Security (Datensicherheit)

Slides:



Advertisements
Ähnliche Präsentationen
Cadastre for the 21st Century – The German Way
Advertisements

Developing your Business to Success We are looking for business partners. Enterprise Content Management with OS|ECM Version 6.
E-Solutions mySchoeller.com for Felix Schoeller Imaging
H - A - M - L - E - IC T Teachers Acting Patterns while Teaching with New Media in the Subjects German, Mathematics and Computer Science Prof. S. Blömeke,
Vorlesung: 1 Betriebliche Informationssysteme 2003 Prof. Dr. G. Hellberg Studiengang Informatik FHDW Vorlesung: Betriebliche Informationssysteme Teil3.
R. Zankl – Ch. Oelschlegel – M. Schüler – M. Karg – H. Obermayer R. Gottanka – F. Rösch – P. Keidler – A. Spangler th Expert Meeting Business.
Dr. M. Schlottke Common Description of Web Services Source: P. Gerbert, 2002 Web Services allow to establish B2B e-commerce on the fly Web Services allow.
Multi electron atoms Atoms with Z>1 contain >1 electron. This changes the atomic structure considerably because in addition to the electron-nucleus interaction,
Fakultät für informatik informatik 12 technische universität dortmund Optimizations Peter Marwedel TU Dortmund Informatik 12 Germany 2009/01/17 Graphics:
Fakultät für informatik informatik 12 technische universität dortmund Specifications Peter Marwedel TU Dortmund, Informatik 12 Graphics: © Alexandra Nolte,
Peter Marwedel TU Dortmund, Informatik 12
Fakultät für informatik informatik 12 technische universität dortmund Hardware/Software Partitioning Peter Marwedel Informatik 12 TU Dortmund Germany Chapter.
1 JIM-Studie 2010 Jugend, Information, (Multi-)Media Landesanstalt für Kommunikation Baden-Württemberg (LFK) Landeszentrale für Medien und Kommunikation.
Projektübung Klimamodellierung André Paul. Vorbesprechung Projektübung Klimamodellierung ( ) – A. Paul.
Vorlesung: 1 Betriebliche Informationssysteme 2003 Prof. Dr. G. Hellberg Studiengang Informatik FHDW Vorlesung: Betriebliche Informationssysteme Teil2.
Thomas Herrmann Software - Ergonomie bei interaktiven Medien Step 6: Ein/ Ausgabe Instrumente (Device-based controls) Trackball. Joystick.
Munz – IT/TG - Lörrach. Goals of this intensive lecture To learn: To learn: –What does it means programming in Java ? –What is JAVA good/bad for ? –Which.
CCNA Exploration Network Fundamentals
Deutsche Gesellschaft für Technische Zusammenarbeit GmbH Integrated Experts as interface between technical cooperation and the private sector – An Example.
This presentation is timed so you will only need to click on the left mouse button when it is time to move to the next slide. Right click on this screen.
virtPresenter „lecture recording framework“
Die Hausaufgaben: Machen Sie Ü. 7 auf S. 29
20:00.
Die Geschichte von Rudi
Zu + Infinitiv : eine Erklärung
Question words and word order By the end of this lesson you will have revised question words By the end of this lesson you will be able to use question.
Laurie Clarcq The purpose of language, used in communication, is to create a picture in the mind and/or the heart of another.
Die Zeit (TIME) Germans are on military time which is 1-24
Institut AIFB, Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 Towards Automatic Composition of Processes based on Semantic.
Sanjay Patil Standards Architect – SAP AG April 2008
| DC-IAP/SVC3 | © Bosch Rexroth Pneumatics GmbH This document, as well as the data, specifications and other information set forth in.
Centre for Public Administration Research E-Government for European Cities Thomas Prorok
BAS5SE | Fachhochschule Hagenberg | Daniel Khan | S SPR5 MVC Plugin Development SPR6P.
1 Ein kurzer Sprung in die tiefe Vergangenheit der Erde.
9/23-9/27 AGENDAS & NOTES Week RMS Glöckner (Translate): Wie heisst du? Wie heissen Sie? Wie alt bist du? Ich bin Ursula. Er ist Brian. Hausaufgaben.
Wortschatz angenehm comfortable anstrengend tiring ausgezeichnet outstanding bequem comfortable berühmt famous besser better blöd stupid einfach easy fantastisch.
Neno Loje Berater & MVP für Visual Studio ALM und TFS (ehemals VSTS) Hochqualitative Produkte mit Visual Studio & TFS 2010.
You need to use your mouse to see this presentation © Heidi Behrens.
Department of Computer Science Homepage HTML Preprocessor Perl Database Revision Control System © 1998, Leonhard Jaschke, Institut für Wissenschaftliches.
Wortschatz der Schulhof the playground die Aula the hall
INTAKT- Interkulturelle Berufsfelderkundungen als ausbildungsbezogene Lerneinheiten in berufsqualifizierenden Auslandspraktika DE/10/LLP-LdV/TOI/
XML IV: Cocoon 2.
Verben Wiederholung Deutsch III Notizen.
Tage der Woche German Early Level Montag Dienstag Mittwoch Donnerstag
Staatsballett Berlin Ein Verbesserungskonzept für den Social- Media Auftritt Your picture here.
PROCAM Score Alter (Jahre)
Berner Fachhochschule Hochschule für Agrar-, Forst- und Lebensmittelwissenschaften HAFL Recent activities on ammonia emissions: Emission inventory Rindvieh.
Ein Projekt des Technischen Jugendfreizeit- und Bildungsvereins (tjfbv) e.V. kommunizieren.de Blended Learning for people with disabilities.
Symmetrische Blockchiffren DES – der Data Encryption Standard
Design Patterns Ein Muster (pattern) ist eine Idee, die sich in einem praktischen Kontext als nützlich erwiesen hat und dies auch in anderen sein wird.
By: Jade Bowerman. German numbers are quite a bit like our own. You start with one through ten and then you add 20, 30, 40 or 50 to them. For time you.
MINDREADER Ein magisch - interaktives Erlebnis mit ENZO PAOLO
1 (C)2006, Hermann Knoll, HTW Chur, FHO Quadratische Reste Definitionen: Quadratischer Rest Quadratwurzel Anwendungen.
Negation is when you dont have or dont do something.
Adjectiv Endungen Lite: Adjective following articles and pre-ceeding nouns. Colors and Clothes.
Sentence Structure Subject and verb are always together. Subject and verb are always together. Subject and verb must agree Subject and verb must agree.
German Word Order explained!
Separable Verbs Turn to page R22 in your German One Book R22 is in the back of the book There are examples at the top of the page.
1 Intern | ST-IN/PRM-EU | | © Robert Bosch GmbH Alle Rechte vorbehalten, auch bzgl. jeder Verfügung, Verwertung, Reproduktion, Bearbeitung,
Dyabola Archäologische Bibliographie Römisch-Germanischen Kommission (RGK) Author searches – compound names Bibliotheken Click = next Libraries.
Launch ON Global.vi System ID object name classname Services to suscribe Observer Control Ref vi-path Service name Step 1 : Objects register to the Global.vi´s,
1 Stevens Direct Scaling Methods and the Uniqueness Problem: Empirical Evaluation of an Axiom fundamental to Interval Scale Level.
Technische Universität München 1 CADUI' June FUNDP Namur G B I The FUSE-System: an Integrated User Interface Design Environment Frank Lonczewski.
TUM in CrossGrid Role and Contribution Fakultät für Informatik der Technischen Universität München Informatik X: Rechnertechnik und Rechnerorganisation.
Instrumente und Unterhaltung End of Unit Assessment.
By Martin L. Loeffler.  The basic sentence has a subject and a verb.  The subject and verb need to be together.  The subject and verb need to agree.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Modalverben.
Numbers Greetings and Good-byes All about Me Verbs and Pronouns
1 Medienpädagogischer Forschungsverbund Südwest KIM-Studie 2014 Landesanstalt für Kommunikation Baden-Württemberg (LFK) Landeszentrale für Medien und Kommunikation.
Creating Web Documents
 Präsentation transkript:

Security (Datensicherheit) Chapter 9 Security (Datensicherheit) 9.1 The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from outside the system 9.6 Protection mechanisms 9.7 Trusted systems

Ziele und Bedrohungen Bedrohungen Ziele Vertraulichkeit Integrität Höhere Gewalt Feuer, Wasser, Blitz, Naturkatastrophen, Krankheit Organisatorische Mängel Fehlende Regelungen und Betriebsmittel Fehlhandlungen Unbewußte Passwortpreisgabe, Unbeabsichtigte Beschädigungen Technisches Versagen Ausfälle Fehlverbindungen Softwarefehler, Schwachstellen Verdeckte Kanäle Vorsätzliche Handlungen Ziele Vertraulichkeit Integrität Verfügbarkeit Verbindlichkeit Anonymität Authentizität Zugriffsbeschränkung Dienste, Mechanismen und Management

Bedrohungen Vorsätzliche Handlungen Klassische Delikte Diebstahl, Einbruch, Vandalismus, Sabotage (neu: gestohlene Laptops) Klassische Spionage Abhören, Ausspähen (neu: IT-Industriespionage) IT - und Netz - Intrusions Manipulation, Sabotage Auftragsüberflutung Abhören, Ressourcen-Zugriffe Flußanalyse Zugriffe auf verdeckte Kanäle Paßwortausspähen Kryptoanalyse Maskerade Viren, Bomben, Trojanische Pferde, Würmer, Hintertüren

Bedrohungen Angriffsmuster Host-Angriff Netz-Angriff Ansatzpunkte An Nutzer-Stelle treten Schwachstellen ausnutzen Planung und Administration Kontroll-Lücken schwache Kontrolle Software und Protokolle Entwurfsfehler Programmierfehler Bombe Hintertür benutzte Dienste DNS Authentifikation Zugang / Zugriff erzwingen Einbruch / Diebstahl Anzapfen Fortpflanzung im Netz Angriffsmuster Host-Angriff Aushorchen und Ausspähen Maskerade Einschleusen von Angriffs-SW Abhören / Auslesen / Manipulation von BM und BS Zerstörung Netz-Angriff Erkundung Abhören / Abfangen / Einspielen Maskerade / Spoofing Wiedereinspielen / Replay Ersetzen von Komponenten und Diensten Stören von Komponenten Last-Erzeugung Nutzer Host Anwendung System Router System Dienst

Angriffssoftware Quellen Dokumente / Programme per Datenträger Download E-Mail-Anhang Aktive WWW-Inhalte Fern-Administration Wirkungen Bombe Hintertür Trojanisches Pferd Stützpunkt Fortpflanzung im Host: Virus im Netz: Wurm

Angriffswerkzeuge Scanner Ports und Systeme Verzeichnisse Sniffer Tools im WWW abrufbar Hacker-Knowhow für alle Automatisierung Scanner Ports und Systeme Verzeichnisse Sniffer IP-Pakete, TCP-Verbindungen Sitzungen Attack Raten und Probieren Schwachstellen-Angriffe (z.B. Sendmail Puffer-Überlauf) Produkt-Angriffe (z.B. Hacking Novell Netware) Verteilte DoS-Angriffe Support Passwort-Cracker Passwort-Listen Hacker-Informationssysteme Potentieller Angreifer Ziel Anwendung System

Maßnahmen Personal Qualifikation geregelte Übergaben und Zuständigkeiten Vertrauenswürdigkeit Notfallvorsorge Regelungen, Übungen Ersatz, Ersatzvereinbarungen Aufbewahrung Maßnahmen in Hard-, Software und Kommunikationseinrichtungen Infrastruktur Gebäudetechnik, Lagerung und Versorgung Organisation Verfahren und Regelungen Zuständigkeiten und Aufgaben Beratung, Betreuung, Kontrolle Dokumentation Bequemlichkeit und Nachlässigkeit Automatisierung und Zwang Datenschutz und Betriebsverfassung

Sicherheitsdienste Authentifikationsdienste Autorisierungsdienste Vertraulichkeitsschutzdienste Integritätsdienste Verfügbarkeitsschutzdienste Verbindlichkeitsdienste Signaturzertifizierungs- und Auskunftsdienste Zahlungsdienste Produktzertifizierungsdienste Mehrseitige Sicherheit Nutzer Arbeitgeber Geschäftspartner Kunden TK-Provider Produktlieferant Staat Gesellschaft ……

Sicherheitsmechanismen Systembeobachtung und Prüfung Schwachstellenermittlung Zugangs-, Zugriffs- und Verkehrskontrolle Ausweisfunktionen Proaktive Systemänderungen z.B. Passwortwechsel Vertrauenswürdige 3. Parteien Kryptosysteme Zahlungssysteme Leistungsbeschränkungen Redundanz Server, Kommunikation Speicher, Daten, Backup Vernebeln und Ablenken Sichere Kommunikationsprotokolle Authentifikations- und Schlüsselverteilprotokolle Sicherheitsklassifikation und Produktzertifizierung Spezialhardware Logplatten, Chipkarten, Kryptoboxen

Schutz Schutz-Systeme Planung und Administration Schwachstellen-Analysatoren Kontrolldienste Autorisierung und Authentifikation Inhaltsfilterung und Prüfung Virenscanner Verkehrsfilter Firewalls Abschottung Kryptokanäle, Tunnels VPNs Überwachung Intrusion Detection Systeme Fallstrick- und Teergruben-Systeme Planung und Administration Enger Spielraum Zugangskontrolle Zugriffskontrolle Authentifikation Verkehrskontrolle Überwachung Monitoring Logs und Audits Schwachstellen-Analyse Systempflege

Basics of Cryptography Relationship between the plaintext and the ciphertext

Secret-Key Cryptography Monoalphabetic substitution each letter replaced by different letter Given the encryption key, easy to find decryption key Secret-key crypto called symmetric-key crypto

Public-Key Cryptography All users pick a public key/private key pair publish the public key private key not published Public key is the encryption key private key is the decryption key

One-Way Functions Function such that given formula for f(x) easy to evaluate y = f(x) But given y computationally infeasible to find x

Digital Signatures Computing a signature block What the receiver gets

User Authentication Basic Principles. Authentication must identify: Something the user knows Something the user has Something the user is This is done before user can use the system

Authentication Using Passwords (a) A successful login (b) Login rejected after name entered (c) Login rejected after name and password typed

Authentication Using Passwords How a cracker broke into LBL a U.S. Dept. of Energy research lab

Authentication Using Passwords , , , , Password Salt The use of salt to defeat precomputation of encrypted passwords

Authentication Using a Physical Object Magnetic cards magnetic stripe cards chip cards: stored value cards, smart cards

Authentication Using Biometrics A device for measuring finger length.

Countermeasures Limiting times when someone can log in Automatic callback at number prespecified Limited number of login tries A database of all logins Simple login name/password as a trap security personnel notified when attacker bites

Operating System Security Trojan Horses Free program made available to unsuspecting user Actually contains code to do harm Place altered version of utility program on victim's computer trick user into running that program

Login Spoofing (a) Correct login screen (b) Phony login screen

Logic Bombs Company programmer writes program potential to do harm OK as long as he/she enters password daily ff programmer fired, no password and bomb explodes

Trap Doors (a) Normal code. (b) Code with a trapdoor inserted

Buffer Overflow (a) Situation when main program is running (b) After program A called (c) Buffer overflow shown in gray

Generic Security Attacks Typical attacks Request memory, disk space, tapes and just read Try illegal system calls Start a login and hit DEL, RUBOUT, or BREAK Try modifying complex OS structures Try to do specified DO NOTs Convince a system programmer to add a trap door Beg admin's sec’y to help a poor user who forgot password

The TENEX – password problem Famous Security Flaws (a) (b) (c) The TENEX – password problem

Design Principles for Security System design should be public Default should be n access Check for current authority Give each process least privilege possible Protection mechanism should be simple uniform in lowest layers of system Scheme should be psychologically acceptable And … keep it simple

Network Security External threat Goals of virus writer code transmitted to target machine code executed there, doing damage Goals of virus writer quickly spreading virus difficult to detect hard to get rid of Virus = program can reproduce itself attach its code to another program additionally, do harm

Virus Damage Scenarios Blackmail Denial of service as long as virus runs Permanently damage hardware Target a competitor's computer do harm espionage Intra-corporate dirty tricks sabotage another corporate officer's files

How Viruses Work (1) Virus written in assembly language Inserted into another program use tool called a “dropper” Virus dormant until program executed then infects other programs eventually executes its “payload”

How Viruses Work (2) Recursive procedure that finds executable files on a UNIX system Virus could infect them all

How Viruses Work (3) An executable program With a virus at the front With the virus at the end With a virus spread over free space within program

How Viruses Work (4) After virus has captured interrupt, trap vectors After OS has retaken printer interrupt vector After virus has noticed loss of printer interrupt vector and recaptured it

How Viruses Spread Virus placed where likely to be copied When copied infects programs on hard drive, floppy may try to spread over LAN Attach to innocent looking email when it runs, use mailing list to replicate

Antivirus and Anti-Antivirus Techniques (a) A program (b) Infected program (c) Compressed infected program (d) Encrypted virus (e) Compressed virus with encrypted compression code

Antivirus and Anti-Antivirus Techniques Examples of a polymorphic virus All of these examples do the same thing

Antivirus and Anti-Antivirus Techniques Integrity checkers Behavioral checkers Virus avoidance good OS install only shrink-wrapped software use antivirus software do not click on attachments to email frequent backups Recovery from virus attack halt computer, reboot from safe disk, run antivirus

The Internet Worm Consisted of two programs bootstrap to upload worm the worm itself Worm first hid its existence Next replicated itself on new machines

Mobile Code (1) Sandboxing (a) Memory divided into 1-MB sandboxes (b) One way of checking an instruction for validity

Applets can be interpreted by a Web browser Mobile Code (2) Applets can be interpreted by a Web browser

Mobile Code (3) How code signing works

Java Security (1) A type safe language Checks include … compiler rejects attempts to misuse variable Checks include … Attempts to forge pointers Violation of access restrictions on private class members Misuse of variables by type Generation of stack over/underflows Illegal conversion of variables to another type

Examples of specified protection with JDK 1.2 Java Security (2) Examples of specified protection with JDK 1.2

Protection Mechanisms Protection Domains (1) Examples of three protection domains

Protection Domains (2) A protection matrix

A protection matrix with domains as objects Protection Domains (3) A protection matrix with domains as objects

Access Control Lists (1) Use of access control lists of manage file access

Access Control Lists (2) Two access control lists

Capabilities (1) Each process has a capability list

f(Objects, Rights, Check) Capabilities (2) Cryptographically-protected capability Generic Rights Copy capability Copy object Remove capability Destroy object Server Object Rights f(Objects, Rights, Check)

Trusted Systems Trusted Computing Base A reference monitor

Formal Models of Secure Systems (a) An authorized state (b) An unauthorized state

Multilevel Security (1) The Bell-La Padula multilevel security model

Multilevel Security (2) The Biba Model Principles to guarantee integrity of data Simple integrity principle process can write only objects at its security level or lower The integrity * property process can read only objects at its security level or higher

Orange Book Security (1) Symbol X means new requirements Symbol -> requirements from next lower category apply here also

Orange Book Security (2)

Covert Channels (1) Encapsulated server can still leak to collaborator via covert channels Client, server and collaborator processes

A covert channel using file locking Covert Channels (2) A covert channel using file locking

Covert Channels (3) Pictures appear the same Picture on right has text of 5 Shakespeare plays encrypted, inserted into low order bits of color values Hamlet, Macbeth, Julius Caesar Merchant of Venice, King Lear Zebras