Case Study: A Forensic Lesson for Web Security (MSS, part one)
Download
Report
Transcript Case Study: A Forensic Lesson for Web Security (MSS, part one)
Overview of Security & Java
(based on GS: Ch. 1)
csci5233 Computer Security &
Integrity
1
Security Goals for Application Development
1.
2.
3.
Protect sensitive data
Control access to resources
Log activity
c.f., Five security goals:
authenticity, confidentiality, integrity, availability,
and non-repudiatibility
Q: Compare the three goals in this chapter
with the five goals above.
csci5233 Computer Security &
Integrity
2
Security Policy
An explicit statement of what actions are and are
not allowed within an organization.
Acceptable use of corporate resources
Remote access policy
User privileges, …
It helps to define the limits of what your
application needs to protect against.
It helps to identify the important resources.
It is guided by the business needs, rules, and
related laws (example: HIPAA - Health Insurance
Portability and Accountability Act of 1996)
csci5233 Computer Security &
Integrity
3
Analysis of Security Requirements
Security requirements of an application is
affected by the organization’s security policy. It
is usually a compromise.
Two areas need to be carefully examined:
A. Risk Assessment
B.
Cost of data loss or exposure
“Worthiness” of data
Value of the application
Cost of unauthorized use of the application
Where is the weakest link?
…
Data Exposure
csci5233 Computer Security &
Integrity
4
Analysis of Security Requirements
B.
Data Exposure
Identify the types of vulnerability: When, where, how
and by whom would the data be most likely be exposed?
Which of the vulnerability are most in need of
strengthening (per the security policy)?
Two major types of vulnerability:
1. People
External
Internal
Roles
2. Vulnerability points
Potential points of vulnerability in the system,
where data are access, transmitted, stored, etc.
csci5233 Computer Security &
Integrity
5
Analysis of Security Requirements
An example of security requirements analysis
Design of a Network Security Testing
Environment (a draft)
http://sce.cl.uh.edu/yang/research/NetworkSecurityTestingEnviro
nment.pdf
csci5233 Computer Security &
Integrity
6
Analysis of Security Requirements
Usability of the system should be integrated into
the security requirements.
Ideally, the enforcement of the security
requirements should be “transparent” to the end
users.
Achieving a successful balance between
usability and security of a system is one of the
hardest parts of creating a secure system.
csci5233 Computer Security &
Integrity
7
Analysis of Security Requirements
Contingency plans
How would the organization respond to
security breaches?
How about violation of privacy?
Violation of copyright?
csci5233 Computer Security &
Integrity
8
Implementation of Security
Security technologies & tools
The OS
IP security
VPN (virtual private networks)
Firewalls
ID (intrusion detection) tools & systems
Java security features and tools
o Java language features (Ch. 2)
o Byte code verifier
o Class loader
o Java cryptography (JCA, JCE: Ch. 3)
csci5233 Computer Security &
Integrity
9