Bài giảng Bảo mật cơ sở dữ liệu: Chương 3 - Trần Thị Kim Chi (tt)
Số trang: 59
Loại file: pptx
Dung lượng: 357.88 KB
Lượt xem: 10
Lượt tải: 0
Xem trước 6 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Bài giảng "Bảo mật cơ sở dữ liệu - Chương 3: Bảo mật theo cơ chế MAC" cung cấp cho người học các kiến thức: Define Mandatory Access Control Models, secrecy-preserving models, integrity-preserving models, multi-Level security, multi-level databases access control models,... Mời các bạn cùng tham khảo.
Nội dung trích xuất từ tài liệu:
Bài giảng Bảo mật cơ sở dữ liệu: Chương 3 - Trần Thị Kim Chi (tt)BảomậttheocơchếMACMandatory Access Control ModelsAgenda1. DefineMandatoryAccessControlModels2. Secrecypreservingmodels3. Integritypreservingmodels4. MultiLevelsecurity5. Multileveldatabasesaccesscontrolmodels6. MultilevelsecureDBMSarchitecture7. MACtrongcáchệQTCSDLthôngdụngDefineMandatoryAccessControl MandatoryAccessControl:Asystemwidepolicy decreeswhoisallowedtohaveaccess;individual usercannotalterthataccess. Reliesonthesystemtocontrolaccess. Examples: – Thelawallowsacourttoaccessdrivingrecords withouttheowners’permission. TraditionalMACmechanismshavebeentightly coupledtoafewsecuritymodels. Recently,systemssupportingflexiblesecurity modelsstarttoappear(e.g.,SELinux,Trusted Solaris,TrustedBSD,etc.)MandatoryAccessControlvsDiscretionaryAccessControl MACiscentrallycontrolledbyasecuritypolicy administrator;usersdonothavetheabilitytooverridethe policyand,forexample,grantaccesstofilesthatwould otherwiseberestricted. DAC,whichalsogovernstheabilityofsubjectstoaccess objects,allowsuserstheabilitytomakepolicydecisions and/orassignsecurityattributes. MACenabledsystemsallowpolicyadministratorsto implementorganizationwidesecuritypolicies. WithDAC,userscannotoverrideormodifythispolicy, eitheraccidentallyorintentionally.Thisallowssecurity administratorstodefineacentralpolicythatisguaranteed (inprinciple)tobeenforcedforallusers.DegreesofMACsystemstrength Insomesystems,usershavetheauthoritytodecidewhether tograntaccesstoanyotheruser.Toallowthat,allusers haveclearancesforalldata.Thisisnotnecessarilytrueofa MACsystem.Ifindividualsorprocessesexistthatmaybe deniedaccesstoanyofthedatainthesystemenvironment, thenthesystemmustbetrustedtoenforceMAC.Since therecanbevariouslevelsofdataclassificationanduser clearances,thisimpliesaquantifiedscaleforrobustness. Forexample,morerobustnessisindicatedforsystem environmentscontainingclassifiedTopSecretinformation andunclearedusersthanforonewithSecretinformation andusersclearedtoatleastConfidential.Topromote consistencyandeliminatesubjectivityindegreesof robustness,anextensivescientificanalysisandrisk assessmentofthetopicproducedalandmarkbenchmarkEvaluationofMACsystemstrength TheCommonCriteria[7]isbasedonthisscienceandit intendedtopreservetheAssuranceLevelasEALlevelsand thefunctionalityspecificationsasProtectionProfiles.Of thesetwoessentialcomponentsofobjectiverobustness benchmarks,onlyEALlevelswerefaithfullypreserved.In onecase,TCSEClevelC2[8](notaMACcapablecategory) wasfairlyfaithfullypreservedintheCommonCriteria,as theControlledAccessProtectionProfile(CAPP).[9] Multilevelsecurity(MLS)ProtectionProfiles(suchas MLSOSPPsimilartoB2)[10]ismoregeneralthanB2.They arepursuanttoMLS,butlackthedetailedimplementation requirementsoftheirOrangeBookpredecessors,focusing moreonobjectives.Thisgivescertifiersmoresubjective flexibilityindecidingwhethertheevaluatedproduct’s technicalfeaturesadequatelyachievetheobjective, MultilevelSecurity(MLS)DefinitionandneedforMLS– SecurityClassification– SecrecyBasedMandatoryPolicies:Bell LaPadulaModel– IntegritybasedMandatoryPolicies:The BibaModel– LimitationofMandatoryPoliciesHybridPolicies– TheChineseWallPolicyDefinitionandneedforMLS Multilevelsecurityinvolvesadatabaseinwhich thedatastoredhasanassociatedclassification andconsequentlyconstraintsfortheiraccess MLSallowsuserswithdifferentclassification levelstogetdifferentviewsfromthesamedata MLScannotallowdownwardleaking,meaning thatauserwithalowerclassificationviewsdata storedwithahigherclassificationDefinitionandneedforMLS Usuallymultilevelsystemsarewiththefederal government Someprivatesystemsalsohavemultilevelsecurity needs MLSrelationissplitintoseveralsinglelevelrelations, ArecoveryalgorithmreconstructstheMLSrelation fromthedecomposedsinglelevelrelations AttimesMLSupdatescannotbecompletedbecauseit wouldresultinleakageordestructionofsecret informationDefinitionandneedforMLS Inrelationalmodel,relationsaretables andrelationsconsistoftuples(rows)and attributes(columns) Example: Considertherelation SOD(Starship,Objective,Destination) Starship Objective DestinationEnterprise Exploration TalosVoyager ...
Nội dung trích xuất từ tài liệu:
Bài giảng Bảo mật cơ sở dữ liệu: Chương 3 - Trần Thị Kim Chi (tt)BảomậttheocơchếMACMandatory Access Control ModelsAgenda1. DefineMandatoryAccessControlModels2. Secrecypreservingmodels3. Integritypreservingmodels4. MultiLevelsecurity5. Multileveldatabasesaccesscontrolmodels6. MultilevelsecureDBMSarchitecture7. MACtrongcáchệQTCSDLthôngdụngDefineMandatoryAccessControl MandatoryAccessControl:Asystemwidepolicy decreeswhoisallowedtohaveaccess;individual usercannotalterthataccess. Reliesonthesystemtocontrolaccess. Examples: – Thelawallowsacourttoaccessdrivingrecords withouttheowners’permission. TraditionalMACmechanismshavebeentightly coupledtoafewsecuritymodels. Recently,systemssupportingflexiblesecurity modelsstarttoappear(e.g.,SELinux,Trusted Solaris,TrustedBSD,etc.)MandatoryAccessControlvsDiscretionaryAccessControl MACiscentrallycontrolledbyasecuritypolicy administrator;usersdonothavetheabilitytooverridethe policyand,forexample,grantaccesstofilesthatwould otherwiseberestricted. DAC,whichalsogovernstheabilityofsubjectstoaccess objects,allowsuserstheabilitytomakepolicydecisions and/orassignsecurityattributes. MACenabledsystemsallowpolicyadministratorsto implementorganizationwidesecuritypolicies. WithDAC,userscannotoverrideormodifythispolicy, eitheraccidentallyorintentionally.Thisallowssecurity administratorstodefineacentralpolicythatisguaranteed (inprinciple)tobeenforcedforallusers.DegreesofMACsystemstrength Insomesystems,usershavetheauthoritytodecidewhether tograntaccesstoanyotheruser.Toallowthat,allusers haveclearancesforalldata.Thisisnotnecessarilytrueofa MACsystem.Ifindividualsorprocessesexistthatmaybe deniedaccesstoanyofthedatainthesystemenvironment, thenthesystemmustbetrustedtoenforceMAC.Since therecanbevariouslevelsofdataclassificationanduser clearances,thisimpliesaquantifiedscaleforrobustness. Forexample,morerobustnessisindicatedforsystem environmentscontainingclassifiedTopSecretinformation andunclearedusersthanforonewithSecretinformation andusersclearedtoatleastConfidential.Topromote consistencyandeliminatesubjectivityindegreesof robustness,anextensivescientificanalysisandrisk assessmentofthetopicproducedalandmarkbenchmarkEvaluationofMACsystemstrength TheCommonCriteria[7]isbasedonthisscienceandit intendedtopreservetheAssuranceLevelasEALlevelsand thefunctionalityspecificationsasProtectionProfiles.Of thesetwoessentialcomponentsofobjectiverobustness benchmarks,onlyEALlevelswerefaithfullypreserved.In onecase,TCSEClevelC2[8](notaMACcapablecategory) wasfairlyfaithfullypreservedintheCommonCriteria,as theControlledAccessProtectionProfile(CAPP).[9] Multilevelsecurity(MLS)ProtectionProfiles(suchas MLSOSPPsimilartoB2)[10]ismoregeneralthanB2.They arepursuanttoMLS,butlackthedetailedimplementation requirementsoftheirOrangeBookpredecessors,focusing moreonobjectives.Thisgivescertifiersmoresubjective flexibilityindecidingwhethertheevaluatedproduct’s technicalfeaturesadequatelyachievetheobjective, MultilevelSecurity(MLS)DefinitionandneedforMLS– SecurityClassification– SecrecyBasedMandatoryPolicies:Bell LaPadulaModel– IntegritybasedMandatoryPolicies:The BibaModel– LimitationofMandatoryPoliciesHybridPolicies– TheChineseWallPolicyDefinitionandneedforMLS Multilevelsecurityinvolvesadatabaseinwhich thedatastoredhasanassociatedclassification andconsequentlyconstraintsfortheiraccess MLSallowsuserswithdifferentclassification levelstogetdifferentviewsfromthesamedata MLScannotallowdownwardleaking,meaning thatauserwithalowerclassificationviewsdata storedwithahigherclassificationDefinitionandneedforMLS Usuallymultilevelsystemsarewiththefederal government Someprivatesystemsalsohavemultilevelsecurity needs MLSrelationissplitintoseveralsinglelevelrelations, ArecoveryalgorithmreconstructstheMLSrelation fromthedecomposedsinglelevelrelations AttimesMLSupdatescannotbecompletedbecauseit wouldresultinleakageordestructionofsecret informationDefinitionandneedforMLS Inrelationalmodel,relationsaretables andrelationsconsistoftuples(rows)and attributes(columns) Example: Considertherelation SOD(Starship,Objective,Destination) Starship Objective DestinationEnterprise Exploration TalosVoyager ...
Tìm kiếm theo từ khóa liên quan:
Bài giảng Bảo mật cơ sở dữ liệu Bảo mật cơ sở dữ liệu Cơ sở dữ liệu ảo mật theo cơ chế MAC Access Control Models Secrecy-preserving models Multi-Level securityGợi ý tài liệu liên quan:
-
62 trang 401 3 0
-
Đề thi kết thúc học phần học kì 2 môn Cơ sở dữ liệu năm 2019-2020 có đáp án - Trường ĐH Đồng Tháp
5 trang 377 6 0 -
Giáo trình Cơ sở dữ liệu: Phần 2 - TS. Nguyễn Hoàng Sơn
158 trang 291 0 0 -
13 trang 290 0 0
-
Phân tích thiết kế hệ thống - Biểu đồ trạng thái
20 trang 284 0 0 -
Tài liệu học tập Tin học văn phòng: Phần 2 - Vũ Thu Uyên
85 trang 255 1 0 -
Đề cương chi tiết học phần Quản trị cơ sở dữ liệu (Database Management Systems - DBMS)
14 trang 244 0 0 -
8 trang 186 0 0
-
Giáo trình về dữ liệu và các mô hình cơ sở dữ liệu
62 trang 182 0 0 -
Giáo trình Cơ sở dữ liệu: Phần 2 - Đại học Kinh tế TP. HCM
115 trang 175 0 0