”¹±ƒ†¬»¹ƒ· ±¹...

download ”¹±ƒ†¬»¹ƒ· ±¹ ‘¾¹»Œ³·ƒ· ‘ƒ†¬»µ¹±‚ £…ƒ„·¼¬„‰½

of 83

  • date post

    31-Dec-2015
  • Category

    Documents

  • view

    26
  • download

    0

Embed Size (px)

description

Διασφάλιση και Αξιολόγηση Ασφάλειας Συστημάτων και Προϊόντων. Σωκράτης Κάτσικας. Θέματα συζήτησης. Βασικά χαρακτηριστικά Διασφάλισης (assurance) και Αξιολόγησης (evaluation) Σκοπός, ζητήματα και μέθοδοι διασφάλισης Διασφάλιση έργου Στόχοι, σκοποί, μέθοδοι και κριτήρια αξιολόγησης - PowerPoint PPT Presentation

Transcript of ”¹±ƒ†¬»¹ƒ· ±¹...

  • * (assurance) (evaluation), , ,

  • * : , ,

    : , ,

  • * (assurance)

    , :

    . ,

  • * , , , : ,

  • *

    (functionality) (strength of mechanisms) (implementation) (usability)

  • * : Bell-LaPadula

  • * , :

  • * : :- - :- ;- ;

  • * :

  • *: : :

  • *

  • * (Security Testing) (Formal Methods)

  • * : (project assurance)

  • * : (Formal Methods)

  • * , :

    :

  • *

    , , , (waterfall model) , (CMM), : (Initial) (Repeatable) (Defined) (Managed) (Optimizing)

  • * , Poisson : p = e-Et , p t , E t- k/t. , MTBF t/k. , MTBF.

  • * , ,

    TCSEC :

  • * (target of the evaluation TOE) (products), (systems),

  • * TCSEC: (evaluation) (certification) , : (repeatability) (reproducibility)

  • * : (functionality) (effectiveness) (assurance) , (TCSEC, ITSEC)

  • * : (functionality requirements) (assurance requirements) (levels of trust)

  • *TCSEC - rusted Computer System Evaluation Criteria - Orange Book TCSEC TCSEC

  • * TCSEC 1983 1999 (C1, C2, B1, B2, B3, A1), (D, C, B, A) Bell-LaPadula

  • *TCSEC:

  • *TCSEC:

  • *TCSEC: 1(2)D ( ) C1 (Discretionary Protection) , Discretionary Access Control Identification and Authentication C2 (Control Access Protection) C1 Object Reuse Auditing B1 (Labeled Security Protection) C2 Mandatory Access Control Label . , ,

  • *B2 (Structured Protection) 1 Mandatory Access Control Label. Trusted path, , Descriptive Top Level Specification B3 (Security Domains) 2 , . A1 (Verified Protection) 3, ,

    TCSEC: 2(2)

  • *TCSEC: , (RMP)

  • *TCSEC: : , .

  • *TNI Trusted Network Interpretation Red Book TNITNI TNI TNI

  • * TNI TCSEC : , : TCSEC

  • * : : (secrecy) (integrity)Discretionary Access Control (DAC)Mandatory Access Control (MAC)

  • * I TCSEC, : (functionality) (strength) (assurance) : (none) (minimum C1) (fair C2) (good B2) (not offered present)

  • *TNI: TNI C Multi-level Security C2+ DAC (audit time alarm) MAC

  • *TNI: TCSEC, TNI TNI , (ISO)

  • *CTCPEC Canadian Trusted Computer Product Evaluation Criteria 1989 TCSEC

  • *ITSEC Information Technology System Evaluation Criteria ITSEC ITSEC TCSEC ITSEC ITSEC

  • * ITSEC 1991, 1995 6+1 : (1, 2, 3, 4, 5, 6, E0) (Target of Evaluation TOE)

  • *ITSEC: TCSEC : (correctness) (effectiveness) : (suitability of requirements) (binding of requirements)

  • * ITSEC TCSEC TCSEC, ITSEC TCSEC 1 ITSEC ITSEC ITSEC :

  • *ITSEC: 0:

    1:

    2: ,

    3:

    4: , TOE

    5:

    6:

  • *

    ITSEC : , , TCSEC

  • * ITSEC , TCSEC ,

  • *CISR Commercial International Security Requirements CISR CISR CISR

  • * CISR 1991 , , American Express EDS - Electronic Data Systems TCSEC Germanys IT-Security Criteria C2+

  • * CISR C2 DAC

  • * CISR 1990 Federal Criteria

  • *FC The Federal Criteria Federal Criteria Federal Criteria Federal Criteria

  • * Federal Criteria 1992 NIST National Institute of Standards and Technology NSA National Security Agency TCSEC ITSEC TCSEC ITSEC FIPS Federal Information Processing Standards

  • * Federal Criteria : TCSEC CISR

  • * Federal Criteria (Protection Profiles) ,

  • *FIPS-140 Federal Information Processing Standards FIPS-140 FIPS-140 FIPS-140-2 FIPS-140

  • * FIPS-140To FIPS-140-1 1994 CSE Canadian Security Establishment 2001 FIPS-140-2 NIST () CSE () CMV Cryptographic Module Validation CMV

  • * FIPS-140 1(2) FIPS-140-1

  • * FIPS-140 2(2) FIPS-140-2 ,

  • *

    FIPS-140-2 1:

    2: 1

    3:

    4:

  • * FIPS-140 2002 162 332 162 :50% 95% 332 :25% 65% ,

  • *CC Common Criteria CC CC CC CC CC CC CC CC

  • * CC 1(3) (TCSEC, ITSEC, TCCPEC, Federal Criteria) , , , , CC Arrangement on the Recognition of the Common Criteria Certifications in the Field of Information Technology Security1998: , , , , 1999: , . 2002: , , , , , , , 2003: : , , . , de facto standard 1998 ITSEC CC ISO Standard 15408

  • * CC 2(3) CC : CC (CC documents) CC (Common Criteria evaluation methodology - CEM) (CC National Scheme) CC , (Evaluation Assurance Levels - EALs) CEM EAL. , CEM EAL, CC, . , , (high assurance) CC National Schemes . CC . CC CEM , EAL ,

  • * CC 3(3) CC, : (TOE Security policy - TSP) , , ( Security Functions - TSF) , , TSP. , TSF TCB TCSEC (Security Target ST)

  • * CC (PP - Protection Profile) Common Criteria ITSEC, Federal Criteria CTCPEC. , PP Federal Criteria, . PP Common Criteria , ,

    PP , , , CC. : PP CC, , EAL, . PP . PP , APE - Protection Profile Evaluation CC.

  • * CC CC , EAL. (naming) (numbering). , . (families). , ,

  • * CC 1(4) , . , :

    FAU - Security Audit: (audit). , , , , , - , FCO - Communication: , - - . CC FCS Cryptographic Support: . , FIPS-140-2

  • * CC 2(4) FDP User Data Protection: . (.. DAC), , (.. MAC), , , , , , TSF (inter-TSF), TSF , TSF (export to outside TSF control), TSF , (Internal TOE Transfer) FIA Identification and Authentication: , , , , /

  • * CC 3(4) FMT Security Management: , TSF , , TSF, , (security attribute expiration) FPR - Privacy: . (anonymity), (pseudonymity), - (unlinkability) - (unobservability). CC FPT Protection of Security Functions: . TSF , (reference mediation), , , TSF, , TSF , TSF , TSF , TSF , , , , TSF , TSF , TSF

  • * CC 4(4) FRU Resource Utilization: , , , , FTA TOE Access: , , , , , (product or system access banners), FTP Trusted Path: , , TSF

  • * CC 1(2) CC , . , , , , . , : APE Protection Profile Evaluation: , PP CC ASE Security Target Evaluation: , ST. APE ACM Configuration Management: , CM, CM CM ADO Delivery and Operation: , , ADV - Development: , , , , TSF internals, , ,

  • * CC 2(2) AGD Guidance Documentation: , ALC Life Cycle: , , , , - Tests: , , , , AVA Vulnerabilities Assessment: , (covert channels), , , AMA Maintenance of Assurance: , , , ,

  • * CC 1(4) CC :

    AL1 Functionally Tested: . . EAL1 , AL2 Structurally Tested: , . EAL1, , , AL3 Methodically Tested and Checked: EAL2 . ,