SlideShare a Scribd company logo
Security Engineering

                                 Lecture 1




Security Engineering 1, 2013                     Slide 1
Topics covered
  •       Security engineering and security management
        –       Security engineering concerned with applications; security
                management with infrastructure.

  •       Security risk assessment
        –       Designing a system based on the assessment of security
                risks.

  •       Design for security
        –       How system architectures have to be designed for security.




Security Engineering 1, 2013                                           Slide 2
Security engineering
  •       Tools, techniques and methods to support the
          development and maintenance of systems that can
          resist malicious attacks that are intended to damage
          a computer-based system or its data.
  •       A sub-field of the broader field of computer security.
  •       Assumes background knowledge of dependability
          and security concepts (Chapter 10) and security
          requirements specification (Chapter 12)




Security Engineering 1, 2013                                 Slide 3
Security concerns
                                       •   Confidentiality
                                           –   Ensuring that data is only
                                               accessible to authorised
                                               people and organisations

                                       •   Integrity
                                           –   Ensuring that external
                                               attacks cannot damage data
                                               and programs

                                       •   Availability
                                           –   Ensuring that external
                                               attacks do not compromise
                                               the availability of data and
                                               programs
Security Engineering 1, 2013                                          Slide 4
Application/infrastructure
                            security
Build                            •   Application security is
                 Application         a software engineering
                                     problem where the
                                     system is designed to
Purchased infrastructure
                                     resist attacks.
                 Middleware
                                 •   Infrastructure security
                                     is a systems
                     Platform        management problem
                                     where the purchased
                     Network         infrastructure is
                                     configured to resist
                                     attacks.
 Security Engineering 1, 2013                           Slide 5
System layers where security
            may be compromised




Security Engineering 1, 2013            Slide 6
System security management
  •       User and permission management
        –       Adding and removing users from the system and setting up
                appropriate permissions for users

  •       Software deployment and maintenance
        –       Installing application software and middleware and
                configuring these systems so that vulnerabilities are avoided.

  •       Attack monitoring, detection and recovery
        –       Monitoring the system for unauthorized access, design
                strategies for resisting attacks and develop backup and
                recovery strategies.


Security Engineering 1, 2013                                              Slide 7
Security risk management
  •       Risk management is concerned with assessing the
          possible losses that might ensue from attacks on the
          system and balancing these losses against the costs
          of security procedures that may reduce these losses.
  •       Risk management should be driven by an
          organisational security policy.
  •       Risk management involves
        –       Preliminary risk assessment
        –       Life cycle risk assessment
        –       Operational risk assessment

Security Engineering 1, 2013                              Slide 8
Preliminary risk assessment




Security Engineering 1, 2013              Slide 9
Misuse cases
  •       Misuse cases are instances of threats to a system
  •       Interception threats
        –       Attacker gains access to an asset

  •       Interruption threats
        –       Attacker makes part of a system unavailable

  •       Modification threats
        –       A system asset if tampered with

  •       Fabrication threats
        –       False information is added to a system

Security Engineering 1, 2013                                  Slide 10
Security Engineering 1, 2013   Slide 11
Asset analysis

    Asset                             Value                                 Exposure

The information system            High. Required to support all         High. Financial loss as clinics
                                  clinical consultations. Potentially   may have to be canceled. Costs
                                  safety-critical.                      of restoring system. Possible
                                                                        patient harm if treatment cannot
                                                                        be prescribed.

The patient database              High. Required to support all         High. Financial loss as clinics
                                  clinical consultations. Potentially   may have to be canceled. Costs
                                  safety-critical.                      of restoring system. Possible
                                                                        patient harm if treatment cannot
                                                                        be prescribed.

An individual patient record      Normally low although may be Low direct losses but possible
                                  high for specific high-profile loss of reputation.
                                  patients.




  Security Engineering 1, 2013                                                                 Slide 12
Threat and control analysis

Threat                           Probability   Control                      Feasibility

Unauthorized       user Low                    Only allow system            Low cost of
gains access as system                         management from              implementation but care
manager and makes                              specific locations that      must be taken with key
system unavailable                             are physically secure.       distribution and to
                                                                            ensure that keys are
                                                                            available in the event of
                                                                            an emergency.

Unauthorized         user High                 Require all users to         Technically feasible but
gains access as system                         authenticate themselves      high-cost solution.
user   and      accesses                       using    a     biometric     Possible user
confidential information                       mechanism.                   resistance.
                                               Log all changes           to Simple and transparent
                                               patient information       to to implement and also
                                               track system usage.          supports recovery.



  Security Engineering 1, 2013                                                              Slide 13
Security requirements
  •       Patient information must be downloaded at the start
          of a clinic session to a secure area on the system
          client that is used by clinical staff.
  •       Patient information must not be maintained on
          system clients after a clinic session has finished.
  •       A log on a separate computer from the database
          server must be maintained of all changes made to the
          system database.




Security Engineering 1, 2013                                    Slide 14
Life cycle risk assessment
       •       Risk assessment while the system is being
               developed and after it has been deployed
       •       More information is available - system
               platform, middleware and the system architecture
               and data organisation.
       •       Vulnerabilities that arise from design choices may
               therefore be identified.




Security Engineering 1, 2013                                  Slide 15
Life-cycle risk analysis




Security Engineering 1, 2013                      Slide 16
Design decisions from use of
              off-the-shelf system
  •       System users are authenticated using a
          name/password combination.
  •       The system architecture is client-server with clients
          accessing the system through a standard web
          browser.
  •       Information is presented as an editable web form.




Security Engineering 1, 2013                                 Slide 17
Vulnerabilities associated with
             technology choices




Security Engineering 1, 2013          Slide 18
Security requirements
  •       A password checker shall be made available and
          shall be run daily. Weak passwords shall be reported
          to system administrators.
  •       Access to the system shall only be allowed by
          approved client computers.
  •       All client computers shall have a single, approved
          web browser installed by system administrators.




Security Engineering 1, 2013                               Slide 19
Operational risk assessment




     •       Environment characteristics can lead to new system
             risks
           –       Risk of interruption means that logged in computers are left
                   unattended.
Security Engineering 1, 2013                                              Slide 20
Design for security
  •       Architectural design
        –       how do architectural design decisions affect the security of a
                system?

  •       Good practice
        –       what is accepted good practice when designing secure
                systems?

  •       Design for deployment
        –       what support should be designed into a system to avoid the
                introduction of vulnerabilities when a system is deployed for
                use?


Security Engineering 1, 2013                                             Slide 21
Architectural design
  •       Two fundamental issues have to be considered when
          designing an architecture for security.
        –         Protection
              •       How should the system be organised so that critical assets can
                      be protected against external attack?
        –         Distribution
              •       How should system assets be distributed so that the effects of a
                      successful attack are minimized?

  •       These are potentially conflicting
        –         If assets are distributed, then they are more expensive to
                  protect. If assets are protected, then usability and
                  performance requirements may be compromised.

Security Engineering 1, 2013                                                     Slide 22
Protection – defence in depth




Security Engineering 1, 2013             Slide 23
Layered protection model
             •      Platform-level protection
                   –      Top-level controls on the platform on which a
                          system runs.

             •      Application-level protection
                   –      Specific protection mechanisms built into the
                          application itself e.g. additional password
                          protection.

             •      Record-level protection
                   –      Protection that is invoked when access to specific
                          information is requested


Security Engineering 1, 2013                                                   Slide 24
A layered protection
                               architecture




Security Engineering 1, 2013                      Slide 25
Distribute assets to reduce
                         losses




Security Engineering 1, 2013                Slide 26
Distributed assets
  •       Distributing assets means that attacks on one system
          do not necessarily lead to complete loss of system
          service
  •       Each platform has separate protection features and
          may be different from other platforms so that they do
          not share a common vulnerability
  •       Distribution is particularly important if the risk of
          denial of service attacks is high




Security Engineering 1, 2013                                      Slide 27
Distributed assets in an equity
                trading system




Security Engineering 1, 2013          Slide 28
Key points
  •       Security engineering is concerned with how to
          develop systems that can resist malicious attacks
  •       Security threats can be threats to confidentiality,
          integrity or availability of a system or its data
  •       Security risk management is concerned with
          assessing possible losses from attacks and deriving
          security requirements to minimise losses
  •       Design for security involves architectural design,
          following good design practice and minimising the
          introduction of system vulnerabilities

Security Engineering 1, 2013                                    Slide 29

More Related Content

PPTX
CS5032 L10 security engineering 2 2013
PPTX
Security Engineering 2 (CS 5032 2012)
PPTX
Security case buffer overflow
PPTX
CS 5032 L12 security testing and dependability cases 2013
PPTX
CS5032 L20 cybersecurity 2
PPTX
CS5032 L11 validation and reliability testing 2013
PPT
Software security engineering
PPTX
CS 5032 L2 dependability and security 2013
CS5032 L10 security engineering 2 2013
Security Engineering 2 (CS 5032 2012)
Security case buffer overflow
CS 5032 L12 security testing and dependability cases 2013
CS5032 L20 cybersecurity 2
CS5032 L11 validation and reliability testing 2013
Software security engineering
CS 5032 L2 dependability and security 2013

What's hot (20)

PPTX
CS 5032 L4 requirements engineering 2013
PPTX
CS 5032 L6 reliability and security specification 2013
PPTX
CS 5032 L5 safety specification 2013
PPTX
Security Engineering 1 (CS 5032 2012)
PPTX
CS 5032 L7 dependability engineering 2013
PPTX
CS5032 L19 cybersecurity 1
PPTX
CS 5032 L8 dependability engineering 2 2013
PPTX
CS 5032 L1 critical socio-technical systems 2013
PPTX
Security engineering
PPTX
Database development and security certification and accreditation plan pitwg
PPTX
Ch14-Software Engineering 9
PPTX
Security testing (CS 5032 2012)
PPTX
Ch13 security engineering
PPT
3 secure design principles
PDF
5 Things to Know about Safety and Security of Embedded Systems
PDF
Assessing Risk: Developing a Client/Server Security Architecture,
PPTX
Safety specification (CS 5032 2012)
PDF
Incident response methodology
PPT
Software security engineering
PPSX
2 Security Architecture+Design
CS 5032 L4 requirements engineering 2013
CS 5032 L6 reliability and security specification 2013
CS 5032 L5 safety specification 2013
Security Engineering 1 (CS 5032 2012)
CS 5032 L7 dependability engineering 2013
CS5032 L19 cybersecurity 1
CS 5032 L8 dependability engineering 2 2013
CS 5032 L1 critical socio-technical systems 2013
Security engineering
Database development and security certification and accreditation plan pitwg
Ch14-Software Engineering 9
Security testing (CS 5032 2012)
Ch13 security engineering
3 secure design principles
5 Things to Know about Safety and Security of Embedded Systems
Assessing Risk: Developing a Client/Server Security Architecture,
Safety specification (CS 5032 2012)
Incident response methodology
Software security engineering
2 Security Architecture+Design
Ad

Viewers also liked (14)

PPTX
CS5032 Case study Maroochy water breach
PPTX
CS5032 Case study Kegworth air disaster
PPTX
CS 5032 L18 Critical infrastructure 2: SCADA systems
PPTX
Router forensics
PPTX
Secure Software Development Life Cycle
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
PPTX
Critical systems intro
PPTX
CS5032 Case study Ariane 5 launcher failure
PPTX
System dependability
PPTX
Critical systems engineering
PPTX
CS 5032 L3 socio-technical systems 2013
PPTX
Insulin pump overview
PPTX
Availability and reliability
PPT
Software cost estimation
CS5032 Case study Maroochy water breach
CS5032 Case study Kegworth air disaster
CS 5032 L18 Critical infrastructure 2: SCADA systems
Router forensics
Secure Software Development Life Cycle
CISSP Prep: Ch 4. Security Engineering (Part 2)
Critical systems intro
CS5032 Case study Ariane 5 launcher failure
System dependability
Critical systems engineering
CS 5032 L3 socio-technical systems 2013
Insulin pump overview
Availability and reliability
Software cost estimation
Ad

Similar to CS5032 L9 security engineering 1 2013 (20)

PPT
Software Security Engineering
PDF
Information systems security(1)
PPTX
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
PDF
5 Things to Know about Safety and Security of Embedded Systems
PDF
Design and Analyze Secure Networked Systems - 2
ODP
Network Security Topic 1 intro
PPTX
Information and network security 5 security attacks mechanisms and services
PPT
Ch1 cse
PPT
Computer security overview
 
PPTX
chp1- Information Security Overview.pptx
PPTX
Engnerring documents chapter 134Ch14.pptx
PPTX
Gainful Information Security 2012 services
PPT
ch01.ppt
PDF
Computer security priciple and practice
PPT
ch0001 computer systems security and principles and practices
ODP
Network security Topic 2 overview continued
PPTX
Building a Multi-Layered Defense for Your IBM i Security
PPT
Assuring Reliable and Secure IT Services
PDF
20210629_104540Information Security L1.pdf
Software Security Engineering
Information systems security(1)
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
5 Things to Know about Safety and Security of Embedded Systems
Design and Analyze Secure Networked Systems - 2
Network Security Topic 1 intro
Information and network security 5 security attacks mechanisms and services
Ch1 cse
Computer security overview
 
chp1- Information Security Overview.pptx
Engnerring documents chapter 134Ch14.pptx
Gainful Information Security 2012 services
ch01.ppt
Computer security priciple and practice
ch0001 computer systems security and principles and practices
Network security Topic 2 overview continued
Building a Multi-Layered Defense for Your IBM i Security
Assuring Reliable and Secure IT Services
20210629_104540Information Security L1.pdf

More from Ian Sommerville (12)

PPTX
Ultra Large Scale Systems
PPTX
Resp modellingintro
PPTX
Resilience and recovery
PPTX
LSCITS-engineering
PPTX
Requirements reality
PPTX
Dependability requirements for LSCITS
PPTX
Conceptual systems design
PPTX
Requirements Engineering for LSCITS
PPTX
An introduction to LSCITS
PPTX
Internet worm-case-study
PPTX
Designing software for a million users
PPTX
L17 CS5032 critical infrastructure
Ultra Large Scale Systems
Resp modellingintro
Resilience and recovery
LSCITS-engineering
Requirements reality
Dependability requirements for LSCITS
Conceptual systems design
Requirements Engineering for LSCITS
An introduction to LSCITS
Internet worm-case-study
Designing software for a million users
L17 CS5032 critical infrastructure

CS5032 L9 security engineering 1 2013

  • 1. Security Engineering Lecture 1 Security Engineering 1, 2013 Slide 1
  • 2. Topics covered • Security engineering and security management – Security engineering concerned with applications; security management with infrastructure. • Security risk assessment – Designing a system based on the assessment of security risks. • Design for security – How system architectures have to be designed for security. Security Engineering 1, 2013 Slide 2
  • 3. Security engineering • Tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data. • A sub-field of the broader field of computer security. • Assumes background knowledge of dependability and security concepts (Chapter 10) and security requirements specification (Chapter 12) Security Engineering 1, 2013 Slide 3
  • 4. Security concerns • Confidentiality – Ensuring that data is only accessible to authorised people and organisations • Integrity – Ensuring that external attacks cannot damage data and programs • Availability – Ensuring that external attacks do not compromise the availability of data and programs Security Engineering 1, 2013 Slide 4
  • 5. Application/infrastructure security Build • Application security is Application a software engineering problem where the system is designed to Purchased infrastructure resist attacks. Middleware • Infrastructure security is a systems Platform management problem where the purchased Network infrastructure is configured to resist attacks. Security Engineering 1, 2013 Slide 5
  • 6. System layers where security may be compromised Security Engineering 1, 2013 Slide 6
  • 7. System security management • User and permission management – Adding and removing users from the system and setting up appropriate permissions for users • Software deployment and maintenance – Installing application software and middleware and configuring these systems so that vulnerabilities are avoided. • Attack monitoring, detection and recovery – Monitoring the system for unauthorized access, design strategies for resisting attacks and develop backup and recovery strategies. Security Engineering 1, 2013 Slide 7
  • 8. Security risk management • Risk management is concerned with assessing the possible losses that might ensue from attacks on the system and balancing these losses against the costs of security procedures that may reduce these losses. • Risk management should be driven by an organisational security policy. • Risk management involves – Preliminary risk assessment – Life cycle risk assessment – Operational risk assessment Security Engineering 1, 2013 Slide 8
  • 9. Preliminary risk assessment Security Engineering 1, 2013 Slide 9
  • 10. Misuse cases • Misuse cases are instances of threats to a system • Interception threats – Attacker gains access to an asset • Interruption threats – Attacker makes part of a system unavailable • Modification threats – A system asset if tampered with • Fabrication threats – False information is added to a system Security Engineering 1, 2013 Slide 10
  • 11. Security Engineering 1, 2013 Slide 11
  • 12. Asset analysis Asset Value Exposure The information system High. Required to support all High. Financial loss as clinics clinical consultations. Potentially may have to be canceled. Costs safety-critical. of restoring system. Possible patient harm if treatment cannot be prescribed. The patient database High. Required to support all High. Financial loss as clinics clinical consultations. Potentially may have to be canceled. Costs safety-critical. of restoring system. Possible patient harm if treatment cannot be prescribed. An individual patient record Normally low although may be Low direct losses but possible high for specific high-profile loss of reputation. patients. Security Engineering 1, 2013 Slide 12
  • 13. Threat and control analysis Threat Probability Control Feasibility Unauthorized user Low Only allow system Low cost of gains access as system management from implementation but care manager and makes specific locations that must be taken with key system unavailable are physically secure. distribution and to ensure that keys are available in the event of an emergency. Unauthorized user High Require all users to Technically feasible but gains access as system authenticate themselves high-cost solution. user and accesses using a biometric Possible user confidential information mechanism. resistance. Log all changes to Simple and transparent patient information to to implement and also track system usage. supports recovery. Security Engineering 1, 2013 Slide 13
  • 14. Security requirements • Patient information must be downloaded at the start of a clinic session to a secure area on the system client that is used by clinical staff. • Patient information must not be maintained on system clients after a clinic session has finished. • A log on a separate computer from the database server must be maintained of all changes made to the system database. Security Engineering 1, 2013 Slide 14
  • 15. Life cycle risk assessment • Risk assessment while the system is being developed and after it has been deployed • More information is available - system platform, middleware and the system architecture and data organisation. • Vulnerabilities that arise from design choices may therefore be identified. Security Engineering 1, 2013 Slide 15
  • 16. Life-cycle risk analysis Security Engineering 1, 2013 Slide 16
  • 17. Design decisions from use of off-the-shelf system • System users are authenticated using a name/password combination. • The system architecture is client-server with clients accessing the system through a standard web browser. • Information is presented as an editable web form. Security Engineering 1, 2013 Slide 17
  • 18. Vulnerabilities associated with technology choices Security Engineering 1, 2013 Slide 18
  • 19. Security requirements • A password checker shall be made available and shall be run daily. Weak passwords shall be reported to system administrators. • Access to the system shall only be allowed by approved client computers. • All client computers shall have a single, approved web browser installed by system administrators. Security Engineering 1, 2013 Slide 19
  • 20. Operational risk assessment • Environment characteristics can lead to new system risks – Risk of interruption means that logged in computers are left unattended. Security Engineering 1, 2013 Slide 20
  • 21. Design for security • Architectural design – how do architectural design decisions affect the security of a system? • Good practice – what is accepted good practice when designing secure systems? • Design for deployment – what support should be designed into a system to avoid the introduction of vulnerabilities when a system is deployed for use? Security Engineering 1, 2013 Slide 21
  • 22. Architectural design • Two fundamental issues have to be considered when designing an architecture for security. – Protection • How should the system be organised so that critical assets can be protected against external attack? – Distribution • How should system assets be distributed so that the effects of a successful attack are minimized? • These are potentially conflicting – If assets are distributed, then they are more expensive to protect. If assets are protected, then usability and performance requirements may be compromised. Security Engineering 1, 2013 Slide 22
  • 23. Protection – defence in depth Security Engineering 1, 2013 Slide 23
  • 24. Layered protection model • Platform-level protection – Top-level controls on the platform on which a system runs. • Application-level protection – Specific protection mechanisms built into the application itself e.g. additional password protection. • Record-level protection – Protection that is invoked when access to specific information is requested Security Engineering 1, 2013 Slide 24
  • 25. A layered protection architecture Security Engineering 1, 2013 Slide 25
  • 26. Distribute assets to reduce losses Security Engineering 1, 2013 Slide 26
  • 27. Distributed assets • Distributing assets means that attacks on one system do not necessarily lead to complete loss of system service • Each platform has separate protection features and may be different from other platforms so that they do not share a common vulnerability • Distribution is particularly important if the risk of denial of service attacks is high Security Engineering 1, 2013 Slide 27
  • 28. Distributed assets in an equity trading system Security Engineering 1, 2013 Slide 28
  • 29. Key points • Security engineering is concerned with how to develop systems that can resist malicious attacks • Security threats can be threats to confidentiality, integrity or availability of a system or its data • Security risk management is concerned with assessing possible losses from attacks and deriving security requirements to minimise losses • Design for security involves architectural design, following good design practice and minimising the introduction of system vulnerabilities Security Engineering 1, 2013 Slide 29