Trusted systems1

12
TRUSTED SYSTEMS Network Security And Cryptography By:- SUMITA DAS

Transcript of Trusted systems1

Page 1: Trusted systems1

TRUSTED SYSTEMSNetwork Security And Cryptography

By:-  SUMITA DAS

Page 2: Trusted systems1

Created by Sumita Das

TRUSTED SYSTEMS

To enhance the ability of a system to defend against-Intrudersmalicious programs.

Page 3: Trusted systems1

Created by Sumita Das

DATA ACCESS CONTROLAccess Matrix:

SubjectObjectAccess right

Page 4: Trusted systems1

Created by Sumita Das

DATA ACCESS CONTROL

Access Control List: Decomposition of the matrix by columns

Page 5: Trusted systems1

Created by Sumita Das

DATA ACCESS CONTROL

Capability list: Decomposition of the matrix by rows

Page 6: Trusted systems1

Created by Sumita Das

TRUSTED SYSTEMS CONCEPT Protect data and resources on the basis of levels ofsecurity.

Unclassified(U)Confidential(C)Secret(S)Top Secret(TS)

Page 7: Trusted systems1

Created by Sumita Das

SECURITY LEVELS

Multilevel security: Multiple categories or levels of data

Multilevel secure system must enforce:No read up (Simple Security Property)No write down(Property)

Security levels may be linear or latticed

Page 8: Trusted systems1

Created by Sumita Das

REFERENCE MONITOR

Provides multilevel security for a data processing system

Controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on the basis of security parameters of the subject and object.

Page 9: Trusted systems1

Created by Sumita Das

Page 10: Trusted systems1

Created by Sumita Das

REFERENCE MONITOR PROPERTIES

Complete mediation Isolation Verifiability

Page 11: Trusted systems1

Created by Sumita Das

EXAMPLE: TROJAN HORSE DEFENSE

Secure, trusted operating systems are one way to secure against Trojan Horse attacks

Page 12: Trusted systems1

Created by Sumita Das

REFERENCES

[1]William Stallings, “Cryptography and Network Security Principles and Practices”, Fourth Edition