The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?



Similar documents
The Future of Cyber Security

The Science, Engineering, and Business of Cyber Security

Cyber Security Research: A Personal Perspective

The Future of Access Control: Attributes, Automation and Adaptation

Security Models: Past, Present and Future

Cyber Security: What You Need to Know

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Cyber Security: Past, Present and Future

How To Secure Cloud Computing

Bellevue University Cybersecurity Programs & Courses

The Science, Engineering, and Business of Cyber Security

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Cloud Security Who do you trust?

The Next Generation of Security Leaders

Introduction to Cyber Security / Information Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

THE BLUENOSE SECURITY FRAMEWORK

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Evaluate the Usability of Security Audits in Electronic Commerce

IQware's Approach to Software and IT security Issues

VeilMail Penetration Test Executive Summary PRESENTED TO: GREG ROAKE, CEO.TURNER TECHNOLOGIES LTD - VEILMAIL STEVE BYRNE, DIRECTOR.

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

White paper. Keys to SAP application acceleration: advances in delivery systems.

The Seven Deadly Myths of Software Security Busting the Myths

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

White Paper. Document Security and Compliance. April Enterprise Challenges and Opportunities. Comments or Questions?

Beyond the Hype: Advanced Persistent Threats

EXIN Cloud Computing Foundation

COSC 472 Network Security

Security Software Engineering: Do it the right way

Associate Prof. Dr. Victor Onomza Waziri

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

BM482E Introduction to Computer Security

Fundamentals of Network Security - Theory and Practice-

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Security Who do you trust?

Database Security, Virtualization and Cloud Computing

Passing PCI Compliance How to Address the Application Security Mandates

Module 1: Facilitated e-learning

Applying Cryptography as a Service to Mobile Applications

ISM/ISC Middleware Module

External Supplier Control Requirements

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

The Protection Mission a constant endeavor

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Weighted Total Mark. Weighted Exam Mark

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Database Security in Virtualization and Cloud Computing Environments

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Certified Information Systems Auditor (CISA)

Securing the Intelligent Network

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

A practical guide to IT security

Module 7 Security CS655! 7-1!

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Basics of Internet Security

Meeting the Challenges of Virtualization Security

Brainloop Cloud Security

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Tutorial 3. June 8, 2015

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Data Protection Act Guidance on the use of cloud computing

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

A Look at the New Converged Data Center

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006

future data and infrastructure

1.1.1 Introduction to Cloud Computing

Providing Data Protection as a Service in Cloud Computing

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:

Post-Class Quiz: Software Development Security Domain

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IBM EXAM QUESTIONS & ANSWERS

Cyber Security Competency Center

Cloud Computing Security Considerations

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Transcription:

Institute for Cyber Security The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21, 2011 ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu 1

Cyber security is all about trade-offs confidentiality integrity availablity usage privacy cost usability productivity Fundamental Premise Application context is necessary for trade- offs 2

Outline The ATM (Automatic Teller Machine) paradox Lessons from the Orange Book era Data security and privacy Application security The DASPY system challenge DASPY research thrusts 3

The ATM system is secure enough global in scope The ATM Paradox Not attainable via current cyber security science, engineering, doctrine not studied as a success story Similar paradoxes apply to on-line banking e-commerce payments 4

Why is the ATM System Secure? Monetary loss is easier to quantify and compensate than information loss Security principles stop loss mechanisms audit trail (including physical video) retail loss tolerance with recourse wholesale loss avoidance Technical surprises no asymmetric cryptography no annonymity 5

Why is the ATM System Secure? Monetary loss is easier to quantify and compensate than information loss Security principles stop loss mechanisms audit trail (including physical video) retail loss tolerance with recourse wholesale loss avoidance Technical surprises no asymmetric cryptography no annonymity Application Centric 6

Lessons from the Orange Book Era Our Basic Premise Security is fundamentally about tradeoffs There can be no security (no tradeoffs) without application context Orange Book/Rainbow Series (1983-94) Security is all about high assurance Application context makes high assurance security impossible to achieve 7

Rainbow Series 34 titles listed in Wikipedia as the most significant Rainbow series books Only 1 addresses applications Trusted Database Interpretation (TDI) Scope: Trusted Applications in general and database management system in particular 8

The Polyinstantiation Debate Software Architect Alice Alice Bob Project % Time Label Win7 25% U SecureWin7 75% S Vista 100% U What precisely is Secret? There exists a SecureVista project Alice works on SecureVista Alice s effort on SecureVista is 75% All or some of the above How do we maintain integrity of the database? Depends Much work and $$$ by researchers and vendors, late 80 s-early 90 s

Data Security and Privacy Familiar term used for over 3 decades Fundamental problems identified in the first decade continue to dominate covert channels inference and aggregation homomorphic encryption The general understanding of the term data security and privacy is probably not significantly changed since these early days, although of course in the details and nuances there have been considerable advances. 10

Has come into use relatively recently Remains amorphous Application Security The How interpretation: (currently prevalent in industry) scanning for software vulnerabilities such as buffer overflow run time application firewalls to prevent/detect application layer attacks The What interpretation: (the bigger challenge) security policy and trade-offs in existing applications such as on-line banking: relatively straightforward and relatively well understood security policy and trade-offs in newer applications such as social networks, secure information sharing, smart grid, secure data provenance, location-based services, electronic helath records: much fuzzier, less familiar and a major challenge to understand 11

The DASPY System Challenge Wisdom from the past: Generally, security is a system problem. That is, it is rare to find that a single security mechanism or procedure is used in isolation. Instead, several different elements working together usually compose a security system to protect something. R. Gaines and N. Shapiro 1978. The DASPY system challenge is how to develop a systems perspective on DASPY 12

The DASPY System Challenge P E I M O D E L S Security and system goals (objectives/policy) Policy models Enforcement models Implementation models Concrete System Necessarily informal Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting. Security analysis (objectives, properties, etc.). Approximated policy realized using system architecture with trusted servers, protocols, etc. Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.). Technologies such as Cloud Computing, Trusted Computing, etc. Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.) Software and Hardware 13

DASPY Research Thrusts Continue to pursue point solutions for various problems in data security and privacy. Continue to pursue solutions on the how aspect of application security. Embark on research to understand the what elements of application security. There are some excellent examples already but this thrust needs further and explicit encouragement. Embark on research to address the DASPY system challenge. Today this is largely ignored. 14

Summary The ATM (Automatic Teller Machine) paradox Lessons from the Orange Book era Data security and privacy Application security The DASPY system challenge DASPY research thrusts 15