Security of Information Systems
Total Page:16
File Type:pdf, Size:1020Kb
Security of Information Systems: What Technical Solutions Exist and What is Needed Ryszard Gwozd A Thesis in The Department of Computer Science Presented in Partial Fulfillrnent of the Requirements for the Degree of Master of Computer Science at Concordia University August 2000 ORyszard Gwozd, 2000 National Library Bibliothèque nationale l*l of Canada du Canada Acquisitions and Acquisitions et Bibliographic Services services bibliographiques 395 Wellington Street 395. rue Wellington Ottawa ON KIA ON4 Ottawa ON KIA ON4 Canada Canada The author has granted a non- L'auteur a accordé une licence non exclusive licence allowing the exclusive permettant à la National Library of Canada to Bibliothèque nationale du Canada de reproduce, loan, distribute or sell reproduire, prêter, distribuer ou copies of this thesis in microform, vendre des copies de cette thèse sous paper or electronic formats. la forme de microfiche/^, de reproduction sur papier ou sur format électronique. The author retains ownership of the L'auteur conserve la propriété du copyright in this thesis. Neither the droit d'auteur qui protège cette thèse. thesis nor substantial extracts f?om it Ni la thèse ni des extraits substantiels may be printed or othenvise de celle-ci ne doivent être imprimés reproduced without the author's ou autrement reproduits sans son permission. autorisation. Abstract Security of Information Systems: What Technical Solutions Exist and What is Needed Ryszard Gwozd The objective of this thesis is to review the need for information system security, evahate the technical sohtions commody used today, make recommendations on where extra research is needed, and to overview the technologies, algorithms, standards, and security policies used in providing computer and communications security. The information-security issue is equaUy important to the users of the htemet (e-g., businesses engaged in e-commerce) and to users of stand-alone ("air-gapped") systems. The problems that these two groups of users face are both different and have a different scale. However, there is no question that the urgent security problems are driven by the increasing demand for all-to-ali connectivity; security is a top issue primarily because of the Net. Internet security is the most urgent and the most chailenging field in computer security. Moreover, cyber security involves issues that go beyond technological solutions, algorithms and hardware. Often ignored or not stressed enough are user education and prudent engineering. Today, we are more alea about security, but still lack a compIete understandhg of what it means, how far it should go and how to accompIish it. Nevertheless, people are starting to feel that they should accept it, or at least try to understand it. Many users have an impression that they ought to how more about computer securïty, but few make the effort to learn about it. This thesis explains why the user has to be educated about security, what are different security levels, msted systems, encryption, mandatory access control, and legislation. It helps the readers to understand the basics of computer security that will persuade them to practice safe cornputing. Acknowledgements and Dedications 1 am grateful to the many thoughtfd reviews of interim versions of this thesis done by rny thesis supervisor Dr. David K. Probst. His extraordinary perspective on computer technologies, especialiy computer security, his constructive criticisrn and his guidance were invaiuable in helping to shape thïs thesis. The exchange of ideas we have had, helped me validate the foundations of this study. These discussions dso helped me stay focused on most essentid topics of information security. 1 wouid like to dedicate this work to my wonderfd parents, Maria and Wlodzimierz Gwozd. Both of them were very supportive in aii my educational endeavors. Even though neither of my parents were experts in high-tech industry, they understood completely the importance of education and research in advancements on personal and societal levels. My parents were great advisors, guides and teachers; my mom was actuaUy my first professor in the prhary school. Thank you mom, 1 appreciate your support and plan to present you with a copy of this thesis on my next visit home. Before 1finish, 1 wish to thank ail my famiiy for constant encouragement and for king there for me, when mostly needed. Ryszard Gwozd ... List of Figures ................................................................................................................. VIU Chapter 1 ............................................................................................................................. 1 Introduction ........................ ... ............... ................................................................... 1 1.1 . OVERVIEW................................................... .... .................................... 2 1.2. CONTRJBU~ONS..................................................................................................... 4 1.3. ~MPORTANTTERMINOLOGY ..................... .. ............................................................ 5 1.4. REMARKS...................... ... .............................................................................. 9 Chapter 2 ............................ ... ...................................................................................... 11 Computer Security Fundamentals .................................. ..... .............................................. 11 2.1. EVOLUTIONOF SECVRITY NEEDS .......... ... ......................................................... 11 2.2. INFORMATIONIS A STRATEGIC RESOURCE ............................................................... 12 2.3. INFORMATIONSECUR~TY VULNERABIL~TIES ............................................................ 13 2.3.1. Physicd Security Holes ....~........~..~.................................................................14 2.3.2. Trust Mode1 and Security Policy ...................... .. .................................. 14 2.3 .3 .Faulty Configuration .................... ... ...........................................................15 2.3.4. Software and Hardware Errors ................................. ..................................... 15 2.3 .5 . Cryptographie Protocols ............ ... .............................................................. 15 2.3.6. Education and Personnel Assurance ................................ .. ....................... 16 2.4. CATEGORYOF ATTACKER........................................................................................ 16 2.4.1 .Professionals and Amateurs ............................................................................ 17 2.4.2. Insiders and Outsiders ..................................................................................... 17 2.5. BUILDINGA SECURE SYSTEM .................................................................................. 18 2.5.1. Secuxity through Obscurity ........................... .... ........................................... 19 2.5.2. Suitable Security Policy ............................ .. .................................................. 19 2.5.3. Securïty Perimeters ....................................................................................... 20 2.5.4. Physical, Personnel and Legal Controls ................... ... .............................. 21 2.6. FCEMUWS ................................................................................................................. 22 Chapter 3 .............................................................................. .... ..................................... 25 Access Control ........................... ,, .................................................................................. 25 3.1. SECURITYMODELS .................................................................................................. 27 3.2. DoD GOALSECURITY ARCH~T'ECTURE ................................................................... -29 3.3. OPERATINGSYSTEM ACCESS CONTROL............. .... .. .. .................................... 3 0 3.3.1. Decision Subsystem ............................... ........... ...............---30 3.3.2. Enforcement Subsystem .................................................................................. 31 3.4. APPLICATIONACCESS CONTROL ......................................................................... 32 3 .5. ALTERNATNES........................................................................................................ 32 3.6. REMARKS................................................................................................................ 34 Chapter 4 ................................. .... ................................................................................... 36 Identification and Authentication .................... ... ........................................................... 36 4.1.USER CATION .......................... ... ........................................................... 36 4.2. SIGNATURES-s (DIGITALSIGNATURES) ....................................................... 3 8 4.2.1. RSA ................................................................................................................. 39 4.2.2. ElGamal ......................................................................................................... 41 4.2.3. Diffie-Hellman ............................................................................................... 42 4.2.4. Binding Signatures