476 REVISION SUMMARY BY Alex Peng Definition of key concepts (paper1+handout) ------------------------------------------ Information Security: o (Anderson 2003): A well-informed sense of assurance that information risks and controls are in balance. o (Solms 1999): The aim of information security is to ensure business continuity and minimise business damage by preventing and minimising the impact of security incidences. o (Solms 1999, why important): The CIA of business information may be essential to maintain the competitive edge, cash-flow, profitability, legal compliance and respected company profile; information security threats become more widespread and increasingly sophisticated; the growth of network presents new opportunities for unauthorized access of business data. Standards (Eloff and Solms 2000): International Standards: documented agreements containing exact criteria that must be followed consistently as rules, guidelines or definitions of characteristics to ensure that any materials, products, processes or services are fit for their purpose. National standards: (N/A but should be the same as international version. Just considering BS7799-1ISO17799) Organizational standards: a specific rules and requirements adopted in or prescribed for the company internally. Impact of standards (handout): Enhance compatibility or interoperability Reduced uncertainty Reduced consumer lock-in Competition for the market vs. competition in the market Competition on price vs. features Certification (Handout): the issue of a formal statement (certificate) confirming the results of the security evaluation. Accreditation (Handout): the procedure for accepting a product, a service, a system for use within a particular environment. Evaluation (Handout): 476 REVISION SUMMARY BY Alex Peng assessment of a product or service against defined security evaluation criteria/standards 注意:评估是需要依据的。这里的依据就是那些安全标 准如 BS7799. SECURITY in e-commerce------------------------------------------------------------------ How to prevent information? Information can be altered (integrity) or corrupted (availability) or misused (confidentiality) in any phase of the information life cycle: Creation/store/process/transmit/used/lost/corrupted/destroyed 1. Structure: (Stephen Wilson 1997+Handout of cryptosystems) Integrity: The assurance to an entity that data has not been altered (intentionally or unintentionally) between “there” and “here”, or between “then” and “now”. Cryptography security: PKC (public key cryptography) o Two properties of a successful encryption algorithm: You need the right key to decrypt an encrypted message Any change to an encrypted message will also cause the decryption to fail These properties can be exploited to provide “CIANA”. Authentication: The assurance to one entity that another entity is who/he/she/it claims to be. Digital signature o The relationship between public key and private key: mathematical “one way function” (Hash algorithm, for example)---it is computationally infeasible for a private key to derive from the knowledge of public key. o Signature: Hash algorithm encrypted by originator’s private key . o Verify: public key to reverse the encryption processre-compute the hash Non-repudiation: The inability of the originator to deny later having sent the letter. Digital signature Confidentiality: The assurance to an entity that no one can read a particular piece of data except the receiver(s) explicitly intended. 476 REVISION SUMMARY BY Alex Peng Cryptography security + key escrow (copies of keys would be lodged either with the government or with trusted third parties.) (PKICA…) To make a message secret, the original message can be encrypted under a DIFFERENT cryptographic key, AFTER digital signature. Notice that key escrow and key recovery proposals only apply to confidentiality tools. 2. Public Keys Infrastructure (PKI) (instance: PKAF) (Handout from ADMIS 2006-2007. Feel free to contact me if u need this ppt.) Definition of PKI: “The set of hardware, software, people and procedures needed to create, manage, store, distribute and revoke certificates based on public-key cryptography” X.509 Definitions of interoperability: “Interoperability means the ability of information and communication technology systems and of the business processes they support to exchange data and to enable the sharing of information and knowledge” IDA “Interoperability means the co-operation of systems, processes and people, in order to deliver seamless and customer-centric services. It encompasses three different aspects: Technical, Semantic, Organisational” IDABC PKI elements: • Policy Authority • Certificate Authority (CA) ( or Trust Services Provider) • Registration Authority (RA) • Subscribers • Relying Parties • Repositories The interoperability of PKIs globally: (Backhouse, et al 2003) Considerable effort on both technical and policy fronts has been expended to address these five security matters in e-commerce. Public key cryptography is gradually emerging as the prime technology for providing very secure authentication of identity online with the use of a Certification Authority as trust intermediary. Problem domain: At the moment most CAs are highly localized in their marketplace and operate largely within the confines of a single territory, jurisdiction and language. Equally the electronic communities they support with their trusted services are, in global terms 476 REVISION SUMMARY BY Alex Peng still parochial in nature. To achieve e-commerce on a global scale, PKIs must be able to interoperate so that the digital certificates issued in one domain are accepted in a foreign domain. Furthermore, both technical and institutional problems of PKI interoperability must be resolved. Existing approaches for resolving this problem: cross-certification, cross-recognition and Bridge CA. Alternative approach suggested by Backhouse: the problem of interoperability in PKI can be solved by the use of accreditation schemes in concert with international standards Lessons from the failure study of c:cure + BS7799: Market-led Leadership Legislation in Place Government Sets the Example Efficient Auditor Assessment Process Certificate Authority Architecture: (Liddy and Strugeon 1999) General trend: Architectures such as hierarchical, cross-certificated CAs will become more frequently used, as the complexity of business use increases and risk of exposure increases. The evolution of internet: IntranetsExtranetsGlobalnet Current models of CA: The critical issues driving the evolution of CA models architecture: Technology models Marketplace or customer maturity Geopolitical concerns Each models has been developed based on different business requirements. The architectures are different particularly in the cryptographic generation of CA keys. CA products=key generation + key management systems + key architectures + use of key structures + standard (X509.v3) Proprietary model (私有模型) Offering for various Virtual Private Networks (VPNs) Often a part of browser based software Support SET and SSL Security provided by proprietary and non-standards-based solutions for 476 REVISION SUMMARY BY Alex Peng specific closed system in organizationsused within organizations thus support intranet ONLY. Pros: Restrict access Cons: o cannot be easily evaluated against standards o difficult to migrate to extranet use (redesign needed) Self-signed CA Security is based on acceptance of users of the central server as being trusted without necessarily the appropriate system security controls and mechanisms Pros: relatively cheap Used for low confidentiality and authentication requirements (kind of willing to face risk) The cheapest version running on Microsoft browsers is ubiquitous Cons: o cannot be easily evaluated against standards Structure (see paper) Suitable for (see paper)\ TTP (trust third party) The ideal model for global internet; Open systems architecture Developing international standards Trust is ensured by a third party that is subject to and abide by exhaustive means and measures of delivering secured transactions. Two architecture: o Centralized structure A central CA sign both user certificates and registration authority (RA) certificates RA provide the user verification Potential users can apply either RA or directly to central CA for their certificate. Drawback: the conflict the CA has with geopolitical elements( CA complies with only one central government authority) o Hierarchical structure Through a hierarchical structure of “signed roots”, each CA can issue a certificate and make it recognized by other CAs in this network. Center of root: policy creation authority (PCA, 政策起草) and policy approval authority (PAA, 政策批准) Pros: can issue a certificate on a decentralized basis. This may be important when a national CA wishes to provide seamless international transactions but must at the same time adhere to national legislation or regulation pertaining to certificate 476 REVISION SUMMARY BY Alex Peng issuance and management. Factors to consider in choosing a model Keying structure: based on cryptographic requirements and confidentiality sought Certificate technologies: based on authentication requirements and include criteria such as the size and nature of the groups in the CA community Role of marketplace: The major obstacle to the growth and acceptance of global electronic business is the absence of standards to enforce common recognition and confidence in the security of transactions. The market will serve to force the adoption of standards and their implementation. The principle issue is cross certification. Cross-Certification: currently multiple PKIs independently implemented and operated, serving different environments and user communities, whilst inevitably some of them need to be interconnected. Changing business relationships or other reasons will necessitate secure communication was not previously a requirement. In the absence of single global PKI, corss-certification is the accepted mechanism for enabling users of one PKI community to validate the certificates of users in another PKI community. Cross-certification of TTPs: Involves the root certification authority accepting the other TTPs’ security policy and practices. As the keys and certificates are ubiquitous, one technology component needs to be cross-certified is the set of certificate revocation lists. Cross-certification of proprietary systems Involves setting up both policy and technology between two organizations. The policy must denote what levels of security are acceptable for both, and it must address agreement on compliance audit. This must be repeated for each organization wishing to cross-certify with any other organization. Notice: the more times the systems cross-certify the greater the chances the system will break down, as the linkages between the systems will allow for an unsecured passage of both keys and certificates if one organisation deviates from the accepted policy. Cross-certification provides that essential next step towards the future of certification and cryptography products on the Internet. But how? International standards for technology must be formalized and recognized. Vendors must develop products and services adhering to these standards. 476 REVISION SUMMARY BY Alex Peng The necessary policy and procedures to accompany secure solutions must be developed and formally accepted as part of standards. National legislative and regulatory frameworks need to be developed such that they set acceptable and achievable accreditation schemes. 3. Pitfalls in cryptographic design (把它和 E-BUSINESS 结合起来思考;找出哪 些和 E-BUSINESS 有关) (Bruce Schneier 1998) Intro. Strong Cryptography =/ Algorithm + Key length Longer keys do not always means more security. If the key is too long (tem pins password for example), hackers will try cryptographic attack against the algorithm. Strong cryptography does not means more security too. Smart hackers can go around the algorithms. We can always find attacks bypass the algorithms altogether. Hackers don’t try to match the keys, or break the algorithm, yet they try to find the errors in the system design, installation and implementation. 1. Attacks against cryptographic designs The elements of a cryptosystem: o Encryption algorithms o Digital signature algorithms o One-way hash functions o Message authentication codes Break one, break whole; further more, if the structure is weak, a weak system can probably be built with strong algorithms and protocols. Encryption algorithms don’t provide data integrity. While key exchange protocols don’t necessarily ensure both parties receive the same key. Even good engineers or well-known organizations can not guarantee the robust implementation. Random-number generators can be broken since it is possible to generate weak keys even with strong encryption algorithms. 2. Attacks against implementations The involvement of human Some systems don’t ensure the plaintext is destroyed Sometimes same data be encrypted twice, one in strong keys whilst another in weak keys. Some systems use inadequate protection mechanisms for the master keys and mistakenly relying on the session keys. Account reconciliation flood attack Hotlist Keys recovery databases 476 REVISION SUMMARY BY Alex Peng 3. Attacks against keys System rely on user-generated passwords 4. Attacks against hardware Tamper-resistant hardware in commerce systems Timing attack 5. Attacks against trust models Attacks against the underlying trust model of system: who or what in the system is trusted, in what way, and to what extent. Simple systems have simple trust models and complex systems have more sophisticated models. The more complex, the more vulnerability is in the system. Many software systems make poor trust assumptions about the computers on which they run The cryptography may be irrelevant if it can be circumvented through network insecurity, and no software is secure against reverse-engineering A system will be designed with one trust model in mind while implemented in another. 6. Attacks against the users Users can subvert its security by accident; for example, a user give his/her password to his co-workers. Good system design can not sole all these social problems. 7. Attacks against failure recovery Many systems have a “default to insecure mode”. A “version rollback attack” against a system after it has been revised to fix a security problem: the need for backwards compatibility allows an attacker to force the protocol into an older, insecure version. 8. Attacks against the cryptography Proprietary cryptographic algorithms are particularly weak Keeping the algorithm secret is not much of an impediment to analysis—it only takes couple of days to reverse-engineer the cryptographic algorithm from the executable code. Suggestion from Author: Preventing is essential for cryptographic systems, while detecting abuse is also important. One design principle: no perfect design—sooner or later every system will be successfully attacked. 476 REVISION SUMMARY BY Alex Peng Once the attack is detected, the system needs to recover, generate and promulgate a new key pair, update the protocol and invalidate the old one, remove an untrusted node from the system, etc. Standards---------------------------------------------------------------------------------------1. TCSEC, ITSEC: (Solms, 1999) Three factors during technical evaluation process: Functionality Assurance of correctness Assurance of effectiveness TCSEC: Trusted Computer Security Evaluation Criteria---the orange book Only evaluates technical features of products that can be bought “off the shelf”, such as Windows XP, UNIX. Consider all the three factors together. ITSEC: Information Technology Security Evaluation Criteria---the white book Evaluate the products as well as the systems Handle functionality independently and assurance of correctness and assurance of effectiveness together. 2. BS7799: (Eloff and Solms 2000) BS7799 part1: Code of Practice for ISM Code of practice: Documents recording actions or practices which have led to positive results in the past experiences. Constitutes a comprehensive reference document for identifying the range of IS controls needed in most industry and commerce scenarios. Contains detailed set of controls that will meet the IS requirements of the majority of organizations across all functional domains. A guide and recommendation document for management members who are responsible for initiating, implementing and maintaining IS. 10 sections (refer to BS7799 part 1) A risk management strategy is recommended by means of which to identify the critical factors for successful implementation and maintenance of IS measures. 476 REVISION SUMMARY BY Alex Peng BS7799 part2: Specification of ISM Set out the requirements for the establishment, implementation documentation of Info-Sec management systems (ISMS). An improvement of part 1 since part 2 addresses the issue of ISMS. and Baseline security controls by BS7799-1 (Solms 1999) Two elements of security control: Risk management Security baseline manual (identify minimum security control requirements in organizations) Two objectives of the CoP: Provide a common basis for develop, implement and measure effective security management practice Provide confidence in inter-company trading Controls listed in CoP define an industry baseline of good security practice, whilst not all controls will be applicable to every IT environment. A sub-set of these 10 sections controls are judged to be especially important and are referred to as the key controls, which would be applicable for ALL organizations, and considered as mandatory. Key controls always plays a good start point for introducing info-Sec. 10 Key controls of CoP: Information Security Policy Document Allocation of security responsibilities Information security education and training Reporting of security incidents Virus control Business continuity planning Control of proprietary records Safeguarding of company records Compliance with data protection legislation Compliance with security policy Critical factors for the successful implementation of information security in organizations: Security objectives and activities must be based on business objectives and requirements, and led by business management. There must be visible support and commitment from top management There must be a good understanding of security risks (threats and 476 REVISION SUMMARY BY Alex Peng vulnerabilities) to company assets, and the level of security inside the organization. Security must be effectively marketed to all managers and employees Comprehensive guidance on security policy standards must be distributed to all employees and contractors. 3. Combing the process and product evaluation (Eloff and Solms 2000) Categories of evaluated IT products and/or systems (TCSEC only check products whilst ITSEC check both products and systems) Database System of Communication Miscellaneous (其他功能) Networks Operating Systems (OS) PC access (see example to enhance better understanding from this paper) BS7799 10 sections: (政策, 组织, 资产, 职员, 物理环境, 计算机和网络, access control, 系统维护, business continuity planning, compliance 总合格率) 把 product evaluation 放入 section 6, 即 computer and networks management 当中, 就把产品检验和过程检验统一起来了/ Critique(personally): This is only a qualitative analysis without any quantitative mathematical approach to indicate precisely that how much percentage should be added into section 6 of BS7799 while combing product evaluation by TCSEC or ITSEC. Thus this paper can only provides a research direction for future study in this domain. ------------------------------------------------------------------------------------------------------NOTE: PAPER 8 is such amazing paper which depressed me so much when I was trying to find what it means…This is some key points I found in this paper: Table 2: The development process of BS7799 Figure 2: The risk management model Figure 3: Risk analysis and risk assessment flow chart and explanation P453: “four threats” P454: “Risk categories” Table 7: Maturity of IRM Figure 9: Selection methods for ISMS protection 476 REVISION SUMMARY BY Alex Peng *Combining figure2, figure5 and table 10 to catch the main contribution of this paper*