraints and Requirements on IA in Typical Application Environments of Data-Centric Pub/Sub 2 DDS is the Data Distribution Service for Real-time Systems, i.e. required are: Minimum latency Minimum latency implementation of access control Minimum use of cryptography Efficient use of cryptography (minimization of encryption/decryption operation) Using cryptography in modes with minimum latency No unnecessary use of public-key cryptography Non-blocking generation of security audit information Minimum jitter No blocking hand-shake protocols No centralized access decision function servers DDS is pub/sub for multi-node systems Full support for multicast needed, no peer-to-peer (hub-and-spoke) approaches as usually used for internet security (like SSL for transport-level communication security) Architecture support for RED/BLACK separation (nodes potentially connected via untrusted networks) Plug-in / replaceability of crypto algorithms/software/hardware High IA: Support for formally proven security policies and models
4 Proven Security Policies and Models for High IA 3 Traditionally (especially in Defense), focus of security policies for high-ia environments on confidentiality of information Implementing multilevel security for IT (security [secrecy] levels, compartments [need-to-know]) Controlling the information flow (containment of Trojan horse effects, covert channel suppression, RED/BLACK separation...) Cornerstone: Bell-LaPadula Confidentiality Model Nowadays, especially with the processing of real-time control information, the integrity of the information has become equally important. Model with proven foundation: Biba Integrity Model (sibling of Bell-LaPadula model) Information assurance (IA) MUST be supported/enabled by the appropriate technology Security Services Availability Integrity Transmission Storage Processing Information States Authentication Confidentiality Extended McCumber Model (chosen by the IA group in the NCOIC as the reference model for their work on the IA Design Framework) Nonrepudiation Technology Policy & Practice People Security Countermeasures
5 Security Policy and Models briefly reminded 4 Military Security Policy: Each piece of information is ranked at a particular sensitivity level, such as unclassified, restricted, confidential, secret, or top secret. Each piece of classified information (information object, or object for short) is associated to one or more compartments which represent the subject matter of the information. The combination rank; compartments is the classification (C) of a piece of information. An entity (traditionally a person) that wants to access a piece of classified information must be cleared. A clearance (C) is an indication that an entity (a subject, traditionally a person) is trusted to access information up to a certain level of sensitivity and that this subject needs to know certain categories of information. Also the clearance of a subject has the form rank; compartments. A subject dominates an object, meaning the subject can read the information object if and only if (i) the rank of the subject is at least as high as the rank of the subject (rank object rank subject ), AND (ii) the subject has a need to know about all compartments for which the object is classified (compartments object compartments subject ). Bell-LaPadula Confidentiality Model: Two properties characterize the secure flow of information (i.e., the enforcement of the military security policy): Security Property: A subject may have read access to an object only if the subject dominates the object, i.e., C subject C object *- Property : A subject s that has read access to an object o may have write access to an object p only if C p C o Biba Integrity Model: In the Biba model, two properties guarantee the integrity of the information in the system: Simple Integrity Property: A subject can modify (have write access to) an object only if I subject I object Integrity *-Property: If a subject s has read access to an object o with integrity level I o, s can have write access to an object p only if I o I p
6 Building Distributed Application Systems Based on Data-Centric Pub/Sub Middleware what does it mean for IA? 5 Proven security policies and models for high IA are data-centric The underlying interaction model for distributed applications systems based on data-centric publish/subscribe middleware also is data-centric (in contrast to object-oriented or service oriented distribution middleware like CORBA or SOAP/WSDL) The software architecture, named SPLICE, that we developed for distributed embedded systems basically consists of two types of components: applications and a shared data space. Applications are active, concurrently executing processes that each implement part of the system s overall functionality. Besides process creation, there is no direct interaction between applications; all communication takes place through a logically shared data space simply by reading and writing data elements. [1] MAC read access [1] M. Boasson and E. de Jong. Software Architecture for Large Embedded Systems. In Proc. of the IEEE. RTSS 97 Workshop on Middleware for Distributed Real-Time Software Systems, San Francisco, CA, Dec write access Implementing Data-Centric Applications: Data-centric applications can be implemented using the precepts of dataoriented programming. In general, the tenets of data-oriented programming include the following principles: (i) Expose the data. Ensure that the data is visible throughout the entire system... [2] [2] G. Pardo-Castellote and S. Oberoi. A Data- Centric Approach to Distributed Application Architecture. White paper. March Direct applicability of proven security policies and models (interaction model: common access of all applications to a replicated database) if the information backbone (replicated database) is implemented as a trusted infrastructure that enforces mandatory access control (MAC), i.e. is an IA-enabled information backbone
7 The DDS-based IA-enabled Information Backbone for Building Secure Distributed Application Systems 6 Application 1 App.2 App.3 App.4 App.5 DP 1a DP 1b DP 2 DP 3 DP 4 DP 5 Global Data Space (GDS) A Global Data Space is made accessible to applications through an DDS-based information backbone. The IA-enabled backbone enforces security controls on the (global) distribution (replication) of the data within the Global Data Space and on the access to the (local) replicas. local replica/part of GDS node 1 local replica/part of GDS node 2 local replica/part of GDS intelligent replication node 3 inter-node enforcement of global security policy The IA-enabled information backbone covers the technology part of the five pillars of IA: Availability Integrity Authentication Confidentiality Non-repudiation local (intra-node) enforcement of global security policy
8 The Pieces of the Puzzle 7 What is the scope of a security policy and model? What is the scope of a single security administration (what is the security domain / trust domain)? The DDS Domain What are the (identifiable) principals (that can be authenticated) in the security domain? The applications, resp. the registered userids (human or system) that the applications run for (like processes in Unix) What are the objects to which access control is to be enforced in a DDS-based information backbone (global data space)? ClassifiedDataPartitions and ClassifiedDataTopics What are the subjects that access these objects and that act for a principal (with the principals privileges)? The Domain Participants What about nodes of varying trustworthiness? All nodes are under the same security administration and governed by the same security policy and model. However, the level up to which a node can be trusted to handle classified information appropriately may vary (due to hardware, operating system, physical exposure etc.). Nodes get assigned max. security levels. Inter-node security enforcement prevents distribution (replication) of higher-classified information to lesser classified nodes.
9 The Pieces of the Puzzle (cont.): Clearances & Classifications 8 Security attributes (clearance) of a subject (Domain Participant, inherited from userid): Secrecy level Integrity level Set of Compartments (all assigned by the security administration) Security attributes (classification) of ClassifiedDataPartition (object): Secrecy level Integrity level Set of Compartments (all assigned by the security administration) Security attributes (classification) of ClassifiedDataTopic (object): assignment to an (already existing) ClassifiedDataPartition (assigned by the security administration) Security attributes (classification) of node: max. Secrecy level max. Integrity level Set of Compartments (all assigned by the security administration)
10 Mandatory Security Policy and Models looked at again 9 Military Security Policy: Each piece of information is ranked at a particular sensitivity level, such as unclassified, restricted, confidential, secret, or top secret. Each piece of classified information (information object, or object for short) is associated to one or more compartments which represent the subject matter of the information. The combination rank; compartments is the classification (C) of a piece of information. An entity (traditionally a person) that wants to access a piece of classified information must be cleared. A clearance (C) is an indication that an entity (a subject, traditionally a person) is trusted to access information up to a certain level of sensitivity and that this subject needs to know certain categories of information. Also the clearance of a subject has the form rank; compartments. A subject dominates an object, meaning the subject can read the information object if and only if (i) the rank of the subject is at least as high as the rank of the subject (rank object rank subject ), AND (ii) the subject has a need to know about all compartments for which the object is classified (compartments object compartments subject ). Bell-LaPadula Confidentiality Model: Two properties characterize the secure flow of information (i.e., the enforcement of the military security policy): Security Property: A subject may have read access to an object only if the subject dominates the object, i.e., C subject C object *- Property : A subject s that has read access to an object o may have write access to an object p only if C p C o Biba Integrity Model: In the Biba model, two properties guarantee the integrity of the information in the system: Simple Integrity Property: A subject can modify (have write access to) an object only if I subject I object Integrity *-Property: If a subject s has read access to an object o with integrity level I o, s can have write access to an object p only if I o I p
11 Security Model Activation 10 The Bell-LaPadula *- Property can be deactivated for single applications (trusted applications, MLS applications) The Biba Integrity *- Property can be deactivated for single applications (trusted applications, MLS applications)
12 End-to-end Security / Inter-node Security 11 Application 1 App.2 App.3 App.4 App.5 End-to-end security = intranode security + inter-node security DP 1a DP 1b DP 2 DP 3 DP 4 DP 5 local replica/part of GDS node 1 Global Data Space (GDS) local replica/part of GDS node 2 local replica/part of GDS intelligent replication node 3 Inter-node security includes preservation of confidentiality and integrity of information communicated over unsecure networks labeling of differently classified information cryptographic of differently classified information RED/BLACK separation at the node/network boundary by means of a dedicated network process inter-node enforcement of global security policy local (intra-node) enforcement of global security policy
13 Summary / Q&A 12 Most application environments for Data-centric Pub/Sub require the integration and support of proven security models (Bell-LaPadula etc.) by the information distribution backbone Data-centric way to build distributed application systems very suitable for the implementation of such models End-to-end security = intra-node security + inter-node security Proposed mapping of DDS entities to subjects and objects of established security models: ClassifiedDataPartitions as objects (ClassifiedDataTopics as specialization) Domain Participants as subjects Applications as principals
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
Secure Networking Configuration
Secure Networking Configuration Release 6.x Contents 1 Preface 1 1.1 About The Secure Networking Configuration Guide........................ 1 1.2 Intended Audience..........................................
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Part III. Access Control Fundamentals
Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
DDS and SOA Interfaces to ESB
DDS and SOA Interfaces to ESB NCOIC Plenary, VA Beach 29 Mar 2007 Joe Schlesselman NCOIC OS&P WG Chair [email protected] www.rti.com Gerardo Pardo-Castellote CTO & Co-Author DDS Specification [email protected]
What is a secret? Ruth Nelson
What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011
A Data Centric Approach for Modular Assurance The Real-Time Middleware Experts Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 Gabriela F. Ciocarlie Heidi Schubert
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Security and privacy for multimedia database management systems
Multimed Tools Appl (2007) 33:13 29 DOI 10.1007/s11042-006-0096-1 Security and privacy for multimedia database management systems Bhavani Thuraisingham Published online: 1 March 2007 # Springer Science
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module
CS 665: Computer System Security Designing Trusted Operating Systems Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Trusted? An operating system is
Access Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Integrated Development of Distributed Real-Time Applications with Asynchronous Communication
Integrated Development of Distributed Real-Time Applications with Asynchronous Communication Marc Schanne International Workshop on Java Technologies for Real-time and Embedded Systems (JTRES) 26-28 September
TRANSMAT Trusted Operations for Untrusted Database Applications
TRANSMAT Trusted Operations for Untrusted Database s Dan Thomsen Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113, USA email: [email protected] Abstract This paper presents a technique
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Secure Managed File Transfer with Connect:Direct
Secure Managed File Transfer with Connect:Direct Mike Watley Advisory Software Engineer IBM Software Group Industry Solutions August 16, 2013 Session 13423 Agenda What is Secure Plus? What are the components
Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152
Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD
Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21
Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed
Session objectives. Access control. Subjects and objects. The request. Information Security
The session Session objectives Access Control Information Security Dr Hans Georg Schaathun Introduce fundamental terminology of access control Understand principles of privilege management and identity
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Security Implications of Distributed Database Management System Models
Security Implications of Distributed Database Management System Models 1 * Dr.C.Sunil Kumar, 2 J.Seetha, 3 S.R.Vinotha 1,2,3 Anna University, Chennai, India E-mail: 1 [email protected], 2 [email protected],
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
Enterprise Security Architecture Concepts and Practice
Enterprise Architecture Concepts and Practice Jim Whitmore [email protected] Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
Using DDS to Enable The Real-Time Enterprise Service Bus (RT-ESB)
Using DDS to Enable The Real-Time Enterprise Service Bus (RT-ESB) Rajive Joshi, Ph. D. Gerardo Pardo-Castellote, Ph.D. Real-Time Innovations, Inc OMG Real-time and Embedded Systems Workshop Arlington,
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Committee on National Security Systems
Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a
Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus
Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Identity Management and Access Control
and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
UML Profile for DDS. a tutorial for OMG Specification in Government Workshop (Real-Time & Embedded Systems) July 13, 2009
UML Profile for DDS a tutorial for OMG Specification in Government Workshop (Real-Time & Embedded Systems) July 13, 2009 Prepared by: Sam Mancarella (Sparx Systems) Presented by: Angelo Corsaro (PrismTech)
EECatalog SPECIAL FEATURE
Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that
CSCI 454/554 Computer and Network Security. Final Exam Review
CSCI 454/554 Computer and Network Security Final Exam Review Topics covered by Final Topic before Midterm 20% Topic after Midterm 80% Date: 05/13/2015 9:00am noon Place: the same classroom Open book/notes
VALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202
Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions
Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions z September 2011 Table of Contents EXECUTIVE SUMMARY... 3 CYBER-ARK
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
Network Security. A Quick Overview. Joshua Hill [email protected] http://www.untruth.org
Network Security A Quick Overview Joshua Hill [email protected] http://www.untruth.org Security Engineering What is Security Engineering? "Security Engineering is about building systems to remain dependable
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
A Structured Approach to Computer Security *
1 A Structured Approach to Computer Security * Tomas Olovsson Department of Computer Engineering Chalmers University of Technology S-412 96 Gothenburg SWEDEN Technical Report No 122, 1992 ABSTRACT Security
Commercial Practices in IA Testing Panel
Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation Panel Members! Dr.
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
2009-2010. SSL Firewalls
& 2009-2010 & ( ) SSL Firewalls :. :.. byte 0x01 : 1,. 1 , :,, : ( ) ). : : (Confidentiality) (Integrity) (Availability) :.,,. :. :...,,. :,,. 2 (Identification) (Authentication).,,, )... (Authorization)
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
